Patents by Inventor Vikram Tuli
Vikram Tuli has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 11893615Abstract: A system to receive data indicative of physical location from a first computing device and to associate an event with the physical location, the event occurring at the physical location and including the physical presence of two or more entities. The system further to receive registration information from one or more entities that are associated with the event and to generate, using the registration information, a data object to enable a first entity of the one or more entities and a second entity of the one or more entities to exchange one or more items while the first entity and the second entity are both physically present at the event. The system additionally to publish the data object to a second computing device based on a participation criteria, the second device being operated by at least one of the first entity and the second entity.Type: GrantFiled: February 4, 2021Date of Patent: February 6, 2024Assignee: EBAY INC.Inventors: Vikram Tuli, Jeffrey Chen Chieh Leng, Daniel Morales
-
Patent number: 11301551Abstract: Access to computing assets is controlled by dynamically selecting an authentication process for an access attempt to a computing asset. In an example embodiment, when an indication of an access attempt for a computing asset is received, a security level associated with the computing asset is determined. Based on the security level associated with the computing asset, an authentication process is selected from a plurality of authentication processes, and the selected authentication process is executed in relation to the access attempt for the computing asset. In further embodiments, the authentication process is further selected based on a comparison of an access characteristic associated with the access attempt for the computing asset and an access characteristic for a user associated with the access attempt.Type: GrantFiled: February 26, 2020Date of Patent: April 12, 2022Assignee: eBay Inc.Inventors: Vikram Tuli, Daniel Morales
-
Publication number: 20210158414Abstract: A system to receive data indicative of physical location from a first computing device and to associate an event with the physical location, the event occurring at the physical location and including the physical presence of two or more entities. The system further to receive registration information from one or more entities that are associated with the event and to generate, using the registration information, a data object to enable a first entity of the one or more entities and a second entity of the one or more entities to exchange one or more items while the first entity and the second entity are both physically present at the event. The system additionally to publish the data object to a second computing device based on a participation criteria, the second device being operated by at least one of the first entity and the second entity.Type: ApplicationFiled: February 4, 2021Publication date: May 27, 2021Inventors: Vikram Tuli, Jeffrey Chen Chieh Leng, Daniel Morales
-
Publication number: 20210080926Abstract: Enhancing enterprise security by deploying a robotic security escort to guide a guest along a route that is tailored to the guest to ensure that the guest does not pass through restricted areas which the guest is not authorized to access. The guest may be assigned a security authorization level that defines whether the guest is permitted to access one or more predefined areas of the enterprise facility. A destination location to which the guest is to be escorted may be identified. Based on the security authorization level assigned to the guest, the system determines an appropriate route for escorting the guest throughout the enterprise facility to the destination location. The system may then deploy the robotic security escort to physically escort the guest along the appropriate route obtain adequate security with respect to sensitive enterprise resources while the guest is visiting the enterprise facility.Type: ApplicationFiled: September 12, 2019Publication date: March 18, 2021Inventors: Ethan Benjamin RUBINSON, Vikram TULI, Leslie Linnea JOHNSSON, Qiaosong WANG, A. Rami MAZID
-
Patent number: 10943277Abstract: A system to receive data indicative of physical location from a first computing device and to associate an event with the physical location, the event occurring at the physical location and including the physical presence of two or more entities. The system further to receive registration information from one or more entities that are associated with the event and to generate, using the registration information, a data object to enable a first entity of the one or more entities and a second entity of the one or more entities to exchange one or more items while the first entity and the second entity are both physically present at the event. The system additionally to publish the data object to a second computing device based on a participation criteria, the second device being operated by at least one of the first entity and the second entity.Type: GrantFiled: July 20, 2018Date of Patent: March 9, 2021Assignee: eBay Inc.Inventors: Vikram Tuli, Jeffrey Chen Chieh Leng, Daniel Morales
-
Publication number: 20200193002Abstract: Access to computing assets is controlled by dynamically selecting an authentication process for an access attempt to a computing asset. In an example embodiment, when an indication of an access attempt for a computing asset is received, a security level associated with the computing asset is determined. Based on the security level associated with the computing asset, an authentication process is selected from a plurality of authentication processes, and the selected authentication process is executed in relation to the access attempt for the computing asset. In further embodiments, the authentication process is further selected based on a comparison of an access characteristic associated with the access attempt for the computing asset and an access characteristic for a user associated with the access attempt.Type: ApplicationFiled: February 26, 2020Publication date: June 18, 2020Inventors: Vikram Tuli, Daniel Morales
