Patents by Inventor Sandeep K. Singhal
Sandeep K. Singhal has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 7660851Abstract: A method for creating, discovering, and joining meetings over a peer-to-peer network involves creation of a graph of meetings on a local subnet. When a meeting is created a meeting record is added to the graph where it may be discovered by other potential meeting attendees. A user may select from a list of meetings displayed in a meeting management window and send requested showing the selected meaning. Credentials, such as a password, may be supplied with the request. When the request is validated, information is sent to the requester for use in joining the meeting. When an ad hoc wireless session is used to hold a meeting the discovery process may further include analyzing data traffic to determine which wireless sessions are meetings.Type: GrantFiled: July 6, 2005Date of Patent: February 9, 2010Assignee: Microsoft CorporationInventors: Todd R. Manion, Sandeep K. Singhal, Eliot Flannery, Aaron Cunningham, Ravi Rao
-
Patent number: 7656810Abstract: The overall health of a peer-to-peer network may be inferred from statistics gathered and analyzed pertaining to individual node and node-to-node performance within the peer-to-peer network. When used with simulations for development or testing, the health statistic may be used instead of or to supplement standard regression testing to determine whether or not changes made improve system performance. When used with live peer-to-peer networks, the health statistic may provide a real-time view into network performance. Such a view may be used to adjust peer-to-peer network topology or to isolate underperforming or malicious nodes.Type: GrantFiled: March 25, 2005Date of Patent: February 2, 2010Assignee: Microsoft CorporationInventors: Noah Horton, Brian R. Lieuallen, Geogy A. Samuel, Sandeep K. Singhal
-
Publication number: 20090319473Abstract: The described method and system enables a client at a branch office to retrieve data from a local hosted cache instead of an application server over a WAN to improve latency and reduce overall WAN traffic. A server at the data center may be adapted to provide either a list of hashes or the requested data based on whether a hosted cache system is enabled. A hosted cache at the client side may provide the data to the client based on the hashes. The hashes may be generated to provide a fingerprint of the data which may be used to index the data in an efficient manner.Type: ApplicationFiled: June 19, 2008Publication date: December 24, 2009Applicant: MICROSOFT CORPORATIONInventors: Ravi T. Rao, Sandeep K. Singhal, See-Mong Tan, R. Scott Briggs, Kushal Narkhede, Eliot John Flannery, Nilesh R. Shah, Gianluigi Nusca, Khawar Mahmood Zuberi
-
Publication number: 20090320099Abstract: Content retrieval techniques are described. In an implementation, a determination is made as to whether a client is permitted to receive content requested by the client. When the client is permitted to receive the content, a communication is formed to be communicated via a wide area network that includes a hash list having a hash of each of a plurality of blocks of the content, each hash being configured to enable the client to locate a corresponding one of the blocks of the content via a local area network.Type: ApplicationFiled: June 23, 2008Publication date: December 24, 2009Applicant: MICROSOFT CORPORATIONInventors: Ravi T. Rao, Khaja E. Ahmed, R. Scott Briggs, Sandeep K. Singhal
-
Patent number: 7620902Abstract: A computer implemented method and system enable users to create a social network providing access to other users. By providing access to such networks via a visual presentation, the system renders content available for access by other network members. Access is sometimes provided through propagation of metadata or other uniquely identifying indicia associated with the social network to all or at least certain other network members.Type: GrantFiled: April 20, 2005Date of Patent: November 17, 2009Assignee: Microsoft CorporationInventors: Todd R. Manion, Aaron W. Cunningham, Noah Horton, Gursharan S. Sidhu, Sandeep K. Singhal
-
Patent number: 7617281Abstract: Collaboration between collaborative endpoints may be facilitated by a serverless publication service of a collaborative services platform. The serverless publication service may be configured to accept communicative connections from the collaborative endpoints. Users of the collaborative services platform may publish their associated collaborative presences with the serverless publication service. For example, the collaborative presence of a user may include information with respect to valid collaborative endpoints for the user and collaborative capabilities at those endpoints. Subscriptions to published collaborative presences may be placed through the serverless publication service. A collaborative presence subscribe message may specify a subscription to a collaborative presence of a user. Upon receipt of a presence subscribe message, if there is no subscription policy with respect to the sender, the recipient may be queried for a subscription policy with respect to the sender.Type: GrantFiled: April 25, 2005Date of Patent: November 10, 2009Assignee: Microsoft CorporationInventors: Todd R. Manion, David G. Thaler, Rohit Gupta, Sandeep K. Singhal, Ravi T. Rao, Radu Simionescu
-
Publication number: 20090164663Abstract: A mesh is joined by a node, wherein the mesh includes a Distributed Routing Table (DRT) for determining addresses of nodes in the mesh. A DRT message is processed in accordance with a security mode of the DRT.Type: ApplicationFiled: December 21, 2007Publication date: June 25, 2009Applicant: MICROSOFT CORPORATIONInventors: Kevin C. Ransom, Sandeep K. Singhal, Ramakrishna P. Pamulapati, Tyler M. Barton, Jeremy L. Dewey, Todd R. Manion
-
