Patents by Inventor Mudit Goel

Mudit Goel has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20170032037
    Abstract: Techniques for presenting a recommendation to a member of a social network in a specific field of study are described. A predictor can access, from a database in the social network, educational data of a plurality of students and post-graduate data of a plurality of graduates in the social network. Additionally, the predictor can determine a subset of students associated with a specific field of study, and can calculate a demand for the specific field of study based on the accessed data. A recommendation generator can calculate a competition value for the specific field of study based on the determined subset of students and the calculated demand for the specific field of study. Subsequently, the recommendation generator can cause a presentation, on a display of a device, of a recommendation associated with the specific field of study, the recommendation being based on the calculated competition value.
    Type: Application
    Filed: July 31, 2015
    Publication date: February 2, 2017
    Inventors: Mudit Goel, Yi Feng, Weizhen Wang, Dong Li
  • Publication number: 20170004456
    Abstract: Disclosed in some examples are systems, methods, and machine-readable mediums which enhance the social networking service by providing a search functionality to allow members to search for jobs based upon their predicted applicant score or rank. Thus, a member may easily search for jobs in which the member is likely to compare favorably to others who have already applied. In order to maintain this data, the social networking service may utilize an event-driven live update architecture which allows the social networking service to manage these scores and update these scores based upon events (e.g., new job postings, new job applicants, and the like).
    Type: Application
    Filed: May 18, 2016
    Publication date: January 5, 2017
    Inventors: Yi Feng, Mudit Goel, Dong Li, Yida Yao
  • Publication number: 20170004452
    Abstract: Disclosed in some examples are systems, methods, and machine-readable mediums which enhance the social networking service by providing a search functionality to allow members to search for jobs based upon their predicted applicant score or rank. Thus, a member may easily search for jobs in which the member is likely to compare favorably to others who have already applied. In order to maintain this data, the social networking service may utilize an event-driven live update architecture which allows the social networking service to manage these scores and update these scores based upon events (e.g., new job postings, new job applicants, and the like).
    Type: Application
    Filed: June 30, 2015
    Publication date: January 5, 2017
    Inventors: Yi Feng, Mudit Goel, Dong Li, Yida Yao
  • Patent number: 9521119
    Abstract: Software for managing access control functions in a network. The software includes a host that receives access control commands or information and calls one or more methods. The methods perform access control functions and communicate access control results or messages to be transmitted. The host may be installed in a network peer seeking access to the network or in a server controlling access to the network. When installed in a peer, the host receives commands and exchanges information with a supplicant. When installed in an access control server, the host receives commands and exchanges information with an authenticator. The host has a flexible architecture that enables multiple features, such as allowing the same methods to be used for authentication by multiple supplicants, providing ready integration of third party access control software, simplifying network maintenance by facilitating upgrades of authenticator software and enabling access control functions other than peer authentication.
    Type: Grant
    Filed: October 14, 2015
    Date of Patent: December 13, 2016
    Assignee: MICROSOFT TECHNOLOGY LICENSING, LLC
    Inventors: Anthony M. Leibovitz, Mark C. Schurman, Mudit Goel, Paul G. Mayfield, Sudhakar Pasupuleti, Taroon Mandhana, Vivek P. Kamath, Wei Zheng, Xuemei Bao
  • Publication number: 20160210703
    Abstract: In systems, methods, and machine readable media for recommending a next career position to a user of a social network system, the user may identify a goal position through a user interface. For instance, the goal position may represent a job that the user wishes to have at some future time, an entry-level job in a new field for the user, or a desired college degree. The system may select role models from the full membership of the social network system, where each role model has held or currently holds the goal career position, and where each role model may optionally have once held the current position of the user. The system may aggregate the career histories of the role models to determine a recommended next career position for the user. The system may display the recommendation, along with other suitable data, through the user interface to the user.
