Patents by Inventor Jagadish Kumar Agrawal

Jagadish Kumar Agrawal has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 11429174
    Abstract: This document describes techniques (400, 500, 600) and apparatuses (100, 700) for implementing sensor-based near-field communication (NFC) authentication. These techniques (400, 500, 600) and apparatuses (100, 700) enable a computing device (102) to detect, in a low-power state, environmental variances indicating proximity with an NFC-enabled device (104) with which to authenticate. In some embodiments, various components of a computing device (102) in a sleep state are activated to process environmental variance(s), perform authentication operations, and/or an indicate initiation of authentication operations to a user.
    Type: Grant
    Filed: January 15, 2020
    Date of Patent: August 30, 2022
    Assignee: Google LLC
    Inventors: Jagadish Kumar Agrawal, Deepak Chandra, John J. Gorsica, Jagatkumar V. Shah
  • Publication number: 20200150735
    Abstract: This document describes techniques (400, 500, 600) and apparatuses (100, 700) for implementing sensor-based near-field communication (NFC) authentication. These techniques (400, 500, 600) and apparatuses (100, 700) enable a computing device (102) to detect, in a low-power state, environmental variances indicating proximity with an NFC-enabled device (104) with which to authenticate. In some embodiments, various components of a computing device (102) in a sleep state are activated to process environmental variance(s), perform authentication operations, and/or an indicate initiation of authentication operations to a user.
    Type: Application
    Filed: January 15, 2020
    Publication date: May 14, 2020
    Applicant: Google Technology Holdings LLC
    Inventors: Jagadish Kumar Agrawal, Deepak Chandra, John J. Gorsica, Jagatkumar V. Shah
  • Patent number: 10591969
    Abstract: This document describes techniques (400, 500, 600) and apparatuses (100, 700) for implementing sensor-based near-field communication (NFC) authentication. These techniques (400, 500, 600) and apparatuses (100, 700) enable a computing device (102) to detect, in a low-power state, environmental variances indicating proximity with an NFC-enabled device (104) with which to authenticate. In some embodiments, various components of a computing device (102) in a sleep state are activated to process environmental variance(s), perform authentication operations, and/or an indicate initiation of authentication operations to a user.
    Type: Grant
    Filed: June 24, 2014
    Date of Patent: March 17, 2020
    Assignee: Google Technology Holdings LLC
    Inventors: Jagadish Kumar Agrawal, Deepak Chandra, John J. Gorsica, Jagatkumar V. Shah
  • Patent number: 9983651
    Abstract: This document describes techniques (400, 500, 600) and apparatuses (100, 700) for implementing low-power near-field communication (NFC) authentication. These techniques (400, 500, 600) and apparatuses (100, 700) enable a computing device (102) to detect, in a low-power state, an NFC-enabled device (104) with which to authenticate via NFC. In some embodiments, various components of a computing device (102) in a sleep state are activated to perform authentication and/or an indication is provided to a user indicating an initiation of the authentication.
    Type: Grant
    Filed: June 4, 2014
    Date of Patent: May 29, 2018
    Assignee: GOOGLE TECHNOLOGY HOLDINGS LLC
    Inventors: Jagadish Kumar Agrawal, Deepak Chandra, John J. Gorsica, Jagatkumar V. Shah
  • Patent number: 9621422
    Abstract: In embodiments of device to device content upgrades, a computing device includes a peer sharing manager that shares content and upgrades to content with peer devices. The computing device downloads content and upgrades from sources on the Internet, and shares the content and upgrades with peer devices that lack an Internet connection. A lowest supported version of the content can be shared from the computing device to one of the peer devices. The lowest supported version of the content determines capabilities of the peer device and establishes a peer-to-peer communication link with the computing device. The peer device reports the capability information to the computing device and, if the computing device determines that the peer device is capable of supporting an upgraded version of the content, the computing device communicates the upgraded version of the content to the peer device.
    Type: Grant
    Filed: June 24, 2014
    Date of Patent: April 11, 2017
    Assignee: Google Technology Holdings LLC
    Inventors: Jagadish Kumar Agrawal, Sujoy Das, Nathan J Fortin, Jordan Andrew Hurwich, Catherine T Nguyen, Sheila A Vyas
  • Publication number: 20160041879
    Abstract: Multiple computing devices (102, 122) transfer data and otherwise communicate directly with one another, and do so in the absence of any intervening devices such as devices accessed over the Internet or other wide-range network. A user of a particular device can select which other devices, if any, are to be trusted by the particular device. Once another device is trusted by the particular device, data from the particular device is backed up to the trusted device while the two devices are in close physical proximity to one another. In the event that data on the particular device is lost, the lost data can be restored from the trusted device to the particular device while the two devices are in close physical proximity to one another.
