Patents by Inventor Cristina del Amo Casado

Cristina del Amo Casado has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 11366744
    Abstract: Systems, methods and computer program products are described herein that can be used to help achieve a safe rollout of software in a production datacenter environment. In accordance with certain embodiments, cloud services requests from certain users of a cloud services system (e.g., users that are authorized to receive cloud services via computing devices running test versions of infrastructure software) are dynamically matched to clusters (groups of commonly-managed computing devices called nodes) that are capable of providing the requested services on nodes running test versions of infrastructure software. Within such clusters, the requested services are provided to the users on a subset of cluster nodes that run a test version of an infrastructure software component, while the remaining cluster nodes are not running the particular test version.
    Type: Grant
    Filed: September 29, 2017
    Date of Patent: June 21, 2022
    Assignee: MICROSOFT TECHNOLOGY LICENSING, LLC
    Inventors: Reza Sherafat Kazemzadeh, Harsh Gupta, Binit R. Mishra, Yevgeniy Olegovich Razuvayev, Muhammad Usman Sharif, Li-Fen Wu, Cristina del Amo Casado, Avnish Kumar Chhabra, Hariharan Jayaraman, Li Xiong, Abhishek Singh
  • Publication number: 20220035895
    Abstract: Techniques described herein provide multi-factor authentication based on positioning data. Generally described, configurations disclosed herein enable a system to authorize a particular action using positioning data, and possibly other data, associated with an identity. For example, when a user wishes to change a password or access a secured account, the system can authenticate a user if a device associated with the user is located in the secure area. The system can authenticate a user if a requested operation and/or a predetermined pattern of movement associated with the user is detected. For instance, the system allows the user to change the password when the user's computer has followed a predetermined pattern of movement, and when one or more verification procedures meets one or more criteria while the location of the computing device is within the predetermined area.
    Type: Application
    Filed: August 10, 2021
    Publication date: February 3, 2022
    Inventors: Stephen P. DiAcetis, David Mahlon Hoover, Cristina del Amo Casado, Lanny D. Natucci, JR., Janet Lynn Schneider, Sanjib Saha, Fernando Gonzalez, Jonathan Matthew Kay
  • Patent number: 11115423
    Abstract: Techniques described herein provide multi-factor authentication based on positioning data. Generally described, configurations disclosed herein enable a system to authorize a particular action using positioning data, and possibly other data, associated with an identity. For example, when a user wishes to change a password or access a secured account, the system can authenticate a user if a device associated with the user is located in the secure area. The system can authenticate a user if a requested operation and/or a predetermined pattern of movement associated with the user is detected. For instance, the system allows the user to change the password when the user's computer has followed a predetermined pattern of movement, and when one or more verification procedures meets one or more criteria while the location of the computing device is within the predetermined area.
    Type: Grant
    Filed: July 10, 2019
    Date of Patent: September 7, 2021
    Assignee: Microsoft Technology Licensing, LLC
    Inventors: Stephen P. DiAcetis, David Mahlon Hoover, Cristina del Amo Casado, Lanny D. Natucci, Jr., Janet Lynn Schneider, Sanjib Saha, Fernando Gonzalez, Jonathan Matthew Kay
  • Patent number: 10803189
    Abstract: Techniques described herein provide location-based access control to secured resources. Generally described, configurations disclosed herein enable a system to dynamically modify access to secured resources based on one or more location-related actions. For example, techniques disclosed herein can enable a computing system to control access to resources such as computing devices, display devices, secured locations, and secured data. In some configurations, the techniques disclosed herein can enable controlled access to secured resources based, at least in part, on an invitation associated with a location and positioning data indicating a location of a user.
    Type: Grant
    Filed: August 31, 2016
    Date of Patent: October 13, 2020
    Assignee: Microsoft Technology Licensing, LLC
    Inventors: Jonathan Matthew Kay, Stephen P. DiAcetis, David Mahlon Hoover, Cristina del Amo Casado
  • Publication number: 20200045055
    Abstract: Techniques described herein provide multi-factor authentication based on positioning data. Generally described, configurations disclosed herein enable a system to authorize a particular action using positioning data, and possibly other data, associated with an identity. For example, when a user wishes to change a password or access a secured account, the system can authenticate a user if a device associated with the user is located in the secure area. The system can authenticate a user if a requested operation and/or a predetermined pattern of movement associated with the user is detected. For instance, the system allows the user to change the password when the user's computer has followed a predetermined pattern of movement, and when one or more verification procedures meets one or more criteria while the location of the computing device is within the predetermined area.
