Patents by Inventor Nathan C. Sherman
Nathan C. Sherman has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 11907382Abstract: An accessory device receives authentication information from a host computing device connected thereto and determines whether the authentication information is valid. If the authentication information is valid, the accessory device applies a first access policy that specifies whether the accessory device can provide the host computing device with access to none, some, or all of various computing resources of the accessory device. If the authentication information is not valid, the accessory device applies a second access policy that is different than the first access policy. The accessory device can also be provisioned with access policies by a host computing device if the host computing device successfully authenticates with the accessory device. In either case, authenticating the host computing device may include verifying a digital signature of a certificate provided by the host computing device using a public key of a certificate authority that has been provisioned to the accessory device.Type: GrantFiled: September 2, 2022Date of Patent: February 20, 2024Assignee: MICROSOFT TECHNOLOGY LICENSING, LLCInventors: Ravi Kiran Chivukula, Robert D. Young, Nathan C. Sherman, Chirag Shah, Brandon Records, Astha Keshan, Eric Kotz, M. Nashaat Soliman
-
Publication number: 20220414238Abstract: An accessory device receives authentication information from a host computing device connected thereto and determines whether the authentication information is valid. If the authentication information is valid, the accessory device applies a first access policy that specifies whether the accessory device can provide the host computing device with access to none, some, or all of various computing resources of the accessory device. If the authentication information is not valid, the accessory device applies a second access policy that is different than the first access policy. The accessory device can also be provisioned with access policies by a host computing device if the host computing device successfully authenticates with the accessory device. In either case, authenticating the host computing device may include verifying a digital signature of a certificate provided by the host computing device using a public key of a certificate authority that has been provisioned to the accessory device.Type: ApplicationFiled: September 2, 2022Publication date: December 29, 2022Inventors: Ravi Kiran CHIVUKULA, Robert D. YOUNG, Nathan C. SHERMAN, Chirag SHAH, Brandon RECORDS, Astha KESHAN, Eric KOTZ, M. Nashaat SOLIMAN
-
Patent number: 11468181Abstract: An accessory device receives authentication information from a host computing device connected thereto and determines whether the authentication information is valid. If the authentication information is valid, the accessory device applies a first access policy that specifies whether the accessory device can provide the host computing device with access to none, some, or all of various computing resources of the accessory device. If the authentication information is not valid, the accessory device applies a second access policy that is different than the first access policy. The accessory device can also be provisioned with access policies by a host computing device if the host computing device successfully authenticates with the accessory device. In either case, authenticating the host computing device may include verifying a digital signature of a certificate provided by the host computing device using a public key of a certificate authority that has been provisioned to the accessory device.Type: GrantFiled: April 21, 2020Date of Patent: October 11, 2022Assignee: MICROSOFT TECHNOLOGY LICENSING, LLCInventors: Ravi Kiran Chivukula, Robert D. Young, Nathan C. Sherman, Chirag Shah, Brandon Records, Astha Keshan, Eric Kotz, M. Nashaat Soliman
-
Publication number: 20210326459Abstract: An accessory device receives authentication information from a host computing device connected thereto and determines whether the authentication information is valid. If the authentication information is valid, the accessory device applies a first access policy that specifies whether the accessory device can provide the host computing device with access to none, some, or all of various computing resources of the accessory device. If the authentication information is not valid, the accessory device applies a second access policy that is different than the first access policy. The accessory device can also be provisioned with access policies by a host computing device if the host computing device successfully authenticates with the accessory device. In either case, authenticating the host computing device may include verifying a digital signature of a certificate provided by the host computing device using a public key of a certificate authority that has been provisioned to the accessory device.Type: ApplicationFiled: April 21, 2020Publication date: October 21, 2021Inventors: Ravi Kiran Chivukula, Robert D. Young, Nathan C. Sherman, Chirag Shah, Brandon Records, Astha Keshan, Eric Kotz, M. Nashaat Soliman
-
