Patents by Inventor Abhinav Gupta
Abhinav Gupta has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Publication number: 20180069871Abstract: A content request communication, e.g., generated using a first processor of a device, can be transmitted to a web server. A response communication including content identifying a first value can be received from the web server. The first processor can facilitate presentation of the content on a first display of the device. A communication can be received at a second processor of the device from a remote server. The communication can include data representing a second value and can be generated at the remote server using information received from the web server. Further, the second processor can produce a secure verification output that can be presented on a separate, second display, representing at least the second value. The presentation on first display can at least partially overlap in time with the presentation on the second display.Type: ApplicationFiled: September 6, 2016Publication date: March 8, 2018Applicant: Apple Inc.Inventors: Gianpaolo Fasoli, Matthew C. Byington, Christopher Sharp, Anton K. Diederich, Nicholas J. Shearer, Roberto G. Yepez, Petr Kostka, Gianluca Barbieri, Abhinav Gupta
-
Publication number: 20180060927Abstract: According to the invention, a method for initiating a similar transaction to one previously initiated by a user is disclosed. The method may include sending a digital receipt for a first transaction to a user. The method may also include determining reminder information, where the reminder information indicates a future time or frequency. The method may further include sending to the user, upon occurrence of the future time or frequency, a digital reminder which includes an interactive element. The method may additionally include receiving an indication that the user has interacted with the interactive element, and initiating a second transaction having a characteristic in common with the first transaction based on the indication.Type: ApplicationFiled: August 30, 2016Publication date: March 1, 2018Applicant: The Western Union CompanyInventor: Abhinav Gupta
-
Patent number: 9888380Abstract: A method for authenticating a mobile device in real-time. The method includes detecting the mobile device, sending a text message containing a unique uniform resource locator (“URL”) to the mobile device, and detecting an access of the unique URL by the mobile device through a first communication path. In response to detecting the access of the unique URL, requesting and subsequently receiving, by the host system in real-time, a phone number and a subscriber identification ID associated with the mobile device through a second communication path distinct from the first communication path, and a device fingerprint of the mobile device through the first communication path. The method further includes initiating a risk analysis based on the phone number, the subscriber ID, and the device fingerprint and determining an authentication status of the mobile device based on the risk analysis.Type: GrantFiled: October 30, 2014Date of Patent: February 6, 2018Assignee: The Western Union CompanyInventors: Abhinav Gupta, Bernard McManus, Don McNelley
-
Publication number: 20170185612Abstract: Various embodiments of systems, computer program products, and methods for dynamically designing webpages are described herein. In an aspect, a request for designing a webpage may be received. Based upon the request, a metadata related to the webpage may be identified. Based upon the identified metadata, one or more widgets for designing the webpage may be rendered. A selection of a widget from the one or more widgets may be received from a user. Multiple sections of the webpage and the widgets positioned in corresponding sections may be identified. The identified widgets of the webpage may be integrated with one or more security rules.Type: ApplicationFiled: December 29, 2015Publication date: June 29, 2017Inventors: SUNIL KAMADOLLI, PRASHANT KUMAR, MUGE DAS, RAJAT KARNWAL, PAIGE CHERNY, SHARON LAU, ABHINAV GUPTA, CORA SCHOPPE, JASON KOLAITIS
-
Patent number: 9693252Abstract: Techniques for monitoring presence of a remote device at Layer 2 that allow reducing power consumption without compromising the device's availability. A device that pairs with a remote wireless device may establish a Layer 3 connection, such as an IP connection, to the remote device to provide services to a user. The Layer 3 connection may be formed over a Layer 2 connection via an access point or as a peer-to-peer wireless connection between the devices. When the Layer 3 connection is not actively used to access the remote device, the Layer 3 connection and the supporting Layer 2 connection (e.g., WI-FI, WI-FI DIRECT™ or BLUETOOTH®) may be terminated and presence of the remote device may be monitored using a Layer 2 device discovery mechanism. The Layer 2 and Layer 3 connections to the device may be reestablished when use of the remote device is desired.Type: GrantFiled: December 2, 2016Date of Patent: June 27, 2017Assignee: Microsoft Technology Licensing, LLCInventors: Arunkumar Navasivasakthivelsamy, Mitesh K. Desai, Dattatraya B. Rajpure, Henrique M. A. Filgueiras, Mukund Sankaranarayan, Abhinav Gupta, Arvind M. Murching, Manoj Kumar Miryala
