Imvu
Director of Engineering
Facebook Jul 2014 - Apr 2019
Software Developer
Freak'n Genius Jan 2012 - Jul 2014
Founder and Chief Technology Officer
Yousendit Dec 2010 - Dec 2011
Senior Engineering Manager and Lead Architect
Attassa Jan 2007 - Dec 2010
Founder, Chief Technology Officer
Education:
University of Alberta Sep 1991 - Dec 1997
Bachelors, Bachelor of Science, Computer Engineering
Skills:
Software Development Scrum C# Object Oriented Design Objective C Xml Javascript Start Ups Java Agile Methodologies C++ Software Design System Architecture Product Management Entrepreneurship Cloud Computing Ios Development Win32 Api Security Strategy Project Management Android Development Analytics Amazon Web Services Rtc
Interests:
Tablets Mobile Enterprise Software Consumer Internet
Freak'n Genius since Jan 2012
Founder and CTO
YouSendIt Dec 2010 - Dec 2011
Senior Engineering Manager/Lead Architect
Attassa Jan 2007 - Dec 2010
Founder, CTO
SAFLINK Feb 2000 - Oct 2006
Chief Software Architect/Director of Engineering
Jotter Technologies 1998 - 2000
Lead Developer/Chief Architect
Education:
University of Alberta Sep 1991 - Dec 1997
BSc., Computer Engineering
Skills:
C# Objective-C Scrum Java Object Oriented Design System Architecture iOS development JavaScript XML Product Management C++ Win32 API Start-ups
An apparatus, method and program product for enabling token authentication by generating a secret key using manufacturer controlled information () present on a token (). A computer () typically reads the manufacturer controlled information and applies an cryptographic algorithm () to determine the secret key (). The secret key () may comprise or be used to generate a one-time password () for use in authenticating the token (). Typical manufacturer controlled information () present on the token () includes static, non-writeable/erasable information, such as a serial number () or manufacturer ID (). Where desired, the token authentication is accomplished in the absence of memory or processors on the token that are dedicated to the authentication process, itself. This absence reduces token hardware requirements and associated expenses. The dynamic generation of the cryptographic key () also reduces risks conventionally associated with duplicating static keys stored within token memory. Where desired, token includes a password () and/or a user name () in addition to the manufacturer controlled information () for realizing multiple factor authentication. As such, the password () and user name () stored on the token () may automatically be transmitted to the access device ().
Gregory Jensen - Redmond WA, US Jeremy Kierstead - Issaquah WA, US Jesse McReynolds - Buena Park CA, US Dwayne Mercredi - Bothell WA, US Joachim Vance - Mission Viejo CA, US
Assignee:
SAFLINK CORPORATION - Kirkland WA
International Classification:
H04K 1/00
US Classification:
713186000
Abstract:
An apparatus, method and program product for enabling biometric authentication that includes receiving a biometric submission () at a biometric device (), and in response to an authentication of the submission (), providing a cryptographic credential () from a computer () to the biometric device () for use in a subsequent cryptographic purpose (). In this manner, the biometric device () may subsequently mimic properties of a smart card.
An apparatus, method and program product allow two factor token authentication in the presence of multiple tokens. When multiple tokens are detected, a user desiring access needs merely to provide a unique biometric identifier, referred to as a capture BIR, and that capture BIR is evaluated against a stored BIR associated with at least one of the tokens to determine if access is to be granted. If there is a match, that user is given access. If not, the capture BIR is evaluated against the stored BIR associated with another of the detected tokens. The process may repeat until either a match is found and the user is granted access, or none is found and access is denied. The foregoing occurs without the user having to input any user ID or the like and without the inconvenience or risk of error associated with selecting a user ID from a list of potential user ID's.
An apparatus, method and program product allow two factor token authentication in the presence of multiple tokens. When multiple tokens are detected, a user desiring access needs merely to provide a unique biometric identifier, referred to as a capture BIR, and that capture BIR is evaluated against a stored BIR associated with at least one of the tokens to determine if access is to be granted. If there is a match, that user is given access. If not, the capture BIR is evaluated against the stored BIR associated with another of the detected tokens. The process may repeat until either a match is found and the user is granted access, or none is found and access is denied. The foregoing occurs without the user having to input any user ID or the like and without the inconvenience or risk of error associated with selecting a user ID from a list of potential user ID's.
Initiating Real-Time Games In Video Communications
In one embodiment, a method includes, by a client system of a first user, presenting a communication interface including a plurality of layers, wherein a first layer of the communication interface includes a video communication of the second user, and wherein a second layer of the communication interface includes a thumbnail view of a video communication of the first user, receiving a request from the second user to initiate a first game, receiving a user input indicative an acceptance of the request to initiate the first game, generating a game container containing the first game in a third layer of the communication interface, reducing the first layer to a thumbnail within the communication interface, and overlaying the first layer onto the third layer, wherein the second layer is closed responsive to the overlaying of the first layer onto the third layer.
- Menlo Park CA, US Duckjin Kang - Issaquah WA, US Dwayne B. Mercredi - Kirkland WA, US Aaron Nech - Arlington WA, US
Assignee:
Facebook, Inc. - Menlo Park CA
International Classification:
G06T 13/80 H04N 5/04
Abstract:
Techniques for animating stickers with sound include receiving audio input by a first mobile device; animating a selected image according to an energy level of the audio input using a set of animation frames associated with the selected image in a user interface view of an application executing on the first mobile device; and presenting the animated image concurrently with receiving the audio input. Other embodiments are described and claimed.