Patents by Inventor Ranveer Chandra
Ranveer Chandra has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Publication number: 20170105214Abstract: The disclosed subject matter includes techniques for wireless communication. In one example, a system includes a processor and a computer-readable memory storage device for storing executable instructions that can be executed by the processor to cause the processor to generate a channel hop sequence of wireless channels to be used by an access point. The processor can also send a channel schedule to a client device via a wireless channel. The processor can also change the wireless channel to a next available channel in the channel hop sequence in response to detecting a change in wireless metrics of the wireless channel. The processor can also further receive a connection request from the client device via the next available wireless channel based at least on the channel schedule.Type: ApplicationFiled: October 7, 2015Publication date: April 13, 2017Applicant: Microsoft Technology Licensing, LLCInventors: David W. Russo, Ranveer Chandra
-
Patent number: 9596235Abstract: One or more systems and/or techniques are provided for managing a partially encrypted file system, for storage hardware virtualization, and/or for storage management. In example, data may be stored in a partially encrypted file system, where sensitive data is encrypted for security and non-sensitive data is unencrypted, which may mitigate energy usage otherwise used for encrypting non-sensitive data, thus improving battery life. In an example, a storage device may be exposed to applications as a plurality of isolated storage structures where an application is provided data access to an isolated storage structure assigned to the application but not to isolated storage structures assigned to other applications, which may provide hardware level isolation with improved energy efficiency. In an example, a storage management component, configured to provide isolation and encryption, may be integrated into a computing device as an application specific integrated circuit (ASIC) or a system on a chip (SoC).Type: GrantFiled: March 30, 2015Date of Patent: March 14, 2017Assignee: Microsoft Technology Licensing, LLCInventors: Anirudh Badam, Ranveer Chandra, Qi Zhang, Bruce Lee Worthington, Jing Li
-
Publication number: 20170065882Abstract: Example apparatus and methods concern establishing, maintaining, managing, or terminating communications between an access point and a client in a wireless network used by a shared, wireless gaming system. An example apparatus may include a first logic configured to control timing for the protocol and a second logic configured to control message exchange for the protocol. Controlling timing and message exchange facilitates reducing contention in the wireless gaming environment. Contention may lead to latency. A user gaming experience may depend on reducing latency. Therefore, reducing latency may produce an improved gaming experience. Controlling timing and message exchange also facilitates reducing power consumption by clients (e.g., accessories, controllers), which in turn facilitates improving battery life for clients.Type: ApplicationFiled: September 12, 2016Publication date: March 9, 2017Applicant: Microsoft Technology Licensing, LLCInventors: David Russo, Ranveer Chandra, Hang Yu
-
Patent number: 9591437Abstract: Systems and methods are described relating to determining a specified time period of non-movement in a mobile device and presenting an indication of location of the mobile device at least partially based on the specified time period of non-movement. Additionally, systems and methods are described relating to means for determining a specified time period of non-movement in a mobile device and means for presenting an indication of location of the mobile device at least partially based on the specified time period of non-movement.Type: GrantFiled: December 30, 2011Date of Patent: March 7, 2017Assignee: Elwha LLCInventors: Paramvir Bahl, Douglas C. Burger, Ranveer Chandra, Matthew G. Dyor, William Gates, Pablos Holman, Roderick A. Hyde, Muriel Y. Ishikawa, Jordin T. Kare, Royce A. Levien, Richard T. Lord, Robert W. Lord, Mark A. Malamud, Craig J. Mundie, Nathan P. Myhrvold, Tim Paek, John D. Rinaldo, Jr., Desney S. Tan, Clarence T. Tegreene, Charles Whitmer, Lowell L. Wood, Jr., Victoria Y. H. Wood, Lin Zhong
-
Publication number: 20170047984Abstract: Various techniques for providing network connectivity are described herein. In one example, a moving object includes an uplink device of the moving object to connect the moving object to a publicly available computer network. The moving object also includes a downlink device of the moving object to be communicatively coupled to a remote device at a specific segment along a route of the moving object. The remote device is to provide data received via the downlink device to a user. The moving object also further includes a cache store communicatively coupled to the uplink device and the downlink device. Implementations include the use of commercial airplanes for providing connectivity via intermittent access and refreshing of a cache store that makes content available to end users.Type: ApplicationFiled: October 31, 2016Publication date: February 16, 2017Applicant: Microsoft Technology Licensing, LLC.Inventors: Eric Horvitz, Ashish Kapoor, Jie Liu, Ranveer Chandra