    Type: Application
    Filed: January 20, 2015
    Publication date: July 21, 2016
    Inventors: Mudit Goel, Ravneet Singh Khalsa
  • Publication number: 20160092998
    Abstract: Disclosed in some examples are methods, machine readable mediums, and systems for providing a list of skills a member should learn in order to achieve a particular goal. The system may provide a user interface to the member of the social networking service. Through the user interface, the member may select one or more goals that they wish to achieve. Based upon these goals, the list of skills associated with that goal may be determined—this list is a goal set of skills. The goal set of skills may be compared to the member's current skills. Skills in the list of goal skills that the member does not already possess may be recommended to the member.
    Type: Application
    Filed: September 30, 2014
    Publication date: March 31, 2016
    Applicant: Linkedln Corporation
    Inventor: Mudit Goel
  • Publication number: 20160036781
    Abstract: Software for managing access control functions in a network. The software includes a host that receives access control commands or information and calls one or more methods. The methods perform access control functions and communicate access control results or messages to be transmitted. The host may be installed in a network peer seeking access to the network or in a server controlling access to the network. When installed in a peer, the host receives commands and exchanges information with a supplicant. When installed in an access control server, the host receives commands and exchanges information with an authenticator. The host has a flexible architecture that enables multiple features, such as allowing the same methods to be used for authentication by multiple supplicants, providing ready integration of third party access control software, simplifying network maintenance by facilitating upgrades of authenticator software and enabling access control functions other than peer authentication.
    Type: Application
    Filed: October 14, 2015
    Publication date: February 4, 2016
    Inventors: Anthony M. Leibovitz, Mark C. Schurman, Mudit Goel, Paul G. Mayfield, Sudhakar Pasupuleti, Taroon Mandhana, Vivek P. Kamath, Wei Zheng, Xuemei Bao
  • Patent number: 9185091
    Abstract: Software for managing access control functions in a network. The software includes a host that receives access control commands or information and calls one or more methods. The methods perform access control functions and communicate access control results or messages to be transmitted. The host may be installed in a network peer seeking access to the network or in a server controlling access to the network. When installed in a peer, the host receives commands and exchanges information with a supplicant. When installed in an access control server, the host receives commands and exchanges information with an authenticator. The host has a flexible architecture that enables multiple features, such as allowing the same methods to be used for authentication by multiple supplicants, providing ready integration of third party access control software, simplifying network maintenance by facilitating upgrades of authenticator software and enabling access control functions other than peer authentication.
    Type: Grant
    Filed: September 28, 2012
    Date of Patent: November 10, 2015
    Assignee: MICROSOFT TECHNOLOGY LICENSING, LLC
    Inventors: Anthony M. Leibovitz, Mark C. Schurman, Mudit Goel, Paul G. Mayfield, Sudhakar Pasupuleti, Taroon Mandhana, Vivek P. Kamath, Wei Zheng, Xuemei Bao
  • Patent number: 8755773
    Abstract: A system and method for notifying the calling party of acknowledgment of the missed calls by the called party is disclosed. The called party and the calling party can subscribe for the notification service to enable charging for the service. When the calling party initiates a call to the called party it may result in a missed call as the called party may be out of coverage area or busy. When the called party views the record of the missed call a notification is generated on the wireless device by the application on the wireless device of the called party. The notification is then sent to the calling party. The acknowledgement notification may be sent directly to the calling party or via an application server.
    Type: Grant
    Filed: February 16, 2009
    Date of Patent: June 17, 2014
    Assignee: Alcatel Lucent
    Inventors: Mudit Goel, Satish Kanugovi, Sarang Gadgil, Nagendra Bykampadi, Shivani Arora
  • Publication number: 20130024911
    Abstract: Software for managing access control functions in a network. The software includes a host that receives access control commands or information and calls one or more methods. The methods perform access control functions and communicate access control results or messages to be transmitted. The host may be installed in a network peer seeking access to the network or in a server controlling access to the network. When installed in a peer, the host receives commands and exchanges information with a supplicant. When installed in an access control server, the host receives commands and exchanges information with an authenticator. The host has a flexible architecture that enables multiple features, such as allowing the same methods to be used for authentication by multiple supplicants, providing ready integration of third party access control software, simplifying network maintenance by facilitating upgrades of authenticator software and enabling access control functions other than peer authentication.
