Patents by Inventor Anoop Anantha
Anoop Anantha has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Publication number: 20180295121Abstract: Secure element authentication techniques are described. In implementations, a confirmation is received that an identity of a user has been physically verified using one or more physical documents. One or more credentials that are usable to authenticate the user are caused to be stored in a secure element of a mobile communication device of the user, the secure element implemented using tamper-resistant hardware.Type: ApplicationFiled: June 13, 2018Publication date: October 11, 2018Inventors: Anoop Anantha, Murali R. Krishnan, Alan L. Marshall, Kamran Rajabi Zargahi, Miller Thomas Abel
-
Publication number: 20170048232Abstract: Secure element authentication techniques are described. In implementations, a confirmation is received that an identity of a user has been physically verified using one or more physical documents. One or more credentials that are usable to authenticate the user are caused to be stored in a secure element of a mobile communication device of the user, the secure element implemented using tamper-resistant hardware.Type: ApplicationFiled: November 1, 2016Publication date: February 16, 2017Inventors: Anoop Anantha, Murali R. Krishnan, Alan L. Marshall, Kamran Rajabi Zargahi, Miller Thomas Abel
-
Patent number: 9525548Abstract: Provisioning techniques are described. In implementations, a particular one of a plurality of public keys are located using an identifier included in a request received via a network. The located public key is communicated via the network, the public key configured to encrypt data that is to be decrypted by a secure element of a mobile communication device, the secure element implemented using hardware and including a private key that is configured to decrypt the data that was encrypted using the public key.Type: GrantFiled: October 21, 2010Date of Patent: December 20, 2016Assignee: Microsoft Technology Licensing, LLCInventors: Alan L. Marshall, Kamran Rajabi Zargahi, Miller Thomas Abel, Murali Krishnan, Anoop Anantha
-
Patent number: 9509686Abstract: Secure element authentication techniques are described. In implementations, a confirmation is received that an identity of a user has been physically verified using one or more physical documents. One or more credentials that are usable to authenticate the user are caused to be stored in a secure element of a mobile communication device of the user, the secure element implemented using tamper-resistant hardware.Type: GrantFiled: December 3, 2010Date of Patent: November 29, 2016Assignee: Microsoft Technology Licensing, LLCInventors: Anoop Anantha, Murali R. Krishnan, Alan L. Marshall, Kamran Rajabi Zargahi, Miller Thomas Abel
-
Patent number: 8793031Abstract: Embodiments enhance the functionality of a vehicle, a user device, or both by the selection and sharing of data. Upon detection of each other, the vehicle device and the user device obtain and share data. The data may be associated with the user, the user computing device, and/or the vehicle and may be stored in cloud-based services. Functionality of the vehicle and/or user device is customized to the user based on the shared data. For example, the user device may provide assisted global positioning system (GPS) data to the vehicle to reduce a time-to-fix (TTF) when determining a location of the vehicle. In other examples, settings of the vehicle are personalized to the user, and location-relevant content is downloaded to the user device.Type: GrantFiled: November 10, 2011Date of Patent: July 29, 2014Assignee: Microsoft CorporationInventors: Anoop Anantha, Jyh-Han Lin
-
Publication number: 20130124006Abstract: Embodiments enhance the functionality of a vehicle, a user device, or both by the selection and sharing of data. Upon detection of each other, the vehicle device and the user device obtain and share data. The data may be associated with the user, the user computing device, and/or the vehicle and may be stored in cloud-based services. Functionality of the vehicle and/or user device is customized to the user based on the shared data. For example, the user device may provide assisted global positioning system (GPS) data to the vehicle to reduce a time-to-fix (TTF) when determining a location of the vehicle. In other examples, settings of the vehicle are personalized to the user, and location-relevant content is downloaded to the user device.Type: ApplicationFiled: November 10, 2011Publication date: May 16, 2013Applicant: Microsoft CorporationInventors: Anoop Anantha, Jyh-Han Lin
-
Publication number: 20120143758Abstract: Account transfer techniques are described. In one or more implementations, a user interface is output by a mobile communication device that describes funds in an account. The account is usable by the mobile communication device to purchase goods or service and the purchase performable at least in part using credentials stored in a secure element implemented in hardware of the mobile communication device. An input is received via interaction with the user interface to authorize a transfer of funds from the account associated with the mobile communication device to another account usable by another mobile communication device to purchase goods or services.Type: ApplicationFiled: December 1, 2010Publication date: June 7, 2012Applicant: MICROSOFT CORPORATIONInventors: Anoop Anantha, Murali R. Krishnan, Miller Thomas Abel, Rupali Jain
-
Publication number: 20120143669Abstract: Loyalty offer modeling techniques are described. In one or more implementations, interaction with a loyalty service via a network is performed to model one or more loyalty offers for a use in conjunction with a merchant. Information is transmitted via the network for receipt by the loyalty service, at least a portion of the information describing consumer interaction with the merchant that pertains to the loyalty offer that is sufficient for use by the loyalty service to manage participation of the consumers with the one or more loyalty offers of the merchant.Type: ApplicationFiled: December 2, 2010Publication date: June 7, 2012Applicant: MICROSOFT CORPORATIONInventors: Anoop Anantha, Murali R. Krishnan, Miller Thomas Abel
-
Publication number: 20120143769Abstract: Commerce card techniques are described. In one or more implementations, one or more credentials are received at a commerce card, the credentials encrypted using a public key. The one or more credentials are decrypted using a private key that corresponds to the public key, the decrypting performed by a secure element implemented in tamper-resistant hardware of the commerce card without exposing the private key outside of the secure element. The decrypted one or more credentials are stored within the secure element of the commerce card such that the decrypted one or more credentials are not exposed outside of the secure element, the one or more credentials usable by the commerce card as part of a transaction to purchase a good or service.Type: ApplicationFiled: December 2, 2010Publication date: June 7, 2012Applicant: MICROSOFT CORPORATIONInventors: Murali R. Krishnan, Anoop Anantha