Patent number: 9490842Abstract: Architecture for enabling continuous operation of a control command issued by a control input (e.g., a control key on a computer keyboard or game controller). For example, for a user of a software application (e.g., a gaming application), an activation modifier is used for enabling continuous operation of the control command. The activation modifier can be a lock key or other type of input used in combination with the control key. During continuous operation of the control command, one or more alternate control inputs (e.g., from alternate control keys) are enabled to concurrently issue alternate control commands to the software application.Type: GrantFiled: July 27, 2012Date of Patent: November 8, 2016Assignee: Microsoft Technology Licensing, LLCInventors: Daniel L. Odell, Joshua E. Baber, Nathan C. Sherman
-
Patent number: 8935774Abstract: Accessory device authentication techniques are described. In one or more embodiments, connection of an accessory device to a host computing device is detected. Responsive to the detection, an authentication sequence may occur to verify an identity and/or capabilities of the accessory device. Upon successful authentication of the accessory device, the host device may authorize the accessory device for power exchange interactions with the host device. The host device may then draw supplemental power from a power source associated with the authorized accessory device, such as a battery or power adapter. The host device may also enable the accessory device to obtain and use power supplied by the host device in some scenarios. Power exchange between a host device and an authorized accessory may be managed in accordance with capabilities of the accessory device that are identified during authentication.Type: GrantFiled: May 14, 2012Date of Patent: January 13, 2015Assignee: Microsoft CorporationInventors: Jim Tom Belesiu, Gene Robert Obie, James Charles Marshall, Robert D. Young, Nathan C. Sherman, Edward C. Giaimo, III, David Neff, Jose R. Sousa
-
Publication number: 20140354550Abstract: Disclosed are techniques and systems for obtaining contextual information at least in part from a keyboard, to improve typing efficiencies and user experience. The contextual information may include keyboard attributes, typing metadata, user actions, and the like. The keyboard may be configured to detect an input event at the keyboard. A human interface device (HID) stack is configured to receive the contextual information, and a keyboard manager is configured to determine an output based at least in part on the input event and the contextual information. The output may be a most probable function (non-text-based output), or character or word (text-based output) that can be suggested or used to auto-correct application data. In some embodiments, the user action received in the contextual information may be translated to a gesture to manipulate application data.Type: ApplicationFiled: September 6, 2013Publication date: December 4, 2014Applicant: Microsoft CorporationInventors: Rouella J. Mendonca, Alex G. Snitkovskiy, Hirofumi Yamamoto, Randall E. Aull, Nathan C. Sherman, James C. Marshall, Scott Mail
-
Patent number: 8793786Abstract: Computer-readable media, computerized methods, and computer systems for alerting a user that an operating system has entered a secure mode is provided. Initially, inputs are received at an operating system residing in a default mode. Typically, the default mode allows applications running on the operating system to access the inputs. If the inputs are identified as a call to perform a protected operation, the operating system is transitioned from the default mode to the secure mode. Typically, the secure mode restricts the applications from intercepting the inputs. The transition to the secure mode is automatically communicated to the user via an indicator device. Generally, automatic communication includes providing a message from the operating system to the indicator device over a secure pathway that triggers the indicator device to generate a user-perceivable output. Accordingly, the operating system exerts exclusive control over the operation of the indicator device.Type: GrantFiled: February 8, 2008Date of Patent: July 29, 2014Assignee: Microsoft CorporationInventors: Firdosh K. Bhesania, Alain Michaud, Nathan C. Sherman, Hirofumi Yamamoto, Yashabh Sethi, Steve Wright
-
Patent number: 8719603Abstract: Accessory device authentication techniques are described. In one or more embodiments, connection of an accessory device to a host computing device is detected. Responsive to the detection, an authentication sequence may occur to verify an identity and/or capabilities of the accessory device. Upon successful authentication of the accessory device, the host device may authorize the accessory device for power exchange interactions with the host device. The host device may then draw supplemental power from a power source associated with the authorized accessory device, such as a battery or power adapter. The host device may also enable the accessory device to obtain and use power supplied by the host device in some scenarios. Power exchange between a host device and an authorized accessory may be managed in accordance with capabilities of the accessory device that are identified during authentication.Type: GrantFiled: October 16, 2012Date of Patent: May 6, 2014Assignee: Microsoft CorporationInventors: Jim Tom Belesiu, Gene Robert Obie, James Charles Marshall, Robert D. Young, Nathan C. Sherman, Edward C. Giaimo, III, David Neff, Jose R. Sousa
-
