Patents by Inventor Andrew T. Baron
Andrew T. Baron has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 10681151Abstract: Discovery of services between devices is provided prior to establishing a connection between devices, including wireless-enabled devices or devices that are communicatively coupled to wireless access points or other wireless communication devices. Discovering services prior to establishing a connection may facilitate finding a desired service. The services that may be discovered may be, for example, print services, camera services, PDA services or any other suitable services. Services may be discovered using 802.11, Bluetooth, UWB or any other suitable wireless technology. A graphical user interface is provided that enables a user to select a desired service.Type: GrantFiled: September 30, 2011Date of Patent: June 9, 2020Assignee: Microsoft Technology Licensing, LLCInventors: David Jones, Thomas W. Kuehnel, Deyun Wu, Amer A. Hassan, Andrew T. Baron, Yi Lu, Hui Shen, John W. Archer, Sundar P. Subramani, Vinod K. Swamy
-
Publication number: 20190238438Abstract: An indicator for a device may provide an indication that a threshold associated with a budget for a network resource has or will be reached. When a user requests a network operation that will consume the network resource, an amount of the network resource to be consumed by the operation is predicted, if possible. If the prior use of the network resource and the amount to be used to complete the network operation exceeds a threshold the user may be warned and given an opportunity to cancel the operation or adjust the way in which the operation will be performed. If the amount of network resource a network operation will consume is unknown, a rate of use of the network resource is determined and a time until the budget is reached is estimated.Type: ApplicationFiled: April 7, 2019Publication date: August 1, 2019Inventors: Amer A. Hassan, Billy R. Anders, JR., Pehkeong Teh, Andrew T. Baron, Shai Guday, Upshur W. Parks, Marco Piumatti, Dmitry A. Anipko
-
Patent number: 10257064Abstract: An indicator for a device may provide an indication that a threshold associated with a budget for a network resource has or will be reached. When a user requests a network operation that will consume the network resource, an amount of the network resource to be consumed by the operation is predicted, if possible. If the prior use of the network resource and the amount to be used to complete the network operation exceeds a threshold the user may be warned and given an opportunity to cancel the operation or adjust the way in which the operation will be performed. If the amount of network resource a network operation will consume is unknown, a rate of use of the network resource is determined and a time until the budget is reached is estimated.Type: GrantFiled: January 25, 2016Date of Patent: April 9, 2019Assignee: Microsoft Technology Licensing, LLCInventors: Amer A. Hassan, Billy R. Anders, Jr., Pehkeong Teh, Andrew T. Baron, Shai Guday, Upshur W. Parks, Marco Piumatti, Dmitry A. Anipko
-
Publication number: 20180034923Abstract: A computing device is provided with a discovery framework that may include a discovery user interface (UI) and a discovery engine configured to use various standard discovery protocols in a protocol stack of the computing device. The discovery engine may respond to an invocation of the discovery framework by determining discovery criteria and based thereon selecting one of the discovery protocols, requesting discovery through the selected discovery protocol, receiving corresponding first discovery results, and maintaining a discovery list comprised of indicia of devices discovered through at least the selected discovery protocol. The discovery UI allows interactive adjustment of the discovery criteria, displays the discovery list, and responds to selection of a discovered device in the discovery list by enabling a connection with the discovered device based on a network address of the discovered device obtained through one of the discovery protocols.Type: ApplicationFiled: July 30, 2016Publication date: February 1, 2018Inventors: Rouella Joan Mendonca, Cristian M. Matesan, Yi-Chang Richard Shen, Gianluigi Nusca, Andrew T. Baron, Anders Edgar Klemets, Vishal A. Mhatre, Darren R. Davis
-
Publication number: 20170142586Abstract: Security techniques and security mechanisms for wireless networks that transmit content such as advertisements. According to exemplary techniques, control messages comprising unrequested content (e.g., advertisement data) may be transmitted in response to a request from a client device, while in other exemplary techniques the control messages may be transmitted without any request from a client device. In some exemplary implementations, security mechanisms such as public key cryptography algorithms may be used to secure transmissions, in some of these techniques which implement public key cryptography, a user may he required to retrieve a public key from to a source other than the wireless access point transmitting encrypted advertisements (e.g.Type: ApplicationFiled: January 31, 2017Publication date: May 18, 2017Inventors: Hui Shen, Amer A. Hassan, Yi Lu, Thomas W. Kuehnel, Andrew T. Baron, Deyun Wu
-
