Patents by Inventor Himanshu Soni

Himanshu Soni has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 9661091
    Abstract: Presence based content access control techniques are described in which presence of users is used as a basis for enforcing content restrictions. In an implementation, applications are registered to receive feedback regarding users' presence in relation to a presentation of content via a computing device. The presence of users is recognized independently of authentication of the users to access user accounts. For example, an imaging sensor such as camera may be employed for recognition of multiple users engaged with the computing device. In addition or alternatively, presence devices associated with users such as badges, key fobs, or access cards may be detected to ascertain the presence of users. Feedback indicative of the one or more users that are recognized may then be supplied to the registered applications. The feedback enables the applications to control the presentation of content by enforcing content restrictions and/or taking other presence based actions.
    Type: Grant
    Filed: September 12, 2014
    Date of Patent: May 23, 2017
    Assignee: Microsoft Technology Licensing, LLC
    Inventors: Peter Dawoud Shenouda Dawoud, Nelly Porter, Himanshu Soni, Dustin Michael Ingalls, Kyle James Krum
  • Patent number: 9614835
    Abstract: A system for bootstrap provisioning of a device is provided. A vouching device is provisioned to access a bootstrap account of a bootstrap account provider and a secondary account of a secondary account provider. The bootstrap account provider stores an indication of the secondary account, and the secondary account provider stores verification data to verify a certification of the vouching device. A target device is provisioned to access the bootstrap account of the bootstrap account provider. The target device receives from the bootstrap account provider an indication that the target device is provisioned with the secondary account provider. The target device directs generation of a certification by the vouching device of target authentication data of the target device. The target device then sends the certification to the secondary account provider to effect the provisioning of the target device to access the secondary account.
    Type: Grant
    Filed: June 8, 2015
    Date of Patent: April 4, 2017
    Assignee: Microsoft Technology Licensing, LLC
    Inventors: Anooshiravan Saboori, Himanshu Soni, Peter Dawoud, Magnus Nystrom, Jonathan David Schwartz, Dayi Zhou
  • Publication number: 20170093575
    Abstract: A facility for enrolling a software implementer in a code signing. In one example facility, the facility receives information identifying the implementer, and credentials authenticating the implementer. The facility generates secret state for the implementer. Based on at least one or both of (1) at least a portion of the received credentials and (2) at least a portion of the generated secret state, the facility generates for the implementer a key pair comprising a private key and a public key, and persistently stores the secret state.
    Type: Application
    Filed: September 30, 2015
    Publication date: March 30, 2017
    Inventors: Prabu Raju, Fengfen Liu, Christopher Leonard Walstad, Levi P. Broderick, Himanshu Soni, Reed Molbak, Klaudia Leja
  • Publication number: 20160364600
    Abstract: Techniques and apparatuses for biometric gestures are described herein. In one or more implementations, a computing device includes a biometric sensor, such as a fingerprint touch sensor, that is configured to detect gesture input. When gesture input is received from a user, the biometric sensor detects biometric characteristics (e.g., a fingerprint) of the user and determines a gesture (e.g., a tap, touch and hold, or swipe) based on the gesture input. The user is authenticated if the biometric characteristics correspond to an authorized user of the device. If the user is authenticated, the device transitions to an authenticated user state that is associated with the type of gesture, such as by displaying personal information on a lockscreen of the computing device or opening a quick action center.
    Type: Application
    Filed: June 10, 2015
    Publication date: December 15, 2016
    Inventors: Akash Atul Shah, Peter Dawoud Shenouda Dawoud, Nelly Porter, Himanshu Soni, Michael E. Stephens
  • Publication number: 20160359844
    Abstract: A system for bootstrap provisioning of a device is provided. A vouching device is provisioned to access a bootstrap account of a bootstrap account provider and a secondary account of a secondary account provider. The bootstrap account provider stores an indication of the secondary account, and the secondary account provider stores verification data to verify a certification of the vouching device. A target device is provisioned to access the bootstrap account of the bootstrap account provider. The target device receives from the bootstrap account provider an indication that the target device is provisioned with the secondary account provider. The target device directs generation of a certification by the vouching device of target authentication data of the target device. The target device then sends the certification to the secondary account provider to effect the provisioning of the target device to access the secondary account.
    Type: Application
    Filed: June 8, 2015
    Publication date: December 8, 2016
    Inventors: Anooshiravan Saboori, Himanshu Soni, Peter Dawoud, Magnus Nystrom, Jonathan David Schwartz, Dayi Zhou
  • Patent number: 9507964
    Abstract: Described herein are techniques for regulating access to a remote resource using two-factor authentication based on information regarding a host machine of a portable storage drive that stores an operating system that is booted by the host machine. The information regarding the host machine of a portable storage drive may be used as a second factor in a two-factor authentication. Such information regarding the host machine may include, in some embodiments, information retrieved from a secure storage of the host machine, such as from a cryptoprocessor of the host machine. The information may include an identifier for the host machine or may be a user credential pre-provisioned to the host machine to be used in two-factor authentication.
