Patents by Inventor Cristina del Amo Casado
Cristina del Amo Casado has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 11366744Abstract: Systems, methods and computer program products are described herein that can be used to help achieve a safe rollout of software in a production datacenter environment. In accordance with certain embodiments, cloud services requests from certain users of a cloud services system (e.g., users that are authorized to receive cloud services via computing devices running test versions of infrastructure software) are dynamically matched to clusters (groups of commonly-managed computing devices called nodes) that are capable of providing the requested services on nodes running test versions of infrastructure software. Within such clusters, the requested services are provided to the users on a subset of cluster nodes that run a test version of an infrastructure software component, while the remaining cluster nodes are not running the particular test version.Type: GrantFiled: September 29, 2017Date of Patent: June 21, 2022Assignee: MICROSOFT TECHNOLOGY LICENSING, LLCInventors: Reza Sherafat Kazemzadeh, Harsh Gupta, Binit R. Mishra, Yevgeniy Olegovich Razuvayev, Muhammad Usman Sharif, Li-Fen Wu, Cristina del Amo Casado, Avnish Kumar Chhabra, Hariharan Jayaraman, Li Xiong, Abhishek Singh
-
Publication number: 20220035895Abstract: Techniques described herein provide multi-factor authentication based on positioning data. Generally described, configurations disclosed herein enable a system to authorize a particular action using positioning data, and possibly other data, associated with an identity. For example, when a user wishes to change a password or access a secured account, the system can authenticate a user if a device associated with the user is located in the secure area. The system can authenticate a user if a requested operation and/or a predetermined pattern of movement associated with the user is detected. For instance, the system allows the user to change the password when the user's computer has followed a predetermined pattern of movement, and when one or more verification procedures meets one or more criteria while the location of the computing device is within the predetermined area.Type: ApplicationFiled: August 10, 2021Publication date: February 3, 2022Inventors: Stephen P. DiAcetis, David Mahlon Hoover, Cristina del Amo Casado, Lanny D. Natucci, JR., Janet Lynn Schneider, Sanjib Saha, Fernando Gonzalez, Jonathan Matthew Kay
-
Patent number: 11115423Abstract: Techniques described herein provide multi-factor authentication based on positioning data. Generally described, configurations disclosed herein enable a system to authorize a particular action using positioning data, and possibly other data, associated with an identity. For example, when a user wishes to change a password or access a secured account, the system can authenticate a user if a device associated with the user is located in the secure area. The system can authenticate a user if a requested operation and/or a predetermined pattern of movement associated with the user is detected. For instance, the system allows the user to change the password when the user's computer has followed a predetermined pattern of movement, and when one or more verification procedures meets one or more criteria while the location of the computing device is within the predetermined area.Type: GrantFiled: July 10, 2019Date of Patent: September 7, 2021Assignee: Microsoft Technology Licensing, LLCInventors: Stephen P. DiAcetis, David Mahlon Hoover, Cristina del Amo Casado, Lanny D. Natucci, Jr., Janet Lynn Schneider, Sanjib Saha, Fernando Gonzalez, Jonathan Matthew Kay
-
Patent number: 10803189Abstract: Techniques described herein provide location-based access control to secured resources. Generally described, configurations disclosed herein enable a system to dynamically modify access to secured resources based on one or more location-related actions. For example, techniques disclosed herein can enable a computing system to control access to resources such as computing devices, display devices, secured locations, and secured data. In some configurations, the techniques disclosed herein can enable controlled access to secured resources based, at least in part, on an invitation associated with a location and positioning data indicating a location of a user.Type: GrantFiled: August 31, 2016Date of Patent: October 13, 2020Assignee: Microsoft Technology Licensing, LLCInventors: Jonathan Matthew Kay, Stephen P. DiAcetis, David Mahlon Hoover, Cristina del Amo Casado
-
Publication number: 20200045055Abstract: Techniques described herein provide multi-factor authentication based on positioning data. Generally described, configurations disclosed herein enable a system to authorize a particular action using positioning data, and possibly other data, associated with an identity. For example, when a user wishes to change a password or access a secured account, the system can authenticate a user if a device associated with the user is located in the secure area. The system can authenticate a user if a requested operation and/or a predetermined pattern of movement associated with the user is detected. For instance, the system allows the user to change the password when the user's computer has followed a predetermined pattern of movement, and when one or more verification procedures meets one or more criteria while the location of the computing device is within the predetermined area.Type: ApplicationFiled: July 10, 2019Publication date: February 6, 2020Inventors: Stephen P. DiAcetis, David Mahlon Hoover, Cristina del Amo Casado, Lanny D. Natucci, JR., Janet Lynn Schneider, Sanjib Saha, Fernando Gonzalez, Jonathan Matthew Kay
