Patents by Inventor Roy D. Kuntz

Roy D. Kuntz has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20230413187
    Abstract: Disclosed in some examples are methods, systems, and machine-readable mediums in which interference is mitigated on a wireless radio frequency channel used by multiple computing devices by adjusting (e.g., lowering) the power level of one or more computing devices (e.g., mobile devises such as User Equipment (UE) devices) and using successive interference cancellation to decode the combined signals, Successive interference cancellation may first decode a strongest signal of a combined signal of all computing devices. The decoded signal is then subtracted from the combined signal. The strongest signal of that combined signal is then decoded and then subtracted and so on until all signals are decoded.
    Type: Application
    Filed: June 9, 2022
    Publication date: December 21, 2023
    Inventors: Amer Aref Hassan, Roy D. Kuntz
  • Publication number: 20230362662
    Abstract: Disclosed in some examples are methods, systems, devices, and machine-readable mediums that detect evil twin and other anomalous access points in an IT infrastructure by detecting access points that are not in their expected locations based upon an analysis of access point reports from one or more computing devices.
    Type: Application
    Filed: July 21, 2023
    Publication date: November 9, 2023
    Inventors: Amer Aref Hassan, Roy D. KUNTZ, Michael Davis
  • Patent number: 11777710
    Abstract: Disclosed are systems, methods, and non-transitory computer-readable media for cryptography using different sized symbol sets. To protect against a brute force or other similar type of attack, multiple symbol sets having different sizes can be used for encrypting/decrypting data. For example, different portions of the data (e.g., data blocks representing multiple symbols, set of bits representing a single symbol) may be encrypted/decrypted using different symbol sets that include different numbers of unique symbols. Using different sized symbol sets adds additional complexity to the encryption process, thereby greatly increasing the difficulty in decrypting the encrypted data with a brute force attack.
    Type: Grant
    Filed: September 28, 2022
    Date of Patent: October 3, 2023
    Assignee: Microsoft Technology Licensing, LLC
    Inventors: Amer Aref Hassan, Whitney J Giaimo, Roy D. Kuntz
  • Patent number: 11751070
    Abstract: Disclosed in some examples are methods, systems, devices, and machine-readable mediums that detect evil twin and other anomalous access points in an IT infrastructure by detecting access points that are not in their expected locations based upon an analysis of access point reports from one or more computing devices.
    Type: Grant
    Filed: September 10, 2021
    Date of Patent: September 5, 2023
    Assignee: Microsoft Technology Licensing, LLC
    Inventors: Amer Aref Hassan, Roy D Kuntz, Michael Davis
  • Publication number: 20230017435
    Abstract: Disclosed are systems, methods, and non-transitory computer-readable media for cryptography using different sized symbol sets. To protect against a brute force or other similar type of attack, multiple symbol sets having different sizes can be used for encrypting/decrypting data. For example, different portions of the data (e.g., data blocks representing multiple symbols, set of bits representing a single symbol) may be encrypted/decrypted using different symbol sets that include different numbers of unique symbols. Using different sized symbol sets adds additional complexity to the encryption process, thereby greatly increasing the difficulty in decrypting the encrypted data with a brute force attack.
    Type: Application
    Filed: September 28, 2022
    Publication date: January 19, 2023
    Inventors: Amer Aref Hassan, Whitney J GIAIMO, Roy D. KUNTZ
  • Patent number: 11496289
    Abstract: Disclosed are systems, methods, and non-transitory computer-readable media for symmetric cryptography using varying sized symbol sets. To protect against a brute force or other similar type of attack, multiple symbol sets of varying sizes can be used for encrypting/decrypting data. For example, different portions of the data (e.g., data blocks representing multiple symbols, set of bits representing a single symbol) may be encrypted/decrypted using different symbol sets that include different numbers of unique symbols. Using varying sized symbol sets adds additional complexity to the encryption process, thereby greatly increasing the difficulty in decrypting the encrypted data with a brute force attack.
    Type: Grant
    Filed: August 5, 2020
    Date of Patent: November 8, 2022
    Assignee: Microsoft Technology Licensing, LLC
    Inventors: Amer Aref Hassan, Whitney J Giaimo, Roy D Kuntz
  • Publication number: 20220070684
    Abstract: Disclosed in some examples are methods, systems, devices, and machine-readable mediums that detect evil twin and other anomalous access points in an IT infrastructure by detecting access points that are not in their expected locations based upon an analysis of access point reports from one or more computing devices.