    Type: Grant
    Filed: December 15, 2011
    Date of Patent: November 29, 2016
    Assignee: Microsoft Technology Licensing, LLC
    Inventors: Preston Derek Adam, Sai Vinayak, Octavian T. Ureche, Stefan Thom, Himanshu Soni, Nicolae Voicu
  • Patent number: 9330513
    Abstract: The techniques and systems disclosed herein pertain to preventing unauthorized access to computing resources by unauthorized persons by deploying biometric security. To implement biometric security, the computing device, possibly by the OS, may obtain samples of one or more biometric factors unique to the owner. The computing device may construct pattern-matching templates corresponding to the biometric samples, which may be stored for later use when a protected resource is requested. Computing resources may be selected for protection by a biometric security mechanism by an authorized user or by other techniques or default settings. Before allowing certain restricted actions, the OS may request that the user provide one of the previously registered biometric samples. If the biometric sample matches the user's stored pattern-matching template, the OS may grant access to the computing resource, otherwise, the OS may deny access to the computing resource.
    Type: Grant
    Filed: September 5, 2013
    Date of Patent: May 3, 2016
    Assignee: Microsoft Technology Licensing, LLC
    Inventors: Himanshu Soni, Karanbir Singh, Arthur H. Baker, Vijay G. Bharadwaj, Nelly L. Porter, Violet Anna Barhudarian, John D. T. Wood, Jeffrey E. Shipman, Jeremy D. Viegas
  • Publication number: 20160080510
    Abstract: Presence based content access control techniques are described in which presence of users is used as a basis for enforcing content restrictions. In an implementation, applications are registered to receive feedback regarding users' presence in relation to a presentation of content via a computing device. The presence of users is recognized independently of authentication of the users to access user accounts. For example, an imaging sensor such as camera may be employed for recognition of multiple users engaged with the computing device. In addition or alternatively, presence devices associated with users such as badges, key fobs, or access cards may be detected to ascertain the presence of users. Feedback indicative of the one or more users that are recognized may then be supplied to the registered applications. The feedback enables the applications to control the presentation of content by enforcing content restrictions and/or taking other presence based actions.
    Type: Application
    Filed: September 12, 2014
    Publication date: March 17, 2016
    Inventors: Peter Dawoud Shenouda Dawoud, Nelly Porter, Himanshu Soni, Dustin Michael Ingalls, Kyle James Krum
  • Publication number: 20160080380
    Abstract: Techniques described herein leverage a trusted entity within a domain to enable devices to establish trust with one another so they can securely discover each other and connect to one another. In various examples discussed herein, a device is configured to provide trust information to, and/or receive trust information from, the trusted entity. The trust information may include, for example, a public key of an encryption key pair, a certificate signed by the trusted entity proving authenticity, and/or a hash function and a hash seed used to compute a series of results that form a hash chain. The device may use the trust information to discover another device and to connect to the other device securely and automatically (e.g., with no user involvement or limited user involvement). Moreover, the device may use the trust information to dynamically change a MAC address being used to communicate with the other device.
    Type: Application
    Filed: March 6, 2015
    Publication date: March 17, 2016
    Inventors: Peter Dawoud Shenouda Dawoud, Anoosh Saboori, Himanshu Soni, Dustin Michael Ingalls, Nelly L. Porter
  • Patent number: 9256750
    Abstract: Computing devices utilizing trusted execution environments as virtual smart cards are designed to support expected credential recovery operations when a user credential, e.g., personal identification number (PIN), password, etc. has been forgotten or is unknown. A computing device generates a cryptographic key that is protected with a PIN unlock key (PUK) provided by an administrative entity. If the user PIN cannot be input to the computing device the PUK can be input to unlock the locked cryptographic key and thereby provide access to protected data. A computing device can also, or alternatively, generate a group of challenges and formulate responses thereto. The formulated responses are each used to secure a computing device cryptographic key. If the user PIN cannot be input to the computing device an entity may request a challenge. The computing device issues a challenge from the set of generated challenges.
