Patents by Inventor Ashutosh Badwe
Ashutosh Badwe has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 11190501Abstract: An authentication management system receives a resource request directed to a software service, which may require password-based authentication. The system redirects the resource request to an authentication identity provider (IdP), and receives an authentication token generated by the authentication IdP. The redirecting of the resource request comprises transmission of an authentication request, which includes user identity information that can be authenticated by the IdP but does not include a password for the software service. In response to receiving the authentication token, the system causes a shadow account to be created with the software service. For password-based authentication, this may include setting a temporary, random password for the shadow account. The system is then able to generate authenticated connection information (e.g.Type: GrantFiled: August 22, 2018Date of Patent: November 30, 2021Assignee: Terawe CorporationInventors: Anilkumar Balakrishnan, Ashutosh Badwe, Hilal Al-Hilali, Ramakrishnan Peruvemba, David K. Downing, Javier Dalzell
-
Publication number: 20190068578Abstract: An authentication management system receives a resource request directed to a software service, which may require password-based authentication. The system redirects the resource request to an authentication identity provider (IdP), and receives an authentication token generated by the authentication IdP. The redirecting of the resource request comprises transmission of an authentication request, which includes user identity information that can be authenticated by the IdP but does not include a password for the software service. In response to receiving the authentication token, the system causes a shadow account to be created with the software service. For password-based authentication, this may include setting a temporary, random password for the shadow account. The system is then able to generate authenticated connection information (e.g.Type: ApplicationFiled: August 22, 2018Publication date: February 28, 2019Applicant: Terawe CorporationInventors: Anilkumar Balakrishnan, Ashutosh Badwe, Hilal Al-Hilali, Ramakrishnan Peruvemba, David K. Downing, Javier Dalzell
-
Patent number: 8311947Abstract: Embodiments described herein are directed to syndicating an online service to at least one syndication partner of a syndicator. In one embodiment, a computer system determines that a syndication relationship has been established between a syndicator and a syndication partner, where the syndication relationship is established to provide syndicated services to syndication partners and clients. The computer system indicates which services provided by the syndicator are available for syndication to the syndication partner and which type of usage information the partner is to provide in order to use the syndicator's services. The computer system receives usage information from the syndication partner specifying which services are to be syndicated and specifying parameters for those services indicating operating parameters specific to the use of the syndicated services.Type: GrantFiled: November 26, 2008Date of Patent: November 13, 2012Assignee: Microsoft CorporationInventors: Krishna Kumar Sunkammurali, Michel Burger, Ashutosh Badwe, Jignesh Kacharia, Rammohan Nagasubramani, Roy Peter D'Souza
-
Patent number: 8201231Abstract: Associating a computing device with a group of other computing devices. A service receives a common credential from the computing device and associates the computing device with the other computing devices also associated with the common credential. The service generates a machine-specific credential for use by the computing device in subsequent communications with the service. The machine-specific credential is used to authenticate, identify, and group the computing device with the other computing devices in the subsequent communications.Type: GrantFiled: February 21, 2007Date of Patent: June 12, 2012Assignee: Microsoft CorporationInventors: Juanya Davon Williams, Ashutosh Badwe, Adam Patrick Edwards
-
Patent number: 8019795Abstract: Various technologies and techniques are disclosed for providing a data warehouse test automation framework system. A data generation module is provided that is operable to generate data scenarios that ensure specific logic is being validated against a data warehouse. A data validation module is provided that has data validation blocks that provide a framework for validating data completeness and data integrity of a data warehouse. The data validation blocks are represented by query templates that provide specifications for how queries that perform the validating of the data completeness and the data integrity should be structured. Dimensions in the data warehouse are modeled using an object oriented programming syntax.Type: GrantFiled: December 5, 2007Date of Patent: September 13, 2011Assignee: Microsoft CorporationInventors: Andrew Anderson, Kanmin Zhang, Steven Long, Joseph Heiniger, Ashutosh Badwe
-
Patent number: 7937762Abstract: Tracking data operations associated with unauthenticated computing devices to enable subsequent identification and remediation thereof. In embodiments in which one computing device has to trust another computing device without authenticating the other computing device, a machine identifier and a credential group value are associated with data operations in communications from the unauthenticated computing device. The data operations may be subsequently identified based on the machine identifier and credential group value. Remedial action may be taken on the identified data operations to restore data integrity.Type: GrantFiled: January 15, 2007Date of Patent: May 3, 2011Assignee: Microsoft CorporationInventors: John Leo Ellis, Ashutosh Badwe, Juanya Davon Williams
