Patents by Inventor Vinay Kshirsagar
Vinay Kshirsagar has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 11138300Abstract: A security fingerprint architecture is disclosed. A security fingerprint comprises one or more behavioral factors which store a history of events associated with one or more users. The data in the security fingerprint is exposed by one or more modes, each of which determines the conditions that data in the security fingerprint may be accessed. Security fingerprints support a number of primitive operations that allow set operations to be performed. Security fingerprints may be used in for authentication, advertising, and other operations either alone, or in conjunction with third party data sources. An exemplary platform of security fingerprints built upon a cellular infrastructure is also disclosed.Type: GrantFiled: October 20, 2017Date of Patent: October 5, 2021Assignee: T-Mobile USA, Inc.Inventors: Vinay Kshirsagar, Jeffrey M. Giard, Michael J. Goo, Xianglong Kong, Tony A. Sandidge, Seth H. Schuler, Bala Subramanian, Linda Zhao
-
Publication number: 20210233120Abstract: This disclosure sets forth systems and techniques that integrates social networking services with vendor services, such that a user may directly or indirectly communicate their experience, impression, or intention to a vendor via a user's preferred social networking service. In some examples, the social networking services may facilitate a vendor providing technical service support for a product or service. In other examples, a user may initiate a transaction with the vendor via a preferred social networking service. The user may initiate payment for an outstanding bill, initiate a purchase of vendor products or services, solicit a trade-in estimate for a particular product, query an order status, or initiate a data-allowance transfer to a recipient of a telecommunications vendor. In each of these examples, the user may communicate with a vendor by via social media posts on a social networking services authorized via a vendor platform.Type: ApplicationFiled: April 15, 2021Publication date: July 29, 2021Inventors: Vinay Kshirsagar, James Ellison, Robert Stamm
-
Patent number: 10460325Abstract: A customer service dashboard comprises an account pane and a partially surrounding administrative layer. The account pane presents information that is typically available in a customer-facing account management portal. The administrative layer presents additional content that is not typically available to customers. The administrative layer may have a menu component for selecting and navigating between customer accounts, as well as for viewing calendared items. The administrative layer may also have a module selection component for opening panes corresponding to functional modules. These modules can expose functionality relating to the current customer account. In one example, a module such as this is used for quickly navigating between interrupted tasks that are being performed in the account view. The administrative layer can be quickly hidden by selecting a visible toggle control, so that the dashboard closely replicates what would be available to and seen by a customer.Type: GrantFiled: February 15, 2017Date of Patent: October 29, 2019Assignee: T-Moblie USA, Inc.Inventors: Linda Zhao, Vinay Kshirsagar, Nathan Bushey, Isaac West, Desiree Walden, Robert Prouty
-
Publication number: 20180232742Abstract: A customer service dashboard comprises an account pane and a partially surrounding administrative layer. The account pane presents information that is typically available in a customer-facing account management portal. The administrative layer presents additional content that is not typically available to customers. The administrative layer may have a menu component for selecting and navigating between customer accounts, as well as for viewing calendared items. The administrative layer may also have a module selection component for opening panes corresponding to functional modules. These modules can expose functionality relating to the current customer account. In one example, a module such as this is used for quickly navigating between interrupted tasks that are being performed in the account view. The administrative layer can be quickly hidden by selecting a visible toggle control, so that the dashboard closely replicates what would be available to and seen by a customer.Type: ApplicationFiled: February 15, 2017Publication date: August 16, 2018Inventors: Linda Zhao, Vinay Kshirsagar, Nathan Bushey, Isaac West, Desiree Walden, Robert Prouty
-
