Patents by Inventor Lanny D. Natucci, JR.
Lanny D. Natucci, JR. has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Publication number: 20220035895Abstract: Techniques described herein provide multi-factor authentication based on positioning data. Generally described, configurations disclosed herein enable a system to authorize a particular action using positioning data, and possibly other data, associated with an identity. For example, when a user wishes to change a password or access a secured account, the system can authenticate a user if a device associated with the user is located in the secure area. The system can authenticate a user if a requested operation and/or a predetermined pattern of movement associated with the user is detected. For instance, the system allows the user to change the password when the user's computer has followed a predetermined pattern of movement, and when one or more verification procedures meets one or more criteria while the location of the computing device is within the predetermined area.Type: ApplicationFiled: August 10, 2021Publication date: February 3, 2022Inventors: Stephen P. DiAcetis, David Mahlon Hoover, Cristina del Amo Casado, Lanny D. Natucci, JR., Janet Lynn Schneider, Sanjib Saha, Fernando Gonzalez, Jonathan Matthew Kay
-
Patent number: 11115423Abstract: Techniques described herein provide multi-factor authentication based on positioning data. Generally described, configurations disclosed herein enable a system to authorize a particular action using positioning data, and possibly other data, associated with an identity. For example, when a user wishes to change a password or access a secured account, the system can authenticate a user if a device associated with the user is located in the secure area. The system can authenticate a user if a requested operation and/or a predetermined pattern of movement associated with the user is detected. For instance, the system allows the user to change the password when the user's computer has followed a predetermined pattern of movement, and when one or more verification procedures meets one or more criteria while the location of the computing device is within the predetermined area.Type: GrantFiled: July 10, 2019Date of Patent: September 7, 2021Assignee: Microsoft Technology Licensing, LLCInventors: Stephen P. DiAcetis, David Mahlon Hoover, Cristina del Amo Casado, Lanny D. Natucci, Jr., Janet Lynn Schneider, Sanjib Saha, Fernando Gonzalez, Jonathan Matthew Kay
-
Publication number: 20200045055Abstract: Techniques described herein provide multi-factor authentication based on positioning data. Generally described, configurations disclosed herein enable a system to authorize a particular action using positioning data, and possibly other data, associated with an identity. For example, when a user wishes to change a password or access a secured account, the system can authenticate a user if a device associated with the user is located in the secure area. The system can authenticate a user if a requested operation and/or a predetermined pattern of movement associated with the user is detected. For instance, the system allows the user to change the password when the user's computer has followed a predetermined pattern of movement, and when one or more verification procedures meets one or more criteria while the location of the computing device is within the predetermined area.Type: ApplicationFiled: July 10, 2019Publication date: February 6, 2020Inventors: Stephen P. DiAcetis, David Mahlon Hoover, Cristina del Amo Casado, Lanny D. Natucci, JR., Janet Lynn Schneider, Sanjib Saha, Fernando Gonzalez, Jonathan Matthew Kay
-
Patent number: 10389731Abstract: Techniques described herein provide multi-factor authentication based on positioning data. Generally described, configurations disclosed herein enable a system to authorize a particular action using positioning data, and possibly other data, associated with an identity. For example, when a user wishes to change a password or access a secured account, the system can authenticate a user if a device associated with the user is located in the secure area. The system can authenticate a user if a requested operation and/or a predetermined pattern of movement associated with the user is detected. For instance, the system allows the user to change the password when the user's computer has followed a predetermined pattern of movement, and when one or more verification procedures meets one or more criteria while the location of the computing device is within the predetermined area.Type: GrantFiled: November 22, 2016Date of Patent: August 20, 2019Assignee: Microsoft Technology Licensing, LLCInventors: Stephen P. DiAcetis, David Mahlon Hoover, Cristina del Amo Casado, Lanny D. Natucci, Jr., Janet Lynn Schneider, Sanjib Saha, Fernando Gonzalez, Jonathan Matthew Kay
-
Patent number: 9998866Abstract: The location of a computing device is determined, and the location of an area of interest that is a geographic area referred to as a geo-fence is identified. The accuracy of the determined location of the computing device has an associated uncertainty, so the exact position of the computing device cannot typically be pinpointed. In light of this, the uncertainty associated with the determined location is evaluated relative to the size of the geo-fence in order to determine whether the computing device is inside the geo-fence or outside the geo-fence. Based on this determination, various actions can be taken if the user is entering the geo-fence, exiting the geo-fence, remaining in the geo-fence for at least a threshold amount of time, and so forth.Type: GrantFiled: June 14, 2013Date of Patent: June 12, 2018Assignee: MICROSOFT TECHNOLOGY LICENSING, LLCInventors: Lanny D. Natucci, Jr., Janet L Schneider, Mark A. Inderhees, Frank Gorgenyi, Stuart J. Harper, Cristina del Amo Casado, Fernando Gonzalez, Sanjib Saha, Shaun C. Hedrick
-
Publication number: 20180145990Abstract: Techniques described herein provide multi-factor authentication based on positioning data. Generally described, configurations disclosed herein enable a system to authorize a particular action using positioning data, and possibly other data, associated with an identity. For example, when a user wishes to change a password or access a secured account, the system can authenticate a user if a device associated with the user is located in the secure area. The system can authenticate a user if a requested operation and/or a predetermined pattern of movement associated with the user is detected. For instance, the system allows the user to change the password when the user's computer has followed a predetermined pattern of movement, and when one or more verification procedures meets one or more criteria while the location of the computing device is within the predetermined area.Type: ApplicationFiled: November 22, 2016Publication date: May 24, 2018Inventors: Stephen P. DiAcetis, David Mahlon Hoover, Cristina del Amo Casado, Lanny D. Natucci, JR., Janet Lynn Schneider, Sanjib Saha, Fernando Gonzalez, Jonathan Matthew Kay
-
Publication number: 20140370909Abstract: Various different areas of interest are identified, these areas being geographic areas that are also referred to as geo-fences. Whether a computing device is in a geo-fence can be determined based on the location of the geo-fence and the location of the computing device. The location of a computing device can be determined using various different location determination techniques, such as wireless networking triangulation, cellular positioning, Global Navigation Satellite System positioning, network address positioning, and so forth. Various power saving techniques are implemented to determine which techniques are used and when such techniques are used to reduce power consumption in the computing device.Type: ApplicationFiled: June 14, 2013Publication date: December 18, 2014Inventors: Lanny D. Natucci, JR., Janet L. Schneider, Mark A. Inderhees, Robert R. Dufalo, Jonathan M. Kay, Cristina del Amo Casado, Sanjib Saha, Fernando Gonzalez, Priyanka B. Vegesna
-
Publication number: 20140370910Abstract: The location of a computing device is determined, and the location of an area of interest that is a geographic area referred to as a geo-fence is identified. The accuracy of the determined location of the computing device has an associated uncertainty, so the exact position of the computing device cannot typically be pinpointed. In light of this, the uncertainty associated with the determined location is evaluated relative to the size of the geo-fence in order to determine whether the computing device is inside the geo-fence or outside the geo-fence. Based on this determination, various actions can be taken if the user is entering the geo-fence, exiting the geo-fence, remaining in the geo-fence for at least a threshold amount of time, and so forth.Type: ApplicationFiled: June 14, 2013Publication date: December 18, 2014Inventors: Lanny D. Natucci, JR., Janet L. Schneider, Mark A. Inderhees, Frank Gorgenyi, Stuart J. Harper, Cristina del Amo Casado, Fernando Gonzalez, Sanjib Saha, Shaun C. Hedrick