Patents by Inventor Arjmand M. Samuel
Arjmand M. Samuel has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 11050781Abstract: Example of secure monitoring of modular applications and associated edge devices are described herein. In an example, an accreditation request is initiated to accredit at least one of a modular application and an edge device hosting the modular application. The edge device may a device coupling an IoT device to a cloud server. Based on initiating, accreditation information corresponding to at least one of the modular application and the edge device may be received. The accreditation information are generated by a hardware encryption device associated with the edge device. Further, an accreditation status of the modular application may be monitored during execution of the modular application to ascertain whether the modular application and the edge device have been tampered. In case tampering is detected, a remedial action to address the tampering may be performed.Type: GrantFiled: February 23, 2018Date of Patent: June 29, 2021Assignee: MICROSOFT TECHNOLOGY LICENSING, LLCInventors: Arjmand M. Samuel, Chipalo N. Street, Damon Luke Barry, Eustace Asanghanwa, James W. Osborne
-
Publication number: 20190109874Abstract: Example of secure monitoring of modular applications and associated edge devices are described herein. In an example, an accreditation request is initiated to accredit at least one of a modular application and an edge device hosting the modular application. The edge device may a device coupling an IoT device to a cloud server. Based on initiating, accreditation information corresponding to at least one of the modular application and the edge device may be received. The accreditation information are generated by a hardware encryption device associated with the edge device. Further, an accreditation status of the modular application may be monitored during execution of the modular application to ascertain whether the modular application and the edge device have been tampered. In case tampering is detected, a remedial action to address the tampering may be performed.Type: ApplicationFiled: February 23, 2018Publication date: April 11, 2019Applicant: Microsoft Technology Licensing, LLCInventors: Arjmand M. SAMUEL, Chipalo N. STREET, Damon Luke BARRY, Eustace ASANGHANWA, James W. OSBORNE
-
Publication number: 20190109877Abstract: Example of secure metering of modular applications and associated edge devices are described herein. In an example, a request to secure one or more modular applications associated with one or more edge device may be received. The edge device may be a device authorized to couple an IoT device to a cloud server. A modular application may be a discrete application performing device specific functions or a part of a distributed application, the part being hosted on the IoT device. Further, the request may include a security policy. One or more secure enclaves for executing the modular applications may be generated, based on the security policy. Further, resource utilization in the secure enclaves may be determined based on a predefined unit of consumption using a distributed ledger. Based on the resource utilization, a resource utilization receipt indicative of financial units corresponding to the resource utilization may be generated.Type: ApplicationFiled: February 23, 2018Publication date: April 11, 2019Applicant: Microsoft Technology Licensing, LLCInventors: Arjmand M. Samuel, Chipalo N. Street, Damon Luke Barry, Eustace Asanghanwa, James W. Osborne
-
Patent number: 9495711Abstract: Techniques for invite abuse prevention are described. In an implementation, data that describes mutual activities of the clients with one or more resources available via a service provider is obtained from multiple clients. The service provider may use this data regarding mutual activities to ascertain activity scores between clients that interact directly. The ascertained activity scores may then be used to compute a score between two subject clients to control invites and/or other interactions between the clients. Computing the score may include determining one or more connections between the two clients through clients that interact directly, calculating candidate values for the one or more connections, and selecting one of the candidate values as the computed score using various techniques. The computed score may be used in various ways to control invites and/or other interactions between the clients using the one or more resources.Type: GrantFiled: November 19, 2010Date of Patent: November 15, 2016Assignee: MICROSOFT TECHNOLOGY LICENSING, LLCInventors: Arjmand M. Samuel, Sameer Halai
-
Patent number: 8214301Abstract: Techniques for social network mapping are described. In an implementation, properties of a user's contacts with two services are analyzed to identify matching contacts. Contacts may be determined to correspond to the same user when sufficient common properties are found between the contacts. For unmatched contacts following the property analysis, additional processing may be conducted to identify contacts that the unmatched contacts have in common. A number of common contacts found through this processing may be used, alone or in combination, with information regarding common properties to determine when unmatched contacts correspond to the same user.Type: GrantFiled: September 25, 2009Date of Patent: July 3, 2012Assignee: Microsoft CorporationInventors: Arjmand M. Samuel, Sameer Halai
-
Publication number: 20120131171Abstract: Techniques for invite abuse prevention are described. In an implementation, data that describes mutual activities of the clients with one or more resources available via a service provider is obtained from multiple clients. The service provider may use this data regarding mutual activities to ascertain activity scores between clients that interact directly. The ascertained activity scores may then be used to compute a score between two subject clients to control invites and/or other interactions between the clients. Computing the score may include determining one or more connections between the two clients through clients that interact directly, calculating candidate values for the one or more connections, and selecting one of the candidate values as the computed score using various techniques. The computed score may be used in various ways to control invites and/or other interactions between the clients using the one or more resources.Type: ApplicationFiled: November 19, 2010Publication date: May 24, 2012Applicant: MICROSOFT CORPORATIONInventors: Arjmand M. Samuel, Sameer Halai
-
Publication number: 20110078190Abstract: Techniques for social network mapping are described. In an implementation, properties of a user's contacts with two services are analyzed to identify matching contacts. Contacts may be determined to correspond to the same user when sufficient common properties are found between the contacts. For unmatched contacts following the property analysis, additional processing may be conducted to identify contacts that the unmatched contacts have in common. A number of common contacts found through this processing may be used, alone or in combination, with information regarding common properties to determine when unmatched contacts correspond to the same user.Type: ApplicationFiled: September 25, 2009Publication date: March 31, 2011Applicant: MICROSOFT CORPORATIONInventors: Arjmand M. Samuel, Sameer Halai