Patents by Inventor Mukesh Karki
Mukesh Karki has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Publication number: 20100214979Abstract: A computing environment containing a mesh network that is adapted to provide a reliable transport mechanism over which services may be delivered. Nodes of the mesh can automatically select routable addresses without conflicts, which allows nodes of the mesh to be accessed, even as the mesh changes through the addition or deletion of nodes. Also, nodes communicate with a protocol that supports service advertisements. These advertisements can identify mesh nodes that supply services, such as file or print servers, for which devices that have not yet connected to the network may be searching. Advertisements can also identify services to be used by nodes in the network, allowing, for example, a node to select a gateway providing a reliable connection to an external network. The mesh network can be used as a transport for communication using protocols, such as TCP/IP, that generally exhibit poor performance when using unreliable transports.Type: ApplicationFiled: February 25, 2009Publication date: August 26, 2010Applicant: Microsoft CorporationInventors: Thomas W. Kuehnel, Alok Manchanda, Taroon Mandhana, Amer A. Hassan, Mukesh Karki, Christian Huitema, Yusuf Atas
-
Publication number: 20100217655Abstract: A computing environment containing a mesh network that is adapted to provide a reliable transport mechanism over which services may be delivered. Nodes of the mesh can automatically select routable addresses without conflicts, which allows nodes of the mesh to be accessed, even as the mesh changes through the addition or deletion of nodes. Also, nodes communicate with a protocol that supports service advertisements. These advertisements can identify mesh nodes that supply services, such as file or print servers, for which devices that have not yet connected to the network may be searching. Advertisements can also identify services to be used by nodes in the network, allowing, for example, a node to select a gateway providing a reliable connection to an external network. The mesh network can be used as a transport for communication using protocols, such as TCP/IP, that generally exhibit poor performance when using unreliable transports.Type: ApplicationFiled: February 25, 2009Publication date: August 26, 2010Applicant: Microsoft CorporationInventors: Thomas W. Kuehnel, Alok Manchanda, Taroon Mandhana, Amer A. Hassan, Mukesh Karki, Christian Huitema, Yusuf Atas
-
Publication number: 20100214959Abstract: A computing environment containing a mesh network that is adapted to provide a reliable transport mechanism over which services may be delivered. Nodes of the mesh can automatically select routable addresses without conflicts, which allows nodes of the mesh to be accessed, even as the mesh changes through the addition or deletion of nodes. Also, nodes communicate with a protocol that supports service advertisements. These advertisements can identify mesh nodes that supply services, such as file or print servers, for which devices that have not yet connected to the network may be searching. Advertisements can also identify services to be used by nodes in the network, allowing, for example, a node to select a gateway providing a reliable connection to an external network. The mesh network can be used as a transport for communication using protocols, such as TCP/IP, that generally exhibit poor performance when using unreliable transports.Type: ApplicationFiled: February 25, 2009Publication date: August 26, 2010Applicant: Microsoft CorporationInventors: Thomas W. Kuehnel, Alok Manchanda, Taroon Mandhana, Amer A. Hassan, Mukesh Karki, Christian Huitema, Yusuf Atas
-
Patent number: 7716463Abstract: Systems and/or methods that enable secure deployment and/or receipt of an operating system and/or updates for the operating system to a computer across a network susceptible to malicious communication are described. These systems and/or methods can, in one embodiment, enable a bare computer added to a network to have an operating system deployed to it and updated via the network before the bare computer is subjected to malicious code communicated over the network.Type: GrantFiled: October 15, 2004Date of Patent: May 11, 2010Assignee: Microsoft CorporationInventors: Martin L. Holladay, Mukesh Karki, Parthasarathy Narayanan
-
Patent number: 7610477Abstract: Systems and/or methods that enable secure deployment and/or receipt of an operating system and updates for the operating system to a bare computer across a network susceptible to malicious communication are described. These systems and/or methods can, in one embodiment, securely deploy an image having an operating system and enable secure receipt of an update for the operating system, both via a network susceptible to malicious communication. They can also, in another embodiment, enable a bare computer added to a network to have an operating system deployed to it and updated via the network before the bare computer is subjected to malicious code communicated over the network.Type: GrantFiled: September 15, 2004Date of Patent: October 27, 2009Assignee: Microsoft CorporationInventors: Martin L. Holladay, Mukesh Karki, Parthasarathy Narayanan
-
Publication number: 20090077671Abstract: A portable rewritable medium and a method are provided for preventing unauthorized use of executable software stored on the portable rewritable medium. A portion of the software stored on the portable rewritable medium may include instructions for a processing device to determine whether execution of the executable software is permitted. If execution of the executable software is permitted, the processing device may execute the executable software directly from the portable rewritable medium. Characteristics of the portable rewritable medium may be checked to determine whether functionality of the executable software is to be limited.Type: ApplicationFiled: September 13, 2007Publication date: March 19, 2009Applicant: MICROSOFT CORPORATIONInventors: Mukesh Karki, Yusuf Atas, Bhrighu Sareen, Serdar Unal
