Patents by Inventor Chih-pin Kao
Chih-pin Kao has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 11226983Abstract: Systems and methods for synchronizing data between an online data source and a client application. The method includes, in response to a change in a permission associated with a user to a protected data set included in a shared data space of the online data source, receiving, with the client application associated with the user, a protected data synchronization token issued by the online data source associated with the protected data set and downloading, with the client application, the protected data set included in the shared data space from the online data source to the client application using the protected data synchronization token without re-downloading a public data set included in the shared data space. After downloading the protected data set, the method includes synchronizing the shared data space, including the protected data set and the public data set, using a stored data space synchronization token.Type: GrantFiled: June 18, 2019Date of Patent: January 18, 2022Assignee: Microsoft Technology Licensing, LLCInventors: Chih-Pin Kao, Xi Tong, Keping Zhao, Lin Wang, Gregory Powell Young, Deepak Sreenivas Pemmaraju
-
Publication number: 20200401600Abstract: Systems and methods for synchronizing data between an online data source and a client application. The method includes, in response to a change in a permission associated with a user to a protected data set included in a shared data space of the online data source, receiving, with the client application associated with the user, a protected data synchronization token issued by the online data source associated with the protected data set and downloading, with the client application, the protected data set included in the shared data space from the online data source to the client application using the protected data synchronization token without re-downloading a public data set included in the shared data space. After downloading the protected data set, the method includes synchronizing the shared data space, including the protected data set and the public data set, using a stored data space synchronization token.Type: ApplicationFiled: June 18, 2019Publication date: December 24, 2020Inventors: Chih-Pin KAO, Xi TONG, Keping ZHAO, Lin WANG, Gregory Powell YOUNG, Deepak Sreenivas PEMMARAJU
-
Patent number: 9830430Abstract: Methods and systems are disclosed in which inherited activation opens a secure communication path from the host operating system (OS) to the guest (virtual machine) OS. The license state of the software on the host is passed through this channel, and software installed in the guest uses this information to inform its own product activation process. The virtualized (guest) software may then activate without any outside communication when the license requirements for the host are met.Type: GrantFiled: September 2, 2014Date of Patent: November 28, 2017Assignee: Microsoft Technology Licensing, LLCInventors: Aaron J. Smith, Tyron M. Balascio, Ajay Bhave, Chih-pin Kao, Emeron Bachhuber, Mikael P. Horal
-
Publication number: 20140373014Abstract: Methods and systems are disclosed in which inherited activation opens a secure communication path from the host operating system (OS) to the guest (virtual machine) OS. The license state of the software on the host is passed through this channel, and software installed in the guest uses this information to inform its own product activation process. The virtualized (guest) software may then activate without any outside communication when the license requirements for the host are met.Type: ApplicationFiled: September 2, 2014Publication date: December 18, 2014Inventors: Aaron J. Smith, Tyron M. Balascio, Ajay Bhave, Chih-pin Kao, Emeron Bahhuber, Mikael P. Horal
-
Patent number: 8832686Abstract: Methods and systems are disclosed in which inherited activation opens a secure communication path from the host operating system (OS) to the guest (virtual machine) OS. The license state of the software on the host is passed through this channel, and software installed in the guest uses this information to inform its own product activation process. The virtualized (guest) software may then activate without any outside communication when the license requirements for the host are met.Type: GrantFiled: October 29, 2010Date of Patent: September 9, 2014Assignee: Microsoft CorporationInventors: Aaron J. Smith, Tyron M. Balascio, Ajay Bhave, Chih-pin Kao, Emeron Bachhuber, Mikael P. Horal
-
Patent number: 8806192Abstract: One or more techniques and/or systems are provided for securely authorizing a client to consume data and/or services from a service provider server while mitigating burdensome requests made to a validation server. That is, validation data provided to a client from a validation server may be maintained on the client and at least some of that validation data can be used to subsequently authorize the client when the client attempts to consume data and/or services from the service provider server (e.g., download a song). However, the validation data is maintained on the client and/or provided to the service provider server in a manner that inhibits user tampering. In this manner, numerous requests for validation of the client need not be made from the service provider server to the validation server when a client requests content from the service provider server, while also inhibiting unauthorized consumptions of data by the client.Type: GrantFiled: May 4, 2011Date of Patent: August 12, 2014Assignee: Microsoft CorporationInventors: Hakki Tunc Bostanci, Robert Edgar Fanfant, Chih-Pin Kao, Satish K. Shetty, Kalin G. Toshev, Yefei Gao
-
Publication number: 20130117006Abstract: Techniques involving a simulated start-up or “boot” process to detect the introduction of unauthorized code or data into the boot process. In one embodiment, a boot process is performed to initiate a computing system. The boot process is then simulated using the initiated computing system to detect unauthorized modifications introduced into the computing system prior to the computing system's operating system being operational.Type: ApplicationFiled: November 7, 2011Publication date: May 9, 2013Applicant: MICROSOFT CORPORATIONInventors: Asish George Varghese, Chih-Pin Kao, Robert Fanfant, Hakki Tunc Bostanci
-
Publication number: 20120284507Abstract: One or more techniques and/or systems are provided for securely authorizing a client to consume data and/or services from a service provider server while mitigating burdensome requests made to a validation server. That is, validation data provided to a client from a validation server may be maintained on the client and at least some of that validation data can be used to subsequently authorize the client when the client attempts to consume data and/or services from the service provider server (e.g., download a song). However, the validation data is maintained on the client and/or provided to the service provider server in a manner that inhibits user tampering. In this manner, numerous requests for validation of the client need not be made from the service provider server to the validation server when a client requests content from the service provider server, while also inhibiting unauthorized consumptions of data by the client.Type: ApplicationFiled: May 4, 2011Publication date: November 8, 2012Applicant: Microsoft CorporationInventors: Hakki Tunc Bostanci, Robert Edgar Fanfant, Chih-Pin Kao, Satish K. Shetty, Kalin G. Toshev, Yefei Gao
-
Publication number: 20120110571Abstract: Methods and systems are disclosed in which inherited activation opens a secure communication path from the host operating system (OS) to the guest (virtual machine) OS. The license state of the software on the host is passed through this channel, and software installed in the guest uses this information to inform its own product activation process. The virtualized (guest) software may then activate without any outside communication when the license requirements for the host are met.Type: ApplicationFiled: October 29, 2010Publication date: May 3, 2012Applicant: Microsoft CorporationInventors: Aaron J. Smith, Tyron M. Balascio, Ajay Bhave, Chih-pin Kao, Emeron Bahhuber, Mikael P. Horal