Patents by Inventor Adrian Frei

Adrian Frei has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 11882113
    Abstract: The disclosed technology is generally directed to web authentication. In one example of the technology, authentication of a broker is obtained with an identity provider. Obtaining the authentication includes at least communication between the broker and a top-level frame and communication between the broker and the identity provider. The broker is executing in a descendant frame of the top-level frame. The top-level frame and the broker are hosted on different domains. At the broker, from an embedded application that is executing on another descendant frame of the top-level frame, a token request is received. Via the broker, a token is requested from the identity provider. The token is associated with an authorization of secure delegated remote access of at least one resource by the embedded application. At the broker, from the identity provider, the token is received. Via the broker, the token is provided to the embedded application.
    Type: Grant
    Filed: June 29, 2021
    Date of Patent: January 23, 2024
    Assignee: Microsoft Technology Licensing, LLC
    Inventors: Hirsch Patrick Singhal, Pavel Michailov, Jason Donchey Nutter, Adrian Frei, William Alden Bartlett, Thomas Lyle Norling, Prithviraj Sanjeev Kanherkar
  • Patent number: 11677739
    Abstract: The disclosed technology is generally directed to web authentication. In one example of the technology, authentication of a broker with an identity provider is initiated. The broker is a first application that is executing in a top-level frame. At the broker, from a second application that is executing on a first descendent frame that is a descendant frame of the top-level frame, a token request is received. Via the broker, a first token is requested from the identity provider on behalf of the second application. The first token is associated with an authorization of secure delegated remote access of at least one resource by the second application. At the broker, from the identity provider, the first token is received. Via the broker, the first token is provided to the second application.
    Type: Grant
    Filed: June 25, 2021
    Date of Patent: June 13, 2023
    Assignee: Microsoft Technology Licensing, LLC
    Inventors: Hirsch Patrick Singhal, Pavel Michailov, Jason Donchey Nutter, Adrian Frei, William Alden Bartlett, Thomas Lyle Norling, Shiung-Vei Yong, Prithviraj Sanjeev Kanherkar
  • Publication number: 20220417233
    Abstract: The disclosed technology is generally directed to web authentication. In one example of the technology, authentication of a broker is obtained with an identity provider. Obtaining the authentication includes at least communication between the broker and a top-level frame and communication between the broker and the identity provider. The broker is executing in a descendant frame of the top-level frame. The top-level frame and the broker are hosted on different domains. At the broker, from an embedded application that is executing on another descendant frame of the top-level frame, a token request is received. Via the broker, a token is requested from the identity provider. The token is associated with an authorization of secure delegated remote access of at least one resource by the embedded application. At the broker, from the identity provider, the token is received. Via the broker, the token is provided to the embedded application.
    Type: Application
    Filed: June 29, 2021
    Publication date: December 29, 2022
    Inventors: Hirsch Patrick SINGHAL, Pavel MICHAILOV, Jason Donchey NUTTER, Adrian FREI, William Alden BARTLETT, Thomas Lyle NORLING, Prithviraj Sanjeev KANHERKAR
  • Publication number: 20220417021
    Abstract: The disclosed technology is generally directed to web authentication. In one example of the technology, authentication of a broker with an identity provider is initiated. The broker is a first application that is executing in a top-level frame. At the broker, from a second application that is executing on a first descendent frame that is a descendant frame of the top-level frame, a token request is received. Via the broker, a first token is requested from the identity provider on behalf of the second application. The first token is associated with an authorization of secure delegated remote access of at least one resource by the second application. At the broker, from the identity provider, the first token is received. Via the broker, the first token is provided to the second application.
    Type: Application
    Filed: June 25, 2021
    Publication date: December 29, 2022
    Inventors: Hirsch Patrick SINGHAL, Pavel MICHAILOV, Jason Donchey NUTTER, Adrian FREI, William Alden BARTLETT, Thomas Lyle NORLING, Shiung-Vei YONG, Prithviraj Sanjeev KANHERKAR
  • Publication number: 20220368528
    Abstract: Authentic remote presence for a user located at a source computer is established at a target computer without requiring transmission of the user password from the source computer to the target computer, and without requiring that the user be previously credentialed at the target. The presence established at the target computer will be recognized by a security domain identity provider as authentic, allowing the user to work remotely on the source computer as if the user was physically present at the target computer even when the source and target are miles apart. The remote access presence may be bound to the particular source and target computers, such that the presence credentials can only be used for remote access from the source through the target into the security domain. The remote access functionality will work with a wide variety of operating systems, on both desktop and mobile platforms.