-
Publication number: 20170048010Abstract: A method for monitoring radio frequency (RF) transmitters in an environment, that fits a probability mixture model (PMM) comprising a plurality of probability density functions (PDFs) at least two of which are of a different type, to RF power measurements of RF signals received in the environment to determine a number and characteristics of RF transmitters operating in the environment.Type: ApplicationFiled: August 10, 2015Publication date: February 16, 2017Inventors: Aakanksha Chowdhery, Mariya Zheleva, Ranveer Chandra, Ashish Kapoor, Paul Garnett
-
Publication number: 20170034754Abstract: A continual learning process is applied to a class of risk estimate-based algorithms and associated risk thresholds used for deciding when to initiate a handoff between different types of network connections that are available to a mobile device having telephony functionality. The process is implemented as a virtuous loop providing ongoing tuning and adjustment to improve call handoff algorithms and risk thresholds so that handoffs can be performed with the goals of minimizing dropped calls and unacceptable degradation in call quality as well as avoiding premature handoffs. Device characteristics, environmental context, connection measurements, and outcomes of call handoff decisions are crowd-sourced from a population of mobile devices into a cloud-based handoff decision enabling service.Type: ApplicationFiled: October 17, 2016Publication date: February 2, 2017Inventors: Gursharan S. Sidhu, Thomas Kuehnel, Rao Salapaka, Vishal Soni, Ranveer Chandra, Mansoor Jafry, Anish Desai, Ruchir Astavans, Humayun Khan, John Mark Miller
-
Patent number: 9553640Abstract: Methods and devices for use with a multi-feed antenna used in a MIMO communication system are described herein. A method can include obtaining an antenna feed characteristic indicator associated with each of the feeds of the multi-feed antenna, and controlling how power is distributed among the feeds based on the antenna feed characteristic indicator associated with each of the feeds. An antenna feed characteristic indicator can be, e.g., an indicator of impedance matching, in which case power can be distributed among the feeds of the multi-feed antenna based on the indicators of impedance matching associate with each of the feeds. Power can also be distributed based on an indicator of link quality. Additionally, or alternatively, coding rate and/or modulation type can also be controlled for each of the feeds of the multi-feed antenna, based on one or more antenna feed characteristic indicators and/or one or more indicators of link quality.Type: GrantFiled: December 22, 2015Date of Patent: January 24, 2017Assignee: MICROSOFT TECHNOLOGY LICENSING, LLCInventors: Ranveer Chandra, Lopamudra Kundu, Mike Nakahara, Srihari Narlanka, Gerald DeJean
-
Publication number: 20160380820Abstract: Wireless networks may be dynamically reconfigured based at least in part on predicted future user device locations. The predicted future user device locations may be used to, for example, to offload user devices to small cells or WiFi networks. The predicted future user device locations may additionally or alternatively be used for targeting directional signals and/or for beam forming for multi-user multi-input/multi-output systems.Type: ApplicationFiled: June 29, 2015Publication date: December 29, 2016Inventors: Eric Joel Horvitz, Ranveer Chandra
-
Patent number: 9526125Abstract: Described herein are technologies that facilitate transfer of data-intensive content between portable telephones. Phones are configured to transmit data indicative of phone location to a proxy server by way of respective cellular network data connections. When a user of a phone wishes to acquire content that is labeled as shareable on another phone, the user of the phone initiates a location-based request, which causes the proxy server to provide a list of phones that are estimated to be in Wi-Fi range of such phone. The user thereafter selects a particular phone, and the proxy server instructs that phone to activate its Wi-Fi radio. The phone of the user additionally activates its Wi-Fi radio, and a peer-to-peer connection between phones is established. Thereafter, rich content is transferrable between the phones.Type: GrantFiled: July 12, 2013Date of Patent: December 20, 2016Assignee: Microsoft Technology Licensing, LLCInventors: Ranveer Chandra, Thomas Moscibroda, Ki-Woong Park
-
Patent number: 9515721Abstract: Various techniques for providing network connectivity are described herein. In one example, a moving object includes an uplink device of the moving object to connect the moving object to a publicly available computer network. The moving object also includes a downlink device of the moving object to be communicatively coupled to a remote device at a specific segment along a route of the moving object. The remote device is to provide data received via the downlink device to a user. The moving object also further includes a cache store communicatively coupled to the uplink device and the downlink device. Implementations include the use of commercial airplanes for providing connectivity via intermittent access and refreshing of a cache store that makes content available to end users.Type: GrantFiled: March 9, 2016Date of Patent: December 6, 2016Assignee: Microsoft Technology Licensing, LLCInventors: Eric Horvitz, Ashish Kapoor, Jie Liu, Ranveer Chandra
