Patents by Inventor Mohammad Alam

Mohammad Alam has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20070081508
    Abstract: A process for secure, safe, and easy provisioning of a wireless device with credentials to connect to a wireless network. A connecting wireless device and an established wireless device both utilize low power transmission at close proximity to exchange wireless connection setting information and/or a password. The connecting wireless device is moved into proximity with the established wireless device and a low power setting is discovered at which the wireless devices may communicate with a sufficiently low error rate. The proximity of the connecting wireless device to the established wireless device is verified and the connecting wireless device is then passed the secret information by the established network device.
    Type: Application
    Filed: December 8, 2006
    Publication date: April 12, 2007
    Applicant: Microsoft Corporation
    Inventors: Poovanpilli Madhavan, David Roberts, Mohammad Alam, Zhong Deng, Sharad Mittal, Ankur Agiwal
  • Publication number: 20070026856
    Abstract: A wireless access point may be configured to advertise, to mobile user devices, multiple wireless networks available through the wireless access point. For example, service set identifiers (SSIDs) may be specified within an information element (IE) of a communication such as, for example, an 802.11 beacon, broadcasted to mobile user devices. Such an IE may utilize the capability provided by IEEE 802.11 itself to use additional and flexible numbers of information elements within a beacon. Accordingly, networks that would otherwise remain hidden due to limitations of known wireless access points are made visible to mobile user devices. Configuring a wireless access point to advertise multiple available wireless networks, for example, by firmware upgrades, may serve as a viable and cost-effective interim solution and/or alternative to replacing a wireless access point with a wireless access point configured to implement virtual wireless access points.
    Type: Application
    Filed: July 29, 2005
    Publication date: February 1, 2007
    Applicant: Microsoft Corporation
    Inventors: Anton Krantz, Ari Niikkonen, Mohammad Alam, Timothy Moore
  • Publication number: 20070025371
    Abstract: A wireless access point may be configured to advertise, to mobile user devices, multiple wireless networks available through the wireless access point. For example, service set identifiers (SSIDs) may be specified within an information element (IE) of a communication such as, for example, an 802.11 beacon, broadcasted to mobile user devices. Such an IE may utilize the capability provided by IEEE 802.11 itself to use additional and flexible numbers of information elements within a beacon. Accordingly, networks that would otherwise remain hidden due to limitations of known wireless access points are made visible to mobile user devices. Configuring a wireless access point to advertise multiple available wireless networks, for example, by firmware upgrades, may serve as a viable and cost-effective interim solution and/or alternative to replacing a wireless access point with a wireless access point configured to implement virtual wireless access points.
    Type: Application
    Filed: July 29, 2005
    Publication date: February 1, 2007
    Applicant: Microsoft Corporation
    Inventors: Anton Krantz, Ari Niikkonen, Mohammad Alam, Timothy Moore
  • Publication number: 20060233114
    Abstract: A wireless diagnostics framework that is non-intrusive and stays out of the way of a user is presented. In the case of a failure, prescriptive guidance is provided and/or the framework possibly automatically fixes the problem. The framework includes a wireless diagnostics module that interacts with the operating system's diagnostics framework, helper classes, and wireless components to collect and log wireless diagnostic events and notifications, and issues queries and requests for active diagnostics. The helper classes perform diagnosis and troubleshooting fore their expertise areas based on the information provided by the wireless diagnostics module.
    Type: Application
    Filed: April 15, 2005
    Publication date: October 19, 2006
    Applicant: Microsoft Corporation
    Inventors: Mohammad Alam, Abhishek Abhishek, Ari Niikkonen, Hui Shen
  • Publication number: 20050204014
    Abstract: A method, schema and computer system for a location service provides data structures that are extensible by allowing different types of location awareness applications to retrieve and deposit location data. The method includes providing an abstract location object arranged in a schema to enable servicing a received request for a logical location of an electronic endpoint; and arranging one or more location elements within the context of the abstract location object. The location elements are configured to act as peers relative to the logical location and each location element is configured to act as a proxy relative to any other location element within the abstract location object.
