Patents by Inventor Shai Guday
Shai Guday has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 8874162Abstract: In embodiments of mobile device safe driving, a mobile device can display a device lock screen on an integrated display device, and transition from the device lock screen to display a driving mode lock screen. The transition to display the driving mode lock screen occurs without receiving a PIN code entered on the device lock screen. The mobile device implements a safe driving service that is implemented to activate a safe driving mode of the mobile device, and disable features of the mobile device while the safe driving mode is activated.Type: GrantFiled: December 22, 2012Date of Patent: October 28, 2014Assignee: Microsoft CorporationInventors: Joseph A. Schrader, Raman K. Sarin, Ted Tai-Yu Chen, Sharad Agarwal, Joseph H. Matthews, III, Shai Guday, Joseph Spencer King
-
Publication number: 20140279851Abstract: Example apparatus and methods concern fingerprint-based, intelligent, content pre-fetching. An example apparatus may have a memory that is configured to store content items or fingerprints derived from content items. The apparatus may include a set of logics that are configured to selectively asynchronously provide a content item or a fingerprint derived from the content item to a data store on a mobile computing device. The items are provided in response to an event other than a request for content from the mobile computing device. The apparatus may be configured to select the content item based on a proactive, crowd-sourced, predictive and adaptive method. The apparatus may provide the content item or the fingerprint to the mobile device and to other related mobile devices or users. The apparatus may consider the state (e.g., available memory, available battery, available communication channels) of the mobile device before providing content.Type: ApplicationFiled: March 15, 2013Publication date: September 18, 2014Applicant: Microsoft CorporationInventors: Sandeep Rangarajan, Yogesh Sreenivasan, Shai Guday, Bama Ramarathnam
-
Publication number: 20140162638Abstract: Embodiments enable prioritization and selection of network access points (NAP) by a computing device using NAP attribute values. The computing device obtains the attribute values based on a location of the computing device and/or proximate NAPs detected by the computing device. The obtained attribute values are compared to a state of the computing device (e.g., sensor values), user preferences, or other criteria to select at least one of the NAPs for connection with the computing device. In some embodiments, a user of the computing device is presented with a list of Wi-Fi access points ranked according to relevance to the computing device and/or user.Type: ApplicationFiled: February 15, 2014Publication date: June 12, 2014Applicant: MICROSOFT CORPORATIONInventors: Vladimir Holostov, Thomas W. Kuehnel, Shai Guday, Naile Daoud, Tript Singh Lamba
-
Publication number: 20140071895Abstract: Embodiments select networks for connection based on application-specific quality scores. A request is received from an application for a network connection. Connection quality data for nearby networks is accessed. The connection quality data is derived from crowdsourced data. The connection quality data is adjusted based on a device context to produce an application-specific quality score for each of the networks. One or more of the networks are selected for connection based on the application-specific quality scores. In some embodiments, a single network connection endpoint is provided to the application to abstract connection management details from the application.Type: ApplicationFiled: November 15, 2013Publication date: March 13, 2014Inventors: Ryan H. Bane, Adam R. Dyba, Brent E. Ford, Aurelio Navarro Belletti Garcia, James Christopher Gray, Shai Guday, Tyler E. Hennessy, Ayman Kaheel, Triptpal Singh Lamba, Darya Mazandarany, Michael Hao Mi, Sidharth Uday Nabar, Christopher R. Rice, Peter Schmatz, Michael Svanholm Thomsen
-
Patent number: 8665847Abstract: Embodiments enable prioritization and selection of network access points (NAP) by a computing device using NAP attribute values. The computing device obtains the attribute values based on a location of the computing device and/or proximate NAPs detected by the computing device. The obtained attribute values are compared to a state of the computing device (e.g., sensor values), user preferences, or other criteria to select at least one of the NAPs for connection with the computing device. In some embodiments, a user of the computing device is presented with a list of Wi-Fi access points ranked according to relevance to the computing device and/or user.Type: GrantFiled: November 8, 2011Date of Patent: March 4, 2014Assignee: Microsoft CorporationInventors: Vladimir Holostov, Thomas W. Kuehnel, Shai Guday, Naile Daoud, Tript Singh Lamba
-
Patent number: 8620215Abstract: An accessory for personalizing a mobile communication device includes an accessory body that is configured to adorn the mobile communication device and at least partially cover its exterior. At least one graphic design is disposed on the exterior surface of the accessory body to convey a theme. A data tag is secured to the accessory. The data tag stores data that facilitates personalization of at least one functionality of the mobile communication device in support of the theme. The data tag being configured so that the data is accessible via a short-range wireless protocol such as the Near-Field Communication (NFC) protocol.Type: GrantFiled: August 5, 2010Date of Patent: December 31, 2013Assignee: Microsoft CorporationInventors: Miller Thomas Abel, Shai Guday
-
Publication number: 20130331028Abstract: Described is a technology by which a target device automatically starts tethering on a source device. A target device sends a request to start tethering to the source device, which responds by starting tethering, independent of needing any user interaction on the source device. While tethering is operational, status messages may be exchanged between the source device and the target device.Type: ApplicationFiled: June 11, 2012Publication date: December 12, 2013Applicant: MICROSOFT CORPORATIONInventors: Thomas W. Kuehnel, Shai Guday, James M. Lyon
