Patents by Inventor Astha Keshan

Astha Keshan has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 11907382
    Abstract: An accessory device receives authentication information from a host computing device connected thereto and determines whether the authentication information is valid. If the authentication information is valid, the accessory device applies a first access policy that specifies whether the accessory device can provide the host computing device with access to none, some, or all of various computing resources of the accessory device. If the authentication information is not valid, the accessory device applies a second access policy that is different than the first access policy. The accessory device can also be provisioned with access policies by a host computing device if the host computing device successfully authenticates with the accessory device. In either case, authenticating the host computing device may include verifying a digital signature of a certificate provided by the host computing device using a public key of a certificate authority that has been provisioned to the accessory device.
    Type: Grant
    Filed: September 2, 2022
    Date of Patent: February 20, 2024
    Assignee: MICROSOFT TECHNOLOGY LICENSING, LLC
    Inventors: Ravi Kiran Chivukula, Robert D. Young, Nathan C. Sherman, Chirag Shah, Brandon Records, Astha Keshan, Eric Kotz, M. Nashaat Soliman
  • Publication number: 20220414238
    Abstract: An accessory device receives authentication information from a host computing device connected thereto and determines whether the authentication information is valid. If the authentication information is valid, the accessory device applies a first access policy that specifies whether the accessory device can provide the host computing device with access to none, some, or all of various computing resources of the accessory device. If the authentication information is not valid, the accessory device applies a second access policy that is different than the first access policy. The accessory device can also be provisioned with access policies by a host computing device if the host computing device successfully authenticates with the accessory device. In either case, authenticating the host computing device may include verifying a digital signature of a certificate provided by the host computing device using a public key of a certificate authority that has been provisioned to the accessory device.
    Type: Application
    Filed: September 2, 2022
    Publication date: December 29, 2022
    Inventors: Ravi Kiran CHIVUKULA, Robert D. YOUNG, Nathan C. SHERMAN, Chirag SHAH, Brandon RECORDS, Astha KESHAN, Eric KOTZ, M. Nashaat SOLIMAN
  • Patent number: 11468181
    Abstract: An accessory device receives authentication information from a host computing device connected thereto and determines whether the authentication information is valid. If the authentication information is valid, the accessory device applies a first access policy that specifies whether the accessory device can provide the host computing device with access to none, some, or all of various computing resources of the accessory device. If the authentication information is not valid, the accessory device applies a second access policy that is different than the first access policy. The accessory device can also be provisioned with access policies by a host computing device if the host computing device successfully authenticates with the accessory device. In either case, authenticating the host computing device may include verifying a digital signature of a certificate provided by the host computing device using a public key of a certificate authority that has been provisioned to the accessory device.
    Type: Grant
    Filed: April 21, 2020
    Date of Patent: October 11, 2022
    Assignee: MICROSOFT TECHNOLOGY LICENSING, LLC
    Inventors: Ravi Kiran Chivukula, Robert D. Young, Nathan C. Sherman, Chirag Shah, Brandon Records, Astha Keshan, Eric Kotz, M. Nashaat Soliman
  • Publication number: 20210326459
    Abstract: An accessory device receives authentication information from a host computing device connected thereto and determines whether the authentication information is valid. If the authentication information is valid, the accessory device applies a first access policy that specifies whether the accessory device can provide the host computing device with access to none, some, or all of various computing resources of the accessory device. If the authentication information is not valid, the accessory device applies a second access policy that is different than the first access policy. The accessory device can also be provisioned with access policies by a host computing device if the host computing device successfully authenticates with the accessory device. In either case, authenticating the host computing device may include verifying a digital signature of a certificate provided by the host computing device using a public key of a certificate authority that has been provisioned to the accessory device.
    Type: Application
    Filed: April 21, 2020
    Publication date: October 21, 2021
    Inventors: Ravi Kiran Chivukula, Robert D. Young, Nathan C. Sherman, Chirag Shah, Brandon Records, Astha Keshan, Eric Kotz, M. Nashaat Soliman