Patents by Inventor Robert Edgar Fanfant

Robert Edgar Fanfant has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 9235827
    Abstract: A computing device may include at least one primary notification module and at least one secondary notification module. A notification controller module may trigger a primary notification module and a secondary notification module to generate notification messages or the controller module may trigger the primary notification module to generate a notification message. A graphics device may generate a composite notification message based at least in part on the notification messages from the primary and the secondary notification modules, where representations of the notification messages are stacked one on-top of the other in the composite notification message.
    Type: Grant
    Filed: November 5, 2012
    Date of Patent: January 12, 2016
    Assignee: Microsoft Technology Licensing, LLC
    Inventors: Chih-Pin Ben Kao, Hakki Tunc Bostanci, Asish George Varghese, Vinod Chavva, Robert Edgar Fanfant
  • Patent number: 8931056
    Abstract: A service accessible by a set of entities may be provided to each entity at a different service level (e.g., with a different set of privileges) based on the privilege level of the entity. However, many users may attempt to perform malicious activities through the service, and may do so with impunity if the penalties of detection are inconsequential. Instead, privilege levels of entities may be established based on the claims of assets having identifiable value. Such claims may be established by submitting an asset identifier to the service, such as proof of a software license identified by the submission of a license key purchased at a substantial cost. The penalties of malicious activities performed by such users may include the invalidation of such asset identifiers. Establishing the privilege levels of respective entities in this manner raises the penalties, and hence the deterrence, of attempted malicious use of the service.
    Type: Grant
    Filed: March 31, 2011
    Date of Patent: January 6, 2015
    Assignee: Microsoft Corporation
    Inventors: Eric Fleischman, Eliot Gillum, Matthew Robert Ayers, Robert Edgar Fanfant, Hakki Tunc Bostanci
  • Patent number: 8806192
    Abstract: One or more techniques and/or systems are provided for securely authorizing a client to consume data and/or services from a service provider server while mitigating burdensome requests made to a validation server. That is, validation data provided to a client from a validation server may be maintained on the client and at least some of that validation data can be used to subsequently authorize the client when the client attempts to consume data and/or services from the service provider server (e.g., download a song). However, the validation data is maintained on the client and/or provided to the service provider server in a manner that inhibits user tampering. In this manner, numerous requests for validation of the client need not be made from the service provider server to the validation server when a client requests content from the service provider server, while also inhibiting unauthorized consumptions of data by the client.
    Type: Grant
    Filed: May 4, 2011
    Date of Patent: August 12, 2014
    Assignee: Microsoft Corporation
    Inventors: Hakki Tunc Bostanci, Robert Edgar Fanfant, Chih-Pin Kao, Satish K. Shetty, Kalin G. Toshev, Yefei Gao
  • Publication number: 20140129977
    Abstract: A computing device may include at least one primary notification module and at least one secondary notification module. A notification controller module may trigger a primary notification module and a secondary notification module to generate notification messages or the controller module may trigger the primary notification module to generate a notification message. A graphics device may generate a composite notification message based at least in part on the notification messages from the primary and the secondary notification modules, where representations of the notification messages are stacked one on-top of the other in the composite notification message.
    Type: Application
    Filed: November 5, 2012
    Publication date: May 8, 2014
    Applicant: MICROSOFT CORPORATION
    Inventors: Chih-Pin Ben Kao, Hakki Tunc Bostanci, Asish George Varghese, Vinod Chavva, Robert Edgar Fanfant
  • Publication number: 20120284507
    Abstract: One or more techniques and/or systems are provided for securely authorizing a client to consume data and/or services from a service provider server while mitigating burdensome requests made to a validation server. That is, validation data provided to a client from a validation server may be maintained on the client and at least some of that validation data can be used to subsequently authorize the client when the client attempts to consume data and/or services from the service provider server (e.g., download a song). However, the validation data is maintained on the client and/or provided to the service provider server in a manner that inhibits user tampering. In this manner, numerous requests for validation of the client need not be made from the service provider server to the validation server when a client requests content from the service provider server, while also inhibiting unauthorized consumptions of data by the client.
    Type: Application
    Filed: May 4, 2011
    Publication date: November 8, 2012
    Applicant: Microsoft Corporation
    Inventors: Hakki Tunc Bostanci, Robert Edgar Fanfant, Chih-Pin Kao, Satish K. Shetty, Kalin G. Toshev, Yefei Gao
  • Publication number: 20120254946
    Abstract: A service accessible by a set of entities may be provided to each entity at a different service level (e.g., with a different set of privileges) based on the privilege level of the entity. However, many users may attempt to perform malicious activities through the service, and may do so with impunity if the penalties of detection are inconsequential. Instead, privilege levels of entities may be established based on the claims of assets having identifiable value. Such claims may be established by submitting an asset identifier to the service, such as proof of a software license identified by the submission of a license key purchased at a substantial cost. The penalties of malicious activities performed by such users may include the invalidation of such asset identifiers. Establishing the privilege levels of respective entities in this manner raises the penalties, and hence the deterrence, of attempted malicious use of the service.
    Type: Application
    Filed: March 31, 2011
    Publication date: October 4, 2012
    Applicant: Microsoft Corporation
    Inventors: Eric Fleischman, Eliot Gillum, Matthew Robert Ayers, Robert Edgar Fanfant, Hakki Tunc Bostanci