    Type: Application
    Filed: September 28, 2012
    Publication date: January 24, 2013
    Applicant: Microsoft Corporation
    Inventors: Anthony M. Leibovitz, Mark C. Schurman, Mudit Goel, Paul G. Mayfield, Sudhakar Pasupuleti, Taroon Mandhana, Vivek P. Kamath, Wei Zheng, Xuemei Bao
  • Patent number: 8302166
    Abstract: Systems, devices, and methods for associating network devices with users are described, which can facilitate establishing a secure user to network device association. In various embodiments, the disclosed subject matter facilitates devices providing indication of location and device identity to a user and recognizing the user is in the proximity of the device. The disclosed subject matter provides efficient and secure device to user association and can facilitate performing customized actions based on the nature of the association.
    Type: Grant
    Filed: February 18, 2008
    Date of Patent: October 30, 2012
    Assignee: Microsoft Corporation
    Inventors: Shobana M. Balakrishnan, Mudit Goel, Dinan Srilal Gunawardena, Dave Maltz, Michael Schroeder, Fan Yang
  • Patent number: 8286223
    Abstract: Software for managing access control functions in a network. The software includes a host that receives access control commands or information and calls one or more methods. The methods perform access control functions and communicate access control results or messages to be transmitted. The host may be installed in a network peer seeking access to the network or in a server controlling access to the network. When installed in a peer, the host receives commands and exchanges information with a supplicant. When installed in an access control server, the host receives commands and exchanges information with an authenticator. The host has a flexible architecture that enables multiple features, such as allowing the same methods to be used for authentication by multiple supplicants, providing ready integration of third party access control software, simplifying network maintenance by facilitating upgrades of authenticator software and enabling access control functions other than peer authentication.
    Type: Grant
    Filed: July 8, 2005
    Date of Patent: October 9, 2012
    Assignee: Microsoft Corporation
    Inventors: Anthony M. Leibovitz, Mark C. Schurman, Mudit Goel, Paul G. Mayfield, Sudhakar Pasupuleti, Taroon Mandhana, Vivek P. Kamath, Wei Zheng, Xuemei Bao
  • Publication number: 20120028618
    Abstract: A system and method for notifying the calling party of acknowledgment of the missed calls by the called party is disclosed. The called party and the calling party can subscribe for the notification service to enable charging for the service. When the calling party initiates a call to the called party it may result in a missed call as the called party may be out of coverage area or busy. When the called party views the record of the missed call a notification is generated on the wireless device by the application on the wireless device of the called party. The notification is then sent to the calling party. The acknowledgement notification may be sent directly to the calling party or via an application server.
    Type: Application
    Filed: February 16, 2009
    Publication date: February 2, 2012
    Inventors: Mudit Goel, Satish Kanugovi, Sarang Gadgil, Nagendra Bykampadi, Shivani Arora
  • Patent number: 8086701
    Abstract: A network state platform for managing a network having a number of network nodes is disclosed. A user provides a policy layer a high level instruction indicative of the desired network performance. The policy layer parses the high level instruction to generate a number of configuration instructions for the network nodes. The network nodes provide data logs of their activity to a data layer that collates the logs into a single entry that is stored, and can be accessed by an observation layer. External applications interface with the observation layer to access the stored data and use this information to generate requests to change portions of the network configuration. These requests are provided to a control layer that converts the requests from the applications to a high level instruction that is then provided to the policy layer to implement.