-
Publication number: 20080275921Abstract: A processing device may automatically provide protective services and may provide backup services for backing up and restoring user files, system files, configuration files, as well as other information. The processing device may be configured to check one or more performance conditions and perform an action to improve performance based on the one or more performance conditions. The processing device may monitor configuration and file changes and provide a user with a capability to persist or discard configuration changes and/or file changes made by an application during a session. The processing device may include a recovery button or switch, which when selected or pressed may cause the processing device to be restored to an operational state. The processing device may automatically detect instabilities and may automatically attempt to repair possible causes of the instabilities. The processing device may also include an additional chipset, which may perform backup and recovery services.Type: ApplicationFiled: March 23, 2007Publication date: November 6, 2008Applicant: Microsoft CorporationInventors: Kohulan Gunabalasubramaniam, Mukesh Karki, Narayanan Parthasarathy, Bohdan Raciborski
-
Patent number: 7437721Abstract: Described herein is an implementation for secure deployment, over a network, of software (e.g., an operating system) and updates to a bare computer (e.g., a server), so that it is not susceptible to malicious network-based intrusion.Type: GrantFiled: September 29, 2004Date of Patent: October 14, 2008Assignee: Microsoft CorporationInventors: Colin Watson, Martin L. Holladay, Mukesh Karki
-
Publication number: 20080189627Abstract: When a processing device is started, configuration information may be automatically examined to determine applications for performing a number of tasks. As a result, a user interface including selectable task-focused user interface (UI) elements may be displayed to a user. The selectable task-focused UI elements may be orb-shaped and displayed in a circular pattern at about a middle portion of a display screen. Each of the selectable task-focused UI elements may include a description of a corresponding task. When the user selects one of the selectable task-focused UI elements, a corresponding application may be executed to perform the corresponding task. In some embodiments, selectable category-focused UI elements may be displayed based on the automatically examined configuration information. Selection of one of the selectable category-focused UI elements may cause at least one selectable task-focused UI element corresponding to the selected one of the selectable category-focused UI elements to be displayed.Type: ApplicationFiled: February 7, 2007Publication date: August 7, 2008Applicant: Microsoft CorporationInventors: Egor Nikitin, Mukesh Karki, Narayanan Parthasarathy
-
Publication number: 20080189698Abstract: A method for tailoring the installation of an operating system to a computer system receives information regarding the computer system. Information regarding a modular operating system is accessed. The modular operating system is comprised of a foundational base and a plurality of installable features. Desired performance characteristics of the computer system are determined. Portions of the modular operating system are installed such that the modular operating system is tailored to the computer system and the desired performance characteristics of the computer system.Type: ApplicationFiled: February 5, 2007Publication date: August 7, 2008Applicant: Microsoft CorporationInventors: Bhrighu Sareen, Zubair Ansari, Mukesh Karki
-
Publication number: 20080183918Abstract: In a computer-implemented method for filtering input/output operations of a flash drive, an input/output request directed toward a flash drive is received. It is determined whether the input/output request is associated with a high volume write operation. If the input/output request is associated with the high volume write operation, a flash drive input/output management action to perform is selected. If the input/output request is not associated with the high volume write operation, the input/output request is forwarded to the flash drive.Type: ApplicationFiled: January 31, 2007Publication date: July 31, 2008Applicant: Microsoft CorporationInventors: Dilesh Dhokia, Mukesh Karki, Michael R. Fortin
-
Publication number: 20080172300Abstract: In various embodiments, a user may, via a processing device, indicate a desire to purchase a feature of an installed software product. A purchase request may be sent to an e-commerce server, or other server. The purchase request may be validated and information concerning the software product, the feature of the software product, and the processing device may be stored. Enabling information may be sent to the processing device to enable the feature of the software product. In some embodiments, the user may request a trial of a feature of a software product before purchasing the feature. In other embodiments, the user may deactivate a purchased feature of a software product on one processing device and may activate the purchased feature of the software product on a different processing device.Type: ApplicationFiled: January 11, 2007Publication date: July 17, 2008Applicant: Microsoft CorporationInventors: Mukesh Karki, Mohammed Zubair Ansari, Yusuf Atas, Robert Ian Oliver, Serdar Unal
-
