Patents by Inventor Himanshu Soni

Himanshu Soni has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 11449920
    Abstract: This disclosure describes, in part, techniques for providing add-ons associated with network applications. For instance, a user may be controlling an application that is executing on a remote system using a control device and a display device. While the application is executing, the remote system may send user interface data to the display device, where the user interface data represents a user interface that includes add-ons that may be acquired for the application. If the user selects an add-on, the display device may communicate with a payment system in order to acquire the add-on. The remote system may then determine that the user acquired the add-on using data received from the display device and/or data received from a management system associated with the application. As such, the remote system may enable the add-on for the user within the application.
    Type: Grant
    Filed: December 12, 2019
    Date of Patent: September 20, 2022
    Assignee: Amazon Technologies, Inc.
    Inventors: Matt Adams, Anjana Singh, Prateek Thukral, Kapil Gulati, Himanshu Soni
  • Patent number: 11032279
    Abstract: Techniques described herein leverage a trusted entity within a domain to enable devices to establish trust with one another so they can securely discover each other and connect to one another. In various examples discussed herein, a device is configured to provide trust information to, and/or receive trust information from, the trusted entity. The trust information may include, for example, a public key of an encryption key pair, a certificate signed by the trusted entity proving authenticity, and/or a hash function and a hash seed used to compute a series of results that form a hash chain. The device may use the trust information to discover another device and to connect to the other device securely and automatically (e.g., with no user involvement or limited user involvement). Moreover, the device may use the trust information to dynamically change a MAC address being used to communicate with the other device.
    Type: Grant
    Filed: July 16, 2019
    Date of Patent: June 8, 2021
    Assignee: Microsoft Technology Licensing, LLC
    Inventors: Peter Dawoud Shenouda Dawoud, Anoosh Saboori, Himanshu Soni, Dustin Michael Ingalls, Nelly L. Porter
  • Patent number: 10721080
    Abstract: The present invention provides for streamlined issuance of certificates and other tokens that are contingent on key attestation of keys from a trusted platform module within a computing platform. Various methods are described for wrapping the requested token in a secret, such as an AES key, that is encrypted to a TPM based key in a key challenge. If the requesting platform fails the key challenge, the encrypted certificate or token cannot be decrypted. If requesting platform passes the challenge, the encrypted certificate or token can be decrypted using the AES key recovered from the key challenge.
    Type: Grant
    Filed: March 13, 2019
    Date of Patent: July 21, 2020
    Assignee: Microsoft Technology Licensing, LLC
    Inventors: Christopher Edward Fenner, Peter David Waxman, Gabriel Fortunato Stocco, Kam Kouladjie, Cristian Stefan Salvan, Prabu Raju, Himanshu Soni, Gridhar Viswanathan
  • Patent number: 10581848
    Abstract: Techniques described herein leverage a trusted entity within a domain to enable devices to establish trust with one another so they can securely discover each other and connect to one another. In various examples discussed herein, a device is configured to provide trust information to, and/or receive trust information from, the trusted entity. The trust information may include, for example, a public key of an encryption key pair, a certificate signed by the trusted entity proving authenticity, and/or a hash function and a hash seed used to compute a series of results that form a hash chain. The device may use the trust information to discover another device and to connect to the other device securely and automatically (e.g., with no user involvement or limited user involvement). Moreover, the device may use the trust information to dynamically change a MAC address being used to communicate with the other device.
    Type: Grant
    Filed: June 21, 2017
    Date of Patent: March 3, 2020
    Assignee: Microsoft Technology Licensing, LLC
    Inventors: Peter Dawoud Shenouda Dawoud, Anoosh Saboori, Himanshu Soni, Dustin Michael Ingalls, Nelly L. Porter
  • Patent number: 10574459
    Abstract: A facility for enrolling a software implementer in a code signing. In one example facility, the facility receives information identifying the implementer, and credentials authenticating the implementer. The facility generates secret state for the implementer. Based on at least one or both of (1) at least a portion of the received credentials and (2) at least a portion of the generated secret state, the facility generates for the implementer a key pair comprising a private key and a public key, and persistently stores the secret state.
