Haynes and Boone, Llp
Partner
Mcdermott Will & Emery Llp
Partner
K&L Gates Jul 2016 - Nov 2017
Partner
Thermo Fisher Scientific Mar 2015 - Jun 2016
Director Ip Counsel
Thermo Fisher Scientific Feb 1, 2014 - Mar 2015
Ip Business Segment Lead - Genetic Analysis Instruments
Education:
Chicago - Kent College of Law, Illinois Institute of Technology 2004 - 2006
Doctor of Jurisprudence, Doctorates, Law
Illinois Institute of Technology 1996 - 2000
Bachelors, Bachelor of Science, Chemical Engineering
Chicago - Kent College of Law
Skills:
Intellectual Property Patents Patent Prosecution Licensing Patentability Medical Devices Patent Applications Trademarks Pharmaceutical Industry R&D Patent Litigation Invention Patent Law Copyright Law Chemistry Cross Functional Team Leadership Prosecution
Bell, Boyd & Lloyd LLP 70 West Madison Street, Suite 3100, Chicago, IL 60602
Licenses:
Illinois - Active And Authorized To Practice Law 2006
Education:
Chicago-Kent College of Law Illinois Institute of Technology Degree - JD - Juris Doctor - Law Graduated - 2006 IIIinois Institute of Technology Degree - BS - Bachelor of Science Graduated - 2000
- Cupertino CA, US Paresh B. Sawant - Fremont CA, US Delziel J. Fernandes - San Jose CA, US Sergey Sitnikov - San Jose CA, US Arun G. Mathias - Los Altos CA, US Jason A. Novak - San Francisco CA, US Krisztian Kiss - Hayward CA, US Rafael L. Rivera-Barreto - Santa Clara CA, US Chandiramohan Vasudevan - San Jose CA, US Vladimir M. Appel - Los Altos CA, US
This disclosure relates to techniques for performing Wi-Fi authentication in a wireless communication system. Public key cryptography may be used to enhance the confidentiality of the user's permanent identity in transit. In some embodiments, a RSA-OAEP(SHA-256) encryption scheme may be used to protect the permanent identity when the EAP client needs to send the user's permanent identity to the server in the absence of pseudonym or fast re-authentication identity. In some embodiments, a server certificate is used to authenticate a iWLAN tunnel to protect an IMSI during setup of a Wi-Fi call. Using the methods described herein on both or either of the EAP client and server side may offer improved privacy protection.
Techniques For Managing Advertisement Attributions While Preserving User Privacy
- Cupertino CA, US Jason A. NOVAK - Chicago IL, US Joseph A. TYSON - Redwood City CA, US Dana J. DUBOIS - San Francisco CA, US Jakob D. SWANK - Gilroy CA, US Darren M. LEW - Los Altos CA, US Dmitriy Y. FILYUSHIN - Santa Cruz CA, US Katherine B. SKINNER - San Francisco CA, US Ross F. LeBEAU - South San Francisco CA, US Payam MIRRASHIDI - Los Altos CA, US Guy L. TRIBBLE - Hillsborough CA, US Jeffrey L. ROBBIN - Los Altos CA, US Sam H. GHARABALLY - San Carlos CA, US
International Classification:
G06Q 30/02 H04L 29/06
Abstract:
The embodiments set forth techniques for managing advertisement attributions. A first technique can be implemented by an “app store” application, and include the steps of (1) receiving, from a first user application, a request to view a second user application, where the request includes a set of digitally-signed parameters that are specific to an advertising campaign (provided by an advertisement network) for the second user application that is presented by the first user application. In turn, and in response to identifying that the second user application satisfies at least one criterion, the app store application provides the set of digitally-signed parameters to an advertisement metrics manager that: (i) verifies the set of digitally-signed parameters, and (ii) indicates, to the advertisement network, that business logic should be carried out in association with the first user application and the second user application. A second technique for managing advertisement attributions is also disclosed.
