Patents by Inventor Andrew T. Baron

Andrew T. Baron has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 10681151
    Abstract: Discovery of services between devices is provided prior to establishing a connection between devices, including wireless-enabled devices or devices that are communicatively coupled to wireless access points or other wireless communication devices. Discovering services prior to establishing a connection may facilitate finding a desired service. The services that may be discovered may be, for example, print services, camera services, PDA services or any other suitable services. Services may be discovered using 802.11, Bluetooth, UWB or any other suitable wireless technology. A graphical user interface is provided that enables a user to select a desired service.
    Type: Grant
    Filed: September 30, 2011
    Date of Patent: June 9, 2020
    Assignee: Microsoft Technology Licensing, LLC
    Inventors: David Jones, Thomas W. Kuehnel, Deyun Wu, Amer A. Hassan, Andrew T. Baron, Yi Lu, Hui Shen, John W. Archer, Sundar P. Subramani, Vinod K. Swamy
  • Publication number: 20190238438
    Abstract: An indicator for a device may provide an indication that a threshold associated with a budget for a network resource has or will be reached. When a user requests a network operation that will consume the network resource, an amount of the network resource to be consumed by the operation is predicted, if possible. If the prior use of the network resource and the amount to be used to complete the network operation exceeds a threshold the user may be warned and given an opportunity to cancel the operation or adjust the way in which the operation will be performed. If the amount of network resource a network operation will consume is unknown, a rate of use of the network resource is determined and a time until the budget is reached is estimated.
    Type: Application
    Filed: April 7, 2019
    Publication date: August 1, 2019
    Inventors: Amer A. Hassan, Billy R. Anders, JR., Pehkeong Teh, Andrew T. Baron, Shai Guday, Upshur W. Parks, Marco Piumatti, Dmitry A. Anipko
  • Patent number: 10257064
    Abstract: An indicator for a device may provide an indication that a threshold associated with a budget for a network resource has or will be reached. When a user requests a network operation that will consume the network resource, an amount of the network resource to be consumed by the operation is predicted, if possible. If the prior use of the network resource and the amount to be used to complete the network operation exceeds a threshold the user may be warned and given an opportunity to cancel the operation or adjust the way in which the operation will be performed. If the amount of network resource a network operation will consume is unknown, a rate of use of the network resource is determined and a time until the budget is reached is estimated.
    Type: Grant
    Filed: January 25, 2016
    Date of Patent: April 9, 2019
    Assignee: Microsoft Technology Licensing, LLC
    Inventors: Amer A. Hassan, Billy R. Anders, Jr., Pehkeong Teh, Andrew T. Baron, Shai Guday, Upshur W. Parks, Marco Piumatti, Dmitry A. Anipko
  • Publication number: 20180034923
    Abstract: A computing device is provided with a discovery framework that may include a discovery user interface (UI) and a discovery engine configured to use various standard discovery protocols in a protocol stack of the computing device. The discovery engine may respond to an invocation of the discovery framework by determining discovery criteria and based thereon selecting one of the discovery protocols, requesting discovery through the selected discovery protocol, receiving corresponding first discovery results, and maintaining a discovery list comprised of indicia of devices discovered through at least the selected discovery protocol. The discovery UI allows interactive adjustment of the discovery criteria, displays the discovery list, and responds to selection of a discovered device in the discovery list by enabling a connection with the discovered device based on a network address of the discovered device obtained through one of the discovery protocols.
    Type: Application
    Filed: July 30, 2016
    Publication date: February 1, 2018
    Inventors: Rouella Joan Mendonca, Cristian M. Matesan, Yi-Chang Richard Shen, Gianluigi Nusca, Andrew T. Baron, Anders Edgar Klemets, Vishal A. Mhatre, Darren R. Davis
  • Publication number: 20170142586
    Abstract: Security techniques and security mechanisms for wireless networks that transmit content such as advertisements. According to exemplary techniques, control messages comprising unrequested content (e.g., advertisement data) may be transmitted in response to a request from a client device, while in other exemplary techniques the control messages may be transmitted without any request from a client device. In some exemplary implementations, security mechanisms such as public key cryptography algorithms may be used to secure transmissions, in some of these techniques which implement public key cryptography, a user may he required to retrieve a public key from to a source other than the wireless access point transmitting encrypted advertisements (e.g.