Patent number: 7401362Abstract: Systems and/or methods that edit an image having an operating system to alter a security setting and securely deploy the edited image to a bare computer over a network susceptible to malicious communication are described. The systems and/or methods may also enable secure deployment and/or receipt of an operating system and updates for the operating system.Type: GrantFiled: October 15, 2004Date of Patent: July 15, 2008Assignee: Microsoft CorporationInventors: Martin L. Holladay, Mukesh Karki, Parthasarathy Narayanan
-
Publication number: 20080127161Abstract: In an embodiment, environmental functionality of the system software may be changed by altering guarded system data which may affect behavior of the system software. A user may provide state change information for altering a state of the system software, which may thereby alter the environmental functionality of the system software. In some implementations, the state change information may include a product key or any alternative activation/identification datum. The guarded system data may be altered based on the state change information. Upon startup or after detecting altered guarded system data, the system software may set configuration parameters, based on the altered guarded system data or a detected hardware configuration, to enable a particular environmental functionality of the system software.Type: ApplicationFiled: October 16, 2006Publication date: May 29, 2008Applicant: Microsoft CorporationInventors: Yusuf Atas, Mukesh Karki, Egor Nikitin, Narayanan Parthasarathy
-
Publication number: 20070294332Abstract: In one embodiment, a processing device may create a hardware inventory of hardware devices included in the processing device. A medium of the processing device may be prepared for installation of an operating system. The operating system may be installed onto the medium. One of a number of hardware abstraction layers may be determined to be compatible with a hardware configuration of the processing device. The determined one of the number of hardware abstraction layers may be installed onto the medium. A number of drivers for the hardware devices may be installed onto the medium, wherein the hardware drivers are based on the created hardware inventory.Type: ApplicationFiled: June 19, 2006Publication date: December 20, 2007Applicant: Microsoft CorporationInventors: Mukesh Karki, James Robert Tryon, Hani Umar Shakeel, Martin Holladay, Bhrighu Sareen
-
Patent number: 7065740Abstract: An apparatus and method to automate the deployment, provisioning, and management of a programmable device for the life cycle states of the programmable device is presented. The system includes an automation interface for a developer to develop modules to aid in the automation of the deployment, provisioning, and management of the programmable device and for a user to direct the system to enter into a state of the life cycle. A controller moves the programmable device into states of the life cycle in response to triggering events occurring.Type: GrantFiled: April 23, 2002Date of Patent: June 20, 2006Assignee: Microsoft CorporationInventors: W. Jeff Westerinen, James R. Benton, Mukesh Karki, Alan R. Morin, Raymond D. Pedrizetti, Thomas C. Phillips, Kartik N. Raghavan, Paul Sutton, Curt Steeb
-
Publication number: 20060070056Abstract: Described herein is an implementation for secure deployment, over a network, of software (e.g., an operating system) and updates to a bare computer (e.g., a server), so that it is not susceptible to malicious network-based intrusion.Type: ApplicationFiled: September 29, 2004Publication date: March 30, 2006Applicant: Microsoft CorporationInventors: Colin Watson, Martin Holladay, Mukesh Karki
-
Publication number: 20060059555Abstract: Systems and/or methods that edit an image having an operating system to alter a security setting and securely deploy the edited image to a bare computer over a network susceptible to malicious communication are described. The systems and/or methods may also enable secure deployment and/or receipt of an operating system and updates for the operating system.Type: ApplicationFiled: October 15, 2004Publication date: March 16, 2006Applicant: Microsoft CorporationInventors: Martin Holladay, Mukesh Karki, Parthasarathy Narayanan
-
Publication number: 20060059541Abstract: Systems and/or methods that enable secure deployment and/or receipt of an operating system and updates for the operating system to a bare computer across a network susceptible to malicious communication are described. These systems and/or methods can, in one embodiment, securely deploy an image having an operating system and enable secure receipt of an update for the operating system, both via a network susceptible to malicious communication. They can also, in another embodiment, enable a bare computer added to a network to have an operating system deployed to it and updated via the network before the bare computer is subjected to malicious code communicated over the network.Type: ApplicationFiled: September 15, 2004Publication date: March 16, 2006Applicant: Microsoft CorporationInventors: Martin Holladay, Mukesh Karki, Parthasarathy Narayanan
-
Publication number: 20060059542Abstract: Systems and/or methods that enable secure deployment and/or receipt of an operating system and/or updates for the operating system to a computer across a network susceptible to malicious communication are described. These systems and/or methods can, in one embodiment, enable a bare computer added to a network to have an operating system deployed to it and updated via the network before the bare computer is subjected to malicious code communicated over the network.Type: ApplicationFiled: October 15, 2004Publication date: March 16, 2006Applicant: Microsoft CorporationInventors: Martin Holladay, Mukesh Karki, Parthasarathy Narayanan