Search

Ersin Uzun Phones & Addresses

  • Hoboken, NJ
  • Jersey City, NJ
  • San Francisco, CA

Resumes

Resumes

Ersin Uzun Photo 1

Ersin Uzun

Publications

Us Patents

Privacy-Preserving Behavior Targeting For Digital Coupons

US Patent:
20130159192, Jun 20, 2013
Filed:
Dec 16, 2011
Appl. No.:
13/329020
Inventors:
Kurt Partridge - Palo Alto CA, US
Ersin Uzun - Mountain View CA, US
Cong Wang - Chicago IL, US
Manas Ashok Pathak - Pittsburgh PA, US
Assignee:
PALO ALTO RESEARCH CENTER INCORPORATED - Palo Alto CA
International Classification:
G06Q 30/02
H04L 9/28
US Classification:
705 50, 705 141
Abstract:
A smart coupon-delivery system provides targeted coupons to a user using a criteria-encoded message received from a coupon server. The criteria-encoded message is generated by the coupon server from a behavior-criteria vector that indicates criteria for selecting a recipient of a digital coupon. The system then generates a user-behavior vector to indicate one or more behavior patterns of an end-user, and encodes the user-behavior vector to produce a behavior-encoded message. The system then determines whether the end-user is eligible to receive the digital coupon based on the criteria-encoded message and the behavior-encoded message. If the system determines that the end-user is eligible, the system presents the digital coupon to the end-user.

Transaction Verification On Rfid Enabled Payment And Transaction Instruments

US Patent:
20130179349, Jul 11, 2013
Filed:
Mar 1, 2013
Appl. No.:
13/782764
Inventors:
The Regents of the University of California - Oakland CA, US
Ersin Uzun - Irvine CA, US
Assignee:
THE REGENTS OF THE UNIVERSITY OF CALIFORNIA - Oakland CA
International Classification:
G06Q 20/32
US Classification:
705 44
Abstract:
A display enabled RFID tag (DERT) receives transaction details from the reader. DERT verifies that the details match their counterparts in the reader public key certificate. The process is aborted in case of a mismatch. DERT extracts and displays user-verifiable data. It then enters a countdown stage that lasts for a predetermined duration. A user observes the transaction information and, if the transaction amount and other details are deemed correct, presses an accept button provided on the DERT before the timer runs out. DERT signs the time-stamped transaction statement and sends it to the reader. This signed statement is then sent to the payment gateway and eventually to the financial institution that issued the payment DERT.

Transaction Verification On Rfid Enabled Payment And Transaction Instruments

US Patent:
20130179686, Jul 11, 2013
Filed:
Mar 1, 2013
Appl. No.:
13/782827
Inventors:
The Regents of the University of California - Oakland CA, US
Ersin Uzun - Irvine CA, US
Assignee:
THE REGENTS OF THE UNIVERSITY OF CALIFORNIA - Oakland CA
International Classification:
H04L 9/08
H04W 12/06
US Classification:
713168
Abstract:
A display enabled RFID tag (DERT) receives transaction details from the reader. DERT verifies that the details match their counterparts in the reader public key certificate. The process is aborted in case of a mismatch. DERT extracts and displays user-verifiable data. It then enters a countdown stage that lasts for a predetermined duration. A user observes the transaction information and, if the transaction amount and other details are deemed correct, presses an accept button provided on the DERT before the timer runs out. DERT signs the time-stamped transaction statement and sends it to the reader. This signed statement is then sent to the payment gateway and eventually to the financial institution that issued the payment DERT.

Computer-Implemented System And Method For Protecting Sensitive Data Via Data Re-Encryption

US Patent:
20170366519, Dec 21, 2017
Filed:
Jun 17, 2016
Appl. No.:
15/185575
Inventors:
- Palo Alto CA, US
Shantanu Rane - Menlo Park CA, US
Ersin Uzun - Campbell CA, US
Alejandro E. Brito - Mountain View CA, US
International Classification:
H04L 29/06
G06F 17/30
Abstract:
A computer-implemented method for protecting sensitive data via data re-encryption is provided. Encrypted data is maintained. A data query is received from a user associated with a public key and a secret key. Results of the query are computed by identifying at least a portion of the encrypted data and by adding plaintext for the identified portion of the encrypted data as the results. A re-encryption key is generated for the results using the public key of the user and the results are re-encrypted using the re-encryption key. The re-encrypted results are then transmitted to the user.