    Type: Application
    Filed: January 31, 2017
    Publication date: May 18, 2017
    Inventors: Hui Shen, Amer A. Hassan, Yi Lu, Thomas W. Kuehnel, Andrew T. Baron, Deyun Wu
  • Patent number: 9591483
    Abstract: Security techniques and security mechanisms for wireless networks that transmit content such as advertisements. According to exemplary techniques, control messages comprising unrequested content (e.g., advertisement data) may be transmitted in response to a request from a client device, while in other exemplary techniques the control messages may be transmitted without any request from a client device. In some exemplary implementations, security mechanisms such as public key cryptography algorithms may be used to secure transmissions. In some of these techniques which implement public key cryptography, a user may be required to retrieve a public key from a source other than the wireless access point transmitting encrypted advertisements (e.g., a sign or terminal in a commercial entity transmitting such advertisements, or from a web service), such that the user may confirm that the encrypted content is from a source matching the retrieved public key and thus confirm the authenticity of a wireless access point.
    Type: Grant
    Filed: July 23, 2015
    Date of Patent: March 7, 2017
    Assignee: MICROSOFT TECHNOLOGY LICENSING, LLC
    Inventors: Hui Shen, Amer A. Hassan, Yi Lu, Thomas W. Kuehnel, Andrew T. Baron, Deyun Wu
  • Publication number: 20160285723
    Abstract: An indicator for a device may provide an indication that a threshold associated with a budget for a network resource has or will be reached. When a user requests a network operation that will consume the network resource, an amount of the network resource to be consumed by the operation is predicted, if possible. If the prior use of the network resource and the amount to be used to complete the network operation exceeds a threshold the user may be warned and given an opportunity to cancel the operation or adjust the way in which the operation will be performed. If the amount of network resource a network operation will consume is unknown, a rate of use of the network resource is determined and a time until the budget is reached is estimated.
    Type: Application
    Filed: January 25, 2016
    Publication date: September 29, 2016
    Inventors: Amer A. Hassan, Billy R. Anders, JR., Pehkeong Teh, Andrew T. Baron, Shai Guday, Upshur W. Parks, Marco Piumatti, Dmitry A. Anipko
  • Patent number: 9246783
    Abstract: An indicator for a device may provide an indication that a threshold associated with a budget for a network resource has or will be reached. When a user requests a network operation that will consume the network resource, an amount of the network resource to be consumed by the operation is predicted, if possible. If the prior use of the network resource and the amount to be used to complete the network operation exceeds a threshold the user may be warned and given an opportunity to cancel the operation or adjust the way in which the operation will be performed. If the amount of network resource a network operation will consume is unknown, a rate of use of the network resource is determined and a time until the budget is reached is estimated.
    Type: Grant
    Filed: November 15, 2014
    Date of Patent: January 26, 2016
    Assignee: Microsoft Technology Licensing, LLC
    Inventors: Amer A. Hassan, Billy R. Anders, Jr., Pehkeong Teh, Andrew T. Baron, Shai Guday, Upshur W. Parks, Marco Piumatti, Dmitry A. Anipko
  • Publication number: 20150327067
    Abstract: Security techniques and security mechanisms for wireless networks that transmit content such as advertisements. According to exemplary techniques, control messages comprising unrequested content (e.g., advertisement data) may be transmitted in response to a request from a client device, while in other exemplary techniques the control messages may be transmitted without any request from a client device. In some exemplary implementations, security mechanisms such as public key cryptography algorithms may be used to secure transmissions. In some of these techniques which implement public key cryptography, a user may be required to retrieve a public key from a source other than the wireless access point transmitting encrypted advertisements (e.g., a sign or terminal in a commercial entity transmitting such advertisements, or from a web service), such that the user may confirm that the encrypted content is from a source matching the retrieved public key and thus confirm the authenticity of a wireless access point.
    Type: Application
    Filed: July 23, 2015
    Publication date: November 12, 2015
    Inventors: Hui Shen, Amer A. Hassan, Yi Lu, Thomas W. Kuehnel, Andrew T. Baron, Deyun Wu
  • Patent number: 9105031
    Abstract: Security techniques and security mechanisms for wireless networks that transmit content such as advertisements. According to exemplary techniques, control messages comprising unrequested content (e.g., advertisement data) may be transmitted in response to a request from a client device, while in other exemplary techniques the control messages may be transmitted without any request from a client device. In some exemplary implementations, security mechanisms such as public key cryptography algorithms may be used to secure transmissions. In some of these techniques which implement public key cryptography, a user may be required to retrieve a public key from a source other than the wireless access point transmitting encrypted advertisements (e.g., a sign or terminal in a commercial entity transmitting such advertisements, or from a web service), such that the user may confirm that the encrypted content is from a source matching the retrieved public key and thus confirm the authenticity of a wireless access point.