-
Publication number: 20130303143Abstract: In embodiments of mobile device safe driving, a mobile device can display a device lock screen on an integrated display device, and transition from the device lock screen to display a driving mode lock screen. The transition to display the driving mode lock screen occurs without receiving a PIN code entered on the device lock screen. The mobile device implements a safe driving service that is implemented to activate a safe driving mode of the mobile device, and disable features of the mobile device while the safe driving mode is activated.Type: ApplicationFiled: December 22, 2012Publication date: November 14, 2013Inventors: Joseph A. Schrader, Raman K. Sarin, Ted Tai-Yu Chen, Sharad Agarwal, Joseph H. Matthews, III, Shai Guday, Joseph Spencer King
-
Publication number: 20130295872Abstract: Mobile device emergency service techniques are described. In embodiments, a client device includes one or more modules implemented at least partially in hardware and configured to implement an emergency service. The emergency service configured to support operations including generating a user interface for display on a display device, receiving one or more inputs usable to form an emergency contacts list that includes a plurality of emergency contacts, and causing the emergency contacts list to be communicated to one or more other client devices for use in generating a message to be communicated automatically and without user intervention to the emergency contacts in the emergency contacts list responsive to a trigger.Type: ApplicationFiled: December 22, 2012Publication date: November 7, 2013Inventors: Shai Guday, Joseph H. Matthews, III, Joseph A. Schrader, Ted Tai-Yu Chen, Raman K. Sarin, Sharad Agarwal, Shawn M. Thomas, John D. Skovron, John A. Yovin
-
Patent number: 8494502Abstract: The claimed subject matter provides a system and/or a method that facilitates connecting a wireless device to a secure network. A device can establish a near field communication link with a verified device on a network, wherein the near field communication link can be a secure and/or encrypted link to provision the device without comprising security constraints within the network. An installation component can invoke the transfer of provisioning data to the network via the near filed communication link to secure a wireless connection for the device to the network.Type: GrantFiled: April 30, 2012Date of Patent: July 23, 2013Assignee: Microsoft CorporationInventors: Miller T. Abel, Shai Guday, Benjamin E. Nick
-
Publication number: 20130182625Abstract: A system and method are disclosed for offloading control of services in a mobile device to a non-cellular wireless network, such as Wi-Fi. The described system and method allow the overall connection management to be performed by an application processor, while services are handled in a modem using Wi-Fi connectivity. The Wi-Fi subsystem can be fully driven by the modem for time critical operations allowing the application processor to be off (or in low-power mode) when it is not involved in the delivery of services. Battery power is saved by being able to substantially power down the application processor.Type: ApplicationFiled: July 9, 2012Publication date: July 18, 2013Applicant: Microsoft CorporationInventors: Thomas Kuehnel, Gregory Scott, John D. Bruner, Shai Guday
-
Publication number: 20130144879Abstract: Embodiments control submission of crowdsourced data from a computing device to a cloud service. The cloud service receives a packet from the computing device having collected data and a single-use data tag associated therewith. The single-use data tag represents one of a threshold quantity of single-use data tags issued to the computing device. The cloud service validates the single-use data tag in the received packet by, for example, searching for the single-use data tag in a tag store maintained by the cloud service. The collected data from the received packet is stored by the cloud service based on the validation. After validation, the tag store is updated to prevent re-use of the single-use data tag. In some embodiments, the cloud service is a location service receiving crowdsourced beacon fingerprint data from a plurality of mobile computing devices.Type: ApplicationFiled: December 5, 2011Publication date: June 6, 2013Applicant: Microsoft CorporationInventors: Thomas Werner Kuehnel, Shai Guday
-
Publication number: 20130115945Abstract: Embodiments enable prioritization and selection of network access points (NAP) by a computing device using NAP attribute values. The computing device obtains the attribute values based on a location of the computing device and/or proximate NAPs detected by the computing device. The obtained attribute values are compared to a state of the computing device (e.g., sensor values), user preferences, or other criteria to select at least one of the NAPs for connection with the computing device. In some embodiments, a user of the computing device is presented with a list of Wi-Fi access points ranked according to relevance to the computing device and/or user.Type: ApplicationFiled: November 8, 2011Publication date: May 9, 2013Applicant: Microsoft CorporationInventors: Vladimir Holostov, Thomas W. Kuehnel, Shai Guday, Naile Daoud, Tript Singh Lamba
-
Patent number: 8429272Abstract: An indicator for a device may provide an indication that a threshold associated with a budget for a network resource has or will be reached. When a user requests a network operation that will consume the network resource, an amount of the network resource to be consumed by the operation is predicted, if possible. If the prior use of the network resource and the amount to be used to complete the network operation exceeds a threshold the user may be warned and given an opportunity to cancel the operation or adjust the way in which the operation will be performed. If the amount of network resource a network operation will consume is unknown, a rate of use of the network resource is determined and a time until the budget is reached is estimated.Type: GrantFiled: June 9, 2012Date of Patent: April 23, 2013Assignee: Microsoft CorporationInventors: Amer A. Hassan, Billy R. Anders, PehKeong Teh, Andrew T. Baron, Shai Guday, Upshur W. Parks, Marco Piumatti, Dmitry A. Anipko
