Patents by Inventor Himanshu Soni
Himanshu Soni has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 11449920Abstract: This disclosure describes, in part, techniques for providing add-ons associated with network applications. For instance, a user may be controlling an application that is executing on a remote system using a control device and a display device. While the application is executing, the remote system may send user interface data to the display device, where the user interface data represents a user interface that includes add-ons that may be acquired for the application. If the user selects an add-on, the display device may communicate with a payment system in order to acquire the add-on. The remote system may then determine that the user acquired the add-on using data received from the display device and/or data received from a management system associated with the application. As such, the remote system may enable the add-on for the user within the application.Type: GrantFiled: December 12, 2019Date of Patent: September 20, 2022Assignee: Amazon Technologies, Inc.Inventors: Matt Adams, Anjana Singh, Prateek Thukral, Kapil Gulati, Himanshu Soni
-
Patent number: 11032279Abstract: Techniques described herein leverage a trusted entity within a domain to enable devices to establish trust with one another so they can securely discover each other and connect to one another. In various examples discussed herein, a device is configured to provide trust information to, and/or receive trust information from, the trusted entity. The trust information may include, for example, a public key of an encryption key pair, a certificate signed by the trusted entity proving authenticity, and/or a hash function and a hash seed used to compute a series of results that form a hash chain. The device may use the trust information to discover another device and to connect to the other device securely and automatically (e.g., with no user involvement or limited user involvement). Moreover, the device may use the trust information to dynamically change a MAC address being used to communicate with the other device.Type: GrantFiled: July 16, 2019Date of Patent: June 8, 2021Assignee: Microsoft Technology Licensing, LLCInventors: Peter Dawoud Shenouda Dawoud, Anoosh Saboori, Himanshu Soni, Dustin Michael Ingalls, Nelly L. Porter
-
Patent number: 10721080Abstract: The present invention provides for streamlined issuance of certificates and other tokens that are contingent on key attestation of keys from a trusted platform module within a computing platform. Various methods are described for wrapping the requested token in a secret, such as an AES key, that is encrypted to a TPM based key in a key challenge. If the requesting platform fails the key challenge, the encrypted certificate or token cannot be decrypted. If requesting platform passes the challenge, the encrypted certificate or token can be decrypted using the AES key recovered from the key challenge.Type: GrantFiled: March 13, 2019Date of Patent: July 21, 2020Assignee: Microsoft Technology Licensing, LLCInventors: Christopher Edward Fenner, Peter David Waxman, Gabriel Fortunato Stocco, Kam Kouladjie, Cristian Stefan Salvan, Prabu Raju, Himanshu Soni, Gridhar Viswanathan
-
Patent number: 10581848Abstract: Techniques described herein leverage a trusted entity within a domain to enable devices to establish trust with one another so they can securely discover each other and connect to one another. In various examples discussed herein, a device is configured to provide trust information to, and/or receive trust information from, the trusted entity. The trust information may include, for example, a public key of an encryption key pair, a certificate signed by the trusted entity proving authenticity, and/or a hash function and a hash seed used to compute a series of results that form a hash chain. The device may use the trust information to discover another device and to connect to the other device securely and automatically (e.g., with no user involvement or limited user involvement). Moreover, the device may use the trust information to dynamically change a MAC address being used to communicate with the other device.Type: GrantFiled: June 21, 2017Date of Patent: March 3, 2020Assignee: Microsoft Technology Licensing, LLCInventors: Peter Dawoud Shenouda Dawoud, Anoosh Saboori, Himanshu Soni, Dustin Michael Ingalls, Nelly L. Porter
-
Patent number: 10574459Abstract: A facility for enrolling a software implementer in a code signing. In one example facility, the facility receives information identifying the implementer, and credentials authenticating the implementer. The facility generates secret state for the implementer. Based on at least one or both of (1) at least a portion of the received credentials and (2) at least a portion of the generated secret state, the facility generates for the implementer a key pair comprising a private key and a public key, and persistently stores the secret state.Type: GrantFiled: September 30, 2015Date of Patent: February 25, 2020Assignee: Microsoft Technology Licensing, LLCInventors: Prabu Raju, Fengfen Liu, Christopher Leonard Walstad, Levi P. Broderick, Himanshu Soni, Reed Molbak, Klaudia Leja
-