    Type: Application
    Filed: May 14, 2021
    Publication date: November 17, 2022
    Inventors: Ramachandra Ravitej VENNAPUSA, Sai Pujitha GUTHI RAJENDRAN, Sergii GUBENKO, Balaji KRISH, Aleksandr TOKAREV, Adrian FREI
  • Patent number: 10693873
    Abstract: Authenticating a secure session between a first user entity and an identity provider using a second user entity. The method includes receiving a request for a session from an entity that purports to be the first user entity. The method further includes sending authentication context from the request, and wherein the authentication context for the request arrives at the second user entity. The method further includes receiving an indication that the authentication context has been verified. As a result, the method further includes authenticating a secure session between a first user entity and an identity provider or approving a secure transaction.
    Type: Grant
    Filed: July 20, 2018
    Date of Patent: June 23, 2020
    Assignee: MICROSOFT TECHNOLOGY LICENSING, LLC
    Inventors: Tarek B. Kamel, Adrian Frei, James Shang Kai Chou
  • Publication number: 20190182245
    Abstract: Authenticating a secure session between a first user entity and an identity provider using a second user entity. The method includes receiving a request for a session from an entity that purports to be the first user entity. The method further includes sending authentication context from the request, and wherein the authentication context for the request arrives at the second user entity. The method further includes receiving an indication that the authentication context has been verified. As a result, the method further includes authenticating a secure session between a first user entity and an identity provider or approving a secure transaction.
    Type: Application
    Filed: July 20, 2018
    Publication date: June 13, 2019
    Inventors: Tarek B. Kamel, Adrian Frei, James Shang Kai Chou
  • Patent number: 10142107
    Abstract: Binding a security token to a client token binder, such as a trusted platform module, is provided. A bound security token can only be used on the client on which it was obtained. A secret binding key (kbind) is established between the client and an STS. The client derives a key (kmac) from kbind, signs a security token request with kmac, and instructs the STS to bind the requested security token to kbind. The STS validates the request by deriving kmac using a client-provided nonce and kbind to MAC the message and compare the MAC values. If the request is validated, the STS generates a response comprising the requested security token, derives two keys from kbind: one to sign the response and one to encrypt the response, and sends the response to the client. Only a device comprising kbind is enabled to use the bound security token, providing increased security.
    Type: Grant
    Filed: December 31, 2015
    Date of Patent: November 27, 2018
    Assignee: MICROSOFT TECHNOLOGY LICENSING, LLC
    Inventors: Adrian Frei, Tarek B. Kamel, Guruprasad B. Aphale, Sankara Narayanan Venkataraman, Xiaohong Su, Yordan Rouskov, Vijay G. Bharadwaj
  • Patent number: 10050963
    Abstract: Authenticating a secure session between a first user entity and an identity provider using a second user entity. The method includes receiving a request for a session from an entity that purports to be the first user entity. The method further includes sending authentication context from the request, and wherein the authentication context for the request arrives at the second user entity. The method further includes receiving an indication that the authentication context has been verified. As a result, the method further includes authenticating a secure session between a first user entity and an identity provider or approving a secure transaction.
    Type: Grant
    Filed: March 29, 2016
    Date of Patent: August 14, 2018
    Assignee: Microsoft Technology Licensing, LLC
    Inventors: Tarek B. Kamel, Adrian Frei, James Shang Kai Chou
  • Publication number: 20180124599
    Abstract: An LDE authentication system is provided for granting to an LDE device access to a resource of a resource provider. In accordance with the LDE authentication system, an LDE device sends to the resource provider a request to access the resource. The LDE device receives an indication sent by the resource provider to authenticate the resource provider using an identity provider. A non-LDE device sends to the identity provider credentials for use in authentication and receives an authentication code sent by the identity provider that indicates successful authentication by the identity provider. The LDE device receives the authentication code that was received by the non-LDE device. The LDE device sends to the identity provider the authentication code and receives an authentication token sent by the identity provider in response to receiving the authentication code. The LDE device sends to the resource provider the authentication token and accesses the resource.