    Type: Grant
    Filed: April 28, 2008
    Date of Patent: December 27, 2011
    Assignee: Microsoft Corporation
    Inventors: Mudit Goel, Paul G Mayfield
  • Publication number: 20090328147
    Abstract: Capability negotiation during a PEAP transaction between two end points in a network is performed by initiating EAP capability negotiation methods. A first end point that desires to use a specific capability during a PEAP transaction initiates capability negotiation method requesting the specific capability. Upon receiving the request for the specific capability, a second end point performs the desired capability if an outer method employed in the PEAP transaction supports the specific capability. If the outer method does not support the desired capability, the receiver responds to the first end point with a negative acknowledgment. In other embodiments, if the outer method does not support the desired capability, the desired capability may still be performed if it is supported by an inner method. In such instances, an inner wrapper method is employed in the PEAP transaction to maintain and perform the capability.
    Type: Application
    Filed: June 27, 2008
    Publication date: December 31, 2009
    Applicant: Microsoft Corporation
    Inventors: Mudit Goel, Yue Luo, Ambrish Verma
  • Publication number: 20090271510
    Abstract: A network state platform for managing a network having a number of network nodes is disclosed. A user provides a policy layer a high level instruction indicative of the desired network performance. The policy layer parses the high level instruction to generate a number of configuration instructions for the network nodes. The network nodes provide data logs of their activity to a data layer that collates the logs into a single entry that is stored, and can be accessed by an observation layer. External applications interface with the observation layer to access the stored data and use this information to generate requests to change portions of the network configuration. These requests are provided to a control layer that converts the requests from the applications to a high level instruction that is then provided to the policy layer to implement.
    Type: Application
    Filed: April 28, 2008
    Publication date: October 29, 2009
    Applicant: MICROSOFT CORPORATION
    Inventors: Mudit Goel, Paul G. Mayfield
  • Publication number: 20090210932
    Abstract: Systems, devices, and methods for associating network devices with users are described, which can facilitate establishing a secure user to network device association. In various embodiments, the disclosed subject matter facilitates devices providing indication of location and device identity to a user and recognizing the user is in the proximity of the device. The disclosed subject matter provides efficient and secure device to user association and can facilitate performing customized actions based on the nature of the association.
    Type: Application
    Filed: February 18, 2008
    Publication date: August 20, 2009
    Applicant: MICROSOFT CORPORATION
    Inventors: Shobana M. Balakrishnan, Mudit Goel, Dinan Srilal Gunawardena, Dave Maltz, Michael Schroeder, Fan Yang
  • Publication number: 20070101409
    Abstract: Methods of obtaining information during an authentication session. Information may be obtained, during the authentication session, about a device that is attempting to connect to a network. The information that is obtained may be related to health parameters of the device, or any other suitable information. Obtaining this information during an authentication session may enable determining whether to allow the device to connect to the network.
    Type: Application
    Filed: November 1, 2005
    Publication date: May 3, 2007
    Applicant: Microsoft Corporation
    Inventors: Ashwin Palekar, Hakan Berk, Mudit Goel
  • Publication number: 20070016939
    Abstract: Software for managing access control functions in a network. The software includes a host that receives access control commands or information and calls one or more methods. The methods perform access control functions and communicate access control results or messages to be transmitted. The host may be installed in a network peer seeking access to the network or in a server controlling access to the network. When installed in a peer, the host receives commands and exchanges information with a supplicant. When installed in an access control server, the host receives commands and exchanges information with an authenticator. The host has a flexible architecture that enables multiple features, such as allowing the same methods to be used for authentication by multiple supplicants, providing ready integration of third party access control software, simplifying network maintenance by facilitating upgrades of authenticator software and enabling access control functions other than peer authentication.
    Type: Application
    Filed: July 8, 2005
    Publication date: January 18, 2007
    Applicant: Microsoft Corporation
    Inventors: Anthony Leibovitz, Mark Schurman, Mudit Goel, Paul Mayfield, Sudhakar Pasupuleti, Taroon Mandhana, Vivek Kamath, Wei Zheng, Xuemei Bao