-
Publication number: 20200143929Abstract: An integrated wellness system uses biometric sensor data received from an integrated stationary unit to generate user-specific wellness mappings and to automatically adjust one or more components of the stationary unit. Sensors in the integrated stationary unit transmit biometric sensor data to an integrated online system responsive to detecting that a user is interacting with the integrated stationary unit. Modules of the online system input the received sensor data into a trained configuration model that outputs a recommended optimal configuration of the integrated stationary unit for the user and instruct the integrated stationary unit to configure one or more components according to the recommended configuration. In some embodiments, the online system instructs the integrated stationary unit to further modify one or more components based on user input through a wellness application executing on a client device.Type: ApplicationFiled: November 1, 2019Publication date: May 7, 2020Inventors: Sujeewa Sean Pathiratne, Vikram Tuli
-
Patent number: 10606990Abstract: In various example embodiments, a method for controlling computing asset access using machine learning is presented. In an example embodiment, access data for each user of a plurality of users are accessed, wherein the access data for a user indicate an access history by that user to one or more available assets. Using a machine learning algorithm, the access data of each user are analyzed to generate a characteristic associated with the access data of each user. An indication of a current access attempt of one of the assets is received using an identity of a first user. A characteristic associated with the current access attempt is compared to the characteristic associated with the access data of the first user. Based on the comparison, an authentication process is selected for presentation to the first user for the current access attempt.Type: GrantFiled: July 6, 2017Date of Patent: March 31, 2020Assignee: eBay Inc.Inventors: Vikram Tuli, Daniel Morales
-
Publication number: 20200027145Abstract: A system to receive data indicative of physical location from a first computing device and to associate an event with the physical location, the event occurring at the physical location and including the physical presence of two or more entities. The system further to receive registration information from one or more entities that are associated with the event and to generate, using the registration information, a data object to enable a first entity of the one or more entities and a second entity of the one or more entities to exchange one or more items while the first entity and the second entity are both physically present at the event. The system additionally to publish the data object to a second computing device based on a participation criteria, the second device being operated by at least one of the first entity and the second entity.Type: ApplicationFiled: July 20, 2018Publication date: January 23, 2020Inventors: Vikram Tuli, Jeffrey Chen Chieh Leng, Daniel Morales
-
Publication number: 20190205837Abstract: A bot framework receives a request message for data maintained by at least one of a plurality of autonomous data sources, and determines, based on a knowledge graph, a relationship between a first data set maintained by a first autonomous data source and a second data set maintained by a second autonomous data source. The bot framework transmits a first request to the first autonomous data source for a first set of corporate data using a first API. In response to receiving the first set of corporate data, the bot framework transmits a second request to the second autonomous data source for a second set of corporate data based on the first set of corporate data. The second request is transmitted using a second API. In response to receiving the second set of corporate data, the bot framework generates and transmits a response to the request message.Type: ApplicationFiled: December 30, 2017Publication date: July 4, 2019Inventors: Vikram Tuli, Daniel Morales, John Joseph Kelly
-
Publication number: 20190012441Abstract: In various example embodiments, a method for controlling computing asset access using machine learning is presented. In an example embodiment, access data for each user of a plurality of users are accessed, wherein the access data for a user indicate an access history by that user to one or more available assets. Using a machine learning algorithm, the access data of each user are analyzed to generate a characteristic associated with the access data of each user. An indication of a current access attempt of one of the assets is received using an identity of a first user. A characteristic associated with the current access attempt is compared to the characteristic associated with the access data of the first user. Based on the comparison, an authentication process is selected for presentation to the first user for the current access attempt.Type: ApplicationFiled: July 6, 2017Publication date: January 10, 2019Inventors: Vikram Tuli, Daniel Morales
-
Publication number: 20180083955Abstract: An approach for multi-session authentication of multiple networked devices is disclosed. A user can create a public key-encrypted message on a client device using biometric data and a one-time password (e.g., one-time password). A door control box can transmit the public key-encrypted message to an authentication server. The authentication server can validate the user by decrypting the encrypted message using the private key, and using the one-time password to recover the valid user identifier (ID). The authentication server can then initiate and maintain multiple networked devices using one or more application programming interfaces (APIs).Type: ApplicationFiled: September 19, 2016Publication date: March 22, 2018Inventors: Vikram Tuli, Sanjeev Jain, Gurneet Jandir, Daniel Morales