    Type: Application
    Filed: November 2, 2016
    Publication date: May 3, 2018
    Inventors: Brandon Werner, Adrian Frei
  • Patent number: 9787654
    Abstract: Authenticating issues involving the re-authenticating of a first device that was previously authenticated are resolved by use of a second device which receives a notification of the failed authentication. The second device sends a response to the notification which is operable to facilitate re-authentication of the primary device and without requiring the user to provide credentials at the first device prior to obtaining the re-authentication at the primary device and/or without requiring the primary device to obtain a code to be entered into the secondary device and/or prior to the primary device being notified of a failure condition associated with the primary device.
    Type: Grant
    Filed: October 29, 2015
    Date of Patent: October 10, 2017
    Assignee: Microsoft Technology Licensing, LLC
    Inventors: Benjamin R. Vincent, Adrian Frei, James Shang Kai Chou
  • Publication number: 20170289150
    Abstract: Authenticating a secure session between a first user entity and an identity provider using a second user entity. The method receiving a request for a session from an entity that purports to be the first user entity. The method further includes sending authentication context from the request, and wherein the authentication context for the request arrives at the second user entity. The method further includes receiving an indication that the authentication context has been verified. As a result, the method further includes authenticating a secure session between a first user entity and an identity provider or approving a secure transaction.
    Type: Application
    Filed: March 29, 2016
    Publication date: October 5, 2017
    Inventors: Tarek B. Kamel, Adrian Frei, James Shang Kai Chou
  • Publication number: 20170195121
    Abstract: Binding a security token to a client token binder, such as a trusted platform module, is provided. A bound security token can only be used on the client on which it was obtained. A secret binding key (kbind) is established between the client and an STS. The client derives a key (kmac) from kbind, signs a security token request with kmac, and instructs the STS to bind the requested security token to kbind. The STS validates the request by deriving kmac using a client-provided nonce and kbind to MAC the message and compare the MAC values. If the request is validated, the STS generates a response comprising the requested security token, derives two keys from kbind: one to sign the response and one to encrypt the response, and sends the response to the client. Only a device comprising kbind is enabled to use the bound security token, providing increased security.
    Type: Application
    Filed: December 31, 2015
    Publication date: July 6, 2017
    Applicant: Microsoft Technology Licensing, LLC.
    Inventors: Adrian Frei, Tarek B. Kamel, Guruprasad B. Aphale, Sankara Narayanan Venkataraman, Xiaohong Su, Yordan Rouskov, Vijay G. Bharadwaj
  • Patent number: 9699180
    Abstract: Providing access to a cloud service includes a system receiving an application request to access a cloud service. In response, the system sends an identity provider (IP) a token request, comprising an application identifier (ID), an operating system (OS) cloud credential associated with login credentials of a user of an OS hosting the application, and a cloud service ID of the cloud service. Based on sending the token request, and on the IP authenticating the user and verifying the application ID is valid, the system receives a token from the IP. The token, which is signed with an IP signature, comprises the cloud service ID, the application ID, and a user assigned ID associated with the cloud service. The system provides the token to the application for submission to a cloud service provider for access, and obtains cloud service access based on the cloud service provider validating the IP signature.
    Type: Grant
    Filed: July 26, 2016
    Date of Patent: July 4, 2017
    Assignee: Microsoft Technology Licensing, LLC
    Inventors: Allan Edwin Wetter, Adrian Frei, Peter M. Tsang, Yordan Rouskov
  • Publication number: 20170126640
    Abstract: Authenticating issues involving the re-authenticating of a first device that was previously authenticated are resolved by use of a second device which receives a notification of the failed authentication. The second device sends a response to the notification which is operable to facilitate re-authentication of the primary device and without requiring the user to provide credentials at the first device prior to obtaining the re-authentication at the primary device and/or without requiring the primary device to obtain a code to be entered into the secondary device and/or prior to the primary device being notified of a failure condition associated with the primary device.
