Patents by Inventor Nelly L. Porter

Nelly L. Porter has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 11032279
    Abstract: Techniques described herein leverage a trusted entity within a domain to enable devices to establish trust with one another so they can securely discover each other and connect to one another. In various examples discussed herein, a device is configured to provide trust information to, and/or receive trust information from, the trusted entity. The trust information may include, for example, a public key of an encryption key pair, a certificate signed by the trusted entity proving authenticity, and/or a hash function and a hash seed used to compute a series of results that form a hash chain. The device may use the trust information to discover another device and to connect to the other device securely and automatically (e.g., with no user involvement or limited user involvement). Moreover, the device may use the trust information to dynamically change a MAC address being used to communicate with the other device.
    Type: Grant
    Filed: July 16, 2019
    Date of Patent: June 8, 2021
    Assignee: Microsoft Technology Licensing, LLC
    Inventors: Peter Dawoud Shenouda Dawoud, Anoosh Saboori, Himanshu Soni, Dustin Michael Ingalls, Nelly L. Porter
  • Patent number: 10581848
    Abstract: Techniques described herein leverage a trusted entity within a domain to enable devices to establish trust with one another so they can securely discover each other and connect to one another. In various examples discussed herein, a device is configured to provide trust information to, and/or receive trust information from, the trusted entity. The trust information may include, for example, a public key of an encryption key pair, a certificate signed by the trusted entity proving authenticity, and/or a hash function and a hash seed used to compute a series of results that form a hash chain. The device may use the trust information to discover another device and to connect to the other device securely and automatically (e.g., with no user involvement or limited user involvement). Moreover, the device may use the trust information to dynamically change a MAC address being used to communicate with the other device.
    Type: Grant
    Filed: June 21, 2017
    Date of Patent: March 3, 2020
    Assignee: Microsoft Technology Licensing, LLC
    Inventors: Peter Dawoud Shenouda Dawoud, Anoosh Saboori, Himanshu Soni, Dustin Michael Ingalls, Nelly L. Porter
  • Publication number: 20190386992
    Abstract: Techniques described herein leverage a trusted entity within a domain to enable devices to establish trust with one another so they can securely discover each other and connect to one another. In various examples discussed herein, a device is configured to provide trust information to, and/or receive trust information from, the trusted entity. The trust information may include, for example, a public key of an encryption key pair, a certificate signed by the trusted entity proving authenticity, and/or a hash function and a hash seed used to compute a series of results that form a hash chain. The device may use the trust information to discover another device and to connect to the other device securely and automatically (e.g., with no user involvement or limited user involvement). Moreover, the device may use the trust information to dynamically change a MAC address being used to communicate with the other device.
    Type: Application
    Filed: July 16, 2019
    Publication date: December 19, 2019
    Inventors: Peter DAWOUD SHENOUDA DAWOUD, Anoosh SABOORI, Himanshu SONI, Dustin Michael INGALLS, Nelly L. PORTER
  • Patent number: 10362031
    Abstract: Techniques described herein leverage a trusted entity within a domain to enable devices to establish trust with one another so they can securely discover each other and connect to one another. In various examples discussed herein, a device is configured to provide trust information to, and/or receive trust information from, the trusted entity. The trust information may include, for example, a public key of an encryption key pair, a certificate signed by the trusted entity proving authenticity, and/or a hash function and a hash seed used to compute a series of results that form a hash chain. The device may use the trust information to discover another device and to connect to the other device securely and automatically (e.g., with no user involvement or limited user involvement). Moreover, the device may use the trust information to dynamically change a MAC address being used to communicate with the other device.