Publication number: 20180039770Abstract: A security fingerprint architecture is disclosed. A security fingerprint comprises one or more behavioral factors which store a history of events associated with one or more users. The data in the security fingerprint is exposed by one or more modes, each of which determines the conditions that data in the security fingerprint may be accessed. Security fingerprints support a number of primitive operations that allow set operations to be performed. Security fingerprints may be used in for authentication, advertising, and other operations either alone, or in conjunction with third party data sources. An exemplary platform of security fingerprints built upon a cellular infrastructure is also disclosed.Type: ApplicationFiled: October 20, 2017Publication date: February 8, 2018Inventors: Vinay Kshirsagar, Jeffrey M. Giard, Michael J. Goo, Xianglong Kong, Tony A. Sandidge, Seth H. Schuler, Bala Subramanian, Linda Zhao
-
Patent number: 9824199Abstract: A security fingerprint architecture is disclosed. A security fingerprint comprises one or more behavioral factors which store a history of events associated with one or more users. The data in the security fingerprint is exposed by one or more modes, each of which determines the conditions that data in the security fingerprint may be accessed. Security fingerprints support a number of primitive operations that allow set operations to be performed. Security fingerprints may be used in for authentication, advertising, and other operations either alone, or in conjunction with third party data sources. An exemplary platform of security fingerprints built upon a cellular infrastructure is also disclosed.Type: GrantFiled: September 12, 2012Date of Patent: November 21, 2017Assignee: T-Mobile USA, Inc.Inventors: Vinay Kshirsagar, Jeffrey M. Giard, Michael J. Goo, Xianglong Kong, Tony A. Sandidge, Seth H. Schuler, Bala Subramanian, Linda Zhao
-
Publication number: 20160335675Abstract: This disclosure sets forth systems and techniques that integrates social networking services with vendor services, such that a user may directly or indirectly communicate their experience, impression, or intention to a vendor via a user's preferred social networking service. In some examples, the social networking services may facilitate a vendor providing technical service support for a product or service. In other examples, a user may initiate a transaction with the vendor via a preferred social networking service. The user may initiate payment for an outstanding bill, initiate a purchase of vendor products or services, solicit a trade-in estimate for a particular product, query an order status, or initiate a data-allowance transfer to a recipient of a telecommunications vendor. In each of these examples, the user may communicate with a vendor by via social media posts on a social networking services authorized via a vendor platform.Type: ApplicationFiled: May 13, 2016Publication date: November 17, 2016Inventors: Vinay Kshirsagar, James Ellison, Robert Stamm
-
Publication number: 20160335679Abstract: This disclosure sets forth systems and techniques that integrates social networking services with vendor services, such that a user may directly or indirectly communicate their experience, impression, or intention to a vendor via a user's preferred social networking service. In some examples, the social networking services may facilitate a vendor providing technical service support for a product or service. In other examples, a user may initiate a transaction with the vendor via a preferred social networking service. The user may initiate payment for an outstanding bill, initiate a purchase of vendor products or services, solicit a trade-in estimate for a particular product, query an order status, or initiate a data-allowance transfer to a recipient of a telecommunications vendor. In each of these examples, the user may communicate with a vendor by via social media posts on a social networking services authorized via a vendor platform.Type: ApplicationFiled: May 13, 2016Publication date: November 17, 2016Inventors: Vinay Kshirsagar, James Ellison, Robert Stamm
-
Publication number: 20130055367Abstract: A security fingerprint architecture is disclosed. A security fingerprint comprises one or more behavioral factors which store a history of events associated with one or more users. The data in the security fingerprint is exposed by one or more modes, each of which determines the conditions that data in the security fingerprint may be accessed. Security fingerprints support a number of primitive operations that allow set operations to be performed. Security fingerprints may be used in for authentication, advertising, and other operations either alone, or in conjunction with third party data sources. An exemplary platform of security fingerprints built upon a cellular infrastructure is also disclosed.Type: ApplicationFiled: September 12, 2012Publication date: February 28, 2013Applicant: T-MOBILE USA, INC.Inventors: Vinay Kshirsagar, Jeffrey M. Giard, Michael J. Goo, Xianglong Kong, Tony A. Sandidge, Seth H. Schuler, Bala Subramanian, Linda Zhao