    Type: Application
    Filed: July 10, 2019
    Publication date: February 6, 2020
    Inventors: Stephen P. DiAcetis, David Mahlon Hoover, Cristina del Amo Casado, Lanny D. Natucci, JR., Janet Lynn Schneider, Sanjib Saha, Fernando Gonzalez, Jonathan Matthew Kay
  • Patent number: 10389731
    Abstract: Techniques described herein provide multi-factor authentication based on positioning data. Generally described, configurations disclosed herein enable a system to authorize a particular action using positioning data, and possibly other data, associated with an identity. For example, when a user wishes to change a password or access a secured account, the system can authenticate a user if a device associated with the user is located in the secure area. The system can authenticate a user if a requested operation and/or a predetermined pattern of movement associated with the user is detected. For instance, the system allows the user to change the password when the user's computer has followed a predetermined pattern of movement, and when one or more verification procedures meets one or more criteria while the location of the computing device is within the predetermined area.
    Type: Grant
    Filed: November 22, 2016
    Date of Patent: August 20, 2019
    Assignee: Microsoft Technology Licensing, LLC
    Inventors: Stephen P. DiAcetis, David Mahlon Hoover, Cristina del Amo Casado, Lanny D. Natucci, Jr., Janet Lynn Schneider, Sanjib Saha, Fernando Gonzalez, Jonathan Matthew Kay
  • Publication number: 20180293152
    Abstract: Systems, methods and computer program products are described herein that can be used to help achieve a safe rollout of software in a production datacenter environment. In accordance with certain embodiments, cloud services requests from certain users of a cloud services system (e.g., users that are authorized to receive cloud services via computing devices running test versions of infrastructure software) are dynamically matched to clusters (groups of commonly-managed computing devices called nodes) that are capable of providing the requested services on nodes running test versions of infrastructure software. Within such clusters, the requested services are provided to the users on a subset of cluster nodes that run a test version of an infrastructure software component, while the remaining cluster nodes are not running the particular test version.
    Type: Application
    Filed: September 29, 2017
    Publication date: October 11, 2018
    Inventors: Reza Sherafat Kazemzadeh, Harsh Gupta, Binit R. Mishra, Yevgeniy Olegovich Razuvayev, Muhammad Usman Sharif, Li-Fen Wu, Cristina del Amo Casado, Avnish Kumar Chhabra, Hariharan Jayaraman, Li Xiong, Abhishek Singh
  • Patent number: 9998866
    Abstract: The location of a computing device is determined, and the location of an area of interest that is a geographic area referred to as a geo-fence is identified. The accuracy of the determined location of the computing device has an associated uncertainty, so the exact position of the computing device cannot typically be pinpointed. In light of this, the uncertainty associated with the determined location is evaluated relative to the size of the geo-fence in order to determine whether the computing device is inside the geo-fence or outside the geo-fence. Based on this determination, various actions can be taken if the user is entering the geo-fence, exiting the geo-fence, remaining in the geo-fence for at least a threshold amount of time, and so forth.
    Type: Grant
    Filed: June 14, 2013
    Date of Patent: June 12, 2018
    Assignee: MICROSOFT TECHNOLOGY LICENSING, LLC
    Inventors: Lanny D. Natucci, Jr., Janet L Schneider, Mark A. Inderhees, Frank Gorgenyi, Stuart J. Harper, Cristina del Amo Casado, Fernando Gonzalez, Sanjib Saha, Shaun C. Hedrick
  • Publication number: 20180143024
    Abstract: Techniques described herein generate indoor map data. Generally described, configurations disclosed herein generate indoor map data using positioning data and interaction data associated with the movement and interactions of user computing devices. For example, techniques disclosed herein can enable a computing system to identify floors of a building, hallways, offices, doors, common areas, and other resources, including computing resources, based on the movement of users and the interaction of the users with resources within the indoor environment.
    Type: Application
    Filed: November 22, 2016
    Publication date: May 24, 2018
    Inventors: Jonathan Matthew Kay, Stephen P. DiAcetis, David Mahlon Hoover, Cristina del Amo Casado, Jyh-Han Lin
  • Publication number: 20180145990
    Abstract: Techniques described herein provide multi-factor authentication based on positioning data. Generally described, configurations disclosed herein enable a system to authorize a particular action using positioning data, and possibly other data, associated with an identity. For example, when a user wishes to change a password or access a secured account, the system can authenticate a user if a device associated with the user is located in the secure area. The system can authenticate a user if a requested operation and/or a predetermined pattern of movement associated with the user is detected. For instance, the system allows the user to change the password when the user's computer has followed a predetermined pattern of movement, and when one or more verification procedures meets one or more criteria while the location of the computing device is within the predetermined area.