-
Patent number: 9510251Abstract: A continual learning process is applied to a class of risk estimate-based algorithms and associated risk thresholds used for deciding when to initiate a handoff between different types of network connections that are available to a mobile device having telephony functionality. The process is implemented as a virtuous loop providing ongoing tuning and adjustment to improve call handoff algorithms and risk thresholds so that handoffs can be performed with the goals of minimizing dropped calls and unacceptable degradation in call quality as well as avoiding premature handoffs. Device characteristics, environmental context, connection measurements, and outcomes of call handoff decisions are crowd-sourced from a population of mobile devices into a cloud-based handoff decision enabling service.Type: GrantFiled: December 31, 2013Date of Patent: November 29, 2016Assignee: MICROSOFT TECHNOLOGY LICENSING, LLCInventors: Gursharan S Sidhu, Thomas Kuehnel, Rao Salapaka, Vishal Soni, Ranveer Chandra, Mansoor Jafry, Anish Desai, Ruchir Astavans, Humayun Khan, John Mark Miller
-
Patent number: 9492741Abstract: Example apparatus and methods concern establishing, maintaining, managing, or terminating communications between an access point and a client in a wireless network used by a shared, wireless gaming system. An example apparatus may include a first logic configured to control timing for the protocol and a second logic configured to control message exchange for the protocol. Controlling timing and message exchange facilitates reducing contention in the wireless gaming environment. Contention may lead to latency. A user gaming experience may depend on reducing latency. Therefore, reducing latency may produce an improved gaming experience. Controlling timing and message exchange also facilitates reducing power consumption by clients (e.g., accessories, controllers), which in turn facilitates improving battery life for clients.Type: GrantFiled: May 22, 2013Date of Patent: November 15, 2016Assignee: Microsoft Technology Licensing, LLCInventors: David Russo, Ranveer Chandra, Hang Yu
-
Patent number: 9482737Abstract: Systems and methods are described relating to detecting an indication of a person within a specified proximity to at least one mobile device; and presenting an indication of location of the at least one mobile device at least partially based on the indication of the person within the specified proximity. Additionally, systems and methods are described relating to means for detecting an indication of a person within a specified proximity to at least one mobile device; and means for presenting an indication of location of the at least one mobile device at least partially based on the indication of the person within the specified proximity.Type: GrantFiled: December 30, 2011Date of Patent: November 1, 2016Assignee: Elwha LLCInventors: Paramvir Bahl, Douglas C. Burger, Ranveer Chandra, Matthew G. Dyor, William Gates, Roderick A. Hyde, Muriel Y. Ishikawa, Pablos Holman, Jordin T. Kare, Royce A. Levien, Richard T. Lord, Robert W. Lord, Mark A. Malamud, Craig J. Mundie, Nathan P. Myhrvold, John D. Rinaldo, Jr., Desney S. Tan, Clarence T. Tegreene, Charles Whitmer, Victoria Y. H. Wood, Tim Paek, Lowell L. Wood, Jr., Lin Zhong
-
Publication number: 20160294818Abstract: One or more systems and/or techniques are provided for managing a partially encrypted file system, for storage hardware virtualization, and/or for storage management. In example, data may be stored in a partially encrypted file system, where sensitive data is encrypted for security and non-sensitive data is unencrypted, which may mitigate energy usage otherwise used for encrypting non-sensitive data, thus improving battery life. In an example, a storage device may be exposed to applications as a plurality of isolated storage structures where an application is provided data access to an isolated storage structure assigned to the application but not to isolated storage structures assigned to other applications, which may provide hardware level isolation with improved energy efficiency. In an example, a storage management component, configured to provide isolation and encryption, may be integrated into a computing device as an application specific integrated circuit (ASIC) or a system on a chip (SoC).Type: ApplicationFiled: March 30, 2015Publication date: October 6, 2016Applicant: Microsoft Technology Licensing, LLCInventors: Anirudh Badam, Ranveer Chandra, Qi Zhang, Bruce Lee Worthington, Jing Li
-
DETERMINING THREATS BASED ON INFORMATION FROM ROAD-BASED DEVICES IN A TRANSPORTATION-RELATED CONTEXT