Publication number: 20080148403Abstract: Automatic file replication and scanning for malware in a sharing environment is based on detection of file system changes. Only one client of the multi-client environment needs to include malware protection software for all clients to benefit. A file replication service for each client monitors a shared directory, and synchronizes files across clients at the file system driver level. When a new file appears in the shared directory of a client system, through this driver, the new file automatically gets replicated. A malware protection component operates by monitoring the directory for new or modified files. File replication causes automatic malware scanning on the client that has protection. When the file has been cleaned and re-written to the directory, the replication service senses that the file has changed and replicates the cleaned file to the other clients. Thus, the replication behavior produces a multiparty file scanning and cleansing protection scheme.Type: ApplicationFiled: December 13, 2006Publication date: June 19, 2008Applicant: Microsoft CorporationInventors: Todd Manion, Ryan Kim, Sandeep K. Singhal, Guhan Suriyanarayanan
-
Patent number: 7350074Abstract: An authentication mechanism uses a trusted people store that can be populated on an individual basis by users of computing devices, and can comprise certificates of entities that the user wishes to allow to act as certification authorities. Consequently, peer-to-peer connections can be made even if neither device presents a certificate or certificate chain signed by a third-party certificate authority, so long as each device present a certificate or certificate chain signed by a device present in the trusted people store. Once authenticated, a remote user can access trusted resources on a host device by having local processes mimic the user and create an appropriate token by changing the user's password or password type to a hash of the user's certificate and then logging the user on. The token can be referenced in a standard manner to determine whether the remote user is authorized to access the trusted resource.Type: GrantFiled: April 20, 2005Date of Patent: March 25, 2008Assignee: Microsoft CorporationInventors: Rohit Gupta, Todd R. Manion, Ravi T. Rao, Sandeep K. Singhal
-
Publication number: 20080016234Abstract: A system, apparatus, method, and computer-readable medium are provided for resolving a name to a network endpoint. According to one method, naming providers are registered with a computer system that are operative to resolve names to network endpoints for one or more domains. A provider can claim to be a primary provider or a secondary provider for a domain. A provider can also register as a wildcard provider. Once the providers have been registered, requests may be received to resolve an e-mail address into a network address of the corresponding computer system. In response to such a request, one or more of the registered providers are identified as being able to resolve names in the domain to network addresses. Requests are transmitted to the identified providers requesting that they resolve the e-mail address to a corresponding network address. The manner in which the requests are made depends upon whether authoritative results are required.Type: ApplicationFiled: July 14, 2006Publication date: January 17, 2008Applicant: Microsoft CorporationInventors: Noah Horton, Eliot J. Flannery, Gianluigi Nusca, Scott A. Senkeresty, Sandeep K. Singhal
-
Patent number: 7224979Abstract: A system and a method for delivering location sensitive services within a short-range wireless environment. Service proxies are employed to customize queried information and make services available according to user identity and location.Type: GrantFiled: May 3, 2001Date of Patent: May 29, 2007Assignee: Symantec CorporationInventors: Sandeep K. Singhal, Richard K. Neves, Darren M. Sanders
-
Patent number: 7191407Abstract: The invention is a method and apparatus for automatically opening files of particular types in a computer application program using certain attributes, such as window size and position, as dictated by user preferences based on the user's previous habits in opening files of the same type in that particular computer application program or based on properties of the file itself.Type: GrantFiled: July 12, 2000Date of Patent: March 13, 2007Assignee: International Business Machines CorporationInventors: Karen R. Kluttz, Sandeep K. Singhal, Thyra Rauch, David A. Schell
-
Patent number: 7086090Abstract: A method and apparatus for preventing exchange of viruses. Preexisting content is maintained for a device in a first location. New content associated with the device is placed in a second location, wherein the new content is an update to the preexisting content. The preexisting content and the new content are combined in a third location to form merged content. A check for viruses is performed on the merged content prior to performing a transfer of the new content.Type: GrantFiled: October 20, 2000Date of Patent: August 1, 2006Assignee: International Business Machines CorporationInventors: Frank Robertson Dawson, Jr., Yen-Min Huang, Brent A. Miller, Sandeep K. Singhal
-
Patent number: 7039946Abstract: A method, system, and computer program product for establishing security parameters that are used to exchange data on a secure connection. A piggy-backed key exchange protocol is defined, with which these security parameters are advantageously exchanged. By piggy-backing the key exchange onto other already-required messages (such as a client's HTTP GET request, or the server's response thereto), the overhead associated with setting up a secure browser-to-server connection is minimized. This technique is defined for a number of different scenarios, where the client and server may or may not share an encoding scheme, and is designed to maintain the integrity of application layer communication protocols. In one scenario, a client requests a server to propose a message encoding scheme. If the client has security-sensitive data to transmit with its request, it waits for the proposed scheme before sending this sensitive data to the server.Type: GrantFiled: October 12, 1999Date of Patent: May 2, 2006Assignee: International Business Machines CorporationInventors: Carl Binding, Stefan Georg Hild, Yen-Min Huang, Luke James O'Connor, Sandeep K. Singhal, Victor John Shoup, Michael Steiner