Patent number: 9591483Abstract: Security techniques and security mechanisms for wireless networks that transmit content such as advertisements. According to exemplary techniques, control messages comprising unrequested content (e.g., advertisement data) may be transmitted in response to a request from a client device, while in other exemplary techniques the control messages may be transmitted without any request from a client device. In some exemplary implementations, security mechanisms such as public key cryptography algorithms may be used to secure transmissions. In some of these techniques which implement public key cryptography, a user may be required to retrieve a public key from a source other than the wireless access point transmitting encrypted advertisements (e.g., a sign or terminal in a commercial entity transmitting such advertisements, or from a web service), such that the user may confirm that the encrypted content is from a source matching the retrieved public key and thus confirm the authenticity of a wireless access point.Type: GrantFiled: July 23, 2015Date of Patent: March 7, 2017Assignee: MICROSOFT TECHNOLOGY LICENSING, LLCInventors: Hui Shen, Amer A. Hassan, Yi Lu, Thomas W. Kuehnel, Andrew T. Baron, Deyun Wu
-
Publication number: 20160285723Abstract: An indicator for a device may provide an indication that a threshold associated with a budget for a network resource has or will be reached. When a user requests a network operation that will consume the network resource, an amount of the network resource to be consumed by the operation is predicted, if possible. If the prior use of the network resource and the amount to be used to complete the network operation exceeds a threshold the user may be warned and given an opportunity to cancel the operation or adjust the way in which the operation will be performed. If the amount of network resource a network operation will consume is unknown, a rate of use of the network resource is determined and a time until the budget is reached is estimated.Type: ApplicationFiled: January 25, 2016Publication date: September 29, 2016Inventors: Amer A. Hassan, Billy R. Anders, JR., Pehkeong Teh, Andrew T. Baron, Shai Guday, Upshur W. Parks, Marco Piumatti, Dmitry A. Anipko
-
Patent number: 9246783Abstract: An indicator for a device may provide an indication that a threshold associated with a budget for a network resource has or will be reached. When a user requests a network operation that will consume the network resource, an amount of the network resource to be consumed by the operation is predicted, if possible. If the prior use of the network resource and the amount to be used to complete the network operation exceeds a threshold the user may be warned and given an opportunity to cancel the operation or adjust the way in which the operation will be performed. If the amount of network resource a network operation will consume is unknown, a rate of use of the network resource is determined and a time until the budget is reached is estimated.Type: GrantFiled: November 15, 2014Date of Patent: January 26, 2016Assignee: Microsoft Technology Licensing, LLCInventors: Amer A. Hassan, Billy R. Anders, Jr., Pehkeong Teh, Andrew T. Baron, Shai Guday, Upshur W. Parks, Marco Piumatti, Dmitry A. Anipko
-
Publication number: 20150327067Abstract: Security techniques and security mechanisms for wireless networks that transmit content such as advertisements. According to exemplary techniques, control messages comprising unrequested content (e.g., advertisement data) may be transmitted in response to a request from a client device, while in other exemplary techniques the control messages may be transmitted without any request from a client device. In some exemplary implementations, security mechanisms such as public key cryptography algorithms may be used to secure transmissions. In some of these techniques which implement public key cryptography, a user may be required to retrieve a public key from a source other than the wireless access point transmitting encrypted advertisements (e.g., a sign or terminal in a commercial entity transmitting such advertisements, or from a web service), such that the user may confirm that the encrypted content is from a source matching the retrieved public key and thus confirm the authenticity of a wireless access point.Type: ApplicationFiled: July 23, 2015Publication date: November 12, 2015Inventors: Hui Shen, Amer A. Hassan, Yi Lu, Thomas W. Kuehnel, Andrew T. Baron, Deyun Wu
-
Patent number: 9105031Abstract: Security techniques and security mechanisms for wireless networks that transmit content such as advertisements. According to exemplary techniques, control messages comprising unrequested content (e.g., advertisement data) may be transmitted in response to a request from a client device, while in other exemplary techniques the control messages may be transmitted without any request from a client device. In some exemplary implementations, security mechanisms such as public key cryptography algorithms may be used to secure transmissions. In some of these techniques which implement public key cryptography, a user may be required to retrieve a public key from a source other than the wireless access point transmitting encrypted advertisements (e.g., a sign or terminal in a commercial entity transmitting such advertisements, or from a web service), such that the user may confirm that the encrypted content is from a source matching the retrieved public key and thus confirm the authenticity of a wireless access point.Type: GrantFiled: February 22, 2008Date of Patent: August 11, 2015Assignee: MICROSOFT TECHNOLOGY LICENSING, LLCInventors: Hui Shen, Amer A. Hassan, Yi Lu, Thomas W. Kuehnel, Andrew T. Baron, Deyun Wu
