Patents by Inventor Jyotsana Rathore

Jyotsana Rathore has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 11494505
    Abstract: Data associated with a user account is stored at the cloud-based storage service. A portion of the data is associated with a heightened authentication protocol. A request for an application to access data that is associated with the heightened authentication protocol is received at the cloud-based storage service. The request may include an indication that the application is configured to interact with data with the heightened authentication protocol. The request is authenticated based on the heightened authentication protocol. In response to authenticating the first request, permission is granted to the application to access the data that is associated with the heightened authentication protocol. In response receiving requests that do not include the indication that the application is configured to interact with data with the heightened authentication protocol, data pertaining to the portion of the data with the heightened authentication protocol is hidden.
    Type: Grant
    Filed: May 31, 2019
    Date of Patent: November 8, 2022
    Assignee: Microsoft Technology Licensing, LLC
    Inventors: Jyotsana Rathore, Jose A. Barreto, Kevin Andrew Chan, Gabriela Kornelia Kaczka, Gregory P. Young
  • Patent number: 11443052
    Abstract: A system is provided for controlling access to data stored in a cloud-based storage service. Data associated with a user account is stored at the cloud-based storage service. A first request to cause a portion of the data to be associated with a heightened authentication protocol is received. In response, the portion of the data is caused to require the heightened authentication protocol for access. A second request for a file that is stored in the area that is associated with the heightened authentication protocol is received. The second request is authenticated based on the heightened authentication protocol. In response to authenticating the second request, permission is granted to access the file. In response to a failure to authenticate the second request, access to the file is denied, while access to files stored in other areas associated with the user account is allowed.
    Type: Grant
    Filed: May 31, 2019
    Date of Patent: September 13, 2022
    Assignee: MICROSOFT TECHNOLOGY LICENSING, LLC
    Inventors: Filip C. Lazar, Steven J. Bailey, John D. Rodrigues, Andrew Keith Glover, Jyotsana Rathore, Jose A. Barreto, Kevin Andrew Chan, Gregory P. Young, Jacob C. Schieber, Jackson Cowan, Meir E. Abergel
  • Patent number: 11418497
    Abstract: A system is provided for facilitating access to data stored in a cloud-based storage service. Data associated with a user account is stored at the cloud-based storage service. A portion of the data is associated with a heightened authentication protocol. A request for an application to receive data that is associated with the heightened authentication protocol is received at the cloud-based storage service. In response to the request, the request is authenticated based on the heightened authentication protocol. In response to authenticating the request, permission is granted for the application to receive the data that is associated with the heightened authentication protocol. In response to a locking of the data that is associated with the heightened authentication protocol, an indication that the data is unavailable is sent to the application.
    Type: Grant
    Filed: March 21, 2019
    Date of Patent: August 16, 2022
    Assignee: Microsoft Technology Licensing, LLC
    Inventors: Jyotsana Rathore, Jose A. Barreto, Kevin Andrew Chan, Deepak Sreenivas Pemmaraju, Robert C. Turner, Ronakkumar Desai, Patrick Moulhaud
  • Patent number: 11392711
    Abstract: A system is provided for controlling access to data stored in a cloud-based storage service. A first request is received to access data stored at the cloud-based storage service, the data associated with a user account. The first request is authenticated based on a username and password associated with the user account. A second request is received for a file that is stored in an area associated with a heightened authentication protocol. The heightened authentication protocol is performed to authenticate the second request. In response to authenticating the second request, permission is granted to a temporary strong authentication state. The permission is to access the file that is stored in the area associated with the heightened authentication protocol.
    Type: Grant
    Filed: May 31, 2019
    Date of Patent: July 19, 2022
    Assignee: Microsoft Technology Licensing, LLC
    Inventors: Jyotsana Rathore, Kevin Andrew Chan, Gabriela Kornelia Kaczka, Deepak Sreenivas Pemmaraju, Robert C. Turner, Gregory P. Young, Jose A. Barreto, Daron Spektor
  • Patent number: 11361095
    Abstract: A system is provided for controlling access to data stored in a cloud-based storage service. A first request is received to access data stored at the cloud-based storage service, the data associated with a user account. The first request is authenticated based on a username and password associated with the user account. A second request is received for a file that is stored in an area associated with a heightened authentication protocol. The heightened authentication protocol is performed to authenticate the second request. In response to authenticating the second request, permission is granted to a temporary strong authentication state. The permission is to access the file that is stored in the area associated with the heightened authentication protocol.
    Type: Grant
    Filed: May 31, 2019
    Date of Patent: June 14, 2022
    Assignee: Microsoft Technology Licensing, LLC
    Inventors: Jyotsana Rathore, Kevin Andrew Chan, Gabriela Kornelia Kaczka, Deepak Sreenivas Pemmaraju, Robert C. Turner, Gregory P. Young, Jose A. Barreto, Daron Spektor
  • Patent number: 11132457
    Abstract: A system is provided for controlling access to data stored in a cloud-based storage service. Data associated with a user account is stored at the cloud-based storage service. A portion of the data is associated with a heightened authentication protocol, a first request receiving, at the cloud-based storage service, for an application to access data that is associated with the heightened authentication protocol. The first request is authenticated based on the heightened authentication protocol. In response to authenticating the first request, permission is granted to the application to access the data that is associated with the heightened authentication protocol. The permission is time-limited. It is determined that the application is editing the data that is associated with the heightened authentication protocol. Permission for the application to access the data while the application is editing the data is temporarily extended.
