Anthony Butler

Anthony Butler

الرياض السعودية
١٤ ألف متابع أكثر من 500 زميل

نبذة عني

I am a globally recognized technology leader and Distinguished Engineer, based in Riyadh,…

مقالات Anthony

النشاط

انضم الآن لعرض كل النشاط

التعليم

التراخيص والشهادات

براءات الاختراع

  • Secure virtual meeting vaults to protect user privacy

    تاريخ الإصدار ⁦ US20240323320A1

    A computer-implemented method, according to one embodiment, includes receiving, from a first user device associated with a first user in a shared virtual world, a request to create a secure virtual meeting vault. In response to receiving the request, the secure virtual meeting vault is created. The secure virtual meeting vault runs on a secured container computing environment that is separate from the shared virtual world. The method further includes teleporting an avatar representing a first…

    A computer-implemented method, according to one embodiment, includes receiving, from a first user device associated with a first user in a shared virtual world, a request to create a secure virtual meeting vault. In response to receiving the request, the secure virtual meeting vault is created. The secure virtual meeting vault runs on a secured container computing environment that is separate from the shared virtual world. The method further includes teleporting an avatar representing a first user in the shared virtual world to the secure virtual meeting vault. In response to a determination that an event within the secure virtual meeting vault has concluded, the secure virtual meeting vault is verifiably destroyed. A computer program product, according to another embodiment, includes a computer readable storage medium having program instructions embodied therewith. The program instructions are readable and/or executable by a computer to cause the computer to perform the foregoing method.

    عرض براءة الاختراع
  • Decenteralised biometric signing of smart contracts

    تاريخ الإصدار ⁦ US 10541818

    A method and system for decentralized biometric signing of a digital contract. A digital identity including a private key is created. The private key was encrypted on a mobile device via use of captured biometric data. A digital hash of the digital contract is generated. A user using biometric data is authenticated. Usage of the biometric data is authorized. Responsive to the usage of the biometric data being authorized, the encrypted private key is decrypted. The digital hash is signed with…

    A method and system for decentralized biometric signing of a digital contract. A digital identity including a private key is created. The private key was encrypted on a mobile device via use of captured biometric data. A digital hash of the digital contract is generated. A user using biometric data is authenticated. Usage of the biometric data is authorized. Responsive to the usage of the biometric data being authorized, the encrypted private key is decrypted. The digital hash is signed with the decrypted private key. The signed digital hash is stored in a blockchain.

  • Data Leak Prevention Enforcement based on Learned Document Classification

    تاريخ الإصدار ⁦ US 20150254469

    The present disclosure relates generally to the field of automatically learning and automatically adapting to perform classification of protected data. In various examples, learning and adapting to perform classification of protected data may be implemented in the form of systems, methods and/or algorithms.

  • Dynamic Sandboxing based on Intruder Intent

    تاريخ الإصدار ⁦ US 9535731

    A method of security sandboxing which may include detecting an illicit intrusion to a computer on a first computer system; cloning the intruded computer; directing all traffic from the illicit intrusion to the cloned computer; observing activities of the illicit intrusion interacting with the cloned computer; and dynamically adapting the cloned computer to perform activities of predicted interest to the illicit intrusion based on the observed activities of the illicit intrusion. The steps of…

    A method of security sandboxing which may include detecting an illicit intrusion to a computer on a first computer system; cloning the intruded computer; directing all traffic from the illicit intrusion to the cloned computer; observing activities of the illicit intrusion interacting with the cloned computer; and dynamically adapting the cloned computer to perform activities of predicted interest to the illicit intrusion based on the observed activities of the illicit intrusion. The steps of the method may be performed by one or more computing devices.

    مبتكرون آخرون
    عرض براءة الاختراع
  • Managing distribution of software updates in near field communication (NFC) mobile devices

    تاريخ الإصدار ⁦ US 9301132

    A method, system and a computer program product for managing distribution of software updates in Near Field Communication (NFC) mobile devices includes retrieving information of one or more softwares in one or more NFC mobile devices by a NFC reader in communication range with the one or more NFC mobile devices, transmitting the retrieved information from the NFC reader to a distribution server which determines if the one or more softwares requires an update based on the retrieved information…

    A method, system and a computer program product for managing distribution of software updates in Near Field Communication (NFC) mobile devices includes retrieving information of one or more softwares in one or more NFC mobile devices by a NFC reader in communication range with the one or more NFC mobile devices, transmitting the retrieved information from the NFC reader to a distribution server which determines if the one or more softwares requires an update based on the retrieved information, in response to said determination, receiving an available updated software or update components of the one or more softwares from the distribution server to the NFC reader and transmitting thereof from the NFC reader to a secure element of the one or more NFC mobile devices whose one or more softwares require an updation.