    Type: Grant
    Filed: February 22, 2008
    Date of Patent: August 11, 2015
    Assignee: MICROSOFT TECHNOLOGY LICENSING, LLC
    Inventors: Hui Shen, Amer A. Hassan, Yi Lu, Thomas W. Kuehnel, Andrew T. Baron, Deyun Wu
  • Publication number: 20150074269
    Abstract: An indicator for a device may provide an indication that a threshold associated with a budget for a network resource has or will be reached. When a user requests a network operation that will consume the network resource, an amount of the network resource to be consumed by the operation is predicted, if possible. If the prior use of the network resource and the amount to be used to complete the network operation exceeds a threshold the user may be warned and given an opportunity to cancel the operation or adjust the way in which the operation will be performed. If the amount of network resource a network operation will consume is unknown, a rate of use of the network resource is determined and a time until the budget is reached is estimated.
    Type: Application
    Filed: November 15, 2014
    Publication date: March 12, 2015
    Inventors: Amer A. Hassan, Billy R. Anders, JR., Pehkeong Teh, Andrew T. Baron, Shai Guday, Upshur W. Parks, Marco Piumatti, Dmitry A. Anipko
  • Patent number: 8892732
    Abstract: An indicator for a device may provide an indication that a threshold associated with a budget for a network resource has or will be reached. When a user requests a network operation that will consume the network resource, an amount of the network resource to be consumed by the operation is predicted, if possible. If the prior use of the network resource and the amount to be used to complete the network operation exceeds a threshold the user may be warned and given an opportunity to cancel the operation or adjust the way in which the operation will be performed. If the amount of network resource a network operation will consume is unknown, a rate of use of the network resource is determined and a time until the budget is reached is estimated.
    Type: Grant
    Filed: April 1, 2013
    Date of Patent: November 18, 2014
    Assignee: Microsoft Corporation
    Inventors: Amer A. Hassan, Billy R. Anders, Jr., Pehkeong Teh, Andrew T. Baron, Shai Guday, Upshur W. Parks, Marco Piumatti, Dmitry A. Anipko
  • Publication number: 20140304796
    Abstract: Guest user are enabled to access network resources through an enterprise network using a guest user account. A guest user account may be created for a guest for a limited time. Guest account credentials of the guest account may be provided to the guest to use the guest account using any of a variety of techniques described herein, for example, by scanning a guest access card, credit card or mobile telephone of guest user, and providing the guest account credentials to the user based on the information obtained. A guest access management server may be configured to generate and maintain guest accounts, authenticate guest users, and track and log guest activity. A VLAN technology may be used to separate guest traffic from host enterprise traffic on the host enterprise network. After a guest user is authenticated, communications to and from the guest user may be routed to a guest VLAN.
    Type: Application
    Filed: June 19, 2014
    Publication date: October 9, 2014
    Inventors: Amer A. Hassan, Andrew T. Baron, Christian Huitema, Mahmood H. Khadeer, Vishesh M. Parikh, Deyun Wu, Wajih Yahyaoui
  • Patent number: 8812011
    Abstract: A bootstrapping technique for wirelessly obtaining white space data that may be used to identify an available white space channel for connecting to a service. Portable wireless devices may collaborate to provide white space data to a device requesting such data. A requesting device transmits a request for the white space data using, for example, an unlicensed band. A device receiving the request may transmit a copy of the data to the requesting device. The transmitted copy may be obtained by the receiving device from a local data store or may be provided from a database server to which the receiving device is connected. In the later case the receiving device acts as a proxy between the database server and the requesting device. Once the white space data is received by the requesting device it may be used to select a channel for communication in the white space.
    Type: Grant
    Filed: February 10, 2010
    Date of Patent: August 19, 2014
    Assignee: Microsoft Corporation
    Inventors: Amer A. Hassan, Andrew T. Baron, Billy R. Anders, Jr., Anoop Gupta
  • Patent number: 8755739
    Abstract: Capability checking to examine a computing device's capabilities to determine if the device supports a software defined radio to communicate according to a specific wireless protocol. Applicants have appreciated that as the reliance on software defined radio increases, numerous potential options may be available to a user for performing wireless communication. Applicants have appreciated the desirability of providing the ability to discover the capabilities of a user's computer to determine whether it is capable of supporting one or more wireless protocols.
