Patents by Inventor Muhammad Umer

Muhammad Umer has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20130298210
    Abstract: In an environment that includes a host computing system that executes virtual machines, and a secure cloud computing channel that communicatively couples the host to a client computing system that is assigned to a particular one of the virtual machines, the particular virtual machine generates a certificate, install the certificate on the itself, and returns a certificate representation to the client. This may occur when the virtual machine is provisioned. During a subsequent connection request from the client to the virtual machine, the virtual machine returns the certificate to the client. The client compares the certificate representation that was returned during provisioning with the certificate returned during the subsequent connection, and if there is a match, then the virtual machine is authenticated to the client. Thus, in this case, the virtual machine authenticates without the client having to generate, install, and manage security for a certificate.
    Type: Application
    Filed: May 2, 2012
    Publication date: November 7, 2013
    Applicant: MICROSOFT CORPORATION
    Inventors: Eron D. Wright, Muhammad Umer Azad, Sushant P. Rewaskar, Corey M. Sanders, Saad Syed
  • Publication number: 20120102186
    Abstract: Goal state indicators can be communicated from a fabric controller of a computer cluster to each of multiple compute instances in the computer cluster managed by the fabric controller. The goal state indicators can be formatted according to a structured protocol that defines multiple possible goal states. Additionally, status reports can be received from the compute instances. Each of the status reports can indicate a current state of one of the compute instances relative to a goal state previously indicated in a goal state indicator communicated to that one of the compute instances.
    Type: Application
    Filed: October 21, 2010
    Publication date: April 26, 2012
    Applicant: c/o Microsoft Corporation
    Inventors: Sushant P. Rewaskar, Muhammad Umer Azad, Corey M. Sanders, Saad Syed, Charles T. Lenzmeier, Gaurav Gupta
  • Publication number: 20100251328
    Abstract: Applications, such as cloud services, may be deployed within a network environment (e.g., a cloud computing environment). Unfortunately, when the applications are instantiated within the network environment, they have the ability to compromise the security of other applications and/or the infrastructure of the network environment. Accordingly, as provided herein, a security scheme may be applied to a network environment within which an application is to be instantiated. The security scheme may comprise one or more security layers (e.g., virtual machine level security, application level security, operating system level security, etc.) derived from an application service model describing the application and/or resources allocated to the application.
    Type: Application
    Filed: March 31, 2009
    Publication date: September 30, 2010
    Applicant: Microsoft Corporation
    Inventors: Saad Syed, Chetan Shankar, Jose M. Bernabeu-Auban, Sushant P. Rewaskar, Muhammad Umer Azad