Publication number: 20190386992Abstract: Techniques described herein leverage a trusted entity within a domain to enable devices to establish trust with one another so they can securely discover each other and connect to one another. In various examples discussed herein, a device is configured to provide trust information to, and/or receive trust information from, the trusted entity. The trust information may include, for example, a public key of an encryption key pair, a certificate signed by the trusted entity proving authenticity, and/or a hash function and a hash seed used to compute a series of results that form a hash chain. The device may use the trust information to discover another device and to connect to the other device securely and automatically (e.g., with no user involvement or limited user involvement). Moreover, the device may use the trust information to dynamically change a MAC address being used to communicate with the other device.Type: ApplicationFiled: July 16, 2019Publication date: December 19, 2019Inventors: Peter DAWOUD SHENOUDA DAWOUD, Anoosh SABOORI, Himanshu SONI, Dustin Michael INGALLS, Nelly L. PORTER
-
Patent number: 10498846Abstract: Presence based content access control techniques are described in which presence of users is used as a basis for enforcing content restrictions. In an implementation, applications are registered to receive feedback regarding users' presence in relation to a presentation of content via a computing device. The presence of users is recognized independently of authentication of the users to access user accounts. For example, an imaging sensor such as camera may be employed for recognition of multiple users engaged with the computing device. In addition or alternatively, presence devices associated with users such as badges, key fobs, or access cards may be detected to ascertain the presence of users. Feedback indicative of the one or more users that are recognized may then be supplied to the registered applications. The feedback enables the applications to control the presentation of content by enforcing content restrictions and/or taking other presence based actions.Type: GrantFiled: August 17, 2018Date of Patent: December 3, 2019Assignee: Microsoft Technology Licensing, LLCInventors: Peter Dawoud Shenouda Dawoud, Nelly Porter, Himanshu Soni, Dustin Michael Ingalls, Kyle James Krum
-
Publication number: 20190280883Abstract: The present invention provides for streamlined issuance of certificates and other tokens that are contingent on key attestation of keys from a trusted platform module within a computing platform. Various methods are described for wrapping the requested token in a secret, such as an AES key, that is encrypted to a TPM based key in a key challenge. If the requesting platform fails the key challenge, the encrypted certificate or token cannot be decrypted. If requesting platform passes the challenge, the encrypted certificate or token can be decrypted using the AES key recovered from the key challenge.Type: ApplicationFiled: March 13, 2019Publication date: September 12, 2019Applicant: Microsoft Technology Licensing, LLCInventors: Christopher Edward Fenner, Peter David Waxman, Gabriel Fortunato Stocco, Kam Kouladjie, Cristian Stefan Salvan, Prabu Raju, Himanshu Soni, Giridhar Viswanathan
-
Patent number: 10362031Abstract: Techniques described herein leverage a trusted entity within a domain to enable devices to establish trust with one another so they can securely discover each other and connect to one another. In various examples discussed herein, a device is configured to provide trust information to, and/or receive trust information from, the trusted entity. The trust information may include, for example, a public key of an encryption key pair, a certificate signed by the trusted entity proving authenticity, and/or a hash function and a hash seed used to compute a series of results that form a hash chain. The device may use the trust information to discover another device and to connect to the other device securely and automatically (e.g., with no user involvement or limited user involvement). Moreover, the device may use the trust information to dynamically change a MAC address being used to communicate with the other device.Type: GrantFiled: June 21, 2017Date of Patent: July 23, 2019Assignee: Microsoft Technology Licensing, LLCInventors: Peter Dawoud Shenouda Dawoud, Anoosh Saboori, Himanshu Soni, Dustin Michael Ingalls, Nelly L. Porter
-
Publication number: 20190158420Abstract: Methods, systems, and computer readable storage media are disclosed that aid migration team members with migrating software applications from one platform to another platform, and more particularly, with tools that aid in migrating mainframe applications to a lower cost platform. The tools include legacy statistical generators that scan and analyze components of a mainframe application as well as the datasets associated with the mainframe application. The legacy statistical generators as a result of such analysis extract various statistical information regarding the application and datasets and provide such extracted information to a web-enabled application. Migration team members may use the web-enabled application to gain insight into the structure of the mainframe application as well as determine progress of migrating the mainframe application to the lower cost platform.Type: ApplicationFiled: November 19, 2018Publication date: May 23, 2019Inventors: Himanshu Soni, Tanveer Akhter Khan, Sudip Mitra, Ravinder Kumar, Subir Chatterjee, Kesavan Srinivasan
