Patents by Inventor Binesh Balasingh

Binesh Balasingh has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20180182236
    Abstract: A user's interaction with a product is monitored using one or more sensors on an RFID tag to gather information associated with the user's interaction with the product. Based on the user's interaction and gathered information, an adjustment is made to the product that is personalized to the user.
    Type: Application
    Filed: December 22, 2016
    Publication date: June 28, 2018
    Applicant: Motorola Mobility LLC
    Inventors: Mary Khun Hor-Lao, Binesh Balasingh, Douglas Alfred Lautner, Jagatkumar Shah, Scott P. DeBates
  • Publication number: 20180124063
    Abstract: A method includes receiving a composite security identifier associated with a remote device in a local device. A plurality of identification codes associated with the remote device are encoded in the composite security identifier. An access request from the remote device is received in the local device. The access request is associated with a first one of the plurality of identification codes. The remote device is challenged for a second one of the plurality of identification codes different than the first one of the identification codes. An access level for the remote device is set on the local device based on the composite security identifier and the challenging of the remote device. The access request is selectively executed or denied based on the access level.
    Type: Application
    Filed: November 3, 2016
    Publication date: May 3, 2018
    Inventors: Sudhir Vissa, Binesh Balasingh, Vivek Tyagi
  • Publication number: 20180046789
    Abstract: A method includes receiving an incoming biometric identification request on a first device from a user. First location data for the first device is determined. Second location data associated with at least one previous biometric identification request associated with the user is retrieved. A second level identification request is selectively initiated on the first device based on at least the first and second location data. A device includes a location module to determine first location data for the device, a biometric sensor to generate an incoming biometric identification request from a user, and a processor to retrieve second location data associated with at least one previous biometric identification request associated with the user and selectively initiate a second level identification request on the device based on at least the first and second location data.
    Type: Application
    Filed: August 11, 2016
    Publication date: February 15, 2018
    Inventors: Sudhir Vissa, Binesh Balasingh, Mary Hor-Lao, Vivek Tyagi
  • Publication number: 20180035356
    Abstract: A method and apparatus includes a communication device monitoring for an indication of presence with respect to the communication device. The method involves transmitting, when detecting the indication of presence, a first series of neighborhood awareness networking discovery beacon frames having a first interframe time interval. The method further involves transmitting, when not detecting the indication of presence, a second series of neighborhood awareness networking discovery beacon frames having a second interframe time interval that is longer than the first interframe time interval.
    Type: Application
    Filed: July 26, 2016
    Publication date: February 1, 2018
    Inventors: Ranjeet Gupta, Gabriel Burca, Mary Hor-Lao, Binesh Balasingh
  • Publication number: 20180035275
    Abstract: A method and apparatus includes a NAN communication device suppressing NAN scanning and scanning using an alternate scanning protocol while suppressing NAN scanning. The method additionally includes detecting a transmission from another communication device while scanning using the alternate scanning protocol and determining the detected transmission is a NAN transmission. The method further includes discontinuing suppressing NAN scanning in response to detecting the NAN transmission.
    Type: Application
    Filed: July 26, 2016
    Publication date: February 1, 2018
    Inventors: Ranjeet Gupta, Mary Hor-Lao, Binesh Balasingh, Gabriel Burca
  • Publication number: 20170331696
    Abstract: A device and method for determining a master device in a neighborhood aware network (NAN). The method includes identifying a number of peer devices located within communication range of a first device and that are capable of communicating via the NAN. A master rank value associated with a corresponding peer device is retrieved from each received response. A first master rank value is calculated for the first device, at least partially based on the number of responding peer devices. The first master rank value is compared with the received master rank values of the responding peer devices. In response to the first master rank value being greater than each of the received master rank values, the first device assumes a role of a master device within a NAN cluster that includes the first device and the responding peer devices.
    Type: Application
    Filed: May 10, 2016
    Publication date: November 16, 2017
    Inventors: Ranjeet Gupta, Gabriel Burca, Binesh Balasingh, Mary Hor-Lao
  • Publication number: 20170310661
    Abstract: A method, system, and computer program product for automatically receiving authorization data required to log into a service portal from a second device to a first device, via a validated connection. The method includes the first device submitting a first request to a provider to acquire authorization data required for an authenticated login to an associated online service of the provider. In response to the first device submitting the first request to the provider, the first device automatically receives the authorization data via a validated connection with the second device. In response to receiving the authorization data via the validated connection, the first device transmits a second request, including the authorization data, to the provider to gain access to the online service.
