Patents by Inventor Roy Kuntz
Roy Kuntz has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Publication number: 20220410926Abstract: A data processing system for navigation using-spread spectrum signals herein implements causing a transceiver of the data processing system to transmit a first electromagnetic signal; receiving, via the transceiver, second electromagnetic signals associated with a first object responsive to the first electromagnetic signal, the second electromagnetic signals including first spread-spectrum signals and an identification of the first object incorporated into the first spread-spectrum signals, each respective second electromagnetic signal of the second electromagnetic signals being transmitted from a separate location on the first object; analyzing the second electromagnetic signals to obtain the identification of the first object; and determining a first estimated location of the data processing system relative to the first object by calculating a difference between the time of transmission of the first electromagnetic signal and a respective time of receipt of each of the second electromagnetic signals.Type: ApplicationFiled: June 28, 2021Publication date: December 29, 2022Applicant: Microsoft Technology Licensing, LLCInventors: Amer Aref HASSAN, Roy KUNTZ
-
Patent number: 11122441Abstract: Disclosed in some examples are methods, systems, devices, and machine-readable mediums that detect evil twin and other anomalous access points in an IT infrastructure by detecting access points that are not in their expected locations based upon an analysis of access point reports from one or more computing devices.Type: GrantFiled: June 8, 2018Date of Patent: September 14, 2021Assignee: Microsoft Technology Licensing, LLCInventors: Amer A. Hassan, Roy Kuntz, Michael Davis
-
Patent number: 10560264Abstract: A cryptographic key generator for a first optical transceiver includes a photodetector that receives a continuous wave light beam received via an optical channel from a second optical transceiver. The generator samples and quantizes signals from the photodetector during a plurality of intervals to generate respective samples representing respective numbers of photons incident on the photodetector during each of the plurality of intervals. The generator creates a first cryptographic key from the plurality of digital values. The second optical transceiver receives a continuous wave light beam from the first transceiver and performs the same functions to create a second cryptographic key. Due to the reciprocal nature of the channels, the first and second cryptographic keys match.Type: GrantFiled: May 29, 2018Date of Patent: February 11, 2020Assignee: Microsoft Technology Licensing, LLCInventors: Amer A. Hassan, Roy Kuntz
-
Publication number: 20190380043Abstract: Disclosed in some examples are methods, systems, devices, and machine-readable mediums that detect evil twin and other anomalous access points in an IT infrastructure by detecting access points that are not in their expected locations based upon an analysis of access point reports from one or more computing devices.Type: ApplicationFiled: June 8, 2018Publication date: December 12, 2019Inventors: Amer A. Hassan, Roy Kuntz, Michael Davis
-
Publication number: 20190044712Abstract: A cryptographic key generator for a first optical transceiver includes a photodetector that receives a continuous wave light beam received via an optical channel from a second optical transceiver. The generator samples and quantizes signals from the photodetector during a plurality of intervals to generate respective samples representing respective numbers of photons incident on the photod.etector during each of the plurality of intervals. The generator creates a first cryptographic key from the plurality of digital values. The second optical transceiver receives a continuous wave light beam from the first transceiver and performs the same functions to create a second cryptographic key. Due to the reciprocal nature of the channels, the first and second cryptographic keys match.Type: ApplicationFiled: May 29, 2018Publication date: February 7, 2019Inventors: Amer A. Hassan, Roy Kuntz
-
Patent number: 9456345Abstract: Techniques are provided for authenticating a phone or other device for a user. A phone or other device is provided to the user. A personal identification number is provided to the user. The personal identification number is used to authenticate the phone or other device in the network for the user.Type: GrantFiled: August 8, 2014Date of Patent: September 27, 2016Assignee: MICROSOFT TECHNOLOGY LICENSING, LLCInventors: Rui Maximo, Dawson Yee, Gurdeep S Pall, Roy Kuntz
-
Publication number: 20140357233Abstract: Techniques are provided for authenticating a phone or other device for a user. A phone or other device is provided to the user. A personal identification number is provided to the user. The personal identification number is used to authenticate the phone or other device in the network for the user.Type: ApplicationFiled: August 8, 2014Publication date: December 4, 2014Applicant: Microsoft CorporationInventors: Rui Maximo, Dawson Yee, Gurdeep S. Pall, Roy Kuntz
-
Patent number: 8831189Abstract: Techniques are provided for authenticating a phone or other device for a user. A phone or other device is provided to the user. A personal identification number is provided to the user. The personal identification number is used to authenticate the phone or other device in the network for the user.Type: GrantFiled: June 12, 2006Date of Patent: September 9, 2014Assignee: Microsoft CorporationInventors: Rui Maximo, Dawson Yee, Gurdeep S. Pall, Roy Kuntz
-
Patent number: 8817777Abstract: A hybrid Unified Communications (UC) telephony deployment includes users of a tenant that are hosted between a UC cloud deployment and a UC on-premise deployment that offers PSTN connectivity for the users. An identity of a tenant and its' users are maintained consistently between the on-premise and cloud based UC deployment (e.g. telephone numbers, dialing preferences, voice mail . . . ). Each user of the tenant can register with the UC service from one or more locations (e.g. on-premise, off-premise . . . ) whether or not they are hosted by the on-premise deployment or the cloud based UC deployment. Functionality of the UC deployment may also be maintained at one or more locations within the hybrid UC deployment. For example, some services (e.g. voicemail, or other services) can be hosted in the cloud while the remaining services are hosted on-premise. Different Telco providers may be chosen by the tenant to provide PSTN services for one or more users of the tenant.Type: GrantFiled: August 10, 2011Date of Patent: August 26, 2014Assignee: Microsoft CorporationInventors: Vijay Manian, Russell Andrew Penar, Mahendra D. Sekaran, Danny Levin, Sankaran Narayanan, Roy Kuntz
-
Publication number: 20140199959Abstract: Technologies are generally described for providing location information associated with users for emergency service purposes. User location through a wireless communication device may be determined upon triggering by a user initiated emergency communication (in various modalities) or by an external trigger signal employing one or more known signal sources and provided to an emergency service provider. The user location may also be determined/updated periodically and refined upon triggering of the emergency communication. Communication between the user's wireless device and the emergency service provider may be prioritized, in some examples, to ensure reliable communication.Type: ApplicationFiled: January 14, 2013Publication date: July 17, 2014Applicant: Microsoft CorporationInventors: Amer Hassan, Thomas Kuehnel, Roy Kuntz, Billy R. Anders, JR.