    Type: Application
    Filed: August 6, 2014
    Publication date: February 11, 2016
    Inventors: Akila Varadarajan, Jagadish Kumar Agrawal, Sujoy Das, Nathan J. Fortin, Jordan Andrew Hurwich, Catherine T. Nguyen, Peeyush Ranjan, Punit S. Soni
  • Publication number: 20160036902
    Abstract: A method and apparatus share content between devices in peer-to-peer networks. A first connection between a first peer device and a second peer device can be established in a first peer-to-peer network. A second connection between the second peer device and a third peer device can be established in a second peer-to-peer network. A content request can be received at the second peer device from the first peer device, where the content request is a request for requested content. The second peer device can determine that it does not have the requested content. The second peer device can store the content request when it does not have the requested content. The second peer device can forward the content request to the third peer device if the second peer device does not have the requested content.
    Type: Application
    Filed: July 31, 2014
    Publication date: February 4, 2016
    Inventors: Akila Varadarajan, Jagadish Kumar Agrawal, Sujoy Das
  • Publication number: 20160028798
    Abstract: Techniques are described that may be utilized to manage membership of peers in a peer-to-peer network. For example, membership may be based at least in part on a score that is calculated that describes a reputation for peers in the peer-to-peer network. The calculation of the score may be based, at least in part, on a number of peers that provided reports of inappropriate content, rather than relying solely on a number of reports received from the peers as was performed using conventional techniques. In another example, this score may also be calculated, at least in part, to reflect a positive score for the peer. For instance, the score may also be adjusted based on a number of peers that also received the content but did not report the content as inappropriate.
    Type: Application
    Filed: July 23, 2014
    Publication date: January 28, 2016
    Inventors: Jagadish Kumar Agrawal, Sujoy Das, Nathan J Fortin, Jordan Andrew Hurwich, Catherine T Nguyen, Akila Varadarajan
  • Publication number: 20150372859
    Abstract: In embodiments of device to device content upgrades, a computing device includes a peer sharing manager that shares content and upgrades to content with peer devices. The computing device downloads content and upgrades from sources on the Internet, and shares the content and upgrades with peer devices that lack an Internet connection. A lowest supported version of the content can be shared from the computing device to one of the peer devices. The lowest supported version of the content determines capabilities of the peer device and establishes a peer-to-peer communication link with the computing device. The peer device reports the capability information to the computing device and, if the computing device determines that the peer device is capable of supporting an upgraded version of the content, the computing device communicates the upgraded version of the content to the peer device.
    Type: Application
    Filed: June 24, 2014
    Publication date: December 24, 2015
    Inventors: Jagadish Kumar Agrawal, Sujoy Das, Nathan J. Fortin, Jordan Andrew Hurwich, Catherine T. Nguyen, Sheila A. Vyas
  • Publication number: 20150121108
    Abstract: This document describes techniques (400, 500, 600) and apparatuses (100, 700) for implementing sensor-based near-field communication (NFC) authentication. These techniques (400, 500, 600) and apparatuses (100, 700) enable a computing device (102) to detect, in a low-power state, environmental variances indicating proximity with an NFC-enabled device (104) with which to authenticate. In some embodiments, various components of a computing device (102) in a sleep state are activated to process environmental variance(s), perform authentication operations, and/or an indicate initiation of authentication operations to a user.
    Type: Application
    Filed: June 24, 2014
    Publication date: April 30, 2015
    Inventors: Jagadish Kumar Agrawal, Deepak Chandra, John J. Gorsica, Jagatkumar V. Shah
  • Publication number: 20150019892
    Abstract: This document describes techniques (400, 500, 600) and apparatuses (100, 700) for implementing low-power near-field communication (NFC) authentication. These techniques (400, 500, 600) and apparatuses (100, 700) enable a computing device (102) to detect, in a low-power state, an NFC-enabled device (104) with which to authenticate via NFC. In some embodiments, various components of a computing device (102) in a sleep state are activated to perform authentication and/or an indication is provided to a user indicating an initiation of the authentication.
    Type: Application
    Filed: June 4, 2014
    Publication date: January 15, 2015
    Applicant: MOTOROLA MOBILITY LLC
    Inventors: Jagadish Kumar Agrawal, Deepak Chandra, John J. Gorsica, Jagatkumar V. Shah