-
Patent number: 10389731Abstract: Techniques described herein provide multi-factor authentication based on positioning data. Generally described, configurations disclosed herein enable a system to authorize a particular action using positioning data, and possibly other data, associated with an identity. For example, when a user wishes to change a password or access a secured account, the system can authenticate a user if a device associated with the user is located in the secure area. The system can authenticate a user if a requested operation and/or a predetermined pattern of movement associated with the user is detected. For instance, the system allows the user to change the password when the user's computer has followed a predetermined pattern of movement, and when one or more verification procedures meets one or more criteria while the location of the computing device is within the predetermined area.Type: GrantFiled: November 22, 2016Date of Patent: August 20, 2019Assignee: Microsoft Technology Licensing, LLCInventors: Stephen P. DiAcetis, David Mahlon Hoover, Cristina del Amo Casado, Lanny D. Natucci, Jr., Janet Lynn Schneider, Sanjib Saha, Fernando Gonzalez, Jonathan Matthew Kay
-
Publication number: 20180293152Abstract: Systems, methods and computer program products are described herein that can be used to help achieve a safe rollout of software in a production datacenter environment. In accordance with certain embodiments, cloud services requests from certain users of a cloud services system (e.g., users that are authorized to receive cloud services via computing devices running test versions of infrastructure software) are dynamically matched to clusters (groups of commonly-managed computing devices called nodes) that are capable of providing the requested services on nodes running test versions of infrastructure software. Within such clusters, the requested services are provided to the users on a subset of cluster nodes that run a test version of an infrastructure software component, while the remaining cluster nodes are not running the particular test version.Type: ApplicationFiled: September 29, 2017Publication date: October 11, 2018Inventors: Reza Sherafat Kazemzadeh, Harsh Gupta, Binit R. Mishra, Yevgeniy Olegovich Razuvayev, Muhammad Usman Sharif, Li-Fen Wu, Cristina del Amo Casado, Avnish Kumar Chhabra, Hariharan Jayaraman, Li Xiong, Abhishek Singh
-
Patent number: 9998866Abstract: The location of a computing device is determined, and the location of an area of interest that is a geographic area referred to as a geo-fence is identified. The accuracy of the determined location of the computing device has an associated uncertainty, so the exact position of the computing device cannot typically be pinpointed. In light of this, the uncertainty associated with the determined location is evaluated relative to the size of the geo-fence in order to determine whether the computing device is inside the geo-fence or outside the geo-fence. Based on this determination, various actions can be taken if the user is entering the geo-fence, exiting the geo-fence, remaining in the geo-fence for at least a threshold amount of time, and so forth.Type: GrantFiled: June 14, 2013Date of Patent: June 12, 2018Assignee: MICROSOFT TECHNOLOGY LICENSING, LLCInventors: Lanny D. Natucci, Jr., Janet L Schneider, Mark A. Inderhees, Frank Gorgenyi, Stuart J. Harper, Cristina del Amo Casado, Fernando Gonzalez, Sanjib Saha, Shaun C. Hedrick
-
Publication number: 20180143024Abstract: Techniques described herein generate indoor map data. Generally described, configurations disclosed herein generate indoor map data using positioning data and interaction data associated with the movement and interactions of user computing devices. For example, techniques disclosed herein can enable a computing system to identify floors of a building, hallways, offices, doors, common areas, and other resources, including computing resources, based on the movement of users and the interaction of the users with resources within the indoor environment.Type: ApplicationFiled: November 22, 2016Publication date: May 24, 2018Inventors: Jonathan Matthew Kay, Stephen P. DiAcetis, David Mahlon Hoover, Cristina del Amo Casado, Jyh-Han Lin
-