    Type: Application
    Filed: September 10, 2021
    Publication date: March 3, 2022
    Inventors: Amer Aref Hassan, Roy D. Kuntz, Michael Davis
  • Publication number: 20220045843
    Abstract: Disclosed are systems, methods, and non-transitory computer-readable media for symmetric cryptography using varying sized symbol sets. To protect against a brute force or other similar type of attack, multiple symbol sets of varying sizes can be used for encrypting/decrypting data. For example, different portions of the data (e.g., data blocks representing multiple symbols, set of bits representing a single symbol) may be encrypted/decrypted using different symbol sets that include different numbers of unique symbols. Using varying sized symbol sets adds additional complexity to the encryption process, thereby greatly increasing the difficulty in decrypting the encrypted data with a brute force attack.
    Type: Application
    Filed: August 5, 2020
    Publication date: February 10, 2022
    Inventors: Amer Aref Hassan, Whitney J. Giaimo, Roy D. Kuntz
  • Patent number: 11086719
    Abstract: Disclosed in some examples are methods, systems, storage devices, and machine readable mediums that utilize the ability of ECC to correct errors to actively prevent errors. The memory device determines whether a request to place data of a requested value at a requested location in the storage media is likely to interfere with other data stored at other locations on the storage media, and if so, changes the requested value to a second value that will not interfere (or has a lower probability of interfering) with neighboring data. The second value may be corrected to the requested value when a read request is made for that data using ECC.
    Type: Grant
    Filed: July 16, 2019
    Date of Patent: August 10, 2021
    Assignee: Microsoft Technology Licensing, LLC
    Inventors: Amer Aref Hassan, Roy D. Kuntz, David Anthony Lickorish
  • Patent number: 11075656
    Abstract: Disclosed in some examples are methods, systems, devices, and machine-readable mediums which optimize one or more metrics of a communication system by intentionally changing symbols in a bitstream after encoding by an error correction coder, but prior to transmission. The symbols may be changed to meet a communication metric optimization goal, such as decreasing a high PAPR, reducing an error rate, reducing an average power level (to save battery), or altering some other communication metric. The symbol that is intentionally changed is then detected by the receiver as an error and corrected by the receiver utilizing the error correction coding.
    Type: Grant
    Filed: July 16, 2019
    Date of Patent: July 27, 2021
    Assignee: Microsoft Technology Licensing, LLC
    Inventors: Amer Aref Hassan, Roy D. Kuntz
  • Publication number: 20210021288
    Abstract: Disclosed in some examples are methods, systems, devices, and machine-readable mediums which optimize one or more metrics of a communication system by intentionally changing symbols in a bitstream after encoding by an error correction coder, but prior to transmission. The symbols may be changed to meet a communication metric optimization goal, such as decreasing a high PAPR, reducing an error rate, reducing an average power level (to save battery), or altering some other communication metric. The symbol that is intentionally changed is then detected by the receiver as an error and corrected by the receiver utilizing the error correction coding.
    Type: Application
    Filed: July 16, 2019
    Publication date: January 21, 2021
    Inventors: Amer Aref Hassan, Roy D. Kuntz
  • Publication number: 20210019226
    Abstract: Disclosed in some examples are methods, systems, storage devices, and machine readable mediums that utilize the ability of ECC to correct errors to actively prevent errors. The memory device determines whether a request to place data of a requested value at a requested location in the storage media is likely to interfere with other data stored at other locations on the storage media, and if so, changes the requested value to a second value that will not interfere (or has a lower probability of interfering) with neighboring data. The second value may be corrected to the requested value when a read request is made for that data using ECC.
    Type: Application
    Filed: July 16, 2019
    Publication date: January 21, 2021
    Inventors: Amer Aref Hassan, Roy D. Kuntz, David Anthony Lickorish
  • Publication number: 20200195604
    Abstract: Techniques for message transport and network type selection, provided in the context of electronic messaging sessions (e.g., instant messaging, chat, voice, email, SMS, etc.) occurring between users, are disclosed herein. In an example, a message processing system performs operations to: receive and process a message, addressed from a sender to a recipient in a messaging session; predict a delivery state or read result for the message, based on identified activity of the recipient, or additionally, context of the interaction between the sender and the recipient; select a communications transport mechanism for the message, based on the predicted delivery state or read result; and cause transmission of the message to the recipient using the selected communications transport mechanism. In further examples, the prediction is performed using a machine-learning trained model, or is assisted with profile information, rules, historical data, or ongoing monitoring or tracking data.