System For Key Exchange In A Content Centric Network

US Patent:
20170366526, Dec 21, 2017
Filed:
Aug 30, 2017
Appl. No.:
15/690485
Inventors:
- San Jose CA, US
Marc E. Mosko - Palo Alto CA, US
Ersin Uzun - Campbell CA, US
International Classification:
H04L 29/06
H04L 9/08
H04W 12/04
Abstract:
One embodiment provides a system that facilitates secure communication between computing entities. During operation, the system generates, by a content-consuming device, a first key based on a first consumer-share key and a previously received producer-share key. The system constructs a first interest packet that includes the first consumer-share key and a nonce token which is used as a pre-image of a previously generated first nonce, wherein the first interest has a name that includes a first prefix, and wherein the first nonce is used to establish a session between the content-consuming device and a content-producing device. In response to the nonce token being verified by the content-producing device, the system receives a first content-object packet with a payload that includes a first resumption indicator encrypted based on a second key. The system generates the second key based on a second consumer-share key and the first content-object packet.

Computer-Implemented System And Method For Automatically Identifying Attributes For Anonymization

US Patent:
20170124336, May 4, 2017
Filed:
Nov 3, 2015
Appl. No.:
14/931802
Inventors:
- Palo Alto CA, US
Shantanu Rane - Menlo Park CA, US
Alejandro E. Brito - Mountain View CA, US
Ersin Uzun - Campbell CA, US
International Classification:
G06F 21/60
G06F 17/30
G06F 17/27
G06F 21/62
H04L 29/06
Abstract:
A computer-implemented system and method for automatically identifying attributes for anonymization is provided. A dataset of attributes is accessed. Each attribute in the dataset is associated with a plurality of values. The values of the dataset are encrypted and the attributes are processed by assigning a sensitivity level to each of the attributes. One or more of the attributes are selected from the dataset for anonymization based on the assigned sensitivity levels.

System For Key Exchange In A Content Centric Network

US Patent:
20170126643, May 4, 2017
Filed:
Oct 29, 2015
Appl. No.:
14/927034
Inventors:
- Palo Alto CA, US
Marc E. Mosko - Palo Alto CA, US
Ersin Uzun - Campbell CA, US
Assignee:
PALO ALTO RESEARCH CENTER INCORPORATED - Palo Alto CA
International Classification:
H04L 29/06
Abstract:
One embodiment provides a system that facilitates secure communication between computing entities. During operation, the system generates, by a content-consuming device, a first key based on a first consumer-share key and a previously received producer-share key. The system constructs a first interest packet that includes the first consumer-share key and a nonce token which is used as a pre-image of a previously generated first nonce, wherein the first interest has a name that includes a first prefix, and wherein the first nonce is used to establish a session between the content-consuming device and a content-producing device. In response to the nonce token being verified by the content-producing device, the system receives a first content-object packet with a payload that includes a first resumption indicator encrypted based on a second key. The system generates the second key based on a second consumer-share key and the first content-object packet.

Computer-Implemented System And Method For Analyzing Data Quality

US Patent:
20160352693, Dec 1, 2016
Filed:
Aug 8, 2016
Appl. No.:
15/231689
Inventors:
- Palo Alto CA, US
Shantanu Rane - Menlo Park CA, US
Alejandro E. Brito - Mountain View CA, US
Ersin Uzun - Campbell CA, US
International Classification:
H04L 29/06
Abstract:
A computer-implemented system and method for analyzing data quality is provided. Attributes each associated with one or more elements are maintained. A request from a user is received for determining data quality of at least one attribute based on an interest vector having a listing of the elements of that attribute and a selection of elements of interest. Each element is encrypted. A condensed vector having the same listing of elements as the interest vector is populated with occurrence frequencies for each of the listed elements. The elements of the condensed vector are encrypted by computing an encrypted product of each element in the condensed vector and the corresponding element of the interest vector. An aggregate is determined based on the encrypted products of each element of the interest vector and the corresponding element of the condensed vector. The aggregate is provided as results of the data quality.
Ersin Uzun from Hoboken, NJ, age ~45 Get Report