Patents by Inventor Karanbir Singh
Karanbir Singh has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Publication number: 20240062241Abstract: The present disclosure provides a computer system (112). The computer system (112) performs a method for encoding user count with a low memory footprint. The method includes a first step of receiving real-time and adaptive frequency of user visibility. Further, the method includes another step of receiving a user device (106) id associated with one or more users (104). Furthermore, the method includes yet another step of encoding the user visibility count. The frequency of the user visibility is the number of times the computer system receives a request from a user device (106). The user device (106) id is a unique string of numbers and letters. The unique string of numbers and letters identifies the user device (106) associated with one or more user (104). The user visibility count is encoded by using one or more data structures and one or more algorithms.Type: ApplicationFiled: August 18, 2022Publication date: February 22, 2024Applicant: Affle MEA FZ-LLCInventors: Anuj Khanna Sohum, Charles Yong Jien Foong, Madhusudana Ramakrishna, Guillermo Fernandez Sanz, Adrian Gigante Beneito, Barbara Diaz Duran, Christian Karem Taidi Santana, Karanbir Singh Sehgal
-
Patent number: 9853812Abstract: Content on a device is encrypted and protected based on a data protection key corresponding to a particular identity of the user of the device. The protected content can then be stored to cloud storage, and from the cloud storage the protected content can be transferred to various other ones of the user's devices. A data protection key that is used to retrieve the plaintext content from the protected content is maintained by the user's device. This data protection key can be securely transferred to other of the user's devices, allowing any of the user's devices to access the protected content.Type: GrantFiled: September 17, 2014Date of Patent: December 26, 2017Assignee: MICROSOFT TECHNOLOGY LICENSING, LLCInventors: Yogesh A. Mehta, Innokentiy Basmov, Octavian T. Ureche, Peter J. Novotney, Preston Derek Adam, Mugdha Lakhani, Saurav Sinha, Narendra S. Acharya, Karanbir Singh
-
Patent number: 9531703Abstract: Single sign-on techniques via an application or browser are described. In one or more implementations, a single instance of entry of authentication information is received that is entered via interaction with an application or browser of a computing device. Responsive to this receipt, the single instance of the entry of authentication information is used by the computing device automatically and without user intervention to cause authentication to obtain access to one or more network services that are accessible via a network by the application and the browser.Type: GrantFiled: December 8, 2014Date of Patent: December 27, 2016Assignee: MICROSOFT TECHNOLOGY LICENSING, LLCInventors: Jonathan D. Schwartz, Karanbir Singh, Christopher L. Walstad, Sainath Narendranath Thadkal, Aleksandr Radutskiy, Yifan Wang, Vishal Agarwal, Octavian T. Ureche
-
Patent number: 9495522Abstract: Data sharing session techniques are described. In one or more implementations, a first user login session is initiated as running in a context of a first user profile of a first user with an operating system of a computing device. A request is received by the operating system to run the first user login session in a context of a second user profile of a second user. The second user profile is associated by the operating system with a shadow login session created within the first user login session of the operating system of the computing device such that interaction of the second user with the operating system is associated with the second user profile and interaction of the first user with the operating system is associated with the first user profile.Type: GrantFiled: September 3, 2014Date of Patent: November 15, 2016Assignee: MICROSOFT TECHNOLOGY LICENSING, LLCInventors: Karanbir Singh, Yashar Bahman, Octavian T. Ureche, John Michael Sheehan
-
Patent number: 9330513Abstract: The techniques and systems disclosed herein pertain to preventing unauthorized access to computing resources by unauthorized persons by deploying biometric security. To implement biometric security, the computing device, possibly by the OS, may obtain samples of one or more biometric factors unique to the owner. The computing device may construct pattern-matching templates corresponding to the biometric samples, which may be stored for later use when a protected resource is requested. Computing resources may be selected for protection by a biometric security mechanism by an authorized user or by other techniques or default settings. Before allowing certain restricted actions, the OS may request that the user provide one of the previously registered biometric samples. If the biometric sample matches the user's stored pattern-matching template, the OS may grant access to the computing resource, otherwise, the OS may deny access to the computing resource.Type: GrantFiled: September 5, 2013Date of Patent: May 3, 2016Assignee: Microsoft Technology Licensing, LLCInventors: Himanshu Soni, Karanbir Singh, Arthur H. Baker, Vijay G. Bharadwaj, Nelly L. Porter, Violet Anna Barhudarian, John D. T. Wood, Jeffrey E. Shipman, Jeremy D. Viegas