    Type: Application
    Filed: April 26, 2016
    Publication date: October 26, 2017
    Inventors: Vivek Tyagi, Sudhir Vissa, Binesh Balasingh
  • Publication number: 20170290062
    Abstract: An apparatus includes a first media access control (MAC) device comprising a first radio transceiver and having a first MAC address and a second MAC device comprising a second radio transceiver and having a second MAC address. The second MAC device is operatively coupled to the first MAC device. The first MAC device is operative to receive first MAC layer data for the first MAC device and receive second MAC layer data for the second MAC device, and transmit the first MAC layer data and the second MAC layer data to an access point (AP) using the first radio transceiver of the first MAC device.
    Type: Application
    Filed: July 25, 2016
    Publication date: October 5, 2017
    Applicant: Motorola Mobility LLC
    Inventors: Binesh Balasingh, Ranjeet Gupta, Mary Hor-Lao
  • Publication number: 20170289097
    Abstract: An apparatus includes a first media access control (MAC) device with a first radio transceiver and having a first MAC address, and a second MAC device with a second radio transceiver and having a second MAC address. The first MAC device is operative to communicate with a first wireless access point using an Internet Protocol (IP) address. The second MAC device is operatively coupled to the first MAC device, and is operative to communicate with a second wireless access point using the same IP address.
    Type: Application
    Filed: July 25, 2016
    Publication date: October 5, 2017
    Applicant: Motorola Mobility LLC
    Inventors: Binesh Balasingh, Ranjeet Gupta, Mary Hor-Lao
  • Patent number: 9560129
    Abstract: Disclosed are peer-to-peer group re-formation techniques. The techniques enable automatic reformation of a peer-to-peer group when the Group Owner (“GO”) device is lost. To do so, the techniques enable selection of a one of the peer devices in the peer-to-peer group as a next GO device responsive to detecting the loss of the original GO device. Then, the peer device selected as the next GO device automatically activates as the GO device, while the other peer devices scan for and connect to the next GO device.
    Type: Grant
    Filed: July 28, 2014
    Date of Patent: January 31, 2017
    Assignee: Google Technology Holdings LLC
    Inventors: Binesh Balasingh, Viji Alexander, Gabriel B. Burca, Ranjeet Gupta, Eric J. Hefner, Mary K. Hor-Lao, Ishwara Ja, Douglas A. Lautner, Sudhir C. Vissa
  • Patent number: 9509670
    Abstract: The present invention provides a system and method for managing secure communications in an ad-hoc network having three or more users including a first user, a second user and a third user. Each user is associated with at least one communication device, and has a set of keys associated with the user for managing secure communications between the at least one communication device of the user and the at least one communication device of another one of the three or more users. Each set of keys includes a private key and a public key, where the public key is shared with the communication device of the other ones of the three or more users with which the user has been authenticated, and the private key is used to decrypt communications encrypted using the corresponding public key from the same set of keys.
    Type: Grant
    Filed: August 19, 2014
    Date of Patent: November 29, 2016
    Assignee: Google Technology Holdings LLC
    Inventors: Binesh Balasingh, Viji Alexander, Gabriel B. Burca, Ranjeet Gupta, Eric J. Hefner, Mary K. Hor-Lao, Ishwara Ja, Douglas A. Lautner, Sudhir C. Vissa
  • Publication number: 20160057117
    Abstract: The present invention provides a system and method for managing secure communications in an ad-hoc network having three or more users including a first user, a second user and a third user. Each user is associated with at least one communication device, and has a set of keys associated with the user for managing secure communications between the at least one communication device of the user and the at least one communication device of another one of the three or more users. Each set of keys includes a private key and a public key, where the public key is shared with the communication device of the other ones of the three or more users with which the user has been authenticated, and the private key is used to decrypt communications encrypted using the corresponding public key from the same set of keys.
    Type: Application
    Filed: August 19, 2014
    Publication date: February 25, 2016
    Inventors: Binesh Balasingh, Viji Alexander, Gabriel B. Burca, Ranjeet Gupta, Eric J. Hefner, Mary K. Hor-Lao, Ishwara JA, Douglas A. Lautner, Sudhir C. Vissa
  • Publication number: 20160028802
    Abstract: Disclosed are peer-to-peer group re-formation techniques. The techniques enable automatic reformation of a peer-to-peer group when the Group Owner (“GO”) device is lost. To do so, the techniques enable selection of a one of the peer devices in the peer-to-peer group as a next GO device responsive to detecting the loss of the original GO device. Then, the peer device selected as the next GO device automatically activates as the GO device, while the other peer devices scan for and connect to the next GO device.
    Type: Application
    Filed: July 28, 2014
    Publication date: January 28, 2016
    Inventors: Binesh Balasingh, Viji Alexander, Gabriel B. Burca, Ranjeet Gupta, Eric J. Hefner, Mary K. Hor-Lao, Ishwara JA, Douglas A. Lautner, Sudhir C. Vissa