    Type: Grant
    Filed: June 21, 2017
    Date of Patent: July 23, 2019
    Assignee: Microsoft Technology Licensing, LLC
    Inventors: Peter Dawoud Shenouda Dawoud, Anoosh Saboori, Himanshu Soni, Dustin Michael Ingalls, Nelly L. Porter
  • Publication number: 20170302666
    Abstract: Techniques described herein leverage a trusted entity within a domain to enable devices to establish trust with one another so they can securely discover each other and connect to one another. In various examples discussed herein, a device is configured to provide trust information to, and/or receive trust information from, the trusted entity. The trust information may include, for example, a public key of an encryption key pair, a certificate signed by the trusted entity proving authenticity, and/or a hash function and a hash seed used to compute a series of results that form a hash chain. The device may use the trust information to discover another device and to connect to the other device securely and automatically (e.g., with no user involvement or limited user involvement). Moreover, the device may use the trust information to dynamically change a MAC address being used to communicate with the other device.
    Type: Application
    Filed: June 21, 2017
    Publication date: October 19, 2017
    Inventors: Peter DAWOUD SHENOUDA DAWOUD, Anoosh SABOORI, Himanshu SONI, Dustin Michael INGALLS, Nelly L. PORTER
  • Publication number: 20170289157
    Abstract: Techniques described herein leverage a trusted entity within a domain to enable devices to establish trust with one another so they can securely discover each other and connect to one another. In various examples discussed herein, a device is configured to provide trust information to, and/or receive trust information from, the trusted entity. The trust information may include, for example, a public key of an encryption key pair, a certificate signed by the trusted entity proving authenticity, and/or a hash function and a hash seed used to compute a series of results that form a hash chain. The device may use the trust information to discover another device and to connect to the other device securely and automatically (e.g., with no user involvement or limited user involvement). Moreover, the device may use the trust information to dynamically change a MAC address being used to communicate with the other device.
    Type: Application
    Filed: June 21, 2017
    Publication date: October 5, 2017
    Inventors: Peter DAWOUD SHENOUDA DAWOUD, Anoosh SABOORI, Himanshu SONI, Dustin Michael INGALLS, Nelly L. PORTER
  • Patent number: 9716716
    Abstract: Techniques described herein leverage a trusted entity within a domain to enable devices to establish trust with one another so they can securely discover each other and connect to one another. In various examples discussed herein, a device is configured to provide trust information to, and/or receive trust information from, the trusted entity. The trust information may include, for example, a public key of an encryption key pair, a certificate signed by the trusted entity proving authenticity, and/or a hash function and a hash seed used to compute a series of results that form a hash chain. The device may use the trust information to discover another device and to connect to the other device securely and automatically (e.g., with no user involvement or limited user involvement). Moreover, the device may use the trust information to dynamically change a MAC address being used to communicate with the other device.
    Type: Grant
    Filed: March 6, 2015
    Date of Patent: July 25, 2017
    Assignee: Microsoft Technology Licensing, LLC
    Inventors: Peter Dawoud Shenouda Dawoud, Anoosh Saboori, Himanshu Soni, Dustin Michael Ingalls, Nelly L. Porter
  • Patent number: 9330513
    Abstract: The techniques and systems disclosed herein pertain to preventing unauthorized access to computing resources by unauthorized persons by deploying biometric security. To implement biometric security, the computing device, possibly by the OS, may obtain samples of one or more biometric factors unique to the owner. The computing device may construct pattern-matching templates corresponding to the biometric samples, which may be stored for later use when a protected resource is requested. Computing resources may be selected for protection by a biometric security mechanism by an authorized user or by other techniques or default settings. Before allowing certain restricted actions, the OS may request that the user provide one of the previously registered biometric samples. If the biometric sample matches the user's stored pattern-matching template, the OS may grant access to the computing resource, otherwise, the OS may deny access to the computing resource.