-
Publication number: 20160112402Abstract: Single sign-on techniques via an application or browser are described. In one or more implementations, a single instance of entry of authentication information is received that is entered via interaction with an application or browser of a computing device. Responsive to this receipt, the single instance of the entry of authentication information is used by the computing device automatically and without user intervention to cause authentication to obtain access to one or more network services that are accessible via a network by the application and the browser.Type: ApplicationFiled: December 8, 2014Publication date: April 21, 2016Inventors: Jonathan D. Schwartz, Karanbir Singh, Christopher L. Walstad, Sainath Narendranath Thadkal, Aleksandr Radutskiy, Yifan Wang, Vishal Agarwal, Octavian T. Ureche
-
Publication number: 20160080293Abstract: The techniques discussed herein may facilitate user account management while also protecting a user's personally identifiable information (PII). The user's PII is stored in a protected area, such as a secure operating system area. The techniques may also implement a broker process to access a user's PII. The techniques display a user's accounts that are available for use with an application. The techniques further provide for passing a hint to the application upon receiving selection of an account, wherein the hint indicates which user account is selected, without divulging to the application any of the user's PII.Type: ApplicationFiled: September 12, 2014Publication date: March 17, 2016Inventors: Karanbir Singh, Saurav Sinha, Sanjay N. Mahida, Andy Liu, Gopinathan Kannan, Nathan Jeffrey Ide, Tony Ureche, Sainath Narendranath Thadkal, Alex Radutskiy, Eric M. Jia, Kanna Ramasubramanian, Yifan Wang
-
Publication number: 20160080149Abstract: Content on a device is encrypted and protected based on a data protection key corresponding to a particular identity of the user of the device. The protected content can then be stored to cloud storage, and from the cloud storage the protected content can be transferred to various other ones of the user's devices. A data protection key that is used to retrieve the plaintext content from the protected content is maintained by the user's device. This data protection key can be securely transferred to other of the user's devices, allowing any of the user's devices to access the protected content.Type: ApplicationFiled: September 17, 2014Publication date: March 17, 2016Inventors: Yogesh A. Mehta, Innokentiy Basmov, Octavian T. Ureche, Peter J. Novotney, Preston Derek Adam, Mugdha Lakhani, Saurav Sinha, Narendra S. Acharya, Karanbir Singh
-
Publication number: 20160063226Abstract: Data sharing session techniques are described. In one or more implementations, a first user login session is initiated as running in a context of a first user profile of a first user with an operating system of a computing device. A request is received by the operating system to run the first user login session in a context of a second user profile of a second user. The second user profile is associated by the operating system with a shadow login session created within the first user login session of the operating system of the computing device such that interaction of the second user with the operating system is associated with the second user profile and interaction of the first user with the operating system is associated with the first user profile.Type: ApplicationFiled: September 3, 2014Publication date: March 3, 2016Inventors: Karanbir Singh, Yashar Bahman, Octavian T. Ureche, John Michael Sheehan
-