    Type: Grant
    Filed: September 30, 2015
    Date of Patent: February 25, 2020
    Assignee: Microsoft Technology Licensing, LLC
    Inventors: Prabu Raju, Fengfen Liu, Christopher Leonard Walstad, Levi P. Broderick, Himanshu Soni, Reed Molbak, Klaudia Leja
  • Publication number: 20190386992
    Abstract: Techniques described herein leverage a trusted entity within a domain to enable devices to establish trust with one another so they can securely discover each other and connect to one another. In various examples discussed herein, a device is configured to provide trust information to, and/or receive trust information from, the trusted entity. The trust information may include, for example, a public key of an encryption key pair, a certificate signed by the trusted entity proving authenticity, and/or a hash function and a hash seed used to compute a series of results that form a hash chain. The device may use the trust information to discover another device and to connect to the other device securely and automatically (e.g., with no user involvement or limited user involvement). Moreover, the device may use the trust information to dynamically change a MAC address being used to communicate with the other device.
    Type: Application
    Filed: July 16, 2019
    Publication date: December 19, 2019
    Inventors: Peter DAWOUD SHENOUDA DAWOUD, Anoosh SABOORI, Himanshu SONI, Dustin Michael INGALLS, Nelly L. PORTER
  • Patent number: 10498846
    Abstract: Presence based content access control techniques are described in which presence of users is used as a basis for enforcing content restrictions. In an implementation, applications are registered to receive feedback regarding users' presence in relation to a presentation of content via a computing device. The presence of users is recognized independently of authentication of the users to access user accounts. For example, an imaging sensor such as camera may be employed for recognition of multiple users engaged with the computing device. In addition or alternatively, presence devices associated with users such as badges, key fobs, or access cards may be detected to ascertain the presence of users. Feedback indicative of the one or more users that are recognized may then be supplied to the registered applications. The feedback enables the applications to control the presentation of content by enforcing content restrictions and/or taking other presence based actions.
    Type: Grant
    Filed: August 17, 2018
    Date of Patent: December 3, 2019
    Assignee: Microsoft Technology Licensing, LLC
    Inventors: Peter Dawoud Shenouda Dawoud, Nelly Porter, Himanshu Soni, Dustin Michael Ingalls, Kyle James Krum
  • Publication number: 20190280883
    Abstract: The present invention provides for streamlined issuance of certificates and other tokens that are contingent on key attestation of keys from a trusted platform module within a computing platform. Various methods are described for wrapping the requested token in a secret, such as an AES key, that is encrypted to a TPM based key in a key challenge. If the requesting platform fails the key challenge, the encrypted certificate or token cannot be decrypted. If requesting platform passes the challenge, the encrypted certificate or token can be decrypted using the AES key recovered from the key challenge.
    Type: Application
    Filed: March 13, 2019
    Publication date: September 12, 2019
    Applicant: Microsoft Technology Licensing, LLC
    Inventors: Christopher Edward Fenner, Peter David Waxman, Gabriel Fortunato Stocco, Kam Kouladjie, Cristian Stefan Salvan, Prabu Raju, Himanshu Soni, Giridhar Viswanathan
  • Patent number: 10362031
    Abstract: Techniques described herein leverage a trusted entity within a domain to enable devices to establish trust with one another so they can securely discover each other and connect to one another. In various examples discussed herein, a device is configured to provide trust information to, and/or receive trust information from, the trusted entity. The trust information may include, for example, a public key of an encryption key pair, a certificate signed by the trusted entity proving authenticity, and/or a hash function and a hash seed used to compute a series of results that form a hash chain. The device may use the trust information to discover another device and to connect to the other device securely and automatically (e.g., with no user involvement or limited user involvement). Moreover, the device may use the trust information to dynamically change a MAC address being used to communicate with the other device.
    Type: Grant
    Filed: June 21, 2017
    Date of Patent: July 23, 2019
    Assignee: Microsoft Technology Licensing, LLC
    Inventors: Peter Dawoud Shenouda Dawoud, Anoosh Saboori, Himanshu Soni, Dustin Michael Ingalls, Nelly L. Porter
  • Publication number: 20190158420
    Abstract: Methods, systems, and computer readable storage media are disclosed that aid migration team members with migrating software applications from one platform to another platform, and more particularly, with tools that aid in migrating mainframe applications to a lower cost platform. The tools include legacy statistical generators that scan and analyze components of a mainframe application as well as the datasets associated with the mainframe application. The legacy statistical generators as a result of such analysis extract various statistical information regarding the application and datasets and provide such extracted information to a web-enabled application. Migration team members may use the web-enabled application to gain insight into the structure of the mainframe application as well as determine progress of migrating the mainframe application to the lower cost platform.
