Patents by Inventor Andrew Baron
Andrew Baron has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 10219219Abstract: The disclosure generally relates to identifying a Bluetooth Low Energy (BTLE) enabled Wi-Fi network receiver and automatically connecting to the BTLE-enabled network receiver via a Wi-Fi signal without using a Wi-Fi scanning operation. In some aspects, an initial connection may be established between the network receiver and a BTLE-enabled device during which the Wi-Fi scanning operation of the device is disabled. Thereafter, the device may automatically detect the BTLE-enabled network receiver via BTLE signal and automatically connect to the network receiving using a Wi-Fi signal without using the Wi-Fi scanning operation. In this way, the battery life of the device may be conserved by disabling the Wi-Fi scanning operation. Although the electronic device may be within the Wi-Fi range of the network receiver, the device may not search for or connect to the network receiver if it is outside of the BTLE range of the network receiver.Type: GrantFiled: May 23, 2017Date of Patent: February 26, 2019Assignee: Microsoft Technology Licensing, LLCInventors: Andrew Baron, Vishal Mhatre, Gianluigi Nusca, Andrew Cunningham, Matthew Durak
-
Publication number: 20180213478Abstract: The disclosure generally relates to identifying a Bluetooth Low Energy (BTLE) enabled Wi-Fi network receiver and automatically connecting to the BTLE-enabled network receiver via a Wi-Fi signal without using a Wi-Fi scanning operation. In some aspects, an initial connection may be established between the network receiver and a BTLE-enabled device during which the Wi-Fi scanning operation of the device is disabled. Thereafter, the device may automatically detect the BTLE-enabled network receiver via BTLE signal and automatically connect to the network receiving using a Wi-Fi signal without using the Wi-Fi scanning operation. In this way, the battery life of the device may be conserved by disabling the Wi-Fi scanning operation. Although the electronic device may be within the Wi-Fi range of the network receiver, the device may not search for or connect to the network receiver if it is outside of the BTLE range of the network receiver.Type: ApplicationFiled: May 23, 2017Publication date: July 26, 2018Applicant: Microsoft Technology Licensing, LLCInventors: Andrew BARON, Vishal MHATRE, Gianluigi NUSCA, Andrew CUNNINGHAM, Matthew DURAK
-
Patent number: 9270681Abstract: A method and apparatus for managing network profiles and/or access to a network. Network profiles stored in a computer may be deleted and/or a connection to a wireless network may be disabled when a corresponding access period for the network has been exhausted. The access period may define an amount of time, a number of connections, a number of bits or packets of information, or other measure of connectivity to a network and/or maintenance of profile information related to the network that may be limited in some fashion.Type: GrantFiled: October 2, 2007Date of Patent: February 23, 2016Assignee: Microsoft Technology Licensing, LLCInventors: Andrew Baron, Taroon Mandhana, Amir Zohrenejad
-
Patent number: 8776187Abstract: Guest user are enabled to access network resources through an enterprise network using a guest user account. A guest user account may be created for a guest for a limited time. Guest account credentials of the guest account may be provided to the guest to use the guest account using any of a variety of techniques described herein, for example, by scanning a guest access card, credit card or mobile telephone of guest user, and providing the guest account credentials to the user based on the information obtained. A guest access management server may be configured to generate and maintain guest accounts, authenticate guest users, and track and log guest activity. A VLAN technology may be used to separate guest traffic from host enterprise traffic on the host enterprise network. After a guest user is authenticated, communications to and from the guest user may be routed to a guest VLAN.Type: GrantFiled: July 21, 2006Date of Patent: July 8, 2014Assignee: Microsoft CorporationInventors: Amer A. Hassan, Andrew Baron, Christian Huitema, Deyun Wu, Mahmood H. Khadeer, Vishesh M. Parikh, Wajih Yahyaoui
-
Patent number: 8307411Abstract: An EAP-based authentication framework is provided that decouples credential acquisition from EAP methods that use credentials for authentication. An application may request from an EAP method parameters of credentials required by the EAP method. In response, the EAP method provides credential parameters, which may then be used by the application to acquire credentials consistent with the parameters from the user or other entity. The framework enables an application to request credentials in a context specific way. In addition, the application may simultaneously obtain credentials used in multiple authentication operations through a single user interface, or retain credentials for later use without further prompting a user such that a Single Sign-on user experience may be implemented. Additionally, the application can obtain credentials from a device so that the device may gain network access without requiring a user logon.Type: GrantFiled: February 9, 2007Date of Patent: November 6, 2012Assignee: Microsoft CorporationInventors: Andrew Baron, Taroon Mandhana, Saurabh Mahajan, Prashant Malik
-
Patent number: 8165101Abstract: It is determined whether a mobile user device is within transmission range of one or hidden networks. A list of known networks may be accessed, the list including broadcast and hidden networks. For the hidden networks, the network connection component may instruct a network interface to actively probe for the hidden networks. If the response is received for a communication corresponding to a particular network, then it may be considered that the mobile user interface is within transmission range of the hidden network. If auto-connection logic is activated, a preference order may be applied to select which of the detected broadcasts and/or hidden networks to connect. A user interface displays broadcast and hidden networks determined to be within transmission range of the mobile user device. The user device also displays hidden networks for which it has not yet been attempted to determine whether the hidden networks are in range.Type: GrantFiled: September 29, 2006Date of Patent: April 24, 2012Assignee: Microsoft CorporationInventors: Abhishek Abhishek, Amir Zohrenejad, Yue Chen, Andrew Baron, Yi Lu
