Patents by Inventor Abhishek Abhishek

Abhishek Abhishek has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20050091357
    Abstract: A system and method for carrying out network and interface selections across multiple media is disclosed. The disclosed system facilitates automated network interface configuration decision-making that spans a set of networks supporting communications via differing media. A set of media specific modules associated with differing communications media acquire network interface status/capabilities information. A rules engine thereafter applies a designated network selection rule(s) to the acquired network interface status/capabilities information, and any other appropriate parameters attributable to either an interface or network, to select one or more networks and interfaces with which to establish/maintain a connection.
    Type: Application
    Filed: October 24, 2003
    Publication date: April 28, 2005
    Applicant: Microsoft Corporation
    Inventors: Anton Krantz, Warren Barkley, Dan Knudson, Florin Teodorescu, Mohammad Alam, Vivek Bhanu, Edwin Hernandez-Mondragon, Taroon Mandhana, Timothy Moore, Abhishek Abhishek
  • Publication number: 20050010755
    Abstract: A supplicant on a first computing system authenticating the first computing system to an authenticator on a second computing system in a manner that is independent of the underlying data link and physical layer protocols. The first computing system establishes a data link layer connection with the second computing system using specific data link and physical layer protocols. The supplicant on the first computing system and the authenticator on the second computing system then receive an indication that the data link layer connection has been established. The supplicant determines that authentication is to occur with the authenticator, and vice versa. The supplicant (and the authenticator) then instructs that authentication is to occur in a manner that is independent of the underlying data link and physical layer protocols used to establish the connection.
    Type: Application
    Filed: June 3, 2003
    Publication date: January 13, 2005
    Inventors: Sachin Sheth, Mohammad Alam, Arun Ayyagari, Abhishek Abhishek
  • Publication number: 20040246922
    Abstract: The principles of the present invention provides for making roaming decisions based on association qualities between a wireless device and one or more wireless access points. From time to time, the wireless device updates a current association quality for a current wireless access point, for example, based on relative signal strength, observed error rates, and current wireless access point workload. Similarly, the wireless device updates association qualities for any other wireless access points the wireless device can communicate with. If the current association quality falls below a quality threshold, the wireless device roams to attempt to associate with another wireless access point. The wireless device ranks compatibly configured wireless access points based at least in part on corresponding association qualities. The wireless device can attempt to associate with higher ranked wireless access points before lower ranked wireless access points.
    Type: Application
    Filed: June 3, 2003
    Publication date: December 9, 2004
    Inventors: Jiandong Ruan, Arun Ayyagari, Abhishek Abhishek
  • Publication number: 20040246937
    Abstract: The principles of the present invention provide for providing contention free quality of service to wireless stations. A station indicates to an access point that higher priority data (e.g., time constrained data) is to be sent to the access point. The access point receives the indication and selects a slot time for the station based on the number of other stations that have also indicated higher priority data. A slot time is selected such that the station can check for access to a common wireless link before any stations with lower priority data (e.g., data without time constraints). The access point sends the selected slot time to the station and the station receives the slot time. When the station receives an indication that an application has higher priority data to send, the station checks the common wireless link for availability at the selected slot time.
    Type: Application
    Filed: June 3, 2003
    Publication date: December 9, 2004
    Inventors: Francis Duong, Abhishek Abhishek, Arun Ayyagari
  • Publication number: 20040185845
    Abstract: An architecture and methods for extending the depth of a WLAN to a four-level hierarchal access point structure including wireless access points. The wireless access points in the WLAN can be networked by scanning for a network, collecting one or more packets that identify the network from one or more access points, each packet including an address identifying an ancestry of the access points to an ancestral wired access point; and applying an access point selection algorithm to configure a parent access point. The architecture includes a scanning object configured to issue a scan request to a network interface and collect access point data; a selection object configured to filter and sort the collected access point data; an authentication state machine configured to perform authentication and validate; and an association state machine configured to compose a packet including hierarchical data indicative of access point ancestry to a conventional access point.
    Type: Application
    Filed: February 28, 2003
    Publication date: September 23, 2004
    Applicant: Microsoft Corporation
    Inventors: Abhishek Abhishek, Arun Ayyagari, Hui Shen
  • Publication number: 20040153676
    Abstract: A method and system for managing power consumption in a portable computing device having a network interface module is presented. A power management module receives inputs from other modules and determines when the network interface module is to be put in a doze state for a predetermined number of beacon intervals to conserve power consumption in the network interface module. The network interface module in a device that is associated with a network is put in the doze state after an event has occurred including when a scan has been performed, after a delayed sleep timer has expired, and after a beacon transmission has been completed and no traffic is buffered for the device. The delayed sleep-time is set based on the estimated round trip time of a packet.
    Type: Application
    Filed: January 31, 2003
    Publication date: August 5, 2004
    Applicant: Microsoft Corporation
    Inventors: Anton W. Krantz, Abhishek Abhishek, Arun Ayyagari, Jiandong Ruan, Timothy M. Moore, Avi R. Geiger, Warren V. Barkley
  • Publication number: 20040120278
    Abstract: A method and system for scanning in a wireless device having a wireless network interface card (NIC) is presented. The system has a scanning history table for storing scanning results and a scanning engine that adjusts the scanning period based upon a history of scanning results and commands the NIC to scan for available networks after the period has expired. The engine receives scan results from the NIC, stores the scan results in the scanning history table, determines a scanning period based upon a history of scan results, sets the scanning period, and commands the NIC to scan for available networks after the scanning period has expired. The engine is programmed to set the scanning period using an exponential function and to reset the scanning period to a default period if the scan results are different from a prior scan result or if a triggering event is received.
    Type: Application
    Filed: December 18, 2002
    Publication date: June 24, 2004
    Applicant: Microsoft Corporation
    Inventors: Anton W. Krantz, Abhishek Abhishek, Arun Ayyagari, Jiandong Ruan
  • Publication number: 20040103278
    Abstract: A software based wireless infrastructure system is provided. The system has a driver that communicates with the network stack and a network interface card (NIC), a station server in communication with the station driver and an 802.1X supplicant or an 802.1X authenticator. Each NIC provides station and/or access point functionality support. The driver drops packets that have been received if the packet has not been authenticated and associated. Packets that have been fragmented or encrypted are unfragmented and decrypted. An association manager is used in conjunction with a configuration table manager to associate stations and access points via management packets. A manager receives 802.1X data packets from the packet processor and sends them up to a station server that communicates with user mode applications and an 802.1X supplicant or an 802.1X authenticator that are used to authenticate and deauthenticate stations and access,points. APIs are provided to enable communication between the components.
    Type: Application
    Filed: November 27, 2002
    Publication date: May 27, 2004
    Applicant: Microsoft Corporation
    Inventors: Abhishek Abhishek, Arun Ayyagari, Hui Shen, Krishna Ganugapati, Jiandong Ruan
  • Patent number: 6697857
    Abstract: A method of network security policy administration for a network client uses a finite state machine to maintain the security policy information of the network client. Security policy information may originate in a remote source such a directory storage as well as, or alternatively, locally in cache and local store locations. The finite state machine has four states, Initial, DS, Cache, and Local, and transitions between states responsive to the availability of security policy information from the various policy information sources. Furthermore, security policy updates occur via a differencing mechanism, wherein only filters that have changed are updated, minimizing impact on unchanged policy filters and the traffic protected by them, and minimizing lulls in policy coverage.
    Type: Grant
    Filed: June 9, 2000
    Date of Patent: February 24, 2004
    Assignee: Microsoft Corporation
    Inventors: William H. Dixon, Krishna Ganugapati, Abhishek Abhishek