    Type: Application
    Filed: November 19, 2018
    Publication date: May 23, 2019
    Inventors: Himanshu Soni, Tanveer Akhter Khan, Sudip Mitra, Ravinder Kumar, Subir Chatterjee, Kesavan Srinivasan
  • Patent number: 10277407
    Abstract: The present invention provides for streamlined issuance of certificates and other tokens that are contingent on key attestation of keys from a trusted platform module within a computing platform. Various methods are described for wrapping the requested token in a secret, such as an AES key, that is encrypted to a TPM based key in a key challenge. If the requesting platform fails the key challenge, the encrypted certificate or token cannot be decrypted. If requesting platform passes the challenge, the encrypted certificate or token can be decrypted using the AES key recovered from the key challenge.
    Type: Grant
    Filed: August 26, 2016
    Date of Patent: April 30, 2019
    Assignee: Microsoft Technology Licensing, LLC
    Inventors: Christopher Edward Fenner, Peter David Waxman, Gabriel Fortunato Stocco, Kam Kouladjie, Cristian Stefan Salvan, Prabu Raju, Himanshu Soni, Giridhar Viswanathan
  • Publication number: 20180359326
    Abstract: Presence based content access control techniques are described in which presence of users is used as a basis for enforcing content restrictions. In an implementation, applications are registered to receive feedback regarding users' presence in relation to a presentation of content via a computing device. The presence of users is recognized independently of authentication of the users to access user accounts. For example, an imaging sensor such as camera may be employed for recognition of multiple users engaged with the computing device. In addition or alternatively, presence devices associated with users such as badges, key fobs, or access cards may be detected to ascertain the presence of users. Feedback indicative of the one or more users that are recognized may then be supplied to the registered applications. The feedback enables the applications to control the presentation of content by enforcing content restrictions and/or taking other presence based actions.
    Type: Application
    Filed: August 17, 2018
    Publication date: December 13, 2018
    Inventors: Peter Dawoud Shenouda Dawoud, Nelly Porter, Himanshu Soni, Dustin Michael Ingalls, Kyle James Krum
  • Patent number: 10135749
    Abstract: Methods, systems, and computer readable storage media are disclosed that aid migration team members with migrating software applications from one platform to another platform, and more particularly, with tools that aid in migrating mainframe applications to a lower cost platform. The tools include legacy statistical generators that scan and analyze components of a mainframe application as well as the datasets associated with the mainframe application. The legacy statistical generators as a result of such analysis extract various statistical information regarding the application and datasets and provide such extracted information to a web-enabled application. Migration team members may use the web-enabled application to gain insight into the structure of the mainframe application as well as determine progress of migrating the mainframe application to the lower cost platform.
    Type: Grant
    Filed: November 22, 2013
    Date of Patent: November 20, 2018
    Assignee: SEARS BRANDS, L.L.C.
    Inventors: Himanshu Soni, Tanveer Akhter Khan, Sudip Mitra, Ravinder Kumar, Subir Chatterjee, Kesavan Srinivasan
  • Patent number: 10097655
    Abstract: Presence based content access control techniques are described in which presence of users is used as a basis for enforcing content restrictions. In an implementation, applications are registered to receive feedback regarding users' presence in relation to a presentation of content via a computing device. The presence of users is recognized independently of authentication of the users to access user accounts. For example, an imaging sensor such as camera may be employed for recognition of multiple users engaged with the computing device. In addition or alternatively, presence devices associated with users such as badges, key fobs, or access cards may be detected to ascertain the presence of users. Feedback indicative of the one or more users that are recognized may then be supplied to the registered applications. The feedback enables the applications to control the presentation of content by enforcing content restrictions and/or taking other presence based actions.
    Type: Grant
    Filed: April 19, 2017
    Date of Patent: October 9, 2018
    Assignee: Microsoft Licensing Technology, LLC
    Inventors: Peter Dawoud Shenouda Dawoud, Nelly Porter, Himanshu Soni, Dustin Michael Ingalls, Kyle James Krum
  • Publication number: 20170302666
    Abstract: Techniques described herein leverage a trusted entity within a domain to enable devices to establish trust with one another so they can securely discover each other and connect to one another. In various examples discussed herein, a device is configured to provide trust information to, and/or receive trust information from, the trusted entity. The trust information may include, for example, a public key of an encryption key pair, a certificate signed by the trusted entity proving authenticity, and/or a hash function and a hash seed used to compute a series of results that form a hash chain. The device may use the trust information to discover another device and to connect to the other device securely and automatically (e.g., with no user involvement or limited user involvement). Moreover, the device may use the trust information to dynamically change a MAC address being used to communicate with the other device.