-
Publication number: 20110151770Abstract: Capability checking to examine a computing device's capabilities to determine if the device supports a software defined radio to communicate according to a specific wireless protocol. Applicants have appreciated that as the reliance on software defined radio increases, numerous potential options may be available to a user for performing wireless communication. Applicants have appreciated the desirability of providing the ability to discover the capabilities of a user's computer to determine whether it is capable of supporting one or more wireless protocols.Type: ApplicationFiled: February 28, 2011Publication date: June 23, 2011Applicant: Microsoft CorporationInventors: Amer A. Hassan, Vishesh M. Parikh, Thomas W. Kuehnel, Deyun Wu, Christian Huitema, David Jones, Andrew Baron
-
Patent number: 7941831Abstract: A framework is provided that decouples credential acquisition from authentication processes using those credentials in a way that facilitates dynamic update of credential information. An authentication component may receive credential information for authentication of a user or a device for access to a resource. During interactions with an external authenticator, the authentication component may identify that updated credential information is required and issue a request to the application including credential parameters defining the updated credential information. An application component receiving the request may acquire updated credential information from a user or another entity. In addition, the authentication method may issue notifications to the application. The framework enables the application to update credentials in a context specific way.Type: GrantFiled: February 9, 2007Date of Patent: May 10, 2011Assignee: Microsoft CorporationInventors: Taroon Mandhana, Saurabh Mahajan, Andrew Baron, Prashant Malik, Amir Zohrenejad, Karthik Ranganathan
-
Patent number: 7920823Abstract: Capability checking to examine a computing device's capabilities to determine if the device supports a software defined radio to communicate according to a specific wireless protocol. Applicants have appreciated that as the reliance on software defined radio increases, numerous potential options may be available to a user for performing wireless communication. Applicants have appreciated the desirability of providing the ability to discover the capabilities of a user's computer to determine whether it is capable of supporting one or more wireless protocols.Type: GrantFiled: December 8, 2006Date of Patent: April 5, 2011Assignee: Microsoft CorporationInventors: Amer A. Hassan, Vishesh M. Parikh, Thomas W. Kuehnel, Deyun Wu, Christian Huitema, David Jones, Andrew Baron
-
Patent number: 7874006Abstract: Guest user are enabled to access network resources through an enterprise network using a guest user account. A guest user account may be created for a guest for a limited time. Guest account credentials of the guest account may be provided to the guest to use the guest account using any of a variety of techniques described herein, for example, by scanning a guest access card, credit card or mobile telephone of guest user, and providing the guest account credentials to the user based on the information obtained. A guest access management server may be configured to generate and maintain guest accounts, authenticate guest users, and track and log guest activity. A VLAN technology may be used to separate guest traffic from host enterprise traffic on the host enterprise network. After a guest user is authenticated, communications to and from the guest user may be routed to a guest VLAN.Type: GrantFiled: July 21, 2006Date of Patent: January 18, 2011Assignee: Microsoft CorporationInventors: Amer A. Hassan, Andrew Baron, Christian Huitema, Deyun Wu, Mahmood H. Khadeer, Vishesh M. Parikh, Wajih Yahyaoui
-
Publication number: 20090089865Abstract: A method and apparatus for managing network profiles and/or access to a network. Network profiles stored in a computer may be deleted and/or a connection to a wireless network may be disabled when a corresponding access period for the network has been exhausted. The access period may define an amount of time, a number of connections, a number of bits or packets of information, or other measure of connectivity to a network and/or maintenance of profile information related to the network that may be limited in some fashion.Type: ApplicationFiled: October 2, 2007Publication date: April 2, 2009Applicant: Microsoft CorporationInventors: Andrew Baron, Taroon Mandhana, Amir Zohrenejad
-
Publication number: 20080196089Abstract: An EAP-based authentication framework is provided that decouples credential acquisition from EAP methods that use credentials for authentication. An application may request from an EAP method parameters of credentials required by the EAP method. In response, the EAP method provides credential parameters, which may then be used by the application to acquire credentials consistent with the parameters from the user or other entity. The framework enables an application to request credentials in a context specific way. In addition, the application may simultaneously obtain credentials used in multiple authentication operations through a single user interface, or retain credentials for later use without further prompting a user such that a Single Sign-on user experience may be implemented. Additionally, the application can obtain credentials from a device so that the device may gain network access without requiring a user logon.Type: ApplicationFiled: February 9, 2007Publication date: August 14, 2008Applicant: Microsoft CorporationInventors: Andrew Baron, Taroon Mandhana, Saurabh Mahajan, Prashant Malik