- Cupertino CA, US Jason A. NOVAK - San Francisco CA, US Samuel D. POST - Great Falls MT, US Zhu JI - San Jose CA, US
International Classification:
H04L 29/06 H04L 12/24 H04W 12/06
Abstract:
A wireless device determines a location, identifies a mobile network operator (MNO), and/or experiences a network event. In some instances, the wireless device recognizes a base station as being operated by the MNO. Based on the location, the MNO and/or the network event, the wireless device determines a security action. The security action can include one or more of: (i) ignoring a network command associated with the network event, (ii) providing an alert notification via a user interface of the wireless device alerting a user of a security risk associated with the location, MNO, and/or network event, or (iii) ignoring communication from the base station temporarily or for an indefinite period of time. In some instances, the security action includes proceeding with normal communication with the base station at the location using network services of the MNO.
Protection Of The Ue Identity During 802.1X Carrier Hotspot And Wi-Fi Calling Authentication
- Cupertino CA, US Paresh B. Sawant - Fremont CA, US Delziel J. Fernandes - San Jose CA, US Sergey Sitnikov - San Jose CA, US Arun G. Mathias - Los Altos CA, US Jason A. Novak - San Francisco CA, US Krisztian Kiss - Hayward CA, US Rafael L. Rivera-Barreto - Santa Clara CA, US Chandiramohan Vasudevan - San Jose CA, US Vladimir M. Appel - Los Altos CA, US
International Classification:
H04W 12/02 H04L 29/06 H04L 9/32 H04W 12/06
Abstract:
This disclosure relates to techniques for performing Wi-Fi authentication in a wireless communication system. Public key cryptography may be used to enhance the confidentiality of the user's permanent identity in transit. In some embodiments, a RSA-OAEP (SHA-256) encryption scheme may be used to protect the permanent identity when the EAP client needs to send the user's permanent identity to the server in the absence of pseudonym or fast re-authentication identity. In some embodiments, a server certificate is used to authenticate a iWLAN tunnel to protect an IMSI during setup of a Wi-Fi call. Using the methods described herein on both or either of the EAP client and server side may offer improved privacy protection.
A set of watch straps include a first strap, the first strap including a first band, a first adapter, and a first lug connected in series, and a second strap, the second strap including a second band, a second adapter, and a second lug connected in series. The first lug is configured to slide into a first strap receiving groove of the watch, and the second lug is configured to slide into a second strap receiving groove of the watch. At least one of the first strap and the second strap is reversible.
Repackaging Media Content Data With Anonymous Identifiers
- Cupertino CA, US Prasad Rallabandi - Saratoga CA, US Jason Novak - Cupertino CA, US Sagar Joshi - San Jose CA, US Todd Michael Teresi - Los Gatos CA, US Erik C. Neuenschwander - San Mateo CA, US
International Classification:
H04W 4/02 H04W 4/20 H04W 24/08
Abstract:
Systems, methods, and computer-readable storage media for maintaining user anonymity in content statistics. A system can first receive a media content request from a client device. The media content request can include a user account identifier and a content identifier. The content identifier can be different and separate from the user account identifier and a device identifier associated with the client device, and the content identifier can identify content presented at the client device. Next, the system can store the user account identifier and the content identifier in separate locations without attributing the content identifier to the user account identifier. In response to the media content request, the system can transmit a media content item to the client device based on the user account identifier. The system can also report the content presented at the client device with the content identifier and without the user account identifier.
Name / Title
Company / Classification
Phones & Addresses
Jason Novak Manager
Starbucks Eating Places
2525 1/2 N Clark St, Chicago, IL 60614 Website: starbucks.com
2063 N Clark St, Chicago, IL 60614 2525 N Clark St, Chicago, IL 60614 7735256231, 7732960898, 7732960898
Jason Novak
NOVAK LANDSCAPE LLC
Wikipedia References
Jason Novak
Work:
Position:
Author • Musician • Vocalist
Skills & Activities:
In 1988, while they were attending DePaul University, Jason and his brother Ethan Novak started the industrial rock band project Acumen ( the band was renamed Acumen Nation for legal reasons.
Long Elementary School Dearborn MI 1981-1984, Snow Elementary School Dearborn MI 1984-1988, O.L. Smith Middle School Dearborn MI 1988-1989, East Cobb Middle School Marietta GA 1989-1990