Patents by Inventor Jagadish Kumar Agrawal
Jagadish Kumar Agrawal has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 11429174Abstract: This document describes techniques (400, 500, 600) and apparatuses (100, 700) for implementing sensor-based near-field communication (NFC) authentication. These techniques (400, 500, 600) and apparatuses (100, 700) enable a computing device (102) to detect, in a low-power state, environmental variances indicating proximity with an NFC-enabled device (104) with which to authenticate. In some embodiments, various components of a computing device (102) in a sleep state are activated to process environmental variance(s), perform authentication operations, and/or an indicate initiation of authentication operations to a user.Type: GrantFiled: January 15, 2020Date of Patent: August 30, 2022Assignee: Google LLCInventors: Jagadish Kumar Agrawal, Deepak Chandra, John J. Gorsica, Jagatkumar V. Shah
-
Publication number: 20200150735Abstract: This document describes techniques (400, 500, 600) and apparatuses (100, 700) for implementing sensor-based near-field communication (NFC) authentication. These techniques (400, 500, 600) and apparatuses (100, 700) enable a computing device (102) to detect, in a low-power state, environmental variances indicating proximity with an NFC-enabled device (104) with which to authenticate. In some embodiments, various components of a computing device (102) in a sleep state are activated to process environmental variance(s), perform authentication operations, and/or an indicate initiation of authentication operations to a user.Type: ApplicationFiled: January 15, 2020Publication date: May 14, 2020Applicant: Google Technology Holdings LLCInventors: Jagadish Kumar Agrawal, Deepak Chandra, John J. Gorsica, Jagatkumar V. Shah
-
Patent number: 10591969Abstract: This document describes techniques (400, 500, 600) and apparatuses (100, 700) for implementing sensor-based near-field communication (NFC) authentication. These techniques (400, 500, 600) and apparatuses (100, 700) enable a computing device (102) to detect, in a low-power state, environmental variances indicating proximity with an NFC-enabled device (104) with which to authenticate. In some embodiments, various components of a computing device (102) in a sleep state are activated to process environmental variance(s), perform authentication operations, and/or an indicate initiation of authentication operations to a user.Type: GrantFiled: June 24, 2014Date of Patent: March 17, 2020Assignee: Google Technology Holdings LLCInventors: Jagadish Kumar Agrawal, Deepak Chandra, John J. Gorsica, Jagatkumar V. Shah
-
Patent number: 9983651Abstract: This document describes techniques (400, 500, 600) and apparatuses (100, 700) for implementing low-power near-field communication (NFC) authentication. These techniques (400, 500, 600) and apparatuses (100, 700) enable a computing device (102) to detect, in a low-power state, an NFC-enabled device (104) with which to authenticate via NFC. In some embodiments, various components of a computing device (102) in a sleep state are activated to perform authentication and/or an indication is provided to a user indicating an initiation of the authentication.Type: GrantFiled: June 4, 2014Date of Patent: May 29, 2018Assignee: GOOGLE TECHNOLOGY HOLDINGS LLCInventors: Jagadish Kumar Agrawal, Deepak Chandra, John J. Gorsica, Jagatkumar V. Shah
-
Patent number: 9621422Abstract: In embodiments of device to device content upgrades, a computing device includes a peer sharing manager that shares content and upgrades to content with peer devices. The computing device downloads content and upgrades from sources on the Internet, and shares the content and upgrades with peer devices that lack an Internet connection. A lowest supported version of the content can be shared from the computing device to one of the peer devices. The lowest supported version of the content determines capabilities of the peer device and establishes a peer-to-peer communication link with the computing device. The peer device reports the capability information to the computing device and, if the computing device determines that the peer device is capable of supporting an upgraded version of the content, the computing device communicates the upgraded version of the content to the peer device.Type: GrantFiled: June 24, 2014Date of Patent: April 11, 2017Assignee: Google Technology Holdings LLCInventors: Jagadish Kumar Agrawal, Sujoy Das, Nathan J Fortin, Jordan Andrew Hurwich, Catherine T Nguyen, Sheila A Vyas
-
Publication number: 20160041879Abstract: Multiple computing devices (102, 122) transfer data and otherwise communicate directly with one another, and do so in the absence of any intervening devices such as devices accessed over the Internet or other wide-range network. A user of a particular device can select which other devices, if any, are to be trusted by the particular device. Once another device is trusted by the particular device, data from the particular device is backed up to the trusted device while the two devices are in close physical proximity to one another. In the event that data on the particular device is lost, the lost data can be restored from the trusted device to the particular device while the two devices are in close physical proximity to one another.Type: ApplicationFiled: August 6, 2014Publication date: February 11, 2016Inventors: Akila Varadarajan, Jagadish Kumar Agrawal, Sujoy Das, Nathan J. Fortin, Jordan Andrew Hurwich, Catherine T. Nguyen, Peeyush Ranjan, Punit S. Soni