    Type: Grant
    Filed: February 28, 2011
    Date of Patent: June 17, 2014
    Assignee: Microsoft Corporation
    Inventors: Amer A. Hassan, Vishesh M. Parikh, Thomas W. Kuehnel, Deyun Wu, Christian Huitema, David Jones, Andrew T. Baron
  • Patent number: 8730801
    Abstract: Methods and systems which identify and interact with network interfaces based on the network to which they provide access. A computing device operating in accordance with one or more of the principles described herein may examine available network interfaces and identify the network to which the network interfaces provide access, and perform networking tasks on interfaces based on the network identified. For example, a user may instruct a computing device to connect to a specified network, and the computing device will select a particular network interface by which to connect from the one or more available network interfaces that are able to connect to that network. Alternatively, a user may manage policies (e.g., security, connection, and application policies) based on the network to which a network interface provides access and thereby manage a network regardless of which of multiple network interfaces is used to access the network.
    Type: Grant
    Filed: July 20, 2012
    Date of Patent: May 20, 2014
    Assignee: Microsoft Corporation
    Inventors: Andrew T. Baron, Aaron W. Cunningham, David Jones, Arun K. Buduri, Deon C. Brewis, Bill Begorre
  • Patent number: 8429272
    Abstract: An indicator for a device may provide an indication that a threshold associated with a budget for a network resource has or will be reached. When a user requests a network operation that will consume the network resource, an amount of the network resource to be consumed by the operation is predicted, if possible. If the prior use of the network resource and the amount to be used to complete the network operation exceeds a threshold the user may be warned and given an opportunity to cancel the operation or adjust the way in which the operation will be performed. If the amount of network resource a network operation will consume is unknown, a rate of use of the network resource is determined and a time until the budget is reached is estimated.
    Type: Grant
    Filed: June 9, 2012
    Date of Patent: April 23, 2013
    Assignee: Microsoft Corporation
    Inventors: Amer A. Hassan, Billy R. Anders, PehKeong Teh, Andrew T. Baron, Shai Guday, Upshur W. Parks, Marco Piumatti, Dmitry A. Anipko
  • Publication number: 20120284771
    Abstract: Methods and systems which identify and interact with network interfaces based on the network to which they provide access. A computing device operating in accordance with one or more of the principles described herein may examine available network interfaces and identify the network to which the network interfaces provide access, and perform networking tasks on interfaces based on the network identified. For example, a user may instruct a computing device to connect to a specified network, and the computing device will select a particular network interface by which to connect from the one or more available network interfaces that are able to connect to that network. Alternatively, a user may manage policies (e.g., security, connection, and application policies) based on the network to which a network interface provides access and thereby manage a network regardless of which of multiple network interfaces is used to access the network.
    Type: Application
    Filed: July 20, 2012
    Publication date: November 8, 2012
    Applicant: MICROSOFT CORPORATION
    Inventors: Andrew T. Baron, Aaron W. Cunningham, David Jones, Arun K. Buduri, Deon C. Brewis, Bill Begorre
  • Publication number: 20120254420
    Abstract: An indicator for a device may provide an indication that a threshold associated with a budget for a network resource has or will be reached. When a user requests a network operation that will consume the network resource, an amount of the network resource to be consumed by the operation is predicted, if possible. If the prior use of the network resource and the amount to be used to complete the network operation exceeds a threshold the user may be warned and given an opportunity to cancel the operation or adjust the way in which the operation will be performed. If the amount of network resource a network operation will consume is unknown, a rate of use of the network resource is determined and a time until the budget is reached is estimated.
    Type: Application
    Filed: June 9, 2012
    Publication date: October 4, 2012
    Applicant: MICROSOFT CORPORATION
    Inventors: Amer A. Hassan, Billy R. Anders, JR., PehKeong Teh, Andrew T. Baron, Shai Guday, Upshur W. Parks, Marco Piumatti, Dmitry A. Anipko
  • Patent number: 8238238
    Abstract: Methods and systems which identify and interact with network interfaces based on the network to which they provide access. A computing device operating in accordance with one or more of the principles described herein may examine available network interfaces and identify the network to which the network interfaces provide access, and perform networking tasks on interfaces based on the network identified. For example, a user may instruct a computing device to connect to a specified network, and the computing device will select a particular network interface by which to connect from the one or more available network interfaces that are able to connect to that network. Alternatively, a user may manage policies (e.g., security, connection, and application policies) based on the network to which a network interface provides access and thereby manage a network regardless of which of multiple network interfaces is used to access the network.
    Type: Grant
    Filed: May 16, 2008
    Date of Patent: August 7, 2012
    Assignee: Microsoft Corporation
    Inventors: Andrew T. Baron, Aaron W. Cunningham, David Jones, Arun K. Buduri, Deon C. Brewis, Bill Begorre