Patents by Inventor Mudit Goel

Mudit Goel has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20160092998
    Abstract: Disclosed in some examples are methods, machine readable mediums, and systems for providing a list of skills a member should learn in order to achieve a particular goal. The system may provide a user interface to the member of the social networking service. Through the user interface, the member may select one or more goals that they wish to achieve. Based upon these goals, the list of skills associated with that goal may be determined—this list is a goal set of skills. The goal set of skills may be compared to the member's current skills. Skills in the list of goal skills that the member does not already possess may be recommended to the member.
    Type: Application
    Filed: September 30, 2014
    Publication date: March 31, 2016
    Applicant: Linkedln Corporation
    Inventor: Mudit Goel
  • Publication number: 20160036781
    Abstract: Software for managing access control functions in a network. The software includes a host that receives access control commands or information and calls one or more methods. The methods perform access control functions and communicate access control results or messages to be transmitted. The host may be installed in a network peer seeking access to the network or in a server controlling access to the network. When installed in a peer, the host receives commands and exchanges information with a supplicant. When installed in an access control server, the host receives commands and exchanges information with an authenticator. The host has a flexible architecture that enables multiple features, such as allowing the same methods to be used for authentication by multiple supplicants, providing ready integration of third party access control software, simplifying network maintenance by facilitating upgrades of authenticator software and enabling access control functions other than peer authentication.
    Type: Application
    Filed: October 14, 2015
    Publication date: February 4, 2016
    Inventors: Anthony M. Leibovitz, Mark C. Schurman, Mudit Goel, Paul G. Mayfield, Sudhakar Pasupuleti, Taroon Mandhana, Vivek P. Kamath, Wei Zheng, Xuemei Bao
  • Patent number: 9185091
    Abstract: Software for managing access control functions in a network. The software includes a host that receives access control commands or information and calls one or more methods. The methods perform access control functions and communicate access control results or messages to be transmitted. The host may be installed in a network peer seeking access to the network or in a server controlling access to the network. When installed in a peer, the host receives commands and exchanges information with a supplicant. When installed in an access control server, the host receives commands and exchanges information with an authenticator. The host has a flexible architecture that enables multiple features, such as allowing the same methods to be used for authentication by multiple supplicants, providing ready integration of third party access control software, simplifying network maintenance by facilitating upgrades of authenticator software and enabling access control functions other than peer authentication.
    Type: Grant
    Filed: September 28, 2012
    Date of Patent: November 10, 2015
    Assignee: MICROSOFT TECHNOLOGY LICENSING, LLC
    Inventors: Anthony M. Leibovitz, Mark C. Schurman, Mudit Goel, Paul G. Mayfield, Sudhakar Pasupuleti, Taroon Mandhana, Vivek P. Kamath, Wei Zheng, Xuemei Bao
  • Patent number: 8755773
    Abstract: A system and method for notifying the calling party of acknowledgment of the missed calls by the called party is disclosed. The called party and the calling party can subscribe for the notification service to enable charging for the service. When the calling party initiates a call to the called party it may result in a missed call as the called party may be out of coverage area or busy. When the called party views the record of the missed call a notification is generated on the wireless device by the application on the wireless device of the called party. The notification is then sent to the calling party. The acknowledgement notification may be sent directly to the calling party or via an application server.
    Type: Grant
    Filed: February 16, 2009
    Date of Patent: June 17, 2014
    Assignee: Alcatel Lucent
    Inventors: Mudit Goel, Satish Kanugovi, Sarang Gadgil, Nagendra Bykampadi, Shivani Arora
  • Publication number: 20130024911
    Abstract: Software for managing access control functions in a network. The software includes a host that receives access control commands or information and calls one or more methods. The methods perform access control functions and communicate access control results or messages to be transmitted. The host may be installed in a network peer seeking access to the network or in a server controlling access to the network. When installed in a peer, the host receives commands and exchanges information with a supplicant. When installed in an access control server, the host receives commands and exchanges information with an authenticator. The host has a flexible architecture that enables multiple features, such as allowing the same methods to be used for authentication by multiple supplicants, providing ready integration of third party access control software, simplifying network maintenance by facilitating upgrades of authenticator software and enabling access control functions other than peer authentication.