-
Publication number: 20120254420Abstract: An indicator for a device may provide an indication that a threshold associated with a budget for a network resource has or will be reached. When a user requests a network operation that will consume the network resource, an amount of the network resource to be consumed by the operation is predicted, if possible. If the prior use of the network resource and the amount to be used to complete the network operation exceeds a threshold the user may be warned and given an opportunity to cancel the operation or adjust the way in which the operation will be performed. If the amount of network resource a network operation will consume is unknown, a rate of use of the network resource is determined and a time until the budget is reached is estimated.Type: ApplicationFiled: June 9, 2012Publication date: October 4, 2012Applicant: MICROSOFT CORPORATIONInventors: Amer A. Hassan, Billy R. Anders, JR., PehKeong Teh, Andrew T. Baron, Shai Guday, Upshur W. Parks, Marco Piumatti, Dmitry A. Anipko
-
Publication number: 20120214414Abstract: The claimed subject matter provides a system and/or a method that facilitates connecting a wireless device to a secure network. A device can establish a near field communication link with a verified device on a network, wherein the near field communication link can be a secure and/or encrypted link to provision the device without comprising security constraints within the network. An installation component can invoke the transfer of provisioning data to the network via the near filed communication link to secure a wireless connection for the device to the network.Type: ApplicationFiled: April 30, 2012Publication date: August 23, 2012Applicant: Microsoft CorporationInventors: MILLER T. ABEL, SHAI GUDAY, BENJAMIN E. NICK
-
Patent number: 8243022Abstract: Technologies for creating and viewing virtual graffiti using federated devices. The technologies allow users to associate virtual graffiti with geographic locations and restrict access to the graffiti to particular users, groups, federations, or the like. Users with appropriate access rights may be able to discover and view graffiti associated with a particular geographic location via a federated device when they are present at the location. Users may also access such graffiti from lists via federated devices.Type: GrantFiled: November 27, 2006Date of Patent: August 14, 2012Assignee: Microsoft CorporationInventor: Shai Guday
-
Patent number: 8230061Abstract: A computing device including an indicator predicting use of a network resource. The indicator may provide an indication that a threshold associated with a budget for the network resource has or will be reached. When a user requests a network operation that will consume the network resource, an amount of the network resource to be consumed by the operation is predicted, if possible. If the prior use of the network resource and the amount to be used to complete the network operation exceeds a threshold the user may be warned and given an opportunity to cancel the operation or adjust the way in which the operation will be performed. If the amount of network resource a network operation will consume is unknown, a rate of use of the network resource is determined and a time until the budget is reached is estimated. An administrative tool is provided for managing network resources and setting budgets for resource consumption by users, devices, or applications.Type: GrantFiled: March 17, 2010Date of Patent: July 24, 2012Assignee: Microsoft CorporationInventors: Amer A. Hassan, Billy R. Anders, Jr., PehKeong Teh, Andrew T. Baron, Shai Guday, Upshur W. Parks, Marco Piumatti, Dmitry A. Anipko
-
Publication number: 20120173620Abstract: A method and system are disclosed for providing a temporary peer-to-peer network including a group owner, and one or more deputies able to step into the role of group owner to continue the group session in the event the prior group owner cedes ownership. Each device in the group may include a layered communications protocol having a group maintenance layer between the network layer and the physical layer. The group maintenance layer may be responsible for dictating when and under what conditions a deputy device becomes the group owner so that group membership and activities may move forward without loss of continuity.Type: ApplicationFiled: December 29, 2010Publication date: July 5, 2012Applicant: MICROSOFT CORPORATIONInventors: Vladimir Holostov, Shai Guday, Amer Hassan
-
Publication number: 20120110568Abstract: Viral application distribution facilitates distribution of an application among users and increases likelihood of downloading the application by the users. A first device may receive information of an application from a second device through a short-range communication channel. The information may comprise identification information of the application without any personally identifiable information of the second device to protect privacy of a user of the second device. A version of the application that is compatible with the first device is determined by searching a catalog using the identification information of the application. The compatible version of the application may then be downloaded or obtained by the first device. Location-based viral distribution may also be performed between devices that visit a location, even at different times.Type: ApplicationFiled: October 29, 2010Publication date: May 3, 2012Applicant: Microsoft CorporationInventors: Miller T. Abel, Joseph Futty, James Kai Yu Lau, Shai Guday, Richard Yuqi Yao