-
Publication number: 20160036902Abstract: A method and apparatus share content between devices in peer-to-peer networks. A first connection between a first peer device and a second peer device can be established in a first peer-to-peer network. A second connection between the second peer device and a third peer device can be established in a second peer-to-peer network. A content request can be received at the second peer device from the first peer device, where the content request is a request for requested content. The second peer device can determine that it does not have the requested content. The second peer device can store the content request when it does not have the requested content. The second peer device can forward the content request to the third peer device if the second peer device does not have the requested content.Type: ApplicationFiled: July 31, 2014Publication date: February 4, 2016Inventors: Akila Varadarajan, Jagadish Kumar Agrawal, Sujoy Das
-
Publication number: 20160028798Abstract: Techniques are described that may be utilized to manage membership of peers in a peer-to-peer network. For example, membership may be based at least in part on a score that is calculated that describes a reputation for peers in the peer-to-peer network. The calculation of the score may be based, at least in part, on a number of peers that provided reports of inappropriate content, rather than relying solely on a number of reports received from the peers as was performed using conventional techniques. In another example, this score may also be calculated, at least in part, to reflect a positive score for the peer. For instance, the score may also be adjusted based on a number of peers that also received the content but did not report the content as inappropriate.Type: ApplicationFiled: July 23, 2014Publication date: January 28, 2016Inventors: Jagadish Kumar Agrawal, Sujoy Das, Nathan J Fortin, Jordan Andrew Hurwich, Catherine T Nguyen, Akila Varadarajan
-
Publication number: 20150372859Abstract: In embodiments of device to device content upgrades, a computing device includes a peer sharing manager that shares content and upgrades to content with peer devices. The computing device downloads content and upgrades from sources on the Internet, and shares the content and upgrades with peer devices that lack an Internet connection. A lowest supported version of the content can be shared from the computing device to one of the peer devices. The lowest supported version of the content determines capabilities of the peer device and establishes a peer-to-peer communication link with the computing device. The peer device reports the capability information to the computing device and, if the computing device determines that the peer device is capable of supporting an upgraded version of the content, the computing device communicates the upgraded version of the content to the peer device.Type: ApplicationFiled: June 24, 2014Publication date: December 24, 2015Inventors: Jagadish Kumar Agrawal, Sujoy Das, Nathan J. Fortin, Jordan Andrew Hurwich, Catherine T. Nguyen, Sheila A. Vyas
-
Publication number: 20150121108Abstract: This document describes techniques (400, 500, 600) and apparatuses (100, 700) for implementing sensor-based near-field communication (NFC) authentication. These techniques (400, 500, 600) and apparatuses (100, 700) enable a computing device (102) to detect, in a low-power state, environmental variances indicating proximity with an NFC-enabled device (104) with which to authenticate. In some embodiments, various components of a computing device (102) in a sleep state are activated to process environmental variance(s), perform authentication operations, and/or an indicate initiation of authentication operations to a user.Type: ApplicationFiled: June 24, 2014Publication date: April 30, 2015Inventors: Jagadish Kumar Agrawal, Deepak Chandra, John J. Gorsica, Jagatkumar V. Shah
-
Publication number: 20150019892Abstract: This document describes techniques (400, 500, 600) and apparatuses (100, 700) for implementing low-power near-field communication (NFC) authentication. These techniques (400, 500, 600) and apparatuses (100, 700) enable a computing device (102) to detect, in a low-power state, an NFC-enabled device (104) with which to authenticate via NFC. In some embodiments, various components of a computing device (102) in a sleep state are activated to perform authentication and/or an indication is provided to a user indicating an initiation of the authentication.Type: ApplicationFiled: June 4, 2014Publication date: January 15, 2015Applicant: MOTOROLA MOBILITY LLCInventors: Jagadish Kumar Agrawal, Deepak Chandra, John J. Gorsica, Jagatkumar V. Shah