    Type: Application
    Filed: December 14, 2018
    Publication date: June 18, 2020
    Inventors: Amer A. Hassan, Roy D. Kuntz, David Anthony Lickorish
  • Patent number: 10255328
    Abstract: Techniques for location source ranking for determining device location are described. A location source generally refers to a source of position information (e.g., GPS coordinates, latitude and longitude, street addresses, and so forth) that can be used to determine a geographical location of a device. According to one or more embodiments, location sources and/or combinations of location sources can be ranked based on various criteria. Thus, when a location is requested for a particular device, a highest ranking available location source or combination of location sources can be selected to determine a location of the device. Location source rankings, for instance, can be maintained on a client device and/or via a remote location-related service. According to various embodiments, a location of a device can be determined to enable emergency assistance to be provided at the location.
    Type: Grant
    Filed: October 9, 2013
    Date of Patent: April 9, 2019
    Assignee: Microsoft Technology Licensing, LLC
    Inventors: Amer A. Hassan, Neil A. Deason, Carl S. Olivier, Roy D. Kuntz
  • Publication number: 20180206102
    Abstract: Techniques for determining a valid resource string for a resource are described. According to one or more implementations, a particular resource string for accessing a particular resource may be determined to be not valid at a current location of a client device. Accordingly, the particular resource string can be mapped to an active string profile for the client device, and a valid resource string for accessing the resource at the current location can be determined from the active string profile. The valid resource string can be used to initiate communication with an instance of the particular resource.
    Type: Application
    Filed: March 12, 2018
    Publication date: July 19, 2018
    Applicant: Microsoft Technology Licensing, LLC
    Inventors: Neil A. Deason, Amer A. Hassan, Carl S. Olivier, Roy D. Kuntz
  • Patent number: 9918209
    Abstract: Techniques for policies for selecting sources for resource strings are described. Generally, a resource string refers to a set of characters that can be used to initiate communication with a particular resource. According to one or more embodiments, techniques discussed herein enable resource strings to be determined at different locations, e.g., geographic locations. In at least some embodiments, string source policies are implemented that specify parameters for selecting a source from which to obtain resource strings. According to one or more embodiments, string profiles are implemented that specify resource strings that correspond to particular resources and/or types of resources.
    Type: Grant
    Filed: October 28, 2013
    Date of Patent: March 13, 2018
    Assignee: Microsoft Technology Licensing, LLC
    Inventors: Neil A. Deason, Amer A. Hassan, Carl S. Olivier, Roy D. Kuntz
  • Publication number: 20150118987
    Abstract: Techniques for policies for selecting sources for resource strings are described. Generally, a resource string refers to a set of characters that can be used to initiate communication with a particular resource. According to one or more embodiments, techniques discussed herein enable resource strings to be determined at different locations, e.g., geographic locations. In at least some embodiments, string source policies are implemented that specify parameters for selecting a source from which to obtain resource strings. According to one or more embodiments, string profiles are implemented that specify resource strings that correspond to particular resources and/or types of resources.
    Type: Application
    Filed: October 28, 2013
    Publication date: April 30, 2015
    Applicant: Microsoft Corporation
    Inventors: Neil A. Deason, Amer A. Hassan, Carl S. Olivier, Roy D. Kuntz
  • Publication number: 20150100589
    Abstract: Techniques for location source ranking for determining device location are described. A location source generally refers to a source of position information (e.g., GPS coordinates, latitude and longitude, street addresses, and so forth) that can be used to determine a geographical location of a device. According to one or more embodiments, location sources and/or combinations of location sources can be ranked based on various criteria. Thus, when a location is requested for a particular device, a highest ranking available location source or combination of location sources can be selected to determine a location of the device. Location source rankings, for instance, can be maintained on a client device and/or via a remote location-related service. According to various embodiments, a location of a device can be determined to enable emergency assistance to be provided at the location.
    Type: Application
    Filed: October 9, 2013
    Publication date: April 9, 2015
    Applicant: Microsoft Corporation
    Inventors: Amer A. Hassan, Neil A. Deason, Carl S. Olivier, Roy D. Kuntz