    Type: Application
    Filed: October 29, 2015
    Publication date: May 4, 2017
    Inventors: Benjamin R. Vincent, Adrian Frei, James Shang Kai Chou
  • Publication number: 20170054712
    Abstract: One or more techniques and/or systems are provided for obtaining access to a cloud service. In particular, a user may log into a client device using an operating system (OS) cloud login ID. The user may access cloud services (e.g., a music streaming service, a data storage service, etc.) through applications executing on the client device using merely the OS cloud login ID without providing additional login credentials specific to the cloud services. A client side application may request a token to access a cloud service. The token may be generated by an identity provider based upon the identity provider verifying an application ID identifying the application, a cloud service ID identifying the cloud service and/or OS cloud credentials. In this way, the application may present the token to a cloud service provider for verification to gain access to the cloud service hosted by the cloud service provider.
    Type: Application
    Filed: July 26, 2016
    Publication date: February 23, 2017
    Inventors: Allan Edwin Wetter, Adrian Frei, Peter M. Tsang, Yordan Rouskov
  • Patent number: 9521146
    Abstract: In one embodiment, a user device 110 may access a network service 122 using a secure cookie 300. A high trust process may create an authentication proof 360 using a secure key. The high trust process may provide a browsing token 310 and the authentication proof 360 to a low trust process to send to an authentication service 124.
    Type: Grant
    Filed: August 21, 2013
    Date of Patent: December 13, 2016
    Assignee: Microsoft Technology Licensing, LLC
    Inventors: Sanket Kaluskar, Dejan Subotic, Tarek Kamel, Adrian Frei, Guruprasad Aphale, Allan Wetter
  • Patent number: 9418216
    Abstract: One or more techniques and/or systems are provided for obtaining access to a cloud service. In particular, a user may log into a client device using an operating system (OS) cloud login ID. The user may access cloud services (e.g., a music streaming service, a data storage service, etc.) through applications executing on the client device using merely the OS cloud login ID without providing additional login credentials specific to the cloud services. A client side application may request a token to access a cloud service. The token may be generated by an identity provider based upon the identity provider verifying an application ID identifying the application, a cloud service ID identifying the cloud service and/or OS cloud credentials. In this way, the application may present the token to a cloud service provider for verification to gain access to the cloud service hosted by the cloud service provider.
    Type: Grant
    Filed: July 21, 2011
    Date of Patent: August 16, 2016
    Assignee: Microsoft Technology Licensing, LLC
    Inventors: Allan Edwin Wetter, Adrian Frei, Peter M. Tsang, Yordan Rouskov
  • Publication number: 20160142409
    Abstract: Methods, systems, apparatuses, and computer program products are provided for authentication of users in a service-to-service context. At a first service, a user authentication token is received from a client device that was obtained from an identity provider. The user authentication token was received to enable access to the first service by a user. The user is authenticated based on the user authentication token. A second service is determined to be needed to be accessed by the first service on behalf of the user. The user authentication token is converted into a proxy token that is not convertible back to the user authentication token. The proxy token is forwarded from the first service to the second service to enable access to the second service. A response is received by the first service from the second service due to the user having been authenticated based on the proxy token.
    Type: Application
    Filed: November 18, 2014
    Publication date: May 19, 2016
    Inventors: Adrian Frei, Tarek B. Kamel, Allan Edwin Wetter, Benjamin R. Vincent
  • Publication number: 20150058621
    Abstract: In one embodiment, a user device 110 may access a network service 122 using a secure cookie 300. A high trust process may create an authentication proof 360 using a secure key. The high trust process may provide a browsing token 310 and the authentication proof 360 to a low trust process to send to an authentication service 124.
    Type: Application
    Filed: August 21, 2013
    Publication date: February 26, 2015
    Applicant: Microsoft Corporation
    Inventors: Sanket Kaluskar, Dejan Subotic, Tarek Kamel, Adrian Frei, Guruprasad Aphale, Allan Wetter