-
Patent number: 10277407Abstract: The present invention provides for streamlined issuance of certificates and other tokens that are contingent on key attestation of keys from a trusted platform module within a computing platform. Various methods are described for wrapping the requested token in a secret, such as an AES key, that is encrypted to a TPM based key in a key challenge. If the requesting platform fails the key challenge, the encrypted certificate or token cannot be decrypted. If requesting platform passes the challenge, the encrypted certificate or token can be decrypted using the AES key recovered from the key challenge.Type: GrantFiled: August 26, 2016Date of Patent: April 30, 2019Assignee: Microsoft Technology Licensing, LLCInventors: Christopher Edward Fenner, Peter David Waxman, Gabriel Fortunato Stocco, Kam Kouladjie, Cristian Stefan Salvan, Prabu Raju, Himanshu Soni, Giridhar Viswanathan
-
Publication number: 20180359326Abstract: Presence based content access control techniques are described in which presence of users is used as a basis for enforcing content restrictions. In an implementation, applications are registered to receive feedback regarding users' presence in relation to a presentation of content via a computing device. The presence of users is recognized independently of authentication of the users to access user accounts. For example, an imaging sensor such as camera may be employed for recognition of multiple users engaged with the computing device. In addition or alternatively, presence devices associated with users such as badges, key fobs, or access cards may be detected to ascertain the presence of users. Feedback indicative of the one or more users that are recognized may then be supplied to the registered applications. The feedback enables the applications to control the presentation of content by enforcing content restrictions and/or taking other presence based actions.Type: ApplicationFiled: August 17, 2018Publication date: December 13, 2018Inventors: Peter Dawoud Shenouda Dawoud, Nelly Porter, Himanshu Soni, Dustin Michael Ingalls, Kyle James Krum
-
Patent number: 10135749Abstract: Methods, systems, and computer readable storage media are disclosed that aid migration team members with migrating software applications from one platform to another platform, and more particularly, with tools that aid in migrating mainframe applications to a lower cost platform. The tools include legacy statistical generators that scan and analyze components of a mainframe application as well as the datasets associated with the mainframe application. The legacy statistical generators as a result of such analysis extract various statistical information regarding the application and datasets and provide such extracted information to a web-enabled application. Migration team members may use the web-enabled application to gain insight into the structure of the mainframe application as well as determine progress of migrating the mainframe application to the lower cost platform.Type: GrantFiled: November 22, 2013Date of Patent: November 20, 2018Assignee: SEARS BRANDS, L.L.C.Inventors: Himanshu Soni, Tanveer Akhter Khan, Sudip Mitra, Ravinder Kumar, Subir Chatterjee, Kesavan Srinivasan
-
Patent number: 10097655Abstract: Presence based content access control techniques are described in which presence of users is used as a basis for enforcing content restrictions. In an implementation, applications are registered to receive feedback regarding users' presence in relation to a presentation of content via a computing device. The presence of users is recognized independently of authentication of the users to access user accounts. For example, an imaging sensor such as camera may be employed for recognition of multiple users engaged with the computing device. In addition or alternatively, presence devices associated with users such as badges, key fobs, or access cards may be detected to ascertain the presence of users. Feedback indicative of the one or more users that are recognized may then be supplied to the registered applications. The feedback enables the applications to control the presentation of content by enforcing content restrictions and/or taking other presence based actions.Type: GrantFiled: April 19, 2017Date of Patent: October 9, 2018Assignee: Microsoft Licensing Technology, LLCInventors: Peter Dawoud Shenouda Dawoud, Nelly Porter, Himanshu Soni, Dustin Michael Ingalls, Kyle James Krum
-
Publication number: 20170302666Abstract: Techniques described herein leverage a trusted entity within a domain to enable devices to establish trust with one another so they can securely discover each other and connect to one another. In various examples discussed herein, a device is configured to provide trust information to, and/or receive trust information from, the trusted entity. The trust information may include, for example, a public key of an encryption key pair, a certificate signed by the trusted entity proving authenticity, and/or a hash function and a hash seed used to compute a series of results that form a hash chain. The device may use the trust information to discover another device and to connect to the other device securely and automatically (e.g., with no user involvement or limited user involvement). Moreover, the device may use the trust information to dynamically change a MAC address being used to communicate with the other device.Type: ApplicationFiled: June 21, 2017Publication date: October 19, 2017Inventors: Peter DAWOUD SHENOUDA DAWOUD, Anoosh SABOORI, Himanshu SONI, Dustin Michael INGALLS, Nelly L. PORTER