    مبتكرون آخرون
  • Mobile application data storage allocation

    تاريخ الإصدار ⁦ US US 14/469,765

    In a method for allocating and storing application data for applications of mobile devices, one or more processors receive one or more portions of application data of an application selected by a user of a mobile computing device. The one or more processors determine where to store each of the one or more portions of application data based on predefined instructions. The one or more processors cause each of the one or more portions of application data to be stored based on the determination.

    مبتكرون آخرون
  • Mobile Application Data Storage

    قدم ⁦ US 20150074275

    In a method for allocating and storing application data for applications of mobile devices, one or more processors receive one or more portions of application data of an application selected by a user of a mobile computing device. The one or more processors determine where to store each of the one or more portions of application data based on predefined instructions. The one or more processors cause each of the one or more portions of application data to be stored based on the determination.

    مبتكرون آخرون
  • Executing Electronic Contract on NFC-enabled Mobile Devices

    قدم ⁦ US 20150134561

    A method, system and/or NFC (Near field communication) enabled mobile device is provided for executing an electronic contract on NFC enabled mobile devices. A first contracting party is provided to apply an electronic signature thereof in an electronic contract provided on a first NFC enabled mobile device used by the first contracting party, the electronic signature is applied through a secure element of the first NFC enabled mobile device. The electronically signed contract is transmitted…

    A method, system and/or NFC (Near field communication) enabled mobile device is provided for executing an electronic contract on NFC enabled mobile devices. A first contracting party is provided to apply an electronic signature thereof in an electronic contract provided on a first NFC enabled mobile device used by the first contracting party, the electronic signature is applied through a secure element of the first NFC enabled mobile device. The electronically signed contract is transmitted from the first NFC enabled mobile device to a second NFC enabled mobile device used by a second contracting party for providing the second contracting party to apply an electronic signature thereof in the received electronically signed contract from the first NFC enabled mobile device through a secure element in the second NFC enabled mobile device.

    مبتكرون آخرون
  • Accessing Local Applications When Roaming Using A NFC Mobile Device

    قدم ⁦ US US2014/0380044Al

    A method of accessing local applications when roaming on a NFC mobile device may include creating a first partition and a second partition on a secure element (SE) of a subscriber identification module (SIM) of a near field communication (NFC) enabled device. The home TSM separates the first partition and the second partition by public key encryption. The home TSM generates cryptographic keys in response to a request by a roaming TSM for access to the second partition of the SIM. Following the…

    A method of accessing local applications when roaming on a NFC mobile device may include creating a first partition and a second partition on a secure element (SE) of a subscriber identification module (SIM) of a near field communication (NFC) enabled device. The home TSM separates the first partition and the second partition by public key encryption. The home TSM generates cryptographic keys in response to a request by a roaming TSM for access to the second partition of the SIM. Following the exchange of security keys, the home TSM delegates to the roaming TSM access to the sec­ond partition of the SIM.

    مبتكرون آخرون
  • Detection of Steganograpy at the Perimeter

    قدم ⁦ US 20160283746

    A method to detect a plurality of steganography based information embedded in a multimedia file associated with an online computer environment is provided. The method may include detecting the multimedia file entering or exiting an online environment associated with a network or an organization. The method may also include comparing a stored hashed version of the detected multimedia file to the detected version of the multimedia file. The method may also include comparing a stored perceptual…

    A method to detect a plurality of steganography based information embedded in a multimedia file associated with an online computer environment is provided. The method may include detecting the multimedia file entering or exiting an online environment associated with a network or an organization. The method may also include comparing a stored hashed version of the detected multimedia file to the detected version of the multimedia file. The method may also include comparing a stored perceptual hashed version of the detected multimedia file to the detected version of the multimedia file based on the detected multimedia file not matching the stored hashed version of the detected multimedia file. The method may further include assigning a flag attribute to the detected multimedia file based on the detected multimedia file matching the stored perceptual hashed version of the detected multimedia file.

    مبتكرون آخرون

المشروعات

  • Industry Sector AI strategy and implementation

    -

  • National Emerging Technology Strategy

    -

  • Wholesale Central Bank Digital Currency (CBDC)

    -

  • National Blockchain Strategy

    -

  • Platform for tracking hydrocarbon supply chain for oil and gas industry

    -

  • Blockchain Strategy for Riyadh

    -

المزيد من أنشطة Anthony

عرض ملف Anthony الشخصي الكامل

  • مشاهدة الأشخاص المشتركين الذين تعرفهم
  • تقديم تعارف
  • تواصل مع Anthony مباشرة
انضم لعرض الملف الشخصي الكامل

ملفات شخصية أخرى مشابهة

أعضاء آخرون يحملون اسم ⁦⁩Anthony Butler