Publication number: 20140354401Abstract: The techniques and systems disclosed herein pertain to preventing unauthorized access to computing resources by unauthorized persons by deploying biometric security. To implement biometric security, the computing device, possibly by the OS, may obtain samples of one or more biometric factors unique to the owner. The computing device may construct pattern-matching templates corresponding to the biometric samples, which may be stored for later use when a protected resource is requested. Computing resources may be selected for protection by a biometric security mechanism by an authorized user or by other techniques or default settings. Before allowing certain restricted actions, the OS may request that the user provide one of the previously registered biometric samples. If the biometric sample matches the user's stored pattern-matching template, the OS may grant access to the computing resource, otherwise, the OS may deny access to the computing resource.Type: ApplicationFiled: September 5, 2013Publication date: December 4, 2014Applicant: Microsoft CorporationInventors: Himanshu Soni, Karanbir Singh, Arthur H. Baker, Vijay G. Bharadwaj, Nelly L. Porter, Violet Anna Barhudarian, John D. T. Wood, Jeffrey E. Shipman, Jeremy D. Viegas
-
Patent number: 8863291Abstract: The reputation of an executable computer program is checked when a user input to a computing device initiates a program launch, thus triggering a check of a local cache of reputation information. If the local cache confirms that the program is safe, it is permitted to launch, typically without notifying the user that a reputation check has been made. If the local cache cannot confirm the safety of the program, a reputation check is made by accessing a reputation service in the cloud. If the reputation service identifies the program as safe, it returns an indication to the computing device and the program is permitted to be launched, again without notifying the user that a reputation check has been made. If the reputation service identifies the program as unsafe or potentially unsafe, or does not recognize it at all, a warning is displayed to the user.Type: GrantFiled: January 20, 2011Date of Patent: October 14, 2014Assignee: Microsoft CorporationInventors: Daniel Oliver, Anshul Rawat, Xiang Tu, Ryan Colvin, James Dooley, Elliott Jeb Haber, Ameya Bhatawdekar, Andy Davidson, Jay Dave, Paul Leach, Karanbir Singh, Chris Guzak, Crispin Cowan
-
Patent number: 8561152Abstract: A context of a principal is built, at a target system controlling access to a resource, independently of the principal requesting access to the resource. An authorization policy is applied, at the target system, to the context to determine whether the principal is permitted to access the resource, and an indication of whether the principal is permitted to access the resource is provided (e.g., to an administrator). Modifications can be made to the context and the authorization re-applied to determine whether a principal having the modified context is permitted to access the resource.Type: GrantFiled: May 17, 2011Date of Patent: October 15, 2013Assignee: Microsoft CorporationInventors: Mark F. Novak, Karanbir Singh, David M. McPherson, Andrey Popov, Ming Tang
-
Publication number: 20120297455Abstract: A context of a principal is built, at a target system controlling access to a resource, independently of the principal requesting access to the resource. An authorization policy is applied, at the target system, to the context to determine whether the principal is permitted to access the resource, and an indication of whether the principal is permitted to access the resource is provided (e.g., to an administrator). Modifications can be made to the context and the authorization re-applied to determine whether a principal having the modified context is permitted to access the resource.Type: ApplicationFiled: May 17, 2011Publication date: November 22, 2012Applicant: MICROSOFT CORPORATIONInventors: Mark F. Novak, Karanbir Singh, David M. McPherson, Andrey Popov, Ming Tang
-
Publication number: 20120192275Abstract: The reputation of an executable computer program is checked when a user input to a computing device initiates a program launch, thus triggering a check of a local cache of reputation information. If the local cache confirms that the program is safe, it is permitted to launch, typically without notifying the user that a reputation check has been made. If the local cache cannot confirm the safety of the program, a reputation check is made by accessing a reputation service in the cloud. If the reputation service identifies the program as safe, it returns an indication to the computing device and the program is permitted to be launched, again without notifying the user that a reputation check has been made. If the reputation service identifies the program as unsafe or potentially unsafe, or does not recognize it at all, a warning is displayed to the user.Type: ApplicationFiled: January 20, 2011Publication date: July 26, 2012Applicant: MICROSOFT CORPORATIONInventors: Daniel Oliver, Anshul Rawat, Xiang Tu, Ryan Colvin, James Dooley, Elliott Jeb Haber, Ameya Bhatawdekar, Andy Davidson, Jay Dave, Paul Leach, Karanbir Singh, Chris Guzak, Crispin Cowan