Publication number: 20160286026Abstract: Techniques for ability enhancement are described. Some embodiments provide an ability enhancement facilitator system (“AEFS”) configured to enhance a user's ability to operate or function in a transportation-related context as a pedestrian or a vehicle operator. In one embodiment, the AEFS is configured perform vehicular threat detection based on information received at a road-based device, such as a sensor or processor that is deployed at the side of a road. An example AEFS receives, at a road-based device, information about a first vehicle that is proximate to the road-based device. The AEFS analyzes the received information to determine threat information, such as that the vehicle may collide with the user. The AEFS then informs the user of the determined threat information, such as by transmitting a warning to a wearable device configured to present the warning to the user.Type: ApplicationFiled: June 9, 2016Publication date: September 29, 2016Inventors: Richard T. Lord, Robert W. Lord, Nathan P. Myhrvold, Clarence T. Tegreene, Roderick A. Hyde, Lowell L. Wood, JR., Muriel Y. Ishikawa, Victoria Y. H. Wood, Charles Whitmer, Paramvir Bahl, Douglas C. Burger, Ranveer Chandra, William H. Gates, III, Paul Holman, Jordin T. Kare, Craig J. Mundie, Tim Paek, Desney S. Tan, Lin Zhong, Matthew G. Dyor -
Publication number: 20160278067Abstract: In embodiments of battery-backed RAM for wearable devices, a mobile device, such as a mobile phone, tablet computer, or other portable device is implemented for wireless connection with a wearable device, such as a smartwatch, exercise tracking device, glasses device, or other wearable device that implements computing technology. The wearable device can store data in battery-backed RAM in the wearable device, and the mobile device can back-up the data with battery-backed RAM in the mobile device when the data is received from the wearable device. A wireless connection can be established for wireless data communication between the wearable device and the mobile device. A data manager can detect a low battery condition of the wearable device, which initiates the data being transferred from the wearable device to the mobile device via the wireless connection.Type: ApplicationFiled: March 18, 2015Publication date: September 22, 2016Inventors: Anirudh Badam, Ranveer Chandra, Edmund Bernard Nightingale, Jian Huang
-
Publication number: 20160275400Abstract: Device charging discovery service techniques are described in which a service collects data regarding charging station availability (e.g., locations where device batteries can be charged) through interaction with a community of devices. Devices provide feedback to the service when charging stations are encountered. The service maintains a database of charging stations that is based upon the community feedback. The database is then used to respond to requests for charging station availability. For instance, the service forms individualized recommendations according to the device location, charge level, behavior data, and other device conditions. The service then communicates recommendations to enable output of the recommendations at corresponding devices. Recommendations can provide information regarding charging station locations as well as the type of power source, charging capabilities, costs to charge, and other factors.Type: ApplicationFiled: March 19, 2015Publication date: September 22, 2016Inventors: Stephen E. Hodges, Ranveer Chandra, Julia L. Meinershagen, James William Scott
-
Publication number: 20160254664Abstract: This document describes techniques and apparatuses of load allocation for multi-battery devices. In some embodiments, these techniques and apparatuses determine an amount of load power that a multi-battery device consumes to operate. Respective efficiencies at which the device's multiple batteries are capable of providing power are also determined. A respective portion of load power is then drawn from each of the batteries based on their respective efficiencies.Type: ApplicationFiled: February 26, 2015Publication date: September 1, 2016Inventors: Bojun Huang, Thomas Moscibroda, Ranveer Chandra, Stephen E. Hodges, Julia L. Meinershagen, Nissanka Arachchige Bodhi Priyantha, Anirudh Badam, Pan Hu, Anthony John Ferrese, Evangelia Skiani
-
Publication number: 20160248266Abstract: Heterogeneous battery cell charging techniques are described for a device having a battery system with heterogeneous battery cells. A control system is provided that is configured to determine a charging strategy for charging the heterogeneous battery cells based upon an analysis of a plurality of contextual factors. For example, contextual factors may indicate anticipated future load conditions, battery usage preferences established for the battery system, and/or other factors indicative of an overall context in which charging occurs. Different charging strategies that indicate which battery cells to charge and the way in which charging is to be conducted may be mapped to different combinations of the contextual factors such that the charging is dynamically tailored to different contexts. A selected charging strategy is then employed to distribute charging current from a power source among the heterogeneous battery cells in the manner designated by the selected charging strategy.Type: ApplicationFiled: February 19, 2015Publication date: August 25, 2016Inventors: Anthony John Ferrese, Pan Hu, Stephen E. Hodges, Ranveer Chandra, Julia L. Meinershagen, Nissanka Arachchige Bodhi Priyantha, Anirudh Badam, Thomas Moscibroda, Jon Dutra