    Type: Grant
    Filed: September 5, 2013
    Date of Patent: May 3, 2016
    Assignee: Microsoft Technology Licensing, LLC
    Inventors: Himanshu Soni, Karanbir Singh, Arthur H. Baker, Vijay G. Bharadwaj, Nelly L. Porter, Violet Anna Barhudarian, John D. T. Wood, Jeffrey E. Shipman, Jeremy D. Viegas
  • Publication number: 20160080380
    Abstract: Techniques described herein leverage a trusted entity within a domain to enable devices to establish trust with one another so they can securely discover each other and connect to one another. In various examples discussed herein, a device is configured to provide trust information to, and/or receive trust information from, the trusted entity. The trust information may include, for example, a public key of an encryption key pair, a certificate signed by the trusted entity proving authenticity, and/or a hash function and a hash seed used to compute a series of results that form a hash chain. The device may use the trust information to discover another device and to connect to the other device securely and automatically (e.g., with no user involvement or limited user involvement). Moreover, the device may use the trust information to dynamically change a MAC address being used to communicate with the other device.
    Type: Application
    Filed: March 6, 2015
    Publication date: March 17, 2016
    Inventors: Peter Dawoud Shenouda Dawoud, Anoosh Saboori, Himanshu Soni, Dustin Michael Ingalls, Nelly L. Porter
  • Patent number: 8918530
    Abstract: A remote access system connects a server computer with one or more client computers, where devices are connected locally at the client computers. The devices are recognized by the client computers and a device driver is provided for each connected and recognized device. A virtual driver is created at the server computer from information specific to the device, such that the virtual driver acts as an actual driver to an application on the server computer. The application through the virtual driver is able to recognize and provide commands to the connected device.
    Type: Grant
    Filed: April 3, 2006
    Date of Patent: December 23, 2014
    Assignee: Microsoft Corporation
    Inventors: Vladimir K Stoyanov, Makarand V. Patwardhan, Joy Chik, Nelly L. Porter, Zardosht Kasheff
  • Publication number: 20140354401
    Abstract: The techniques and systems disclosed herein pertain to preventing unauthorized access to computing resources by unauthorized persons by deploying biometric security. To implement biometric security, the computing device, possibly by the OS, may obtain samples of one or more biometric factors unique to the owner. The computing device may construct pattern-matching templates corresponding to the biometric samples, which may be stored for later use when a protected resource is requested. Computing resources may be selected for protection by a biometric security mechanism by an authorized user or by other techniques or default settings. Before allowing certain restricted actions, the OS may request that the user provide one of the previously registered biometric samples. If the biometric sample matches the user's stored pattern-matching template, the OS may grant access to the computing resource, otherwise, the OS may deny access to the computing resource.
    Type: Application
    Filed: September 5, 2013
    Publication date: December 4, 2014
    Applicant: Microsoft Corporation
    Inventors: Himanshu Soni, Karanbir Singh, Arthur H. Baker, Vijay G. Bharadwaj, Nelly L. Porter, Violet Anna Barhudarian, John D. T. Wood, Jeffrey E. Shipman, Jeremy D. Viegas
  • Patent number: 8892758
    Abstract: A remote access system connects a server computer with one or more client computers, where devices are connected locally at the client computers. The devices are recognized by the client computers and a device driver is provided for each connected and recognized device. A virtual driver is created at the server computer from information specific to the device, such that the virtual driver acts as an actual driver to an application on the server computer. The application through the virtual driver is able to recognize and provide commands to the connected device.
    Type: Grant
    Filed: October 19, 2010
    Date of Patent: November 18, 2014
    Assignee: Microsoft Corporation
    Inventors: Vladimir K. Stoyanov, Makarand V. Patwardhan, Joy Chik, Nelly L. Porter, Zardosht Kasheff
  • Patent number: 8612862
    Abstract: Techniques for discovering, connecting to, disconnecting from, reconnecting to, updating, and removing workspaces are described. In one embodiment, a list of discovered workspaces is maintained on a user device. Shortcuts for resources corresponding to each respective one of the discovered workspaces are integrated into a user interface of the user device. A request to access one of the resources contained in one of the discovered workspaces is received. Responsive to receiving the request, a connection from the user device to one or more resource hosts containing the resources corresponding to the indicated one of the discovered workspaces is opened. Access from the user device to the resources stored on the resource host(s) corresponding to the indicated one of the discovered workspaces is enabled by presenting shortcuts for resources corresponding to the discovered workspaces as though they were local resources.
