Patents by Inventor Ittai Doron
Ittai Doron has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 9848328Abstract: A data channel transmission can be used to authenticate a voice channel transmission. An authentication server can authenticate the identity of one or more parties to a call where at least one of the parties to the call is using a mobile device. A PKI authentication methodology or other symmetric or asymmetric encryption/decryption methodology can be used in a mobile network environment to identify and authenticate a first user to a second user. The authentication request sent to the third party trusted server can be encrypted, signed and transmitted over a data channel (such as an internet connection or SMS or MMS connection), concurrent with the voice channel transmission. In response to validation by the third party trusted server, the third party trusted server can send an authentication indication to the second user's device, which can display identification information and other (optional) data associated with the first user.Type: GrantFiled: August 3, 2016Date of Patent: December 19, 2017Assignee: Microsoft Technology Licensing, LLCInventors: Omer Har, Ittai Doron, Chen Ari Kirsch, Avigad Oron, Keren Master
-
Patent number: 9544770Abstract: A data channel transmission can be used to authenticate a voice channel transmission. A third party trusted authentication server can be used to authenticate the identity of one or more parties to a call where at least one of the parties to the call is using a mobile device. A PKI authentication methodology or other symmetric or asymmetric encryption/decryption methodology can be used in a mobile network environment to identify and authenticate a first user to a second user. The authentication request sent to the third party trusted server can be encrypted, signed and transmitted over a data channel (such as an internet connection or SMS or MMS connection), concurrent with the voice channel transmission. In response to validation by the third party trusted server, the third party trusted server can send an authentication indication to the second user's device, which can display identification information and other (optional) data associated with the first user.Type: GrantFiled: December 1, 2010Date of Patent: January 10, 2017Assignee: Microsoft Technology Licensing, LLCInventors: Omer Har, Ittai Doron, Chen Ari Kirsch, Avigad Oron, Keren Master
-
Publication number: 20160344723Abstract: A data channel transmission can be used to authenticate a voice channel transmission. An authentication server can authenticate the identity of one or more parties to a call where at least one of the parties to the call is using a mobile device. A PKI authentication methodology or other symmetric or asymmetric encryption/decryption methodology can be used in a mobile network environment to identify and authenticate a first user to a second user. The authentication request sent to the third party trusted server can be encrypted, signed and transmitted over a data channel (such as an internet connection or SMS or MMS connection), concurrent with the voice channel transmission. In response to validation by the third party trusted server, the third party trusted server can send an authentication indication to the second user's device, which can display identification information and other (optional) data associated with the first user.Type: ApplicationFiled: August 3, 2016Publication date: November 24, 2016Applicant: Microsoft Technology Licensing, LLCInventors: Omer Har, Ittai Doron, Chen Ari Kirsch, Avigad Oron, Keren Master
-
Patent number: 9329784Abstract: Aspects of the subject matter described herein relate to managing policies. In aspects, a staging store is used to store policies that are not applied to a computer system unless and until they are copied to or otherwise imported into a production store. A configuration entity is allowed read/write access to the staging store, but is not allowed write access to the production store. A policy manager is granted read access to the staging store and write access to the production store. The policy manager may approve or deny staging policies. If the policy manger approves a staging policy, the policy manager may derive a production policy from the staging policy and store the production policy in the production store. Once a policy is in the production store, the policy may be applied to one or more entities as appropriate.Type: GrantFiled: October 13, 2011Date of Patent: May 3, 2016Assignee: Microsoft Technology Licensing, LLCInventors: Yaniv Naor, Idan Doitch, Noam Gershon Ben-Yochanan, Eran Ben-Shahar, Ittai Doron, Yafit Cohen
-
Publication number: 20130097653Abstract: Aspects of the subject matter described herein relate to managing policies. In aspects, a staging store is used to store policies that are not applied to a computer system unless and until they are copied to or otherwise imported into a production store. A configuration entity is allowed read/write access to the staging store, but is not allowed write access to the production store. A policy manager is granted read access to the staging store and write access to the production store. The policy manager may approve or deny staging policies. If the policy manger approves a staging policy, the policy manager may derive a production policy from the staging policy and store the production policy in the production store. Once a policy is in the production store, the policy may be applied to one or more entities as appropriate.Type: ApplicationFiled: October 13, 2011Publication date: April 18, 2013Applicant: Microsoft CorporationInventors: Yaniv Naor, Idan Doitch, Noam Gershon Ben-Yochanan, Eran Ben-Shahar, Ittai Doron, Yafit Cohen
-
Publication number: 20120144198Abstract: A data channel transmission can be used to authenticate a voice channel transmission. A third party trusted authentication server can be used to authenticate the identity of one or more parties to a call where at least one of the parties to the call is using a mobile device. A PKI authentication methodology or other symmetric or asymmetric encryption/decryption methodology can be used in a mobile network environment to identify and authenticate a first user to a second user. The authentication request sent to the third party trusted server can be encrypted, signed and transmitted over a data channel (such as an internet connection or SMS or MMS connection), concurrent with the voice channel transmission. In response to validation by the third party trusted server, the third party trusted server can send an authentication indication to the second user's device, which can display identification information and other (optional) data associated with the first user.Type: ApplicationFiled: December 1, 2010Publication date: June 7, 2012Applicant: Microsoft CorporationInventors: Omer Har, Ittai Doron, Chen Ari Kirsch, Avigad Oron, Keren Master