Publication number: 20180145990Abstract: Techniques described herein provide multi-factor authentication based on positioning data. Generally described, configurations disclosed herein enable a system to authorize a particular action using positioning data, and possibly other data, associated with an identity. For example, when a user wishes to change a password or access a secured account, the system can authenticate a user if a device associated with the user is located in the secure area. The system can authenticate a user if a requested operation and/or a predetermined pattern of movement associated with the user is detected. For instance, the system allows the user to change the password when the user's computer has followed a predetermined pattern of movement, and when one or more verification procedures meets one or more criteria while the location of the computing device is within the predetermined area.Type: ApplicationFiled: November 22, 2016Publication date: May 24, 2018Inventors: Stephen P. DiAcetis, David Mahlon Hoover, Cristina del Amo Casado, Lanny D. Natucci, JR., Janet Lynn Schneider, Sanjib Saha, Fernando Gonzalez, Jonathan Matthew Kay
-
Publication number: 20180060601Abstract: Techniques described herein provide location-based access control to secured resources. Generally described, configurations disclosed herein enable a system to dynamically modify access to secured resources based on one or more location-related actions. For example, techniques disclosed herein can enable a computing system to control access to resources such as computing devices, display devices, secured locations, and secured data. In some configurations, the techniques disclosed herein can enable controlled access to secured resources based, at least in part, on an invitation associated with a location and positioning data indicating a location of a user.Type: ApplicationFiled: August 31, 2016Publication date: March 1, 2018Inventors: Jonathan Matthew Kay, Stephen P. DiAcetis, David Mahlon Hoover, Cristina del Amo Casado
-
Patent number: 9706364Abstract: A determination of whether a mobile computing device is indoors or outdoors can incorporate any of a variety of factors to make an efficient and accurate determination of indoor-outdoor status. Such a status can be useful for use in conjunction with positioning services. Features such as bounding boxes, activity determination, and the like can be used to strike a balance between power consumption and accuracy. A positive user experience with fewer false detections can result.Type: GrantFiled: September 16, 2014Date of Patent: July 11, 2017Assignee: Microsoft Technology Licensing, LLCInventors: Jonathan Kay, Chih-Wei Wang, Priyanka B. Vegesna, Jyh-Han Lin, Hiep Khuu, Cristina del Amo Casado, David Hoover, Stephen P. DiAcetis, Fernando Gonzalez
-
Publication number: 20160080911Abstract: A determination of whether a mobile computing device is indoors or outdoors can incorporate any of a variety of factors to make an efficient and accurate determination of indoor-outdoor status. Such a status can be useful for use in conjunction with positioning services. Features such as bounding boxes, activity determination, and the like can be used to strike a balance between power consumption and accuracy. A positive user experience with fewer false detections can result.Type: ApplicationFiled: September 16, 2014Publication date: March 17, 2016Applicant: MICROSOFT CORPORATIONInventors: Jonathan Kay, Chih-Wei Wang, Priyanka B. Vegesna, Jyh-Han Lin, Hiep Khuu, Cristina del Amo Casado, David Hoover, Stephen P. DiAcetis, Fernando Gonzalez
-
Publication number: 20140370909Abstract: Various different areas of interest are identified, these areas being geographic areas that are also referred to as geo-fences. Whether a computing device is in a geo-fence can be determined based on the location of the geo-fence and the location of the computing device. The location of a computing device can be determined using various different location determination techniques, such as wireless networking triangulation, cellular positioning, Global Navigation Satellite System positioning, network address positioning, and so forth. Various power saving techniques are implemented to determine which techniques are used and when such techniques are used to reduce power consumption in the computing device.Type: ApplicationFiled: June 14, 2013Publication date: December 18, 2014Inventors: Lanny D. Natucci, JR., Janet L. Schneider, Mark A. Inderhees, Robert R. Dufalo, Jonathan M. Kay, Cristina del Amo Casado, Sanjib Saha, Fernando Gonzalez, Priyanka B. Vegesna
-
Publication number: 20140370910Abstract: The location of a computing device is determined, and the location of an area of interest that is a geographic area referred to as a geo-fence is identified. The accuracy of the determined location of the computing device has an associated uncertainty, so the exact position of the computing device cannot typically be pinpointed. In light of this, the uncertainty associated with the determined location is evaluated relative to the size of the geo-fence in order to determine whether the computing device is inside the geo-fence or outside the geo-fence. Based on this determination, various actions can be taken if the user is entering the geo-fence, exiting the geo-fence, remaining in the geo-fence for at least a threshold amount of time, and so forth.Type: ApplicationFiled: June 14, 2013Publication date: December 18, 2014Inventors: Lanny D. Natucci, JR., Janet L. Schneider, Mark A. Inderhees, Frank Gorgenyi, Stuart J. Harper, Cristina del Amo Casado, Fernando Gonzalez, Sanjib Saha, Shaun C. Hedrick