Publication number: 20130232350Abstract: Accessory device authentication techniques are described. In one or more embodiments, connection of an accessory device to a host computing device is detected. Responsive to the detection, an authentication sequence may occur to verify an identity and/or capabilities of the accessory device. Upon successful authentication of the accessory device, the host device may authorize the accessory device for power exchange interactions with the host device. The host device may then draw supplemental power from a power source associated with the authorized accessory device, such as a battery or power adapter. The host device may also enable the accessory device to obtain and use power supplied by the host device in some scenarios. Power exchange between a host device and an authorized accessory may be managed in accordance with capabilities of the accessory device that are identified during authentication.Type: ApplicationFiled: October 16, 2012Publication date: September 5, 2013Applicant: MICROSOFT CORPORATIONInventors: Jim Tom Belesiu, Gene Robert Obie, James Charles Marshall, Robert D. Young, Nathan C. Sherman, Edward C. Giaimo, III, David Neff, Jose R. Sousa
-
Publication number: 20130232571Abstract: Accessory device authentication techniques are described. In one or more embodiments, connection of an accessory device to a host computing device is detected. Responsive to the detection, an authentication sequence may occur to verify an identity and/or capabilities of the accessory device. Upon successful authentication of the accessory device, the host device may authorize the accessory device for power exchange interactions with the host device. The host device may then draw supplemental power from a power source associated with the authorized accessory device, such as a battery or power adapter. The host device may also enable the accessory device to obtain and use power supplied by the host device in some scenarios. Power exchange between a host device and an authorized accessory may be managed in accordance with capabilities of the accessory device that are identified during authentication.Type: ApplicationFiled: May 14, 2012Publication date: September 5, 2013Inventors: Jim Tom Belesiu, Gene Robert Obie, James Charles Marshall, Robert D. Young, Nathan C. Sherman, Edward C. Giaimo, III, David Neff, Jose R. Sousa
-
Publication number: 20120295711Abstract: Architecture for enabling continuous operation of a control command issued by a control input (e.g., a control key on a computer keyboard or game controller). For example, for a user of a software application (e.g., a gaming application), an activation modifier is used for enabling continuous operation of the control command. The activation modifier can be a lock key or other type of input used in combination with the control key. During continuous operation of the control command, one or more alternate control inputs (e.g., from alternate control keys) are enabled to concurrently issue alternate control commands to the software application.Type: ApplicationFiled: July 27, 2012Publication date: November 22, 2012Applicant: Microsoft CorporationInventors: Daniel L. Odell, Joshua E. Baber, Nathan C. Sherman
-
Patent number: 8296474Abstract: A peripheral device is connectable to a computer having one of a first interface and a second interface. The first interface communicates with the peripheral device over a differential data connection having a first data conductor and a second data conductor. The second interface communicates with the peripheral device over a clock conductor and a single ended data connection which includes a data conductor. The peripheral device has first and second communication conductors. The peripheral device includes an interface detection component coupled to the first and second communication conductors and configured to detect which of the first and second interfaces the peripheral device is connected to.Type: GrantFiled: December 29, 2011Date of Patent: October 23, 2012Assignee: Microsoft CorporationInventors: Mark T. Hanson, Nathan C. Sherman, Lord Nigel Featherston, Mark W. Casebolt, Victor P. Drake, Keith Mullins, David L. Holo, Terry M. Lipscomb
-
Patent number: 8264381Abstract: Architecture for enabling continuous operation of a control command issued by a control input (e.g., a control key on a computer keyboard or game controller). For example, for a user of a software application (e.g., a gaming application), an activation modifier is used for enabling continuous operation of the control command. The activation modifier can be a lock key or other type of input used in combination with the control key. During continuous operation of the control command, one or more alternate control inputs (e.g., from alternate control keys) are enabled to concurrently issue alternate control commands to the software application.Type: GrantFiled: August 22, 2008Date of Patent: September 11, 2012Assignee: Microsoft CorporationInventors: Daniel L. Odell, Joshua E Baber, Nathan C Sherman
-