    Type: Grant
    Filed: March 28, 2015
    Date of Patent: February 9, 2016
    Assignee: MICROSOFT TECHNOLOGY LICENSING, LLC
    Inventors: Stefan Thom, Robert K. Spiger, Magnus NystrÖm, Himanshu Soni, Marc R. Barbour, Nick Voicu, Xintong Zhou, Kirk Shoop
  • Patent number: 9183415
    Abstract: Described herein are techniques for regulating access to a portable storage drive, that stores an operating system securely, using information regarding a host machine. In accordance with some of the techniques described herein, when a portable storage drive that stores an operating system securely is to be accessed by a host machine, information regarding the host machine, such as information regarding the hardware of the host machine, may be retrieved and evaluated to determine whether to grant access to the host machine. When the host machine is granted access, the host machine may access secured data stored on the portable storage drive in any suitable manner. In some cases, accessing the secured data may include decrypting the secured data and transferring decrypted data to another storage of the host machine. The decrypted information may include an operating system that is booted by the host machine.
    Type: Grant
    Filed: December 1, 2011
    Date of Patent: November 10, 2015
    Assignee: Microsoft Technology Licensing, LLC
    Inventors: Preston Derek Adam, Sai Vinayak, Octavian T. Ureche, Stefan Thom, Himanshu Soni, Nicolae Voicu
  • Publication number: 20150213278
    Abstract: Computing devices utilizing trusted execution environments as virtual smart cards are designed to support expected credential recovery operations when a user credential, e.g., personal identification number (PIN), password, etc. has been forgotten or is unknown. A computing device generates a cryptographic key that is protected with a PIN unlock key (PUK) provided by an administrative entity. If the user PIN cannot be input to the computing device the PUK can be input to unlock the locked cryptographic key and thereby provide access to protected data. A computing device can also, or alternatively, generate a group of challenges and formulate responses thereto. The formulated responses are each used to secure a computing device cryptographic key. If the user PIN cannot be input to the computing device an entity may request a challenge. The computing device issues a challenge from the set of generated challenges.
    Type: Application
    Filed: March 28, 2015
    Publication date: July 30, 2015
    Inventors: Stefan Thom, Robert K. Spiger, Magnus NystrÖm, Himanshu Soni, Marc R. Barbour, Nick Voicu, Xintong Zhou, Kirk Shoop
  • Patent number: 9015490
    Abstract: Computing devices utilizing trusted execution environments as virtual smart cards are designed to support expected credential recovery operations when a user credential, e.g., personal identification number (PIN), password, etc. has been forgotten or is unknown. A computing device generates a cryptographic key that is protected with a PIN unlock key (PUK) provided by an administrative entity. If the user PIN cannot be input to the computing device the PUK can be input to unlock the locked cryptographic key and thereby provide access to protected data. A computing device can also, or alternatively, generate a group of challenges and formulate responses thereto. The formulated responses are each used to secure a computing device cryptographic key. If the user PIN cannot be input to the computing device an entity may request a challenge. The computing device issues a challenge from the set of generated challenges.
    Type: Grant
    Filed: December 12, 2013
    Date of Patent: April 21, 2015
    Assignee: Microsoft Technology Licensing, LLC
    Inventors: Stefan Thom, Robert K. Spiger, Magnus NystrÖm, Himanshu Soni, Marc R. Barbour, Nick Voicu, Xintong Zhou, Kirk Shoop
  • Publication number: 20150106891
    Abstract: In one embodiment, a user login device may create a user identifier template 400 for identifying a user by implicitly capturing one or more biometric identifier readings. A user login device may capture an enrollment biometric identifier reading of a user during an operational user action. The user login device may apply the enrollment biometric identifier reading in creating a user identifier template 400.
    Type: Application
    Filed: October 11, 2013
    Publication date: April 16, 2015
    Applicant: Microsoft Corporation
    Inventors: Himanshu Soni, Vijay Bharadwaj, Arthur H. Baker, Gopinathan Kannan, Ryan Segeberg, Nelly Porter
  • Publication number: 20150089063
    Abstract: Methods, systems, and computer readable storage media are disclosed that aid migration team members with migrating software applications from one platform to another platform, and more particularly, with tools that aid in migrating mainframe applications to a lower cost platform. The tools include legacy statistical generators that scan and analyze components of a mainframe application as well as the datasets associated with the mainframe application. The legacy statistical generators as a result of such analysis extract various statistical information regarding the application and datasets and provide such extracted information to a web-enabled application. Migration team members may use the web-enabled application to gain insight into the structure of the mainframe application as well as determine progress of migrating the mainframe application to the lower cost platform.
    Type: Application
    Filed: November 22, 2013
    Publication date: March 26, 2015
    Applicant: Sears Brands, LLC
    Inventors: Himanshu Soni, Tanveer Akhter Khan, Sudip Mitra, Ravinder Kumar, Subir Chatterjee, Kesavan Srinivasan
  • Publication number: 20140354401
    Abstract: The techniques and systems disclosed herein pertain to preventing unauthorized access to computing resources by unauthorized persons by deploying biometric security. To implement biometric security, the computing device, possibly by the OS, may obtain samples of one or more biometric factors unique to the owner. The computing device may construct pattern-matching templates corresponding to the biometric samples, which may be stored for later use when a protected resource is requested. Computing resources may be selected for protection by a biometric security mechanism by an authorized user or by other techniques or default settings. Before allowing certain restricted actions, the OS may request that the user provide one of the previously registered biometric samples. If the biometric sample matches the user's stored pattern-matching template, the OS may grant access to the computing resource, otherwise, the OS may deny access to the computing resource.
