Patents by Inventor Rohith Ravi

Rohith Ravi has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 10242178
    Abstract: Methods are disclosed for identity key management in networked application execution. In one embodiment, an identifier request is transmitted from a client system to a server system, in which an identity key value in the identifier request is blank. Upon detecting the blank identity key value at the server system, the server system operates to generate a new identity key value and an identifier for the new identity key value. The new identity key value and the identifier for the new identity key value are transmitted from the server system to the client system. The new identity key value is stored in a local store of the client system. The local store of the client system is secured by a passcode and persists data through power cycling of the client system. The identifier is used to track execution of a networked application in an anonymous execution mode.
    Type: Grant
    Filed: February 27, 2018
    Date of Patent: March 26, 2019
    Assignee: Zynga Inc.
    Inventors: Rohith Ravi, Joy Ghanekar, Dorion Carroll
  • Patent number: 10032017
    Abstract: Methods are disclosed for identity key management in networked application execution. In one embodiment, an identifier request is transmitted from a client system to a server system, in which an identity key value in the identifier request is blank. Upon detecting the blank identity key value at the server system, the server system operates to generate a new identity key value and an identifier for the new identity key value. The new identity key value and the identifier for the new identity key value are transmitted from the server system to the client system. The new identity key value is stored in a local store of the client system. The local store of the client system is secured by a passcode and persists data through power cycling of the client system. The identifier is used to track execution of a networked application in an anonymous execution mode.
    Type: Grant
    Filed: July 27, 2015
    Date of Patent: July 24, 2018
    Assignee: Zynga Inc.
    Inventors: Rohith Ravi, Joy Ghanekar, Dorion Carroll
  • Publication number: 20180189477
    Abstract: Methods are disclosed for identity key management in networked application execution. In one embodiment, an identifier request is transmitted from a client system to a server system, in which an identity key value in the identifier request is blank. Upon detecting the blank identity key value at the server system, the server system operates to generate a new identity key value and an identifier for the new identity key value. The new identity key value and the identifier for the new identity key value are transmitted from the server system to the client system. The new identity key value is stored in a local store of the client system. The local store of the client system is secured by a passcode and persists data through power cycling of the client system. The identifier is used to track execution of a networked application in an anonymous execution mode.
    Type: Application
    Filed: February 27, 2018
    Publication date: July 5, 2018
    Inventors: Rohith Ravi, Joy Ghanekar, Dorion Carroll
  • Publication number: 20150332042
    Abstract: Methods are disclosed for identity key management in networked application execution. In one embodiment, an identifier request is transmitted from a client system to a server system, in which an identity key value in the identifier request is blank. Upon detecting the blank identity key value at the server system, the server system operates to generate a new identity key value and an identifier for the new identity key value. The new identity key value and the identifier for the new identity key value are transmitted from the server system to the client system. The new identity key value is stored in a local store of the client system. The local store of the client system is secured by a passcode and persists data through power cycling of the client system. The identifier is used to track execution of a networked application in an anonymous execution mode.
    Type: Application
    Filed: July 27, 2015
    Publication date: November 19, 2015
    Inventors: Rohith Ravi, Joy Ghanekar, Dorion Carroll
  • Patent number: 9104851
    Abstract: Methods are disclosed for identity key management in networked application execution. In one embodiment, an identifier request is transmitted from a client system to a server system, in which an identity key value in the identifier request is blank. Upon detecting the blank identity key value at the server system, the server system operates to generate a new identity key value and an identifier for the new identity key value. The new identity key value and the identifier for the new identity key value are transmitted from the server system to the client system. The new identity key value is stored in a local store of the client system. The local store of the client system is secured by a passcode and persists data through power cycling of the client system. The identifier is used to track execution of a networked application in an anonymous execution mode.
    Type: Grant
    Filed: October 29, 2012
    Date of Patent: August 11, 2015
    Assignee: Zynga Inc.
    Inventors: Rohith Ravi, Joy Ghanekar, Dorion Carroll
  • Publication number: 20130111210
    Abstract: Methods are disclosed for identity key management in networked application execution. In one embodiment, an identifier request is transmitted from a client system to a server system, in which an identity key value in the identifier request is blank. Upon detecting the blank identity key value at the server system, the server system operates to generate a new identity key value and an identifier for the new identity key value. The new identity key value and the identifier for the new identity key value are transmitted from the server system to the client system. The new identity key value is stored in a local store of the client system. The local store of the client system is secured by a passcode and persists data through power cycling of the client system. The identifier is used to track execution of a networked application in an anonymous execution mode.
    Type: Application
    Filed: October 29, 2012
    Publication date: May 2, 2013
    Inventors: Rohith Ravi, Joy Ghanekar, Dorion Carroll