    Type: Application
    Filed: September 28, 2012
    Publication date: January 24, 2013
    Applicant: Microsoft Corporation
    Inventors: Anthony M. Leibovitz, Mark C. Schurman, Mudit Goel, Paul G. Mayfield, Sudhakar Pasupuleti, Taroon Mandhana, Vivek P. Kamath, Wei Zheng, Xuemei Bao
  • Patent number: 8302166
    Abstract: Systems, devices, and methods for associating network devices with users are described, which can facilitate establishing a secure user to network device association. In various embodiments, the disclosed subject matter facilitates devices providing indication of location and device identity to a user and recognizing the user is in the proximity of the device. The disclosed subject matter provides efficient and secure device to user association and can facilitate performing customized actions based on the nature of the association.
    Type: Grant
    Filed: February 18, 2008
    Date of Patent: October 30, 2012
    Assignee: Microsoft Corporation
    Inventors: Shobana M. Balakrishnan, Mudit Goel, Dinan Srilal Gunawardena, Dave Maltz, Michael Schroeder, Fan Yang
  • Patent number: 8286223
    Abstract: Software for managing access control functions in a network. The software includes a host that receives access control commands or information and calls one or more methods. The methods perform access control functions and communicate access control results or messages to be transmitted. The host may be installed in a network peer seeking access to the network or in a server controlling access to the network. When installed in a peer, the host receives commands and exchanges information with a supplicant. When installed in an access control server, the host receives commands and exchanges information with an authenticator. The host has a flexible architecture that enables multiple features, such as allowing the same methods to be used for authentication by multiple supplicants, providing ready integration of third party access control software, simplifying network maintenance by facilitating upgrades of authenticator software and enabling access control functions other than peer authentication.
    Type: Grant
    Filed: July 8, 2005
    Date of Patent: October 9, 2012
    Assignee: Microsoft Corporation
    Inventors: Anthony M. Leibovitz, Mark C. Schurman, Mudit Goel, Paul G. Mayfield, Sudhakar Pasupuleti, Taroon Mandhana, Vivek P. Kamath, Wei Zheng, Xuemei Bao
  • Publication number: 20120028618
    Abstract: A system and method for notifying the calling party of acknowledgment of the missed calls by the called party is disclosed. The called party and the calling party can subscribe for the notification service to enable charging for the service. When the calling party initiates a call to the called party it may result in a missed call as the called party may be out of coverage area or busy. When the called party views the record of the missed call a notification is generated on the wireless device by the application on the wireless device of the called party. The notification is then sent to the calling party. The acknowledgement notification may be sent directly to the calling party or via an application server.
    Type: Application
    Filed: February 16, 2009
    Publication date: February 2, 2012
    Inventors: Mudit Goel, Satish Kanugovi, Sarang Gadgil, Nagendra Bykampadi, Shivani Arora
  • Patent number: 8086701
    Abstract: A network state platform for managing a network having a number of network nodes is disclosed. A user provides a policy layer a high level instruction indicative of the desired network performance. The policy layer parses the high level instruction to generate a number of configuration instructions for the network nodes. The network nodes provide data logs of their activity to a data layer that collates the logs into a single entry that is stored, and can be accessed by an observation layer. External applications interface with the observation layer to access the stored data and use this information to generate requests to change portions of the network configuration. These requests are provided to a control layer that converts the requests from the applications to a high level instruction that is then provided to the policy layer to implement.