    Type: Application
    Filed: March 15, 2004
    Publication date: September 15, 2005
    Applicant: Microsoft Corporation
    Inventors: Yinghua Yao, Mohammad Alam, Vivek Bhanu, Warren Barkley, David Buerer, Denise Chen, Florin Teodorescu, Mark Huyler, John Krumm, Christopher Lang, Tim McGrath, Timothy Moore, Madhurima Pawar, Geoffrey Pease, Steven Shafer
  • Publication number: 20050147045
    Abstract: A method and system for multicast network transmissions dynamically sets response time parameters for handling negative acknowledgments (NAKs). When the sender receives a NAK for a lost packet, it returns an NAK confirmation (NCF), waits for a back-off time before sending requested repair data, and then waits for a “linger time” during which the sender does not respond to other NAKs for the same lost packet. The back-off time and the linger time are dynamically set according to the position of the requested sequence number in the sender's transmit window such that the back-off time is shorter when the requested data is closer to being flushed out of the transmit window. After receiving the NCF, the receiver waits for a timeout period and resends the NAK if no repair data is received. The timeout period for data receipt is dynamically set according to a statistical average time for receiving repair data from the sender and the estimated sender's transmit window size.
    Type: Application
    Filed: March 4, 2005
    Publication date: July 7, 2005
    Applicant: Microsoft Corporation
    Inventors: Mohammad Alam, Pradeep Bahl, Shirish Koti
  • Publication number: 20050149626
    Abstract: An Extensible Mark-up Language (XML) schema is used to generate configuration settings files. A wireless configuration XML schema defines an XML file for configuring wireless network settings on a wireless device. A wide area network (WAN) configuration schema defines an XML file for configuring a WAN device. A local area network (LAN) configuration schema defines an XML file for configuring a LAN device. A broadband modem configuration schema defines an XML file for configuring a broadband modem device. A device configuration schema defines an XML file for reporting the configuration of a device.
    Type: Application
    Filed: March 23, 2004
    Publication date: July 7, 2005
    Applicant: Microsoft Corporation
    Inventors: Scott Manchester, Dalen Abraham, Mohammad Alam, Jean-Pierre Duplessis, Trevor Freeman, Bill Hanlon, Anton Krantz, Benjamin Nick
  • Publication number: 20050125693
    Abstract: A system and method for facilitating automatic detection of a type of wireless network is provided. In accordance with an aspect of the present invention, wireless network client(s) can automatically detect the “type” of a network (e.g., method of authentication and encryption) without requiring input from the user. For example, unencrypted network, WEP encrypted network requiring a WEP key, WPA encrypted network requiring a pre-shared key, an IEEE 802.1x enabled network supporting WPA and/or an IEEE 802.1x enabled network not supporting WPA. In accordance with an aspect of the present invention, a wireless network detection system having a connection component and a detection component is provided. The connection component facilitates connection of a client system to at least one of a plurality of wireless networks. The detection component identities a type of an available wireless network.
    Type: Application
    Filed: December 5, 2003
    Publication date: June 9, 2005
    Inventors: Jean-Pierre Duplessis, Sean Lyndersay, Anton Krantz, Mohammad Alam, Ashwin Palekar, Timothy Moore
  • Publication number: 20050091357
    Abstract: A system and method for carrying out network and interface selections across multiple media is disclosed. The disclosed system facilitates automated network interface configuration decision-making that spans a set of networks supporting communications via differing media. A set of media specific modules associated with differing communications media acquire network interface status/capabilities information. A rules engine thereafter applies a designated network selection rule(s) to the acquired network interface status/capabilities information, and any other appropriate parameters attributable to either an interface or network, to select one or more networks and interfaces with which to establish/maintain a connection.
    Type: Application
    Filed: October 24, 2003
    Publication date: April 28, 2005
    Applicant: Microsoft Corporation
    Inventors: Anton Krantz, Warren Barkley, Dan Knudson, Florin Teodorescu, Mohammad Alam, Vivek Bhanu, Edwin Hernandez-Mondragon, Taroon Mandhana, Timothy Moore, Abhishek Abhishek
  • Publication number: 20050010755
    Abstract: A supplicant on a first computing system authenticating the first computing system to an authenticator on a second computing system in a manner that is independent of the underlying data link and physical layer protocols. The first computing system establishes a data link layer connection with the second computing system using specific data link and physical layer protocols. The supplicant on the first computing system and the authenticator on the second computing system then receive an indication that the data link layer connection has been established. The supplicant determines that authentication is to occur with the authenticator, and vice versa. The supplicant (and the authenticator) then instructs that authentication is to occur in a manner that is independent of the underlying data link and physical layer protocols used to establish the connection.
    Type: Application
    Filed: June 3, 2003
    Publication date: January 13, 2005
    Inventors: Sachin Sheth, Mohammad Alam, Arun Ayyagari, Abhishek Abhishek