Patents by Inventor Roy D. Kuntz
Roy D. Kuntz has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Publication number: 20230413187Abstract: Disclosed in some examples are methods, systems, and machine-readable mediums in which interference is mitigated on a wireless radio frequency channel used by multiple computing devices by adjusting (e.g., lowering) the power level of one or more computing devices (e.g., mobile devises such as User Equipment (UE) devices) and using successive interference cancellation to decode the combined signals, Successive interference cancellation may first decode a strongest signal of a combined signal of all computing devices. The decoded signal is then subtracted from the combined signal. The strongest signal of that combined signal is then decoded and then subtracted and so on until all signals are decoded.Type: ApplicationFiled: June 9, 2022Publication date: December 21, 2023Inventors: Amer Aref Hassan, Roy D. Kuntz
-
Publication number: 20230362662Abstract: Disclosed in some examples are methods, systems, devices, and machine-readable mediums that detect evil twin and other anomalous access points in an IT infrastructure by detecting access points that are not in their expected locations based upon an analysis of access point reports from one or more computing devices.Type: ApplicationFiled: July 21, 2023Publication date: November 9, 2023Inventors: Amer Aref Hassan, Roy D. KUNTZ, Michael Davis
-
Patent number: 11777710Abstract: Disclosed are systems, methods, and non-transitory computer-readable media for cryptography using different sized symbol sets. To protect against a brute force or other similar type of attack, multiple symbol sets having different sizes can be used for encrypting/decrypting data. For example, different portions of the data (e.g., data blocks representing multiple symbols, set of bits representing a single symbol) may be encrypted/decrypted using different symbol sets that include different numbers of unique symbols. Using different sized symbol sets adds additional complexity to the encryption process, thereby greatly increasing the difficulty in decrypting the encrypted data with a brute force attack.Type: GrantFiled: September 28, 2022Date of Patent: October 3, 2023Assignee: Microsoft Technology Licensing, LLCInventors: Amer Aref Hassan, Whitney J Giaimo, Roy D. Kuntz
-
Patent number: 11751070Abstract: Disclosed in some examples are methods, systems, devices, and machine-readable mediums that detect evil twin and other anomalous access points in an IT infrastructure by detecting access points that are not in their expected locations based upon an analysis of access point reports from one or more computing devices.Type: GrantFiled: September 10, 2021Date of Patent: September 5, 2023Assignee: Microsoft Technology Licensing, LLCInventors: Amer Aref Hassan, Roy D Kuntz, Michael Davis
-
Publication number: 20230017435Abstract: Disclosed are systems, methods, and non-transitory computer-readable media for cryptography using different sized symbol sets. To protect against a brute force or other similar type of attack, multiple symbol sets having different sizes can be used for encrypting/decrypting data. For example, different portions of the data (e.g., data blocks representing multiple symbols, set of bits representing a single symbol) may be encrypted/decrypted using different symbol sets that include different numbers of unique symbols. Using different sized symbol sets adds additional complexity to the encryption process, thereby greatly increasing the difficulty in decrypting the encrypted data with a brute force attack.Type: ApplicationFiled: September 28, 2022Publication date: January 19, 2023Inventors: Amer Aref Hassan, Whitney J GIAIMO, Roy D. KUNTZ
-
Patent number: 11496289Abstract: Disclosed are systems, methods, and non-transitory computer-readable media for symmetric cryptography using varying sized symbol sets. To protect against a brute force or other similar type of attack, multiple symbol sets of varying sizes can be used for encrypting/decrypting data. For example, different portions of the data (e.g., data blocks representing multiple symbols, set of bits representing a single symbol) may be encrypted/decrypted using different symbol sets that include different numbers of unique symbols. Using varying sized symbol sets adds additional complexity to the encryption process, thereby greatly increasing the difficulty in decrypting the encrypted data with a brute force attack.Type: GrantFiled: August 5, 2020Date of Patent: November 8, 2022Assignee: Microsoft Technology Licensing, LLCInventors: Amer Aref Hassan, Whitney J Giaimo, Roy D Kuntz
-
Publication number: 20220070684Abstract: Disclosed in some examples are methods, systems, devices, and machine-readable mediums that detect evil twin and other anomalous access points in an IT infrastructure by detecting access points that are not in their expected locations based upon an analysis of access point reports from one or more computing devices.Type: ApplicationFiled: September 10, 2021Publication date: March 3, 2022Inventors: Amer Aref Hassan, Roy D. Kuntz, Michael Davis