-
Publication number: 20120144201Abstract: Secure element authentication techniques are described. In implementations, a confirmation is received that an identity of a user has been physically verified using one or more physical documents. One or more credentials that are usable to authenticate the user are caused to be stored in a secure element of a mobile communication device of the user, the secure element implemented using tamper-resistant hardware.Type: ApplicationFiled: December 3, 2010Publication date: June 7, 2012Applicant: MICROSOFT CORPORATIONInventors: Anoop Anantha, Murali R. Krishnan, Alan L. Marshall, Kamran Rajabi Zargahi, Miller Thomas Abel
-
Publication number: 20120099727Abstract: Provisioning techniques are described. In implementations, a particular one of a plurality of public keys are located using an identifier included in a request received via a network. The located public key is communicated via the network, the public key configured to encrypt data that is to be decrypted by a secure element of a mobile communication device, the secure element implemented using hardware and including a private key that is configured to decrypt the data that was encrypted using the public key.Type: ApplicationFiled: October 21, 2010Publication date: April 26, 2012Applicant: MICROSOFT CORPORATIONInventors: Alan L. Marshall, Kamran Rajabi Zargahi, Miller Thomas Abel, Murali Krishnan, Anoop Anantha
-
Publication number: 20120089450Abstract: Loyalty offer techniques are described. In one or more implementations, data is received from a plurality of merchants via a network, the data describing transactions for goods or services initiated at physical locations of respective said merchants and including identifiers that uniquely identify mobile communication devices that were used to initiate the transactions. Information is updated that describes participation in one or more loyalty offers associated with the plurality of merchants using the identifiers that uniquely identify the mobile communication devices and the data that describes the transactions.Type: ApplicationFiled: October 7, 2010Publication date: April 12, 2012Applicant: MICROSOFT CORPORATIONInventors: Anoop Anantha, Murali R. Krishnan
-
Publication number: 20120084138Abstract: Advertisement management techniques are described. In one or more implementations, a plurality of identifiers are collected of advertisements communicated to respective ones of a plurality of mobile communication devices, each identifier exposed by a respective mobile communication device at a physical location of a merchant. A monetary amount is calculated to be provided to a service that was involved in providing the one or more advertisements to the mobile communication device.Type: ApplicationFiled: October 5, 2010Publication date: April 5, 2012Applicant: MICROSOFT CORPORATIONInventors: Anoop Anantha, Murali R. Krishnan
-
Patent number: 7921299Abstract: The present invention relates to a system and methodology for interacting with a Subscription Platform Service (SPS) and providing data security between entities that employ such service. The system includes a component that receives a request to access an object by an entity, and a data store that stores security information on classes of the objects. A verification component employs the security information to determine whether the entity has permission to call an Application Programming Interface (API) for the object and/or operate on the object, wherein the verification component exposes the object if permission exists or masks the object if permission does not exist.Type: GrantFiled: December 5, 2003Date of Patent: April 5, 2011Assignee: Microsoft CorporationInventors: Anoop Anantha, David J. Brennan
-
Patent number: 7720935Abstract: A storage aggregator is described. In an implementation, a method includes executing a module to determine whether sufficient storage is available to the module to store a particular content item and access a content storage provider over a network to open a client account to obtain additional storage when sufficient storage is not available.Type: GrantFiled: March 29, 2005Date of Patent: May 18, 2010Assignee: Microsoft CorporationInventor: Anoop Anantha
-
Patent number: 7603130Abstract: A wireless communications signal is sampled to obtain one or more data packets. Identifying data is then retrieved from the wireless data packets that uniquely identifies a proximately located computing device that transmitted one or more of the data packets. A server computer is then queried with the identifying data to obtain additional information regarding the proximately located computing device. The additional information regarding the proximately located computing device may then be utilized to obtain data regarding an owner or user of the proximately located computing device. This information may be display within a graphical user interface and exposed to application programs.Type: GrantFiled: March 8, 2006Date of Patent: October 13, 2009Assignee: Microsoft CorporationInventor: Anoop Anantha
-
Publication number: 20070211673Abstract: A wireless communications signal is sampled to obtain one or more data packets. Identifying data is then retrieved from the wireless data packets that uniquely identifies a proximately located computing device that transmitted one or more of the data packets. A server computer is then queried with the identifying data to obtain additional information regarding the proximately located computing device. The additional information regarding the proximately located computing device may then be utilized to obtain data regarding an owner or user of the proximately located computing device. This information may be display within a graphical user interface and exposed to application programs.Type: ApplicationFiled: March 8, 2006Publication date: September 13, 2007Applicant: Microsoft CorporationInventor: Anoop Anantha
-
Publication number: 20060224739Abstract: A storage aggregator is described. In an implementation, a method includes executing a module to determine whether sufficient storage is available to the module to store a particular content item and access a content storage provider over a network to open a client account to obtain additional storage when sufficient storage is not available.Type: ApplicationFiled: March 29, 2005Publication date: October 5, 2006Applicant: Microsoft CorporationInventor: Anoop Anantha