-
Publication number: 20080196090Abstract: A framework is provided that decouples credential acquisition from authentication processes using those credentials in a way that facilitates dynamic update of credential information. An authentication component may receive credential information for authentication of a user or a device for access to a resource. During interactions with an external authenticator, the authentication component may identify that updated credential information is required and issue a request to the application including credential parameters defining the updated credential information. An application component receiving the request may acquire updated credential information from a user or another entity. In addition, the authentication method may issue notifications to the application. The framework enables the application to update credentials in a context specific way.Type: ApplicationFiled: February 9, 2007Publication date: August 14, 2008Applicant: Microsoft CorporationInventors: Andrew Baron, Taroon Mandhana, Saurabh Mahajan, Prashant Malik, Amir Ali Zohrenejad, Karthik Ranganathan
-
Publication number: 20080137548Abstract: Capability checking to examine a computing device's capabilities to determine if the device supports a software defined radio to communicate according to a specific wireless protocol. Applicants have appreciated that as the reliance on software defined radio increases, numerous potential options may be available to a user for performing wireless communication. Applicants have appreciated the desirability of providing the ability to discover the capabilities of a user's computer to determine whether it is capable of supporting one or more wireless protocols.Type: ApplicationFiled: December 8, 2006Publication date: June 12, 2008Applicant: Microsoft CorporationInventors: Amer A. Hassan, Vishesh M. Parikh, Thomas W. Kuehnel, Deyun Wu, Christian Huitema, David Jones, Andrew Baron
-
Publication number: 20080082543Abstract: It is determined whether a mobile user device is within transmission range of one or hidden networks. A list of known networks may be accessed, the list including broadcast and hidden networks. For the hidden networks, the network connection component may instruct a network interface to actively probe for the hidden networks. If the response is received for a communication corresponding to a particular network, then it may be considered that the mobile user interface is within transmission range of the hidden network. If auto-connection logic is activated, a preference order may be applied to select which of the detected broadcasts and/or hidden networks to connect. A user interface displays broadcast and hidden networks determined to be within transmission range of the mobile user device. The user device also displays hidden networks for which it has not yet been attempted to determine whether the hidden networks are in range.Type: ApplicationFiled: September 29, 2006Publication date: April 3, 2008Applicant: Microsoft CorporationInventors: Abhishek Abhishek, Amir Zohrenejad, Yue Chen, Andrew Baron, Yi Lu
-
Publication number: 20070256121Abstract: Guest user are enabled to access network resources through an enterprise network using a guest user account. A guest user account may be created for a guest for a limited time. Guest account credentials of the guest account may be provided to the guest to use the guest account using any of a variety of techniques described herein, for example, by scanning a guest access card, credit card or mobile telephone of guest user, and providing the guest account credentials to the user based on the information obtained. A guest access management server may be configured to generate and maintain guest accounts, authenticate guest users, and track and log guest activity. A VLAN technology may be used to separate guest traffic from host enterprise traffic on the host enterprise network. After a guest user is authenticated, communications to and from the guest user may be routed to a guest VLAN.Type: ApplicationFiled: April 28, 2006Publication date: November 1, 2007Applicant: Microsoft CorporationInventors: Amer Hassan, Andrew Baron, Christian Huitema, Deyun Wu, Mahmood Khadeer, Vishesh Parikh, Wajih Yahyaoui
-
Patent number: 7211327Abstract: An oil and water repellent composition for protecting fabric, wool, and other substrates is described. The oil and water repellent composition comprises: (a) a cationic fluoroacrylate copolymer with a glass transition temperature near ambient temperature; (b) a cationic fluoroacrylate copolymer with a glass transition temperature of about 80° C. to about 100° C.; (c) a nonionic hydrophilic softener; and (d) an inorganic additive.Type: GrantFiled: August 31, 2005Date of Patent: May 1, 2007Inventors: Evan Galen, Andrew Barons
-
Patent number: 7008993Abstract: An oil and water repellent composition for protecting fabric, wool, and other substrates is described. The oil and water repellent composition comprises: (a) a cationic fluoroacrylate copolymer with a glass transition temperature near ambient temperature; (b) a cationic fluoroacrylate copolymer with a glass transition temperature of about 80° C. to about 100° C.; (c) a nonionic hydrophilic softener; and (d) an inorganic additive.Type: GrantFiled: June 1, 2001Date of Patent: March 7, 2006Inventors: Evan Galen, Andrew Barons
-
Publication number: 20050285072Abstract: An oil and water repellent composition for protecting fabric, wool, and other substrates is described. The oil and water repellent composition comprises: (a) a cationic fluoroacrylate copolymer with a glass transition temperature near ambient temperature; (b) a cationic fluoroacrylate copolymer with a glass transition temperature of about 80° C. to about 100° C.; (c) a nonionic hydrophilic softener; and (d) an inorganic additive.Type: ApplicationFiled: August 31, 2005Publication date: December 29, 2005Inventors: Evan Galen, Andrew Barons