-
Publication number: 20220045843Abstract: Disclosed are systems, methods, and non-transitory computer-readable media for symmetric cryptography using varying sized symbol sets. To protect against a brute force or other similar type of attack, multiple symbol sets of varying sizes can be used for encrypting/decrypting data. For example, different portions of the data (e.g., data blocks representing multiple symbols, set of bits representing a single symbol) may be encrypted/decrypted using different symbol sets that include different numbers of unique symbols. Using varying sized symbol sets adds additional complexity to the encryption process, thereby greatly increasing the difficulty in decrypting the encrypted data with a brute force attack.Type: ApplicationFiled: August 5, 2020Publication date: February 10, 2022Inventors: Amer Aref Hassan, Whitney J. Giaimo, Roy D. Kuntz
-
Patent number: 11086719Abstract: Disclosed in some examples are methods, systems, storage devices, and machine readable mediums that utilize the ability of ECC to correct errors to actively prevent errors. The memory device determines whether a request to place data of a requested value at a requested location in the storage media is likely to interfere with other data stored at other locations on the storage media, and if so, changes the requested value to a second value that will not interfere (or has a lower probability of interfering) with neighboring data. The second value may be corrected to the requested value when a read request is made for that data using ECC.Type: GrantFiled: July 16, 2019Date of Patent: August 10, 2021Assignee: Microsoft Technology Licensing, LLCInventors: Amer Aref Hassan, Roy D. Kuntz, David Anthony Lickorish
-
Patent number: 11075656Abstract: Disclosed in some examples are methods, systems, devices, and machine-readable mediums which optimize one or more metrics of a communication system by intentionally changing symbols in a bitstream after encoding by an error correction coder, but prior to transmission. The symbols may be changed to meet a communication metric optimization goal, such as decreasing a high PAPR, reducing an error rate, reducing an average power level (to save battery), or altering some other communication metric. The symbol that is intentionally changed is then detected by the receiver as an error and corrected by the receiver utilizing the error correction coding.Type: GrantFiled: July 16, 2019Date of Patent: July 27, 2021Assignee: Microsoft Technology Licensing, LLCInventors: Amer Aref Hassan, Roy D. Kuntz
-
Publication number: 20210021288Abstract: Disclosed in some examples are methods, systems, devices, and machine-readable mediums which optimize one or more metrics of a communication system by intentionally changing symbols in a bitstream after encoding by an error correction coder, but prior to transmission. The symbols may be changed to meet a communication metric optimization goal, such as decreasing a high PAPR, reducing an error rate, reducing an average power level (to save battery), or altering some other communication metric. The symbol that is intentionally changed is then detected by the receiver as an error and corrected by the receiver utilizing the error correction coding.Type: ApplicationFiled: July 16, 2019Publication date: January 21, 2021Inventors: Amer Aref Hassan, Roy D. Kuntz
-
Publication number: 20210019226Abstract: Disclosed in some examples are methods, systems, storage devices, and machine readable mediums that utilize the ability of ECC to correct errors to actively prevent errors. The memory device determines whether a request to place data of a requested value at a requested location in the storage media is likely to interfere with other data stored at other locations on the storage media, and if so, changes the requested value to a second value that will not interfere (or has a lower probability of interfering) with neighboring data. The second value may be corrected to the requested value when a read request is made for that data using ECC.Type: ApplicationFiled: July 16, 2019Publication date: January 21, 2021Inventors: Amer Aref Hassan, Roy D. Kuntz, David Anthony Lickorish
-
Publication number: 20200195604Abstract: Techniques for message transport and network type selection, provided in the context of electronic messaging sessions (e.g., instant messaging, chat, voice, email, SMS, etc.) occurring between users, are disclosed herein. In an example, a message processing system performs operations to: receive and process a message, addressed from a sender to a recipient in a messaging session; predict a delivery state or read result for the message, based on identified activity of the recipient, or additionally, context of the interaction between the sender and the recipient; select a communications transport mechanism for the message, based on the predicted delivery state or read result; and cause transmission of the message to the recipient using the selected communications transport mechanism. In further examples, the prediction is performed using a machine-learning trained model, or is assisted with profile information, rules, historical data, or ongoing monitoring or tracking data.Type: ApplicationFiled: December 14, 2018Publication date: June 18, 2020Inventors: Amer A. Hassan, Roy D. Kuntz, David Anthony Lickorish