-
Publication number: 20100250730Abstract: Systems, methods, and computer program products are described that perform automated license reconciliation for deployed applications. The applications may be deployed among a plurality of computers. Agents are deployed on respective computers to determine the deployed applications. The agents further determine licensable software product identifiers corresponding to the respective instances of the applications. A license data source module provides entitlements corresponding to respective license agreement(s). A reconciliation module matches the entitlements to the instances of the applications to determine whether the instances of the applications are in compliance with the license agreement(s).Type: ApplicationFiled: March 31, 2009Publication date: September 30, 2010Applicant: MICROSOFT CORPORATIONInventors: Steve Menzies, Bhavini Soneji, Ashutosh Badwe, Erik Hedberg
-
Publication number: 20100131380Abstract: Embodiments described herein are directed to syndicating an online service to at least one syndication partner of a syndicator. In one embodiment, a computer system determines that a syndication relationship has been established between a syndicator and a syndication partner, where the syndication relationship is established to provide syndicated services to syndication partners and clients. The computer system indicates which services provided by the syndicator are available for syndication to the syndication partner and which type of usage information the partner is to provide in order to use the syndicator's services. The computer system receives usage information from the syndication partner specifying which services are to be syndicated and specifying parameters for those services indicating operating parameters specific to the use of the syndicated services.Type: ApplicationFiled: November 26, 2008Publication date: May 27, 2010Applicant: Microsoft CorporationInventors: Krishna Kumar Sunkammurali, Michel Burger, Ashutosh Badwe, Jignesh Kacharia, Rammohan Nagassubramani, Roy Peter D'Souza
-
Publication number: 20090150447Abstract: Various technologies and techniques are disclosed for providing a data warehouse test automation framework system. A data generation module is provided that is operable to generate data scenarios that ensure specific logic is being validated against a data warehouse. A data validation module is provided that has data validation blocks that provide a framework for validating data completeness and data integrity of a data warehouse. The data validation blocks are represented by query templates that provide specifications for how queries that perform the validating of the data completeness and the data integrity should be structured. Dimensions in the data warehouse are modeled using an object oriented programming syntax.Type: ApplicationFiled: December 5, 2007Publication date: June 11, 2009Applicant: MICROSOFT CORPORATIONInventors: Andrew Anderson, Kanmin Zhang, Steven Long, Joseph Heiniger, Ashutosh Badwe
-
Publication number: 20080201767Abstract: Associating a computing device with a group of other computing devices. A service receives a common credential from the computing device and associates the computing device with the other computing devices also associated with the common credential. The service generates a machine-specific credential for use by the computing device in subsequent communications with the service. The machine-specific credential is used to authenticate, identify, and group the computing device with the other computing devices in the subsequent communications.Type: ApplicationFiled: February 21, 2007Publication date: August 21, 2008Applicant: MICROSOFT CORPORATIONInventors: Juanya Davon Williams, Ashutosh Badwe, Adam Patrick Edwards
-
Publication number: 20080172726Abstract: Tracking data operations associated with unauthenticated computing devices to enable subsequent identification and remediation thereof. In embodiments in which one computing device has to trust another computing device without authenticating the other computing device, a machine identifier and a credential group value are associated with data operations in communications from the unauthenticated computing device. The data operations may be subsequently identified based on the machine identifier and credential group value. Remedial action may be taken on the identified data operations to restore data integrity.Type: ApplicationFiled: January 15, 2007Publication date: July 17, 2008Applicant: MICROSOFT CORPORATIONInventors: John Leo Ellis, Ashutosh Badwe
-
Publication number: 20080148253Abstract: Reconciling an installed software application with a software license. A discovery agent is deployed to each computing device at a user site, and each deployed discovery agent identifies information associated with access to the installed software application on the respective computing device. The identified information is aggregated to determine a present utilization of the installed software application on the computing devices at the user site. Usage rights associated with a software license for the software application is correlated with the present utilization of the software application. A resulting utilization is created as a function of the correlation and a report is provided indicating the resulting utilization.Type: ApplicationFiled: December 15, 2006Publication date: June 19, 2008Applicant: MICROSOFT CORPORATIONInventors: Ashutosh Badwe, Ram P. Papatla, David James Armour, Ross Norrie