-
Publication number: 20170181020Abstract: Techniques for monitoring presence of a remote device at Layer 2 that allow reducing power consumption without compromising the device's availability. A device that pairs with a remote wireless device may establish a Layer 3 connection, such as an IP connection, to the remote device to provide services to a user. The Layer 3 connection may be formed over a Layer 2 connection via an access point or as a peer-to-peer wireless connection between the devices. When the Layer 3 connection is not actively used to access the remote device, the Layer 3 connection and the supporting Layer 2 connection (e.g., WI-FI, WI-FI DIRECT™ or BLUETOOTH®) may be terminated and presence of the remote device may be monitored using a Layer 2 device discovery mechanism. The Layer 2 and Layer 3 connections to the device may be reestablished when use of the remote device is desired.Type: ApplicationFiled: December 2, 2016Publication date: June 22, 2017Inventors: Arunkumar Navasivasakthivelsamy, Mitesh K. Desai, Dattatraya B. Rajpure, Henrique M.A. Filgueiras, Mukund Sankaranarayan, Abhinav Gupta, Arvind M. Murching, Manoj Kumar Miryala
-
Patent number: 9668153Abstract: Techniques for monitoring presence of a remote device at Layer 2 that allow reducing power consumption without compromising the device's availability. A device that pairs with a remote wireless device may establish a Layer 3 connection, such as an IP connection, to the remote device to provide services to a user. The Layer 3 connection may be formed over a Layer 2 connection via an access point or as a peer-to-peer wireless connection between the devices. When the Layer 3 connection is not actively used to access the remote device, the Layer 3 connection and the supporting Layer 2 connection (e.g., WI-FI, WI-FI DIRECT™ or BLUETOOTH®) may be terminated and presence of the remote device may be monitored using a Layer 2 device discovery mechanism. The Layer 2 and Layer 3 connections to the device may be reestablished when use of the remote device is desired.Type: GrantFiled: December 15, 2015Date of Patent: May 30, 2017Assignee: Microsoft Technology Licensing, LLCInventors: Arunkumar Navasivasakthivelsamy, Mitesh K. Desai, Dattatraya B. Rajpure, Henrique M. A. Filgueiras, Mukund Sankaranarayan, Abhinav Gupta, Arvind M. Murching, Manoj Kumar Miryala
-
Publication number: 20160212646Abstract: Techniques for monitoring presence of a remote device at Layer 2 that allow reducing power consumption without compromising the device's availability. A device that pairs with a remote wireless device may establish a Layer 3 connection, such as an IP connection, to the remote device to provide services to a user. The Layer 3 connection may be formed over a Layer 2 connection via an access point or as a peer-to-peer wireless connection between the devices. When the Layer 3 connection is not actively used to access the remote device, the Layer 3 connection and the supporting Layer 2 connection (e.g., WI-FI, WI-FI DIRECT™ or BLUETOOTH®) may be terminated and presence of the remote device may be monitored using a Layer 2 device discovery mechanism. The Layer 2 and Layer 3 connections to the device may be reestablished when use of the remote device is desired.Type: ApplicationFiled: December 15, 2015Publication date: July 21, 2016Inventors: Arunkumar Navasivasakthivelsamy, Mitesh K. Desai, Dattatraya B. Rajpure, Henrique M.A. Filgueiras, Mukund Sankaranarayan, Abhinav Gupta, Arvind M. Murching, Manoj Kumar Miryala
-
Publication number: 20160180388Abstract: A behavioral targeting system determines user profiles from online activity. The system includes a plurality of models that define parameters for determining a user profile score. Event information, which comprises on-line activity of the user, is received at an entity. To generate a user profile score, a model is selected. The model comprises recency, intensity and frequency dimension parameters. The behavioral targeting system generates a user profile score for a target objective, such as brand advertising or direct response advertising. The parameters from the model are applied to generate the user profile score in a category. The behavioral targeting system has application for use in ad serving to on-line users.Type: ApplicationFiled: February 29, 2016Publication date: June 23, 2016Inventors: Joshua M. Koran, Christina Yip Chung, Abhinav Gupta, George H. John, Hongfeng Yin, Long-ji Lin, Richard Frankel
-
Publication number: 20160164961Abstract: A method of providing content is provided. The method includes: receiving, by a target device, first content from a source device; establishing, by the target device, a connection with a cloud computing device; transmitting, by the target device, the first content and content control information to be used to convert the first content, to the cloud computing device; and receiving, by the target device, second content obtained by converting the first content based on the content control information, from the cloud computing device.Type: ApplicationFiled: December 9, 2015Publication date: June 9, 2016Applicant: SAMSUNG ELECTRONICS CO., LTD.Inventors: Shubhrangam MALAVIYA, Brejesh LALL, Santanu CHAUDHURY, Rohit, Abhinav GUPTA