Publication number: 20120124247Abstract: A peripheral device is connectable to a computer having one of a first interface and a second interface. The first interface communicates with the peripheral device over a differential data connection having a first data conductor and a second data conductor. The second interface communicates with the peripheral device over a clock conductor and a single ended data connection which includes a data conductor. The peripheral device has first and second communication conductors. The peripheral device includes an interface detection component coupled to the first and second communication conductors and configured to detect which of the first and second interfaces the peripheral device is connected to.Type: ApplicationFiled: December 29, 2011Publication date: May 17, 2012Applicant: MICROSOFT CORPORATIONInventors: Mark T. Hanson, Nathan C. Sherman, Lord Nigel Featherston, Mark W. Casebolt, Victor P. Drake, Keith Mullins, David L. Holo, Terry M. Lipscomb
-
Patent number: 8159372Abstract: Keyboard apparatus and methods for processing keyboard depressions are disclosed. One disclosed keyboard apparatus includes a keyboard having a plurality of keys configured to be depressed in a concurrent depression state, and a plurality of key switch matrices. Each key switch of the plurality of key switch matrices may be configured to be actuated by a corresponding key of the keyboard. The keyboard apparatus may further include a keyboard controller configured to determine whether a sensed key depression in the concurrent depression state is a ghost key depression, based on sensed key switch states of respective key switches in each of the plurality of key switch matrices which correspond to the sensed key depression.Type: GrantFiled: October 16, 2007Date of Patent: April 17, 2012Assignee: Microsoft CorporationInventor: Nathan C Sherman
-
Patent number: 8140855Abstract: A security-enhanced login technique that provides a convenient and easy-to-use two factor technique to enhance the security of passwords without requiring any changes on the server side of a client-server network. The technique employs a convenient and easy-to-use two-factor technique to generate strong passwords for Web and other applications. In this technique, a convenient or personal device such as a mouse is used as the other factor besides a user password. A secret stored in the mouse or other personal device is hashed together with the password entered by a user and the server ID, to generate a strong, server-specific password which is used to authenticate the user to the server. This password enhancement operation is carried out inside the personal device.Type: GrantFiled: April 11, 2008Date of Patent: March 20, 2012Assignee: Microsoft Corp.Inventors: Bin Benjamin Zhu, Min Feng, Aimin Pan, Yuan Kong, Nathan C. Sherman, Hui Fan, Rui Guo, Josh Benaloh
-
Patent number: 8112556Abstract: A peripheral device, with first and second communication conductors, is connectable to a computer having one of a first interface and a second interface. The first interface communicates with the peripheral device over a differential data connection having a first data conductor and a second data conductor. The second interface communicates with the peripheral device over a clock conductor and a single ended data connection which includes a data conductor. The peripheral device includes an interface detection component coupled to the first and second communication conductors to detect which of the first and second interfaces the peripheral device is connected to.Type: GrantFiled: May 31, 2011Date of Patent: February 7, 2012Assignee: Microsoft CorporationInventors: Mark T. Hanson, Lord Nigel Featherston, Nathan C. Sherman, Victor P. Drake, Keith Mullins, David L. Holo
-
Publication number: 20110231585Abstract: A peripheral device is connectable to a computer having one of a first interface and a second interface. The first interface communicates with the peripheral device over a differential data connection having a first data conductor and a second data conductor. The second interface communicates with the peripheral device over a clock conductor and a single ended data connection which includes a data conductor. The peripheral device has first and second communication conductors configured for connection to the first and second data conductors in the differential data connection when the computer includes the first interface and is configured for connection to the first data conductor in the single ended data connection and the clock conductor when the computer is provided with the second interface.Type: ApplicationFiled: May 31, 2011Publication date: September 22, 2011Applicant: MICROSOFT CORPORATIONInventors: Mark T. Hanson, Lord Nigel Featherston, Nathan C. Sherman, Victor P. Drake, Keith Mullins, David L. Holo
-
Patent number: 7975078Abstract: A peripheral device, connected to a computer, has either a first or second interface. The first interface communicates over a differential data connection and the second interface communicates over a clock conductor and a single ended data connection. The peripheral device has first and second communication conductors that are either connected to the differential data connection when the computer includes the first interface or to the single ended data connection and the clock conductor when the computer includes the second interface. The peripheral device has an interface detection component that detects which of the first and second interfaces the peripheral device is connected to. The peripheral device also has a controller that communicates according to a protocol corresponding to the detected interface.Type: GrantFiled: June 17, 2010Date of Patent: July 5, 2011Assignee: Microsoft CorporationInventors: Mark T. Hanson, Nathan C. Sherman, Lord Nigel Featherston, Mark W. Casebolt, Victor P. Drake, Keith Mullins, David L. Holo, Terry M. Lipscomb