-
Patent number: 6965947Abstract: A method and apparatus for automated transcoder selection in a data processing system for transcoding content using a set of transcoders. A request is received for the content from a client, wherein the request includes a set of characteristics. A transcoder is selected from the set of transcoders having a best match to the set of characteristics. The content is transcoded using the transcoder to form transcoded content.Type: GrantFiled: October 6, 2000Date of Patent: November 15, 2005Assignee: International Business Machines CorporationInventors: Stefan Georg Hild, Sandeep K. Singhal
-
Patent number: 6842622Abstract: A method, computer program product, and system for answering a wireless telephone is provided. In one embodiment, the wireless telephone receives an incoming call and then determines whether the user has placed the phone in automatic call answering mode. If it is determined that automatic call answering has been selected by a user, then the phone answers the incoming call by providing the calling party with an indication that the user will take the call momentarily, such as by sending a voice message indicating that the user is busy but will take the call momentarily and instructing the calling party to not hang up. The phone also places itself into mute mode until the user has taken the incoming call to prevent the calling party from overhearing conversations that may be taking place around the user until the user has determined that it is convenient to take the phone call.Type: GrantFiled: June 28, 2001Date of Patent: January 11, 2005Assignee: International Business Machines CorporationInventors: Mark E. Peters, Sandeep K. Singhal
-
Patent number: 6775772Abstract: A method, system, and computer program product for establishing security parameters that are used to exchange data on a secure connection. A piggy-backed key exchange protocol is defined, with which these security parameters are advantageously exchanged. By piggy-backing the key exchange onto other already-required messages (such as a client's HTTP GET request, or the server's response thereto), the overhead associated with setting up a secure browser-to-server connection is minimized. This technique is defined for a number of different scenarios, where the client and server may or may not share an encoding scheme, and is designed to maintain the integrity of application layer communication protocols. In one scenario, a client and a server exchange secure messages using a trusted third party.Type: GrantFiled: October 12, 1999Date of Patent: August 10, 2004Assignee: International Business Machines CorporationInventors: Carl Binding, Stefan Georg Hild, Luke James O'Connor, Sandeep K. Singhal, Victor John Shoup, Michael Steiner
-
Patent number: 6775687Abstract: A method, system, and computer program product for exchanging supplemental information fields between a client and server. This supplemental information can then be used by the server to complete a client's request for content stored at a particular location. For example, the supplemental information may be used to provide a customized response, or for access control to sensitive data. Preferably, the REDIRECT message of the Hypertext Transfer Protocol (HTTP) or the Wireless Session Protocol (WSP) is used to request the supplemental information, encoding a comma-separated list of attribute names in a request header for the desired supplemental information. This solution is designed to be backward-compatible.Type: GrantFiled: October 12, 1999Date of Patent: August 10, 2004Assignee: International Business Machines CorporationInventors: Carl Binding, Stefan Georg Hild, Luke James O'Connor, Sandeep K. Singhal
-
Patent number: 6751731Abstract: A method, system, and computer program product for establishing security parameters that are used to exchange data on a secure connection. A piggy-backed key exchange protocol is defined, with which these security parameters are advantageously exchanged. By piggy-backing the key exchange onto other already-required messages (such as a client's HTTP GET request, or the server's response thereto), the overhead associated with setting up a secure browser-to-server connection is minimized. This technique is defined for a number of different scenarios, where the client and server may or may not share an encoding scheme, and is designed to maintain the integrity of application layer communication protocols. In one scenario, a client and server share a common message encoding scheme.Type: GrantFiled: October 12, 1999Date of Patent: June 15, 2004Assignee: International Business Machines CorporationInventors: Carl Binding, Stefan Georg Hild, Yen-Min Huang, Luke James O'Connor, Sandeep K. Singhal, Victor John Shoup, Michael Steiner
-
Patent number: 6708217Abstract: A method, system, and computer-readable code for receiving and demultiplexing multi-modal document content. A demultiplexing component receives HTTP (HyperText Transfer Protocol) or WSP (Wireless Service Protocol) response messages containing multipart documents from a document server. Each content type of the multipart document is located by this component and used to locate an appropriate content renderer. A content registry, which stores mappings between content types and renderers capable of processing that content type, may be consulted to locate an appropriate renderer. Or, a dynamic query message may be issued on a network to detect any available renderers. The document content corresponding to the content type is then distributed to the located renderer, which renders it to the user.Type: GrantFiled: January 5, 2000Date of Patent: March 16, 2004Assignee: International Business Machines CorporationInventors: James C. Colson, Sandeep K. Singhal