-
Patent number: 9344217Abstract: UEs are adapted to facilitate reconstruction of a segment of corrupted bits. According to one example, a UE can receive a control channel transmission such as a HS-SCCH transmission. The control channel transmission may include a plurality of information bits and a plurality of cyclic redundancy check (CRC) bits. The UE may further determine that a contiguous segment of the received information bits is corrupt. The UE may accordingly utilize the uncorrupted information bits and CRC bits to reconstruct the corrupt information bits. In some instances, the UE may utilize the uncorrupted bits to reconstruct the corrupt information bits using a new generator polynomial. In other instances, the UE may utilize the uncorrupted bits to reconstruct the corrupt information bits using the original generator polynomial.Type: GrantFiled: March 20, 2014Date of Patent: May 17, 2016Assignee: QUALCOMM IncorporatedInventors: Jimmy Chi-Wai Chui, Nate Chizgi, Abhinav Gupta, Amith Vikram Chincholi, Chulong Chen
-
Publication number: 20160127898Abstract: A method for authenticating a mobile device in real-time. The method includes detecting the mobile device, sending a text message containing a unique uniform resource locator (“URL”) to the mobile device, and detecting an access of the unique URL by the mobile device through a first communication path. In response to detecting the access of the unique URL, requesting and subsequently receiving, by the host system in real-time, a phone number and a subscriber identification ID associated with the mobile device through a second communication path distinct from the first communication path, and a device fingerprint of the mobile device through the first communication path. The method further includes initiating a risk analysis based on the phone number, the subscriber ID, and the device fingerprint and determining an authentication status of the mobile device based on the risk analysis.Type: ApplicationFiled: October 30, 2014Publication date: May 5, 2016Applicant: THE WESTERN UNION COMPANYInventors: Abhinav Gupta, Bernard McManus, Don McNelley
-
Patent number: 9286569Abstract: A behavioral targeting system determines user profiles from online activity. The system includes a plurality of models that define parameters for determining a user profile score. Event information, which comprises on-line activity of the user, is received at an entity. To generate a user profile score, a model is selected. The model comprises recency, intensity and frequency dimension parameters. The behavioral targeting system generates a user profile score for a target objective, such as brand advertising or direct response advertising. The parameters from the model are applied to generate the user profile score in a category. The behavioral targeting system has application for use in ad serving to on-line users.Type: GrantFiled: July 29, 2013Date of Patent: March 15, 2016Assignee: YAHOO! INC.Inventors: Joshua M. Koran, Christina Yip Chung, Abhinav Gupta, George H. John, Hongfeng Yin, Long-Ji Lin, Richard Frankel
-
Patent number: 9232422Abstract: Techniques for monitoring presence of a remote device at Layer 2 that allow reducing power consumption without compromising the device's availability. A device that pairs with a remote wireless device may establish a Layer 3 connection, such as an IP connection, to the remote device to provide services to a user. The Layer 3 connection may be formed over a Layer 2 connection via an access point or as a peer-to-peer wireless connection between the devices. When the Layer 3 connection is not actively used to access the remote device, the Layer 3 connection and the supporting Layer 2 connection (e.g., WI-FI, WI-FI DIRECT™ or BLUETOOTH®) may be terminated and presence of the remote device may be monitored using a Layer 2 device discovery mechanism. The Layer 2 and Layer 3 connections to the device may be reestablished when use of the remote device is desired.Type: GrantFiled: December 23, 2013Date of Patent: January 5, 2016Assignee: Microsoft Technology Licensing, LLCInventors: Arunkumar Navasivasakthivelsamy, Mitesh K. Desai, Dattatraya B. Rajpure, Henrique M. A. Filgueiras, Mukund Sankaranarayan, Abhinav Gupta, Arvind M. Murching, Manoj Kumar Miryala
-
Publication number: 20150304061Abstract: Aspects are described for synchronizing a user equipment (UE) and at least one network entity at, for example, a Radio Link Control (RLC) layer entity. The aspects may include receiving a first status packet data unit (PDU). In some aspects, the first status PDU may be a most recent non-erroneous status PDU. Further, the aspects may include receiving a second status PDU. In some aspects, the second status PDU may be received subsequent to receiving the first status PDU. Moreover, the aspects may include determining whether the first status PDU and the second status PDU are transmitted from a same network entity. Additionally, the aspects may include performing a RLC reset based at least in part on a determination being made that the first status PDU and the second status PDU are transmitted from the same network entity.Type: ApplicationFiled: August 5, 2014Publication date: October 22, 2015Inventors: Vagish Gupta, Sitaramanjaneyulu Kanamarlapudi, Abhinav Gupta
