Patents by Inventor Arjmand M. Samuel

Arjmand M. Samuel has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 11050781
    Abstract: Example of secure monitoring of modular applications and associated edge devices are described herein. In an example, an accreditation request is initiated to accredit at least one of a modular application and an edge device hosting the modular application. The edge device may a device coupling an IoT device to a cloud server. Based on initiating, accreditation information corresponding to at least one of the modular application and the edge device may be received. The accreditation information are generated by a hardware encryption device associated with the edge device. Further, an accreditation status of the modular application may be monitored during execution of the modular application to ascertain whether the modular application and the edge device have been tampered. In case tampering is detected, a remedial action to address the tampering may be performed.
    Type: Grant
    Filed: February 23, 2018
    Date of Patent: June 29, 2021
    Assignee: MICROSOFT TECHNOLOGY LICENSING, LLC
    Inventors: Arjmand M. Samuel, Chipalo N. Street, Damon Luke Barry, Eustace Asanghanwa, James W. Osborne
  • Publication number: 20190109874
    Abstract: Example of secure monitoring of modular applications and associated edge devices are described herein. In an example, an accreditation request is initiated to accredit at least one of a modular application and an edge device hosting the modular application. The edge device may a device coupling an IoT device to a cloud server. Based on initiating, accreditation information corresponding to at least one of the modular application and the edge device may be received. The accreditation information are generated by a hardware encryption device associated with the edge device. Further, an accreditation status of the modular application may be monitored during execution of the modular application to ascertain whether the modular application and the edge device have been tampered. In case tampering is detected, a remedial action to address the tampering may be performed.
    Type: Application
    Filed: February 23, 2018
    Publication date: April 11, 2019
    Applicant: Microsoft Technology Licensing, LLC
    Inventors: Arjmand M. SAMUEL, Chipalo N. STREET, Damon Luke BARRY, Eustace ASANGHANWA, James W. OSBORNE
  • Publication number: 20190109877
    Abstract: Example of secure metering of modular applications and associated edge devices are described herein. In an example, a request to secure one or more modular applications associated with one or more edge device may be received. The edge device may be a device authorized to couple an IoT device to a cloud server. A modular application may be a discrete application performing device specific functions or a part of a distributed application, the part being hosted on the IoT device. Further, the request may include a security policy. One or more secure enclaves for executing the modular applications may be generated, based on the security policy. Further, resource utilization in the secure enclaves may be determined based on a predefined unit of consumption using a distributed ledger. Based on the resource utilization, a resource utilization receipt indicative of financial units corresponding to the resource utilization may be generated.
    Type: Application
    Filed: February 23, 2018
    Publication date: April 11, 2019
    Applicant: Microsoft Technology Licensing, LLC
    Inventors: Arjmand M. Samuel, Chipalo N. Street, Damon Luke Barry, Eustace Asanghanwa, James W. Osborne
  • Patent number: 9495711
    Abstract: Techniques for invite abuse prevention are described. In an implementation, data that describes mutual activities of the clients with one or more resources available via a service provider is obtained from multiple clients. The service provider may use this data regarding mutual activities to ascertain activity scores between clients that interact directly. The ascertained activity scores may then be used to compute a score between two subject clients to control invites and/or other interactions between the clients. Computing the score may include determining one or more connections between the two clients through clients that interact directly, calculating candidate values for the one or more connections, and selecting one of the candidate values as the computed score using various techniques. The computed score may be used in various ways to control invites and/or other interactions between the clients using the one or more resources.
    Type: Grant
    Filed: November 19, 2010
    Date of Patent: November 15, 2016
    Assignee: MICROSOFT TECHNOLOGY LICENSING, LLC
    Inventors: Arjmand M. Samuel, Sameer Halai
  • Patent number: 8214301
    Abstract: Techniques for social network mapping are described. In an implementation, properties of a user's contacts with two services are analyzed to identify matching contacts. Contacts may be determined to correspond to the same user when sufficient common properties are found between the contacts. For unmatched contacts following the property analysis, additional processing may be conducted to identify contacts that the unmatched contacts have in common. A number of common contacts found through this processing may be used, alone or in combination, with information regarding common properties to determine when unmatched contacts correspond to the same user.
    Type: Grant
    Filed: September 25, 2009
    Date of Patent: July 3, 2012
    Assignee: Microsoft Corporation
    Inventors: Arjmand M. Samuel, Sameer Halai
  • Publication number: 20120131171
    Abstract: Techniques for invite abuse prevention are described. In an implementation, data that describes mutual activities of the clients with one or more resources available via a service provider is obtained from multiple clients. The service provider may use this data regarding mutual activities to ascertain activity scores between clients that interact directly. The ascertained activity scores may then be used to compute a score between two subject clients to control invites and/or other interactions between the clients. Computing the score may include determining one or more connections between the two clients through clients that interact directly, calculating candidate values for the one or more connections, and selecting one of the candidate values as the computed score using various techniques. The computed score may be used in various ways to control invites and/or other interactions between the clients using the one or more resources.
    Type: Application
    Filed: November 19, 2010
    Publication date: May 24, 2012
    Applicant: MICROSOFT CORPORATION
    Inventors: Arjmand M. Samuel, Sameer Halai
  • Publication number: 20110078190
    Abstract: Techniques for social network mapping are described. In an implementation, properties of a user's contacts with two services are analyzed to identify matching contacts. Contacts may be determined to correspond to the same user when sufficient common properties are found between the contacts. For unmatched contacts following the property analysis, additional processing may be conducted to identify contacts that the unmatched contacts have in common. A number of common contacts found through this processing may be used, alone or in combination, with information regarding common properties to determine when unmatched contacts correspond to the same user.
    Type: Application
    Filed: September 25, 2009
    Publication date: March 31, 2011
    Applicant: MICROSOFT CORPORATION
    Inventors: Arjmand M. Samuel, Sameer Halai