-
Publication number: 20150074269Abstract: An indicator for a device may provide an indication that a threshold associated with a budget for a network resource has or will be reached. When a user requests a network operation that will consume the network resource, an amount of the network resource to be consumed by the operation is predicted, if possible. If the prior use of the network resource and the amount to be used to complete the network operation exceeds a threshold the user may be warned and given an opportunity to cancel the operation or adjust the way in which the operation will be performed. If the amount of network resource a network operation will consume is unknown, a rate of use of the network resource is determined and a time until the budget is reached is estimated.Type: ApplicationFiled: November 15, 2014Publication date: March 12, 2015Inventors: Amer A. Hassan, Billy R. Anders, JR., Pehkeong Teh, Andrew T. Baron, Shai Guday, Upshur W. Parks, Marco Piumatti, Dmitry A. Anipko
-
Patent number: 8892732Abstract: An indicator for a device may provide an indication that a threshold associated with a budget for a network resource has or will be reached. When a user requests a network operation that will consume the network resource, an amount of the network resource to be consumed by the operation is predicted, if possible. If the prior use of the network resource and the amount to be used to complete the network operation exceeds a threshold the user may be warned and given an opportunity to cancel the operation or adjust the way in which the operation will be performed. If the amount of network resource a network operation will consume is unknown, a rate of use of the network resource is determined and a time until the budget is reached is estimated.Type: GrantFiled: April 1, 2013Date of Patent: November 18, 2014Assignee: Microsoft CorporationInventors: Amer A. Hassan, Billy R. Anders, Jr., Pehkeong Teh, Andrew T. Baron, Shai Guday, Upshur W. Parks, Marco Piumatti, Dmitry A. Anipko
-
Publication number: 20140304796Abstract: Guest user are enabled to access network resources through an enterprise network using a guest user account. A guest user account may be created for a guest for a limited time. Guest account credentials of the guest account may be provided to the guest to use the guest account using any of a variety of techniques described herein, for example, by scanning a guest access card, credit card or mobile telephone of guest user, and providing the guest account credentials to the user based on the information obtained. A guest access management server may be configured to generate and maintain guest accounts, authenticate guest users, and track and log guest activity. A VLAN technology may be used to separate guest traffic from host enterprise traffic on the host enterprise network. After a guest user is authenticated, communications to and from the guest user may be routed to a guest VLAN.Type: ApplicationFiled: June 19, 2014Publication date: October 9, 2014Inventors: Amer A. Hassan, Andrew T. Baron, Christian Huitema, Mahmood H. Khadeer, Vishesh M. Parikh, Deyun Wu, Wajih Yahyaoui
-
Patent number: 8812011Abstract: A bootstrapping technique for wirelessly obtaining white space data that may be used to identify an available white space channel for connecting to a service. Portable wireless devices may collaborate to provide white space data to a device requesting such data. A requesting device transmits a request for the white space data using, for example, an unlicensed band. A device receiving the request may transmit a copy of the data to the requesting device. The transmitted copy may be obtained by the receiving device from a local data store or may be provided from a database server to which the receiving device is connected. In the later case the receiving device acts as a proxy between the database server and the requesting device. Once the white space data is received by the requesting device it may be used to select a channel for communication in the white space.Type: GrantFiled: February 10, 2010Date of Patent: August 19, 2014Assignee: Microsoft CorporationInventors: Amer A. Hassan, Andrew T. Baron, Billy R. Anders, Jr., Anoop Gupta
-
Patent number: 8755739Abstract: Capability checking to examine a computing device's capabilities to determine if the device supports a software defined radio to communicate according to a specific wireless protocol. Applicants have appreciated that as the reliance on software defined radio increases, numerous potential options may be available to a user for performing wireless communication. Applicants have appreciated the desirability of providing the ability to discover the capabilities of a user's computer to determine whether it is capable of supporting one or more wireless protocols.Type: GrantFiled: February 28, 2011Date of Patent: June 17, 2014Assignee: Microsoft CorporationInventors: Amer A. Hassan, Vishesh M. Parikh, Thomas W. Kuehnel, Deyun Wu, Christian Huitema, David Jones, Andrew T. Baron
-