    Type: Grant
    Filed: April 28, 2008
    Date of Patent: December 27, 2011
    Assignee: Microsoft Corporation
    Inventors: Mudit Goel, Paul G Mayfield
  • Publication number: 20090328147
    Abstract: Capability negotiation during a PEAP transaction between two end points in a network is performed by initiating EAP capability negotiation methods. A first end point that desires to use a specific capability during a PEAP transaction initiates capability negotiation method requesting the specific capability. Upon receiving the request for the specific capability, a second end point performs the desired capability if an outer method employed in the PEAP transaction supports the specific capability. If the outer method does not support the desired capability, the receiver responds to the first end point with a negative acknowledgment. In other embodiments, if the outer method does not support the desired capability, the desired capability may still be performed if it is supported by an inner method. In such instances, an inner wrapper method is employed in the PEAP transaction to maintain and perform the capability.
    Type: Application
    Filed: June 27, 2008
    Publication date: December 31, 2009
    Applicant: Microsoft Corporation
    Inventors: Mudit Goel, Yue Luo, Ambrish Verma
  • Publication number: 20090271510
    Abstract: A network state platform for managing a network having a number of network nodes is disclosed. A user provides a policy layer a high level instruction indicative of the desired network performance. The policy layer parses the high level instruction to generate a number of configuration instructions for the network nodes. The network nodes provide data logs of their activity to a data layer that collates the logs into a single entry that is stored, and can be accessed by an observation layer. External applications interface with the observation layer to access the stored data and use this information to generate requests to change portions of the network configuration. These requests are provided to a control layer that converts the requests from the applications to a high level instruction that is then provided to the policy layer to implement.
    Type: Application
    Filed: April 28, 2008
    Publication date: October 29, 2009
    Applicant: MICROSOFT CORPORATION
    Inventors: Mudit Goel, Paul G. Mayfield
  • Publication number: 20090210932
    Abstract: Systems, devices, and methods for associating network devices with users are described, which can facilitate establishing a secure user to network device association. In various embodiments, the disclosed subject matter facilitates devices providing indication of location and device identity to a user and recognizing the user is in the proximity of the device. The disclosed subject matter provides efficient and secure device to user association and can facilitate performing customized actions based on the nature of the association.
    Type: Application
    Filed: February 18, 2008
    Publication date: August 20, 2009
    Applicant: MICROSOFT CORPORATION
    Inventors: Shobana M. Balakrishnan, Mudit Goel, Dinan Srilal Gunawardena, Dave Maltz, Michael Schroeder, Fan Yang
  • Publication number: 20070101409
    Abstract: Methods of obtaining information during an authentication session. Information may be obtained, during the authentication session, about a device that is attempting to connect to a network. The information that is obtained may be related to health parameters of the device, or any other suitable information. Obtaining this information during an authentication session may enable determining whether to allow the device to connect to the network.
    Type: Application
    Filed: November 1, 2005
    Publication date: May 3, 2007
    Applicant: Microsoft Corporation
    Inventors: Ashwin Palekar, Hakan Berk, Mudit Goel
  • Publication number: 20070016939
    Abstract: Software for managing access control functions in a network. The software includes a host that receives access control commands or information and calls one or more methods. The methods perform access control functions and communicate access control results or messages to be transmitted. The host may be installed in a network peer seeking access to the network or in a server controlling access to the network. When installed in a peer, the host receives commands and exchanges information with a supplicant. When installed in an access control server, the host receives commands and exchanges information with an authenticator. The host has a flexible architecture that enables multiple features, such as allowing the same methods to be used for authentication by multiple supplicants, providing ready integration of third party access control software, simplifying network maintenance by facilitating upgrades of authenticator software and enabling access control functions other than peer authentication.
    Type: Application
    Filed: July 8, 2005
    Publication date: January 18, 2007
    Applicant: Microsoft Corporation
    Inventors: Anthony Leibovitz, Mark Schurman, Mudit Goel, Paul Mayfield, Sudhakar Pasupuleti, Taroon Mandhana, Vivek Kamath, Wei Zheng, Xuemei Bao