Patents by Inventor Jeffrey A. Staiman
Jeffrey A. Staiman has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Publication number: 20240114033Abstract: Methods of secure resource authorization for external identities using remote principal objects are performed by systems and devices. An external entity creates a user group and defines entitlements to an owning entity's secure resource as a set of permissions for the group. An immutable access template with the permissions and an access policy for the secure resource are provided to the owning entity for approval. On approval, a remote principal object is created in the owner directory according to the permissions and access policy. A remote principal that is a group member requests access via an interface to the owner domain using external domain credentials. The identity of the remote principal is verified against the remote principal object by a token service. Verification causes generation and issuance of a token, with the enumerated entitlements, to the remote principal interface affecting a redirect for access to the secure resource.Type: ApplicationFiled: December 11, 2023Publication date: April 4, 2024Inventors: Charles Prakash Rao DASARI, Maksym YARYN, Debashis CHOUDHURY, Jeffrey A. STAIMAN
-
Patent number: 11888856Abstract: Methods of secure resource authorization for external identities using remote principal objects are performed by systems and devices. An external entity creates a user group and defines entitlements to an owning entity's secure resource as a set of permissions for the group. An immutable access template with the permissions and an access policy for the secure resource are provided to the owning entity for approval. On approval, a remote principal object is created in the owner directory according to the permissions and access policy. A remote principal that is a group member requests access via an interface to the owner domain using external domain credentials. The identity of the remote principal is verified against the remote principal object by a token service. Verification causes generation and issuance of a token, with the enumerated entitlements, to the remote principal interface affecting a redirect for access to the secure resource.Type: GrantFiled: December 21, 2022Date of Patent: January 30, 2024Assignee: MICROSOFT TECHNOLOGY LICENSING, LLCInventors: Charles Prakash Rao Dasari, Maksym Yaryn, Debashis Choudhury, Jeffrey A Staiman
-
Publication number: 20230121372Abstract: Methods of secure resource authorization for external identities using remote principal objects are performed by systems and devices. An external entity creates a user group and defines entitlements to an owning entity's secure resource as a set of permissions for the group. An immutable access template with the permissions and an access policy for the secure resource are provided to the owning entity for approval. On approval, a remote principal object is created in the owner directory according to the permissions and access policy. A remote principal that is a group member requests access via an interface to the owner domain using external domain credentials. The identity of the remote principal is verified against the remote principal object by a token service. Verification causes generation and issuance of a token, with the enumerated entitlements, to the remote principal interface affecting a redirect for access to the secure resource.Type: ApplicationFiled: December 21, 2022Publication date: April 20, 2023Inventors: Charles Prakash Rao Dasari, Maksym Yaryn, Debashis Choudhury, Jeffrey A. Staiman
-
Patent number: 11570181Abstract: Methods of secure resource authorization for external identities using remote principal objects are performed by systems and devices. An external entity creates a user group and defines entitlements to an owning entity's secure resource as a set of permissions for the group. An immutable access template with the permissions and an access policy for the secure resource are provided to the owning entity for approval. On approval, a remote principal object is created in the owner directory according to the permissions and access policy. A remote principal that is a group member requests access via an interface to the owner domain using external domain credentials. The identity of the remote principal is verified against the remote principal object by a token service. Verification causes generation and issuance of a token, with the enumerated entitlements, to the remote principal interface affecting a redirect for access to the secure resource.Type: GrantFiled: May 29, 2020Date of Patent: January 31, 2023Assignee: MICROSOFT TECHNOLOGY LICENSING, LLCInventors: Charles Prakash Rao Dasari, Maksym Yaryn, Debashis Choudhury, Jeffrey A. Staiman
-
Patent number: 11552956Abstract: Methods of secure resource authorization for external identities using remote principal objects are performed by systems and devices. An external entity creates a user group and defines entitlements to an owning entity's secure resource as a set of permissions for the group. An immutable access template with the permissions and an access policy for the secure resource are provided to the owning entity for approval. On approval, a remote principal object is created in the owner directory according to the permissions and access policy. A remote principal that is a group member requests access via an interface to the owner domain using external domain credentials. The identity of the remote principal is verified against the remote principal object by a token service. Verification causes generation and issuance of a token, with the enumerated entitlements, to the remote principal interface affecting a redirect for access to the secure resource.Type: GrantFiled: November 29, 2021Date of Patent: January 10, 2023Assignee: MICROSOFT TECHNOLOGY LICENSING, LLCInventors: Charles Prakash Rao Dasari, Maksym Yaryn, Debashis Choudhury, Jeffrey A. Staiman
-
Publication number: 20220086165Abstract: Methods of secure resource authorization for external identities using remote principal objects are performed by systems and devices. An external entity creates a user group and defines entitlements to an owning entity's secure resource as a set of permissions for the group. An immutable access template with the permissions and an access policy for the secure resource are provided to the owning entity for approval. On approval, a remote principal object is created in the owner directory according to the permissions and access policy. A remote principal that is a group member requests access via an interface to the owner domain using external domain credentials. The identity of the remote principal is verified against the remote principal object by a token service. Verification causes generation and issuance of a token, with the enumerated entitlements, to the remote principal interface affecting a redirect for access to the secure resource.Type: ApplicationFiled: November 29, 2021Publication date: March 17, 2022Inventors: Charles Prakash Rao Dasari, Maksym Yaryn, Debashis Choudhury, Jeffrey A. Staiman