    Type: Application
    Filed: September 5, 2013
    Publication date: December 4, 2014
    Applicant: Microsoft Corporation
    Inventors: Himanshu Soni, Karanbir Singh, Arthur H. Baker, Vijay G. Bharadwaj, Nelly L. Porter, Violet Anna Barhudarian, John D. T. Wood, Jeffrey E. Shipman, Jeremy D. Viegas
  • Publication number: 20140101454
    Abstract: Computing devices utilizing trusted execution environments as virtual smart cards are designed to support expected credential recovery operations when a user credential, personal identification number (PIN), password, etc. has been forgotten or is unknown. A computing device generates a cryptographic key that is protected with a PIN unlock key (PUK) provided by an administrative entity. If the user PIN cannot be input to the computing device the PUK can be input to unlock the locked cryptographic key and thereby provide access to protected data. A computing device can also, or alternatively, generate a group of challenges and formulate responses thereto. The formulated responses are each used to secure a computing device cryptographic key. If the user PIN cannot be input to the computing device an entity may request a challenge. The computing device issues a challenge from the set of generated challenges.
    Type: Application
    Filed: December 12, 2013
    Publication date: April 10, 2014
    Applicant: Microsoft Corporation
    Inventors: Stefan Thom, Robert K. Spiger, Magnus NystrÖm, Himanshu Soni, Marc R. Barbour, Nick Voicu, Xintong Zhou, Kirk Shoop
  • Patent number: 8612766
    Abstract: Computing devices utilizing trusted execution environments as virtual smart cards are designed to support expected credential recovery operations when a user credential, e.g., personal identification number (PIN), password, etc. has been forgotten or is unknown. A computing device generates a cryptographic key that is protected with a PIN unlock key (PUK) provided by an administrative entity. If the user PIN cannot be input to the computing device the PUK can be input to unlock the locked cryptographic key and thereby provide access to protected data. A computing device can also, or alternatively, generate a group of challenges and formulate responses thereto. The formulated responses are each used to secure a computing device cryptographic key. If the user PIN cannot be input to the computing device an entity may request a challenge. The computing device issues a challenge from the set of generated challenges.
    Type: Grant
    Filed: July 5, 2011
    Date of Patent: December 17, 2013
    Assignee: Microsoft Corporation
    Inventors: Stefan Thom, Robert K. Spiger, Magnus Nyström, Himanshu Soni, Marc R. Barbour, Nick Voicu, Xintong Zhou, Kirk Shoop
  • Publication number: 20130145440
    Abstract: Described herein are techniques for regulating access to a remote resource using two-factor authentication based on information regarding a host machine of a portable storage drive that stores an operating system that is booted by the host machine. The information regarding the host machine of a portable storage drive may be used as a second factor in a two-factor authentication. Such information regarding the host machine may include, in some embodiments, information retrieved from a secure storage of the host machine, such as from a cryptoprocessor of the host machine. The information may include an identifier for the host machine or may be a user credential pre-provisioned to the host machine to be used in two-factor authentication.
    Type: Application
    Filed: December 15, 2011
    Publication date: June 6, 2013
    Applicant: MICROSOFT CORPORATION
    Inventors: Preston Derek Adam, Sai Vinayak, Octavian T. Ureche, Stefan Thom, Himanshu Soni, Nicolae Voicu
  • Publication number: 20130145139
    Abstract: Described herein are techniques for regulating access to a portable storage drive, that stores an operating system securely, using information regarding a host machine. In accordance with some of the techniques described herein, when a portable storage drive that stores an operating system securely is to be accessed by a host machine, information regarding the host machine, such as information regarding the hardware of the host machine, may be retrieved and evaluated to determine whether to grant access to the host machine. When the host machine is granted access, the host machine may access secured data stored on the portable storage drive in any suitable manner. In some cases, accessing the secured data may include decrypting the secured data and transferring decrypted data to another storage of the host machine. The decrypted information may include an operating system that is booted by the host machine.
    Type: Application
    Filed: December 1, 2011
    Publication date: June 6, 2013
    Applicant: MICROSOFT CORPORATION
    Inventors: Preston Derek Adam, Sai Vinayak, Octavian T. Ureche, Stefan Thom, Himanshu Soni, Nicolae Voicu