Patents by Inventor Sunava Dutta

Sunava Dutta has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 9178887
    Abstract: A strategy is described for controlling access to a resource which is shared between a trusted environment and an untrusted environment. The resource can represent a clipboard module. The trusted environment can include trusted client functionality, while the untrusted environment can include potentially untrusted network-accessible entities (e.g., websites) which seek to access the clipboard module. The strategy provides a security presentation which notifies a user when a network-accessible entity is attempting to access the clipboard module, identifying the entity which is making the attempt, together with the nature of the information being read or added to the clipboard module. The security presentation invites the user to approve or deny the particular attempt (or all such attempts from the network-accessible entity), and/or clear the clipboard module. The security presentation does not block the user's interaction with other parts of a user interface presentation.
    Type: Grant
    Filed: May 6, 2013
    Date of Patent: November 3, 2015
    Assignee: Microsoft Technology Licensing, LLC
    Inventors: Sunava Dutta, Zhenbin Xu
  • Patent number: 8949344
    Abstract: Various embodiments enable local web applications to communicate asynchronously with web based services and applications based on a local device's current state and a user's communications preferences. In at least some embodiments, a synchronization engine receives a message in a “Web Inbox” from a web based service or application. In at least some embodiments, the synchronization engine notifies a local web application of the message, sends the message to the web application, and/or loads the web application if it is not in session. The web application's response to the message may be transferred to a “Web Outbox” where it resides until being sent to the web service. The synchronization engine then determines a time to transmit the response to the web service by querying the local device for its current state and a user's communication preferences.
    Type: Grant
    Filed: September 15, 2008
    Date of Patent: February 3, 2015
    Assignee: Microsoft Corporation
    Inventors: Eric M. Lawrence, Sunava Dutta, Ganesh Ananthanarayanan
  • Publication number: 20130247227
    Abstract: A strategy is described for controlling access to a resource which is shared between a trusted environment and an untrusted environment. The resource can represent a clipboard module. The trusted environment can include trusted client functionality, while the untrusted environment can include potentially untrusted network-accessible entities (e.g., websites) which seek to access the clipboard module. The strategy provides a security presentation which notifies a user when a network-accessible entity is attempting to access the clipboard module, identifying the entity which is making the attempt, together with the nature of the information being read or added to the clipboard module. The security presentation invites the user to approve or deny the particular attempt (or all such attempts from the network-accessible entity), and/or clear the clipboard module. The security presentation does not block the user's interaction with other parts of a user interface presentation.
    Type: Application
    Filed: May 6, 2013
    Publication date: September 19, 2013
    Applicant: Microsoft Corporation
    Inventors: Sunava Dutta, Zhenbin Xu
  • Patent number: 8438653
    Abstract: A strategy is described for controlling access to a resource which is shared between a trusted environment and an untrusted environment. The resource can represent a clipboard module. The trusted environment can include trusted client functionality, while the untrusted environment can include potentially untrusted network-accessible entities (e.g., websites) which seek to access the clipboard module. The strategy provides a security presentation which notifies a user when a network-accessible entity is attempting to access the clipboard module, identifying the entity which is making the attempt, together with the nature of the information being read or added to the clipboard module. The security presentation invites the user to approve or deny the particular attempt (or all such attempts from the network-accessible entity), and/or clear the clipboard module. The security presentation does not block the user's interaction with other parts of a user interface presentation.
    Type: Grant
    Filed: April 10, 2007
    Date of Patent: May 7, 2013
    Assignee: Microsoft Corporation
    Inventors: Sunava Dutta, Zhenbin Xu
  • Publication number: 20100070586
    Abstract: Various embodiments enable local web applications to communicate asynchronously with web based services and applications based on a local device's current state and a user's communications preferences. In at least some embodiments, a synchronization engine receives a message in a “Web Inbox” from a web based service or application. In at least some embodiments, the synchronization engine notifies a local web application of the message, sends the message to the web application, and/or loads the web application if it is not in session. The web application's response to the message may be transferred to a “Web Outbox” where it resides until being sent to the web service. The synchronization engine then determines a time to transmit the response to the web service by querying the local device for its current state and a user's communication preferences.
    Type: Application
    Filed: September 15, 2008
    Publication date: March 18, 2010
    Applicant: Microsoft Corporation
    Inventors: Eric M. Lawrence, Sunava Dutta, Ganesh Ananthanarayanan
  • Publication number: 20090132713
    Abstract: An anonymous cross-domain data request message is sent to a target domain, the request message including a cross-domain data request header. A cross-domain response message is also received from the target domain if cross-domain data requests are supported by the computing device and if the data requested by the anonymous cross-domain data request message is available for cross-domain data requests. The cross-domain response message includes a cross-domain request allowed header as well as the data requested by the anonymous cross-domain data request message. The requested data can be thoroughly examined, without restriction, by a Web page initiating the request. The target domain is a different domain than the domain that includes a Web page that requested that the anonymous cross-domain data request message be sent.
    Type: Application
    Filed: November 20, 2007
    Publication date: May 21, 2009
    Applicant: MICROSOFT CORPORATION
    Inventors: Sunava Dutta, Zhenbin Xu
  • Publication number: 20080256601
    Abstract: A strategy is described for controlling access to a resource which is shared between a trusted environment and an untrusted environment. The resource can represent a clipboard module. The trusted environment can include trusted client functionality, while the untrusted environment can include potentially untrusted network-accessible entities (e.g., websites) which seek to access the clipboard module. The strategy provides a security presentation which notifies a user when a network-accessible entity is attempting to access the clipboard module, identifying the entity which is making the attempt, together with the nature of the information being read or added to the clipboard module. The security presentation invites the user to approve or deny the particular attempt (or all such attempts from the network-accessible entity), and/or clear the clipboard module. The security presentation does not block the user's interaction with other parts of a user interface presentation.
    Type: Application
    Filed: April 10, 2007
    Publication date: October 16, 2008
    Applicant: Microsoft Corporation
    Inventors: Sunava Dutta, Zhenbin Xu