-
Patent number: 10255328Abstract: Techniques for location source ranking for determining device location are described. A location source generally refers to a source of position information (e.g., GPS coordinates, latitude and longitude, street addresses, and so forth) that can be used to determine a geographical location of a device. According to one or more embodiments, location sources and/or combinations of location sources can be ranked based on various criteria. Thus, when a location is requested for a particular device, a highest ranking available location source or combination of location sources can be selected to determine a location of the device. Location source rankings, for instance, can be maintained on a client device and/or via a remote location-related service. According to various embodiments, a location of a device can be determined to enable emergency assistance to be provided at the location.Type: GrantFiled: October 9, 2013Date of Patent: April 9, 2019Assignee: Microsoft Technology Licensing, LLCInventors: Amer A. Hassan, Neil A. Deason, Carl S. Olivier, Roy D. Kuntz
-
Publication number: 20180206102Abstract: Techniques for determining a valid resource string for a resource are described. According to one or more implementations, a particular resource string for accessing a particular resource may be determined to be not valid at a current location of a client device. Accordingly, the particular resource string can be mapped to an active string profile for the client device, and a valid resource string for accessing the resource at the current location can be determined from the active string profile. The valid resource string can be used to initiate communication with an instance of the particular resource.Type: ApplicationFiled: March 12, 2018Publication date: July 19, 2018Applicant: Microsoft Technology Licensing, LLCInventors: Neil A. Deason, Amer A. Hassan, Carl S. Olivier, Roy D. Kuntz
-
Patent number: 9918209Abstract: Techniques for policies for selecting sources for resource strings are described. Generally, a resource string refers to a set of characters that can be used to initiate communication with a particular resource. According to one or more embodiments, techniques discussed herein enable resource strings to be determined at different locations, e.g., geographic locations. In at least some embodiments, string source policies are implemented that specify parameters for selecting a source from which to obtain resource strings. According to one or more embodiments, string profiles are implemented that specify resource strings that correspond to particular resources and/or types of resources.Type: GrantFiled: October 28, 2013Date of Patent: March 13, 2018Assignee: Microsoft Technology Licensing, LLCInventors: Neil A. Deason, Amer A. Hassan, Carl S. Olivier, Roy D. Kuntz
-
Publication number: 20150118987Abstract: Techniques for policies for selecting sources for resource strings are described. Generally, a resource string refers to a set of characters that can be used to initiate communication with a particular resource. According to one or more embodiments, techniques discussed herein enable resource strings to be determined at different locations, e.g., geographic locations. In at least some embodiments, string source policies are implemented that specify parameters for selecting a source from which to obtain resource strings. According to one or more embodiments, string profiles are implemented that specify resource strings that correspond to particular resources and/or types of resources.Type: ApplicationFiled: October 28, 2013Publication date: April 30, 2015Applicant: Microsoft CorporationInventors: Neil A. Deason, Amer A. Hassan, Carl S. Olivier, Roy D. Kuntz
-
Publication number: 20150100589Abstract: Techniques for location source ranking for determining device location are described. A location source generally refers to a source of position information (e.g., GPS coordinates, latitude and longitude, street addresses, and so forth) that can be used to determine a geographical location of a device. According to one or more embodiments, location sources and/or combinations of location sources can be ranked based on various criteria. Thus, when a location is requested for a particular device, a highest ranking available location source or combination of location sources can be selected to determine a location of the device. Location source rankings, for instance, can be maintained on a client device and/or via a remote location-related service. According to various embodiments, a location of a device can be determined to enable emergency assistance to be provided at the location.Type: ApplicationFiled: October 9, 2013Publication date: April 9, 2015Applicant: Microsoft CorporationInventors: Amer A. Hassan, Neil A. Deason, Carl S. Olivier, Roy D. Kuntz