    Type: Grant
    Filed: June 27, 2008
    Date of Patent: December 17, 2013
    Assignee: Microsoft Corporation
    Inventors: Ayesha M Mascarenhas, Kevin Scott London, Raymond Matthew Reskusich, Subhashini Raghunathan, Ido Ben-Shachar, Alberto Henriquez, Nelly L. Porter, Ersev Samim Erdogan, Niraj Agarwala, Naga Vankata Rajagopal Ramadugu, Ramasamy Pullappan
  • Patent number: 8499044
    Abstract: A MIME or XML formatted message is stored and a map is processed in place of a message. The map is a compact representation of the message. The map is indicative of the content and structure of the message. The map comprises tags that map to and are indicative of portions of the message. When a portion of the message is to be accessed, the associated tag in the map is processed to determine the location of the associated portion of the message, and the associated portion of the message is accessed at the location. To allow accurate decryption of signed messages, the format of the message is preserved.
    Type: Grant
    Filed: December 7, 2006
    Date of Patent: July 30, 2013
    Assignee: Microsoft Corporation
    Inventors: Roy Williams, Oleg V. Ouliankine, Yuriy M. Inglikov, Nelly L. Porter
  • Publication number: 20110035758
    Abstract: A remote access system connects a server computer with one or more client computers, where devices are connected locally at the client computers. The devices are recognized by the client computers and a device driver is provided for each connected and recognized device. A virtual driver is created at the server computer from information specific to the device, such that the virtual driver acts as an actual driver to an application on the server computer. The application through the virtual driver is able to recognize and provide commands to the connected device.
    Type: Application
    Filed: October 19, 2010
    Publication date: February 10, 2011
    Applicant: Microsoft Corporation
    Inventors: Vladimir K. Stoyanov, Makarand V. Patwardhan, Joy Chik, Nelly L. Porter, Zardosht Kasheff
  • Publication number: 20090327905
    Abstract: Techniques for discovering, connecting to, disconnecting from, reconnecting to, updating, and removing workspaces are described. In one embodiment, a list of discovered workspaces is maintained on a user device. Shortcuts for resources corresponding to each respective one of the discovered workspaces are integrated into a user interface of the user device. A request to access one of the resources contained in one of the discovered workspaces is received. Responsive to receiving the request, a connection from the user device to one or more resource hosts containing the resources corresponding to the indicated one of the discovered workspaces is opened. Access from the user device to the resources stored on the resource host(s) corresponding to the indicated one of the discovered workspaces is enabled by presenting shortcuts for resources corresponding to the discovered workspaces as though they were local resources.
    Type: Application
    Filed: June 27, 2008
    Publication date: December 31, 2009
    Applicant: Microsoft Corporation
    Inventors: Ayesha M Mascarenhas, Kevin Scott London, Raymond Matthew Reskusich, Subhashini Raghunathan, Ido Ben-Shachar, Alberto Henriquez, Nelly L. Porter, Ersev Samim Erdogan, Niraj Agarwala, Naga Vankata Rajagopal Ramadugu, Ramasamy Pullappan
  • Publication number: 20080140783
    Abstract: A MIME or XML formatted message is stored and a map is processed in place of a message. The map is a compact representation of the message. The map is indicative of the content and structure of the message. The map comprises tags that map to and are indicative of portions of the message. When a portion of the message is to be accessed, the associated tag in the map is processed to determine the location of the associated portion of the message, and the associated portion of the message is accessed at the location. To allow accurate decryption of signed messages, the format of the message is preserved.
    Type: Application
    Filed: December 7, 2006
    Publication date: June 12, 2008
    Applicant: Microsoft Corporation
    Inventors: Roy Williams, Oleg V. Ouliankine, Yuriy M. Inglikov, Nelly L. Porter