    Type: Application
    Filed: June 21, 2017
    Publication date: October 19, 2017
    Inventors: Peter DAWOUD SHENOUDA DAWOUD, Anoosh SABOORI, Himanshu SONI, Dustin Michael INGALLS, Nelly L. PORTER
  • Publication number: 20170302459
    Abstract: The present invention provides for streamlined issuance of certificates and other tokens that are contingent on key attestation of keys from a trusted platform module within a computing platform. Various methods are described for wrapping the requested token in a secret, such as an AES key, that is encrypted to a TPM based key in a key challenge. If the requesting platform fails the key challenge, the encrypted certificate or token cannot be decrypted. If requesting platform passes the challenge, the encrypted certificate or token can be decrypted using the AES key recovered from the key challenge.
    Type: Application
    Filed: August 26, 2016
    Publication date: October 19, 2017
    Applicant: Microsoft Technology Licensing, LLC
    Inventors: Christopher Edward Fenner, Peter David Waxman, Gabriel Fortunato Stocco, Kam Kouladjie, Cristian Stefan Salvan, Prabu Raju, Himanshu Soni, Giridhar Viswanathan
  • Publication number: 20170289157
    Abstract: Techniques described herein leverage a trusted entity within a domain to enable devices to establish trust with one another so they can securely discover each other and connect to one another. In various examples discussed herein, a device is configured to provide trust information to, and/or receive trust information from, the trusted entity. The trust information may include, for example, a public key of an encryption key pair, a certificate signed by the trusted entity proving authenticity, and/or a hash function and a hash seed used to compute a series of results that form a hash chain. The device may use the trust information to discover another device and to connect to the other device securely and automatically (e.g., with no user involvement or limited user involvement). Moreover, the device may use the trust information to dynamically change a MAC address being used to communicate with the other device.
    Type: Application
    Filed: June 21, 2017
    Publication date: October 5, 2017
    Inventors: Peter DAWOUD SHENOUDA DAWOUD, Anoosh SABOORI, Himanshu SONI, Dustin Michael INGALLS, Nelly L. PORTER
  • Publication number: 20170223125
    Abstract: Presence based content access control techniques are described in which presence of users is used as a basis for enforcing content restrictions. In an implementation, applications are registered to receive feedback regarding users' presence in relation to a presentation of content via a computing device. The presence of users is recognized independently of authentication of the users to access user accounts. For example, an imaging sensor such as camera may be employed for recognition of multiple users engaged with the computing device. In addition or alternatively, presence devices associated with users such as badges, key fobs, or access cards may be detected to ascertain the presence of users. Feedback indicative of the one or more users that are recognized may then be supplied to the registered applications. The feedback enables the applications to control the presentation of content by enforcing content restrictions and/or taking other presence based actions.
    Type: Application
    Filed: April 19, 2017
    Publication date: August 3, 2017
    Applicant: Microsoft Technology Licensing, LLC
    Inventors: Peter Dawoud Shenouda Dawoud, Nelly Porter, Himanshu Soni, Dustin Michael Ingalls, Kyle James Krum
  • Patent number: 9716716
    Abstract: Techniques described herein leverage a trusted entity within a domain to enable devices to establish trust with one another so they can securely discover each other and connect to one another. In various examples discussed herein, a device is configured to provide trust information to, and/or receive trust information from, the trusted entity. The trust information may include, for example, a public key of an encryption key pair, a certificate signed by the trusted entity proving authenticity, and/or a hash function and a hash seed used to compute a series of results that form a hash chain. The device may use the trust information to discover another device and to connect to the other device securely and automatically (e.g., with no user involvement or limited user involvement). Moreover, the device may use the trust information to dynamically change a MAC address being used to communicate with the other device.
    Type: Grant
    Filed: March 6, 2015
    Date of Patent: July 25, 2017
    Assignee: Microsoft Technology Licensing, LLC
    Inventors: Peter Dawoud Shenouda Dawoud, Anoosh Saboori, Himanshu Soni, Dustin Michael Ingalls, Nelly L. Porter
  • Patent number: 9686274
    Abstract: In one embodiment, a user login device may create a user identifier template 400 for identifying a user by implicitly capturing one or more biometric identifier readings. A user login device may capture an enrollment biometric identifier reading of a user during an operational user action. The user login device may apply the enrollment biometric identifier reading in creating a user identifier template 400.
    Type: Grant
    Filed: October 11, 2013
    Date of Patent: June 20, 2017
    Assignee: Microsoft Technology Licensing, LLC
    Inventors: Himanshu Soni, Vijay Bharadwaj, Arthur H. Baker, Gopinathan Kannan, Ryan Segeberg, Nelly Porter