-
Patent number: 9124452Abstract: One or more aspects of the disclosure provide an efficient equalization scheme capable of mitigating multi-path interference on channels with large delay spread using short-length equalizers. That is, by dividing stored samples of a signal received on the multi-path channel by time into a plurality of clusters, a short-length equalizer can be utilized in an iterative fashion on each of the clusters, thus eliminating the need for a large length equalizer while still providing improved performance over that of a Rake receiver at large delay spreads. Other aspects, embodiments, and features are also claimed and described.Type: GrantFiled: January 10, 2013Date of Patent: September 1, 2015Assignee: QUALCOMM IncorporatedInventors: Chun-Hao Hsu, Aditya Dua, Nathan Dingsai Yee, Abhinav Gupta
-
Patent number: 8996502Abstract: In an embodiment, Partition Change Tracking (PCT) refresh is performed by using join dependencies on partitioning columns to derive and fill in identifiers of rows and/or partitions containing the rows in the refresh expressions. In an embodiment, the join dependencies that form the Materialized View's (MV's) query definition and the partitioning predicate of the table are used to automatically generate a statement which is run in order to derive and fill in identifiers of the rows and/or partitions that are being changed. The identifiers are then plugged into the refresh expression, and the refresh expression is run. Running the refresh expression causes the rows identified to be refreshed.Type: GrantFiled: March 18, 2005Date of Patent: March 31, 2015Assignee: Oracle International CorporationInventors: Nathaniel Keith Folkert, Abhinav Gupta, Andrew Witkowski
-
Publication number: 20150071081Abstract: Aspects of the disclosure provide techniques for improving uplink transmit power control at a user equipment (UE). When the UE is communicating with multiple cells using Multi-flow High-Speed Downlink Packet Access (MF-HSDPA), the UE may control its uplink power based on an improved MF-HSDPA uplink power control algorithm, which is different from an or-of-downs (OOD) transmit power control. In handover, a UE may determine its transmit power to be less than a transmit power requested by a high-speed cell and more than an OOD transmit power.Type: ApplicationFiled: April 2, 2014Publication date: March 12, 2015Applicant: QUALCOMM IncorporatedInventors: Abhinav Gupta, Nate Chizgi, Sitaramanjaneyulu Kanamarlapudi, Chih-Ping Hsu, Nitin Kasturi
-
Publication number: 20150033098Abstract: UEs are adapted to facilitate reconstruction of a segment of corrupted bits. According to one example, a UE can receive a control channel transmission such as a HS-SCCH transmission. The control channel transmission may include a plurality of information bits and a plurality of cyclic redundancy check (CRC) bits. The UE may further determine that a contiguous segment of the received information bits is corrupt. The UE may accordingly utilize the uncorrupted information bits and CRC bits to reconstruct the corrupt information bits. In some instances, the UE may utilize the uncorrupted bits to reconstruct the corrupt information bits using a new generator polynomial. In other instances, the UE may utilize the uncorrupted bits to reconstruct the corrupt information bits using the original generator polynomial. Other aspects, embodiments, and features are also included.Type: ApplicationFiled: March 20, 2014Publication date: January 29, 2015Applicant: QUALCOMM IncorporatedInventors: Jimmy Chi-Wai Chui, Nate Chizgi, Abhinav Gupta, Amith Vikram Chincholi, Chulong Chen
-
Publication number: 20140289396Abstract: Techniques for monitoring presence of a remote device at Layer 2 that allow reducing power consumption without compromising the device's availability. A device that pairs with a remote wireless device may establish a Layer 3 connection, such as an IP connection, to the remote device to provide services to a user. The Layer 3 connection may be formed over a Layer 2 connection via an access point or as a peer-to-peer wireless connection between the devices. When the Layer 3 connection is not actively used to access the remote device, the Layer 3 connection and the supporting Layer 2 connection (e.g., WI-FI, WI-FI DIRECT™ or BLUETOOTH®) may be terminated and presence of the remote device may be monitored using a Layer 2 device discovery mechanism. The Layer 2 and Layer 3 connections to the device may be reestablished when use of the remote device is desired.Type: ApplicationFiled: December 23, 2013Publication date: September 25, 2014Applicant: Microsoft CorporationInventors: Arunkumar Navasivasakthivelsamy, Mitesh K. Desai, Dattatraya B. Rajpure, Henrique M.A. Filgueiras, Mukund Sankaranarayan, Abhinav Gupta, Arvind M. Murching, Manoj Kumar Miryala