-
Publication number: 20130039360Abstract: A hybrid Unified Communications (UC) telephony deployment includes users of a tenant that are hosted between a UC cloud deployment and a UC on-premise deployment that offers PSTN connectivity for the users. An identity of a tenant and its' users are maintained consistently between the on-premise and cloud based UC deployment (e.g. telephone numbers, dialing preferences, voice mail . . . ). Each user of the tenant can register with the UC service from one or more locations (e.g. on-premise, off-premise . . . ) whether or not they are hosted by the on-premise deployment or the cloud based UC deployment. Functionality of the UC deployment may also be maintained at one or more locations within the hybrid UC deployment. For example, some services (e.g. voicemail, or other services) can be hosted in the cloud while the remaining services are hosted on-premise. Different Telco providers may be chosen by the tenant to provide PSTN services for one or more users of the tenant.Type: ApplicationFiled: August 10, 2011Publication date: February 14, 2013Applicant: MICROSOFT CORPORATIONInventors: Vijay Manian, Russell Andrew Penar, Mahendra D. Sekaran, Danny Levin, Sankaran Narayanan, Roy Kuntz
-
Patent number: 8307071Abstract: Location of a communication network subscriber is determined employing confidence metrics such as remote vs. local computer usage, primary user in a multi-user computing environment, likelihood of forgery, and comparable ones. A fine-grained location determination is then made based on the metric results and directory information for the particular subscriber such that services like emergency services can be provided with accurate location information.Type: GrantFiled: January 15, 2010Date of Patent: November 6, 2012Assignee: Microsoft CorporationInventors: Austin Donnelly, Bernard Aboba, Roy Kuntz, Gabriel Montenegro, Noor-E-Gagan Singh, Tim Moore
-
Patent number: 8122491Abstract: Techniques are provided for determining a physical presence setting. First information is received indicating whether a physical token of a user is detected with respect to a device associated with the user. The physical presence setting for the user with respect to the device is determined in accordance with the first information.Type: GrantFiled: May 18, 2006Date of Patent: February 21, 2012Assignee: Microsoft CorporationInventors: Dawson Yee, Roy Kuntz
-
Publication number: 20110179158Abstract: Location of a communication network subscriber is determined employing confidence metrics such as remote vs. local computer usage, primary user in a multi-user computing environment, likelihood of forgery, and comparable ones. A fine-grained location determination is then made based on the metric results and directory information for the particular subscriber such that services like emergency services can be provided with accurate location information.Type: ApplicationFiled: January 15, 2010Publication date: July 21, 2011Applicant: Microsoft CorporationInventors: Austin Donnelly, Bernard Aboba, Roy Kuntz, Gabriel Montenegro, Noor-E-Gagan Singh, Tim Moore
-
Publication number: 20070286376Abstract: Techniques are provided for authenticating a phone or other device for a user. A phone or other device is provided to the user. A personal identification number is provided to the user. The personal identification number is used to authenticate the phone or other device in the network for the user.Type: ApplicationFiled: June 12, 2006Publication date: December 13, 2007Applicant: Microsoft Corporation Microsoft Patent GroupInventors: Rui Maximo, Dawson Yee, Gurdeep S. Pall, Roy Kuntz
-
Publication number: 20070268130Abstract: Techniques are provided for determining a physical presence setting. First information is received indicating whether a physical token of a user is detected with respect to a device associated with the user. The physical presence setting for the user with respect to the device is determined in accordance with the first information.Type: ApplicationFiled: May 18, 2006Publication date: November 22, 2007Applicant: Microsoft Corporation Microsoft Patent GroupInventors: Dawson Yee, Roy Kuntz