Patent number: 8730801Abstract: Methods and systems which identify and interact with network interfaces based on the network to which they provide access. A computing device operating in accordance with one or more of the principles described herein may examine available network interfaces and identify the network to which the network interfaces provide access, and perform networking tasks on interfaces based on the network identified. For example, a user may instruct a computing device to connect to a specified network, and the computing device will select a particular network interface by which to connect from the one or more available network interfaces that are able to connect to that network. Alternatively, a user may manage policies (e.g., security, connection, and application policies) based on the network to which a network interface provides access and thereby manage a network regardless of which of multiple network interfaces is used to access the network.Type: GrantFiled: July 20, 2012Date of Patent: May 20, 2014Assignee: Microsoft CorporationInventors: Andrew T. Baron, Aaron W. Cunningham, David Jones, Arun K. Buduri, Deon C. Brewis, Bill Begorre
-
Patent number: 8429272Abstract: An indicator for a device may provide an indication that a threshold associated with a budget for a network resource has or will be reached. When a user requests a network operation that will consume the network resource, an amount of the network resource to be consumed by the operation is predicted, if possible. If the prior use of the network resource and the amount to be used to complete the network operation exceeds a threshold the user may be warned and given an opportunity to cancel the operation or adjust the way in which the operation will be performed. If the amount of network resource a network operation will consume is unknown, a rate of use of the network resource is determined and a time until the budget is reached is estimated.Type: GrantFiled: June 9, 2012Date of Patent: April 23, 2013Assignee: Microsoft CorporationInventors: Amer A. Hassan, Billy R. Anders, PehKeong Teh, Andrew T. Baron, Shai Guday, Upshur W. Parks, Marco Piumatti, Dmitry A. Anipko
-
Publication number: 20120284771Abstract: Methods and systems which identify and interact with network interfaces based on the network to which they provide access. A computing device operating in accordance with one or more of the principles described herein may examine available network interfaces and identify the network to which the network interfaces provide access, and perform networking tasks on interfaces based on the network identified. For example, a user may instruct a computing device to connect to a specified network, and the computing device will select a particular network interface by which to connect from the one or more available network interfaces that are able to connect to that network. Alternatively, a user may manage policies (e.g., security, connection, and application policies) based on the network to which a network interface provides access and thereby manage a network regardless of which of multiple network interfaces is used to access the network.Type: ApplicationFiled: July 20, 2012Publication date: November 8, 2012Applicant: MICROSOFT CORPORATIONInventors: Andrew T. Baron, Aaron W. Cunningham, David Jones, Arun K. Buduri, Deon C. Brewis, Bill Begorre
-
Publication number: 20120254420Abstract: An indicator for a device may provide an indication that a threshold associated with a budget for a network resource has or will be reached. When a user requests a network operation that will consume the network resource, an amount of the network resource to be consumed by the operation is predicted, if possible. If the prior use of the network resource and the amount to be used to complete the network operation exceeds a threshold the user may be warned and given an opportunity to cancel the operation or adjust the way in which the operation will be performed. If the amount of network resource a network operation will consume is unknown, a rate of use of the network resource is determined and a time until the budget is reached is estimated.Type: ApplicationFiled: June 9, 2012Publication date: October 4, 2012Applicant: MICROSOFT CORPORATIONInventors: Amer A. Hassan, Billy R. Anders, JR., PehKeong Teh, Andrew T. Baron, Shai Guday, Upshur W. Parks, Marco Piumatti, Dmitry A. Anipko
-
Patent number: 8238238Abstract: Methods and systems which identify and interact with network interfaces based on the network to which they provide access. A computing device operating in accordance with one or more of the principles described herein may examine available network interfaces and identify the network to which the network interfaces provide access, and perform networking tasks on interfaces based on the network identified. For example, a user may instruct a computing device to connect to a specified network, and the computing device will select a particular network interface by which to connect from the one or more available network interfaces that are able to connect to that network. Alternatively, a user may manage policies (e.g., security, connection, and application policies) based on the network to which a network interface provides access and thereby manage a network regardless of which of multiple network interfaces is used to access the network.Type: GrantFiled: May 16, 2008Date of Patent: August 7, 2012Assignee: Microsoft CorporationInventors: Andrew T. Baron, Aaron W. Cunningham, David Jones, Arun K. Buduri, Deon C. Brewis, Bill Begorre