Patents by Inventor Seth H. Schuler

Seth H. Schuler has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 11138300
    Abstract: A security fingerprint architecture is disclosed. A security fingerprint comprises one or more behavioral factors which store a history of events associated with one or more users. The data in the security fingerprint is exposed by one or more modes, each of which determines the conditions that data in the security fingerprint may be accessed. Security fingerprints support a number of primitive operations that allow set operations to be performed. Security fingerprints may be used in for authentication, advertising, and other operations either alone, or in conjunction with third party data sources. An exemplary platform of security fingerprints built upon a cellular infrastructure is also disclosed.
    Type: Grant
    Filed: October 20, 2017
    Date of Patent: October 5, 2021
    Assignee: T-Mobile USA, Inc.
    Inventors: Vinay Kshirsagar, Jeffrey M. Giard, Michael J. Goo, Xianglong Kong, Tony A. Sandidge, Seth H. Schuler, Bala Subramanian, Linda Zhao
  • Patent number: 10028098
    Abstract: Techniques determining a categorized location of a user of a user device based at least in part on a set of location and time pairs for the user device are described herein. The set of location and time pairs for the user device include at least one location and time pair that is associated with a communication of the user device over a communication network. In some embodiments, the techniques further predict a location for the user given a specified time and based at least in part on the set of location and time pairs for the user device.
    Type: Grant
    Filed: March 18, 2016
    Date of Patent: July 17, 2018
    Assignee: T-Mobile USA, Inc.
    Inventors: Seth H. Schuler, Linda Zhao, Xianglong Kong, Michael J. Goo, Jeffrey M. Giard
  • Publication number: 20180039770
    Abstract: A security fingerprint architecture is disclosed. A security fingerprint comprises one or more behavioral factors which store a history of events associated with one or more users. The data in the security fingerprint is exposed by one or more modes, each of which determines the conditions that data in the security fingerprint may be accessed. Security fingerprints support a number of primitive operations that allow set operations to be performed. Security fingerprints may be used in for authentication, advertising, and other operations either alone, or in conjunction with third party data sources. An exemplary platform of security fingerprints built upon a cellular infrastructure is also disclosed.
    Type: Application
    Filed: October 20, 2017
    Publication date: February 8, 2018
    Inventors: Vinay Kshirsagar, Jeffrey M. Giard, Michael J. Goo, Xianglong Kong, Tony A. Sandidge, Seth H. Schuler, Bala Subramanian, Linda Zhao
  • Patent number: 9824199
    Abstract: A security fingerprint architecture is disclosed. A security fingerprint comprises one or more behavioral factors which store a history of events associated with one or more users. The data in the security fingerprint is exposed by one or more modes, each of which determines the conditions that data in the security fingerprint may be accessed. Security fingerprints support a number of primitive operations that allow set operations to be performed. Security fingerprints may be used in for authentication, advertising, and other operations either alone, or in conjunction with third party data sources. An exemplary platform of security fingerprints built upon a cellular infrastructure is also disclosed.
    Type: Grant
    Filed: September 12, 2012
    Date of Patent: November 21, 2017
    Assignee: T-Mobile USA, Inc.
    Inventors: Vinay Kshirsagar, Jeffrey M. Giard, Michael J. Goo, Xianglong Kong, Tony A. Sandidge, Seth H. Schuler, Bala Subramanian, Linda Zhao
  • Publication number: 20160205511
    Abstract: Techniques determining a categorized location of a user of a user device based at least in part on a set of location and time pairs for the user device are described herein. The set of location and time pairs for the user device include at least one location and time pair that is associated with a communication of the user device over a communication network. In some embodiments, the techniques further predict a location for the user given a specified time and based at least in part on the set of location and time pairs for the user device.
    Type: Application
    Filed: March 18, 2016
    Publication date: July 14, 2016
    Inventors: Seth H. Schuler, Linda Zhao, Xianglong Kong, Michael J. Goo, Jeffrey M. Giard
  • Patent number: 9320006
    Abstract: Techniques determining a categorized location of a user of a user device based at least in part on a set of location and time pairs for the user device are described herein. The set of location and time pairs for the user device include at least one location and time pair that is associated with a communication of the user device over a communication network. In some embodiments, the techniques further predict a location for the user given a specified time and based at least in part on the set of location and time pairs for the user device.
    Type: Grant
    Filed: June 28, 2013
    Date of Patent: April 19, 2016
    Assignee: T-Mobile USA, Inc.
    Inventors: Seth H. Schuler, Linda Zhao, Xianglong Kong, Michael J. Goo, Jeffrey M. Giard
  • Publication number: 20150004999
    Abstract: Techniques determining a categorized location of a user of a user device based at least in part on a set of location and time pairs for the user device are described herein. The set of location and time pairs for the user device include at least one location and time pair that is associated with a communication of the user device over a communication network. In some embodiments, the techniques further predict a location for the user given a specified time and based at least in part on the set of location and time pairs for the user device.
    Type: Application
    Filed: June 28, 2013
    Publication date: January 1, 2015
    Inventors: Seth H. Schuler, Linda Zhao, Xianglong Kong, Michael J. Goo, Jeffrey M. Giard
  • Publication number: 20130055367
    Abstract: A security fingerprint architecture is disclosed. A security fingerprint comprises one or more behavioral factors which store a history of events associated with one or more users. The data in the security fingerprint is exposed by one or more modes, each of which determines the conditions that data in the security fingerprint may be accessed. Security fingerprints support a number of primitive operations that allow set operations to be performed. Security fingerprints may be used in for authentication, advertising, and other operations either alone, or in conjunction with third party data sources. An exemplary platform of security fingerprints built upon a cellular infrastructure is also disclosed.
    Type: Application
    Filed: September 12, 2012
    Publication date: February 28, 2013
    Applicant: T-MOBILE USA, INC.
    Inventors: Vinay Kshirsagar, Jeffrey M. Giard, Michael J. Goo, Xianglong Kong, Tony A. Sandidge, Seth H. Schuler, Bala Subramanian, Linda Zhao
  • Publication number: 20130054433
    Abstract: Multi-factor identity fingerprinting with user behavior is disclosed. A user's interactions with one or more parties are tracked and stored in a data store. A party may be a company itself or a company's information system. The user interactions are aggregated in a user profile bound to a particular user. All of the profile, or some subset of the profile may be used to generate an identity fingerprint. The identity fingerprint may be used as authentication credentials, where the similarity of user activity indicia is measured against all or part of the identity fingerprint. Alternatively, the aggregation systems may identify groups or categories of users by behavior by identifying similar identity fingerprints. Similarity may be measured via correlation models. Finally, the data store of profiles may be used for non-authentication systems such as business intelligence, advertising, identity management, and threat monitoring.
    Type: Application
    Filed: September 9, 2011
    Publication date: February 28, 2013
    Applicant: T-MOBILE USA, INC.
    Inventors: Jeffrey M. Giard, Michael J. Goo, Tony A. Sandidge, Seth H. Schuler, Bala Subramanian