-
Patent number: 11233800Abstract: Methods of secure resource authorization for external identities using remote principal objects are performed by systems and devices. An external entity creates a user group and defines entitlements to an owning entity's secure resource as a set of permissions for the group. An immutable access template with the permissions and an access policy for the secure resource are provided to the owning entity for approval. On approval, a remote principal object is created in the owner directory according to the permissions and access policy. A remote principal that is a group member requests access via an interface to the owner domain using external domain credentials. The identity of the remote principal is verified against the remote principal object by a token service. Verification causes generation and issuance of a token, with the enumerated entitlements, to the remote principal interface affecting a redirect for access to the secure resource.Type: GrantFiled: May 29, 2020Date of Patent: January 25, 2022Assignee: MICROSOFT TECHNOLOGY LICENSING, LLCInventors: Charles Prakash Rao Dasari, Maksym Yaryn, Debashis Choudhury, Jeffrey A. Staiman
-
Publication number: 20210377272Abstract: Methods of secure resource authorization for external identities using remote principal objects are performed by systems and devices. An external entity creates a user group and defines entitlements to an owning entity's secure resource as a set of permissions for the group. An immutable access template with the permissions and an access policy for the secure resource are provided to the owning entity for approval. On approval, a remote principal object is created in the owner directory according to the permissions and access policy. A remote principal that is a group member requests access via an interface to the owner domain using external domain credentials. The identity of the remote principal is verified against the remote principal object by a token service. Verification causes generation and issuance of a token, with the enumerated entitlements, to the remote principal interface affecting a redirect for access to the secure resource.Type: ApplicationFiled: May 29, 2020Publication date: December 2, 2021Inventors: Charles Prakash Rao Dasari, Maksym Yaryn, Debashis Choudhury, Jeffrey A. Staiman
-
Publication number: 20210377276Abstract: Methods of secure resource authorization for external identities using remote principal objects are performed by systems and devices. An external entity creates a user group and defines entitlements to an owning entity's secure resource as a set of permissions for the group. An immutable access template with the permissions and an access policy for the secure resource are provided to the owning entity for approval. On approval, a remote principal object is created in the owner directory according to the permissions and access policy. A remote principal that is a group member requests access via an interface to the owner domain using external domain credentials. The identity of the remote principal is verified against the remote principal object by a token service. Verification causes generation and issuance of a token, with the enumerated entitlements, to the remote principal interface affecting a redirect for access to the secure resource.Type: ApplicationFiled: May 29, 2020Publication date: December 2, 2021Inventors: Charles Prakash Rao Dasari, Maksym Yaryn, Debashis Choudhury, Jeffrey A. Staiman
-
Patent number: 8490152Abstract: An entitlement management system is described herein that models each entitlement as a resource within a resource management system. In a resource management system that applies policy to all requests to create, update, and delete a resource, this approach allows rich application of policy to the creation, delegation, renewal, expiration, and deletion of entitlements. A resource management system that can synchronize data to connected systems can thereby grant or revoke these permissions in those systems. This approach also facilitates role mining, attestation, and compliance reporting. Entitlements stored as resources may also include properties, such as workflows and policies related to the entitlements. Thus, the entitlement management system provides a more formal and automated facility for managing entitlements in organizations.Type: GrantFiled: October 26, 2010Date of Patent: July 16, 2013Assignee: Microsoft CorporationInventors: Jeffrey A. Staiman, Mark Wahl
-
Publication number: 20120102489Abstract: An entitlement management system is described herein that models each entitlement as a resource within a resource management system. In a resource management system that applies policy to all requests to create, update, and delete a resource, this approach allows rich application of policy to the creation, delegation, renewal, expiration, and deletion of entitlements. A resource management system that can synchronize data to connected systems can thereby grant or revoke these permissions in those systems. This approach also facilitates role mining, attestation, and compliance reporting. Entitlements stored as resources may also include properties, such as workflows and policies related to the entitlements. Thus, the entitlement management system provides a more formal and automated facility for managing entitlements in organizations.Type: ApplicationFiled: October 26, 2010Publication date: April 26, 2012Applicant: Microsoft CorporationInventors: Jeffrey A. Staiman, Mark Wahl
-
Publication number: 20080263162Abstract: The embodiments described herein generally relate to systems and methods for modeling a user-initiated request to a business process application as an email form. It is often necessary for individuals to communicate, or exchange information, with a business application. Inefficiencies and delays arise where individuals are required to work within the context of the business application to accomplish desired actions or to determine the status of a requested action. By allowing a user to request an action from a business application using an email form, such inefficiencies and delays are minimized, if not eliminated altogether. A user may therefore initiate a request to a business application by working within the familiar and readily-available UI of the user's general-purpose email client and may receive status updates regarding such a request with the same UI of the original request.Type: ApplicationFiled: November 15, 2007Publication date: October 23, 2008Applicant: Microsoft CorporationInventors: Jeffrey Staiman, Zoltan Pekic, William Qian