Patents by Inventor Dejan Subotic

Dejan Subotic has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 9706401
    Abstract: User-authentication-based approval of a first device via communication with a second device over a channel (e.g., an insecure channel) is described. The first device receives a session ID and first user-observable information, or an identifier thereof, from an identity provider, presents the first user-observable information to a user, and sends the session ID to the second device. The second device sends the session ID to the identity provider to obtain therefrom second user-observable information, or an identifier thereof, and a security challenge. The second user-observable information bears a user-discernable relationship to the first user-observable information and is presented to the user by the second device. The second device is capable of generating a response to the security challenge for transmission to the identity provider based at least on input received from the user, the response to the security challenge being indicative of the suitability of the first device for approval.
    Type: Grant
    Filed: November 25, 2014
    Date of Patent: July 11, 2017
    Assignee: Microsoft Technology Licensing, LLC
    Inventors: Benjamin R. Vincent, Tarek B. Kamel, Sparky Toews, Dejan Subotic, Peter E. Zenzerovich, James Shang Kai Chou
  • Patent number: 9692745
    Abstract: Facilitating single sign-on on a device having sandboxed applications. A method includes identifying a plurality of associated applications. Criteria are evaluated to identify a primary application. Authentication state is stored at the primary application. One or more portions of the authentication state can be used by the applications in the plurality of associated application for authentication.
    Type: Grant
    Filed: April 10, 2015
    Date of Patent: June 27, 2017
    Assignee: Microsoft Technology Licensing, LLC
    Inventors: Jia Le He, Li Qing Xia, Alan Jonathan Lundeen, Dejan Subotic
  • Patent number: 9521146
    Abstract: In one embodiment, a user device 110 may access a network service 122 using a secure cookie 300. A high trust process may create an authentication proof 360 using a secure key. The high trust process may provide a browsing token 310 and the authentication proof 360 to a low trust process to send to an authentication service 124.
    Type: Grant
    Filed: August 21, 2013
    Date of Patent: December 13, 2016
    Assignee: Microsoft Technology Licensing, LLC
    Inventors: Sanket Kaluskar, Dejan Subotic, Tarek Kamel, Adrian Frei, Guruprasad Aphale, Allan Wetter
  • Publication number: 20160301684
    Abstract: Facilitating single sign-on on a device having sandboxed applications. A method includes identifying a plurality of associated applications. Criteria are evaluated to identify a primary application. Authentication state is stored at the primary application. One or more portions of the authentication state can be used by the applications in the plurality of associated application for authentication.
    Type: Application
    Filed: April 10, 2015
    Publication date: October 13, 2016
    Inventors: Jia Le He, Li Qing Xia, Alan Jonathan Lundeen, Dejan Subotic
  • Publication number: 20160150406
    Abstract: User-authentication-based approval of a first device via communication with a second device over a channel (e.g., an insecure channel) is described. The first device receives a session ID and first user-observable information, or an identifier thereof, from an identity provider, presents the first user-observable information to a user, and sends the session ID to the second device. The second device sends the session ID to the identity provider to obtain therefrom second user-observable information, or an identifier thereof, and a security challenge. The second user-observable information bears a user-discernable relationship to the first user-observable information and is presented to the user by the second device. The second device is capable of generating a response to the security challenge for transmission to the identity provider based at least on input received from the user, the response to the security challenge being indicative of the suitability of the first device for approval.
    Type: Application
    Filed: November 25, 2014
    Publication date: May 26, 2016
    Inventors: Benjamin R. Vincent, Tarek B. Kamel, Sparky Toews, Dejan Subotic, Peter E. Zenzerovich, James Shang Kai Chou
  • Publication number: 20150058621
    Abstract: In one embodiment, a user device 110 may access a network service 122 using a secure cookie 300. A high trust process may create an authentication proof 360 using a secure key. The high trust process may provide a browsing token 310 and the authentication proof 360 to a low trust process to send to an authentication service 124.
    Type: Application
    Filed: August 21, 2013
    Publication date: February 26, 2015
    Applicant: Microsoft Corporation
    Inventors: Sanket Kaluskar, Dejan Subotic, Tarek Kamel, Adrian Frei, Guruprasad Aphale, Allan Wetter
  • Patent number: 7636719
    Abstract: A schema is provided that defines people, groups and organizations by their corresponding contact information and other related characteristics. The schema defines a person by personal data, name data, location data, and e-address data. A group is defined by group membership data and e-address data. An organization is defined by location data and by e-address data. The schema also defines role occupancies for interrelating the various contacts. The role occupancies are defined by role occupancy data that may include employee data, team member data, group membership data, family data, customer or business data, and other types of data that can link two or more contacts. By interrelating contacts based on role occupancies, the schema is able to provide rich querying of one or more databases for obtaining desired contact information.
    Type: Grant
    Filed: December 19, 2002
    Date of Patent: December 22, 2009
    Assignee: Microsoft Corporation
    Inventors: J. Patrick Thompson, Walter R. Smith, Kim Cameron, Jonathan D. Perlow, Dejan Subotic, Melissa W. Dunn
  • Publication number: 20050246325
    Abstract: A method and system for recording and accessing usage of an item allows a user to select from a list of previously used items across a computing system. A relationship is established between a used item (e.g., a contact) and a usage pattern. The usage pattern records the number of times that the item is accessed. The usage pattern is available across the system such that multiple applications may retrieve the usage pattern to obtain information associated with a particular item. A weight factor associated with the relationship is generated and implemented in a ranking scheme. When a user begins typing the name of an item in a data field, the user is presented with a list of previously created items based on the ranking scheme. The user then selects the desired item from the list such that typing time is shortened and the user experience is enhanced.
    Type: Application
    Filed: April 30, 2004
    Publication date: November 3, 2005
    Applicant: Microsoft Corporation
    Inventors: Fabio Pettinati, Dejan Subotic, Jon Perlow
  • Publication number: 20040122822
    Abstract: A schema is provided that defines people, groups and organizations by their corresponding contact information and other related characteristics. The schema defines a person by personal data, name data, location data, and e-address data. A group is defined by group membership data and e-address data. An organization is defined by location data and by e-address data. The schema also defines role occupancies for interrelating the various contacts. The role occupancies are defined by role occupancy data that may include employee data, team member data, group membership data, family data, customer or business data, and other types of data that can link two or more contacts. By interrelating contacts based on role occupancies, the schema is able to provide rich querying of one or more databases for obtaining desired contact information.
    Type: Application
    Filed: December 19, 2002
    Publication date: June 24, 2004
    Inventors: J. Patrick Thompson, Walter R. Smith, Kim Cameron, Jonathan D. Perlow, Dejan Subotic, Melissa W. Dunn