    Type: Application
    Filed: November 22, 2016
    Publication date: May 24, 2018
    Inventors: Stephen P. DiAcetis, David Mahlon Hoover, Cristina del Amo Casado, Lanny D. Natucci, JR., Janet Lynn Schneider, Sanjib Saha, Fernando Gonzalez, Jonathan Matthew Kay
  • Publication number: 20180060601
    Abstract: Techniques described herein provide location-based access control to secured resources. Generally described, configurations disclosed herein enable a system to dynamically modify access to secured resources based on one or more location-related actions. For example, techniques disclosed herein can enable a computing system to control access to resources such as computing devices, display devices, secured locations, and secured data. In some configurations, the techniques disclosed herein can enable controlled access to secured resources based, at least in part, on an invitation associated with a location and positioning data indicating a location of a user.
    Type: Application
    Filed: August 31, 2016
    Publication date: March 1, 2018
    Inventors: Jonathan Matthew Kay, Stephen P. DiAcetis, David Mahlon Hoover, Cristina del Amo Casado
  • Patent number: 9706364
    Abstract: A determination of whether a mobile computing device is indoors or outdoors can incorporate any of a variety of factors to make an efficient and accurate determination of indoor-outdoor status. Such a status can be useful for use in conjunction with positioning services. Features such as bounding boxes, activity determination, and the like can be used to strike a balance between power consumption and accuracy. A positive user experience with fewer false detections can result.
    Type: Grant
    Filed: September 16, 2014
    Date of Patent: July 11, 2017
    Assignee: Microsoft Technology Licensing, LLC
    Inventors: Jonathan Kay, Chih-Wei Wang, Priyanka B. Vegesna, Jyh-Han Lin, Hiep Khuu, Cristina del Amo Casado, David Hoover, Stephen P. DiAcetis, Fernando Gonzalez
  • Publication number: 20160080911
    Abstract: A determination of whether a mobile computing device is indoors or outdoors can incorporate any of a variety of factors to make an efficient and accurate determination of indoor-outdoor status. Such a status can be useful for use in conjunction with positioning services. Features such as bounding boxes, activity determination, and the like can be used to strike a balance between power consumption and accuracy. A positive user experience with fewer false detections can result.
    Type: Application
    Filed: September 16, 2014
    Publication date: March 17, 2016
    Applicant: MICROSOFT CORPORATION
    Inventors: Jonathan Kay, Chih-Wei Wang, Priyanka B. Vegesna, Jyh-Han Lin, Hiep Khuu, Cristina del Amo Casado, David Hoover, Stephen P. DiAcetis, Fernando Gonzalez
  • Publication number: 20140370909
    Abstract: Various different areas of interest are identified, these areas being geographic areas that are also referred to as geo-fences. Whether a computing device is in a geo-fence can be determined based on the location of the geo-fence and the location of the computing device. The location of a computing device can be determined using various different location determination techniques, such as wireless networking triangulation, cellular positioning, Global Navigation Satellite System positioning, network address positioning, and so forth. Various power saving techniques are implemented to determine which techniques are used and when such techniques are used to reduce power consumption in the computing device.
    Type: Application
    Filed: June 14, 2013
    Publication date: December 18, 2014
    Inventors: Lanny D. Natucci, JR., Janet L. Schneider, Mark A. Inderhees, Robert R. Dufalo, Jonathan M. Kay, Cristina del Amo Casado, Sanjib Saha, Fernando Gonzalez, Priyanka B. Vegesna
  • Publication number: 20140370910
    Abstract: The location of a computing device is determined, and the location of an area of interest that is a geographic area referred to as a geo-fence is identified. The accuracy of the determined location of the computing device has an associated uncertainty, so the exact position of the computing device cannot typically be pinpointed. In light of this, the uncertainty associated with the determined location is evaluated relative to the size of the geo-fence in order to determine whether the computing device is inside the geo-fence or outside the geo-fence. Based on this determination, various actions can be taken if the user is entering the geo-fence, exiting the geo-fence, remaining in the geo-fence for at least a threshold amount of time, and so forth.
    Type: Application
    Filed: June 14, 2013
    Publication date: December 18, 2014
    Inventors: Lanny D. Natucci, JR., Janet L. Schneider, Mark A. Inderhees, Frank Gorgenyi, Stuart J. Harper, Cristina del Amo Casado, Fernando Gonzalez, Sanjib Saha, Shaun C. Hedrick