-
Publication number: 20170302459Abstract: The present invention provides for streamlined issuance of certificates and other tokens that are contingent on key attestation of keys from a trusted platform module within a computing platform. Various methods are described for wrapping the requested token in a secret, such as an AES key, that is encrypted to a TPM based key in a key challenge. If the requesting platform fails the key challenge, the encrypted certificate or token cannot be decrypted. If requesting platform passes the challenge, the encrypted certificate or token can be decrypted using the AES key recovered from the key challenge.Type: ApplicationFiled: August 26, 2016Publication date: October 19, 2017Applicant: Microsoft Technology Licensing, LLCInventors: Christopher Edward Fenner, Peter David Waxman, Gabriel Fortunato Stocco, Kam Kouladjie, Cristian Stefan Salvan, Prabu Raju, Himanshu Soni, Giridhar Viswanathan
-
Publication number: 20170289157Abstract: Techniques described herein leverage a trusted entity within a domain to enable devices to establish trust with one another so they can securely discover each other and connect to one another. In various examples discussed herein, a device is configured to provide trust information to, and/or receive trust information from, the trusted entity. The trust information may include, for example, a public key of an encryption key pair, a certificate signed by the trusted entity proving authenticity, and/or a hash function and a hash seed used to compute a series of results that form a hash chain. The device may use the trust information to discover another device and to connect to the other device securely and automatically (e.g., with no user involvement or limited user involvement). Moreover, the device may use the trust information to dynamically change a MAC address being used to communicate with the other device.Type: ApplicationFiled: June 21, 2017Publication date: October 5, 2017Inventors: Peter DAWOUD SHENOUDA DAWOUD, Anoosh SABOORI, Himanshu SONI, Dustin Michael INGALLS, Nelly L. PORTER
-
Publication number: 20170223125Abstract: Presence based content access control techniques are described in which presence of users is used as a basis for enforcing content restrictions. In an implementation, applications are registered to receive feedback regarding users' presence in relation to a presentation of content via a computing device. The presence of users is recognized independently of authentication of the users to access user accounts. For example, an imaging sensor such as camera may be employed for recognition of multiple users engaged with the computing device. In addition or alternatively, presence devices associated with users such as badges, key fobs, or access cards may be detected to ascertain the presence of users. Feedback indicative of the one or more users that are recognized may then be supplied to the registered applications. The feedback enables the applications to control the presentation of content by enforcing content restrictions and/or taking other presence based actions.Type: ApplicationFiled: April 19, 2017Publication date: August 3, 2017Applicant: Microsoft Technology Licensing, LLCInventors: Peter Dawoud Shenouda Dawoud, Nelly Porter, Himanshu Soni, Dustin Michael Ingalls, Kyle James Krum
-
Patent number: 9716716Abstract: Techniques described herein leverage a trusted entity within a domain to enable devices to establish trust with one another so they can securely discover each other and connect to one another. In various examples discussed herein, a device is configured to provide trust information to, and/or receive trust information from, the trusted entity. The trust information may include, for example, a public key of an encryption key pair, a certificate signed by the trusted entity proving authenticity, and/or a hash function and a hash seed used to compute a series of results that form a hash chain. The device may use the trust information to discover another device and to connect to the other device securely and automatically (e.g., with no user involvement or limited user involvement). Moreover, the device may use the trust information to dynamically change a MAC address being used to communicate with the other device.Type: GrantFiled: March 6, 2015Date of Patent: July 25, 2017Assignee: Microsoft Technology Licensing, LLCInventors: Peter Dawoud Shenouda Dawoud, Anoosh Saboori, Himanshu Soni, Dustin Michael Ingalls, Nelly L. Porter
-
Patent number: 9686274Abstract: In one embodiment, a user login device may create a user identifier template 400 for identifying a user by implicitly capturing one or more biometric identifier readings. A user login device may capture an enrollment biometric identifier reading of a user during an operational user action. The user login device may apply the enrollment biometric identifier reading in creating a user identifier template 400.Type: GrantFiled: October 11, 2013Date of Patent: June 20, 2017Assignee: Microsoft Technology Licensing, LLCInventors: Himanshu Soni, Vijay Bharadwaj, Arthur H. Baker, Gopinathan Kannan, Ryan Segeberg, Nelly Porter