    Type: Grant
    Filed: May 31, 2019
    Date of Patent: September 28, 2021
    Assignee: Microsoft Technology Licensing, LLC
    Inventors: Daron Spektor, Jyotsana Rathore, Jose A. Barreto, Kevin Andrew Chan, Peter Daniel Henderson, Gabriela Kornelia Kaczka
  • Publication number: 20200304481
    Abstract: A system is provided for facilitating access to data stored in a cloud-based storage service. Data associated with a user account is stored at the cloud-based storage service. A portion of the data is associated with a heightened authentication protocol. A request for an application to receive data that is associated with the heightened authentication protocol is received at the cloud-based storage service. In response to the request, the request is authenticated based on the heightened authentication protocol. In response to authenticating the request, permission is granted for the application to receive the data that is associated with the heightened authentication protocol. In response to a locking of the data that is associated with the heightened authentication protocol, an indication that the data is unavailable is sent to the application.
    Type: Application
    Filed: March 21, 2019
    Publication date: September 24, 2020
    Inventors: Jyotsana RATHORE, Jose A. BARRETO, Kevin Andrew CHAN, Deepak Sreenivas PEMMARAJU, Robert C. TURNER, Ronakkumar DESAI, Patrick MOULHAUD
  • Publication number: 20200302075
    Abstract: Data associated with a user account is stored at the cloud-based storage service. A portion of the data is associated with a heightened authentication protocol. A request for an application to access data that is associated with the heightened authentication protocol is received at the cloud-based storage service. The request may include an indication that the application is configured to interact with data with the heightened authentication protocol. The request is authenticated based on the heightened authentication protocol. In response to authenticating the first request, permission is granted to the application to access the data that is associated with the heightened authentication protocol. In response receiving requests that do not include the indication that the application is configured to interact with data with the heightened authentication protocol, data pertaining to the portion of the data with the heightened authentication protocol is hidden.
    Type: Application
    Filed: May 31, 2019
    Publication date: September 24, 2020
    Inventors: Jyotsana RATHORE, Jose A. BARRETO, Kevin Andrew CHAN, Gabriela Kornelia KACZKA, Gregory P. YOUNG
  • Publication number: 20200304511
    Abstract: A system is provided for controlling access to data stored in a cloud-based storage service. A first request is received to access data stored at the cloud-based storage service, the data associated with a user account. The first request is authenticated based on a username and password associated with the user account. A second request is received for a file that is stored in an area associated with a heightened authentication protocol. The heightened authentication protocol is performed to authenticate the second request. In response to authenticating the second request, permission is granted to a temporary strong authentication state. The permission is to access the file that is stored in the area associated with the heightened authentication protocol.
    Type: Application
    Filed: May 31, 2019
    Publication date: September 24, 2020
    Inventors: Jyotsana RATHORE, Kevin Andrew CHAN, Gabriela Kornelia KACZKA, Deepak Sreenivas PEMMARAJU, Robert C. TURNER, Gregory P. YOUNG, Jose A. BARRETO, Daron SPEKTOR
  • Publication number: 20200304487
    Abstract: A system is provided for controlling access to data stored in a cloud-based storage service. Data associated with a user account is stored at the cloud-based storage service. A portion of the data is associated with a heightened authentication protocol. a first request receiving, at the cloud-based storage service, for an application to access data that is associated with the heightened authentication protocol. The first request is authenticated based on the heightened authentication protocol. In response to authenticating the first request, permission is granted to the application to access the data that is associated with the heightened authentication protocol. The permission is time-limited. It is determined that the application is editing the data that is associated with the heightened authentication protocol. Permission for the application to access the data while the application is editing the data is temporarily extended.
    Type: Application
    Filed: May 31, 2019
    Publication date: September 24, 2020
    Inventors: Daron SPEKTOR, Jyotsana RATHORE, Jose A. BARRETO, Kevin Andrew CHAN, Peter Daniel HENDERSON, Gabriela Kornelia KACZKA
  • Publication number: 20200304516
    Abstract: A system is provided for controlling access to data stored in a cloud-based storage service. Data associated with a user account is stored at the cloud-based storage service. A first request to cause a portion of the data to be associated with a heightened authentication protocol is received. In response, the portion of the data is caused to require the heightened authentication protocol for access. A second request for a file that is stored in the area that is associated with the heightened authentication protocol is received. The second request is authenticated based on the heightened authentication protocol. In response to authenticating the second request, permission is granted to access the file. In response to a failure to authenticate the second request, access to the file is denied, while access to files stored in other areas associated with the user account is allowed.
    Type: Application
    Filed: May 31, 2019
    Publication date: September 24, 2020
    Inventors: Filip C. LAZAR, Steven J. BAILEY, John D. RODRIGUES, Andrew Keith GLOVER, Jyotsana RATHORE, Jose A. BARRETO, Kevin Andrew CHAN, Gregory P. YOUNG, Jacob C. SCHIEBER, Jackson COWAN, Meir E. ABERGEL
  • Publication number: 20160269674
    Abstract: Dynamic video capture rate control techniques are described. In one or more implementations, a method is described of dynamically controlling video capture rate. Capture of video of a camera is caused by a device to occur at a first rate for a first collection of images in the video. During the causation of the capture of the video at the first rate, an input is detected by the device to change to a second rate that is different than the first rate. Responsive to the detection of the input, the capture rate is changed from the first rate to the second rate, the capture of the video by the camera is caused to occur at the second rate for a second collection of images of the video, and timestamps of the first collection of images or the second collection of images are transformed to configure the image in the video for output at a substantially uniform rate relative to each other.
    Type: Application
    Filed: March 9, 2015
    Publication date: September 15, 2016
    Inventors: Jyotsana Rathore, Rinku Sreedhar, Lucia Darsa, Brian Douglas King, Brian S. Beecher