Patents by Inventor Nathan C. Sherman

Nathan C. Sherman has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 11907382
    Abstract: An accessory device receives authentication information from a host computing device connected thereto and determines whether the authentication information is valid. If the authentication information is valid, the accessory device applies a first access policy that specifies whether the accessory device can provide the host computing device with access to none, some, or all of various computing resources of the accessory device. If the authentication information is not valid, the accessory device applies a second access policy that is different than the first access policy. The accessory device can also be provisioned with access policies by a host computing device if the host computing device successfully authenticates with the accessory device. In either case, authenticating the host computing device may include verifying a digital signature of a certificate provided by the host computing device using a public key of a certificate authority that has been provisioned to the accessory device.
    Type: Grant
    Filed: September 2, 2022
    Date of Patent: February 20, 2024
    Assignee: MICROSOFT TECHNOLOGY LICENSING, LLC
    Inventors: Ravi Kiran Chivukula, Robert D. Young, Nathan C. Sherman, Chirag Shah, Brandon Records, Astha Keshan, Eric Kotz, M. Nashaat Soliman
  • Publication number: 20220414238
    Abstract: An accessory device receives authentication information from a host computing device connected thereto and determines whether the authentication information is valid. If the authentication information is valid, the accessory device applies a first access policy that specifies whether the accessory device can provide the host computing device with access to none, some, or all of various computing resources of the accessory device. If the authentication information is not valid, the accessory device applies a second access policy that is different than the first access policy. The accessory device can also be provisioned with access policies by a host computing device if the host computing device successfully authenticates with the accessory device. In either case, authenticating the host computing device may include verifying a digital signature of a certificate provided by the host computing device using a public key of a certificate authority that has been provisioned to the accessory device.
    Type: Application
    Filed: September 2, 2022
    Publication date: December 29, 2022
    Inventors: Ravi Kiran CHIVUKULA, Robert D. YOUNG, Nathan C. SHERMAN, Chirag SHAH, Brandon RECORDS, Astha KESHAN, Eric KOTZ, M. Nashaat SOLIMAN
  • Patent number: 11468181
    Abstract: An accessory device receives authentication information from a host computing device connected thereto and determines whether the authentication information is valid. If the authentication information is valid, the accessory device applies a first access policy that specifies whether the accessory device can provide the host computing device with access to none, some, or all of various computing resources of the accessory device. If the authentication information is not valid, the accessory device applies a second access policy that is different than the first access policy. The accessory device can also be provisioned with access policies by a host computing device if the host computing device successfully authenticates with the accessory device. In either case, authenticating the host computing device may include verifying a digital signature of a certificate provided by the host computing device using a public key of a certificate authority that has been provisioned to the accessory device.
    Type: Grant
    Filed: April 21, 2020
    Date of Patent: October 11, 2022
    Assignee: MICROSOFT TECHNOLOGY LICENSING, LLC
    Inventors: Ravi Kiran Chivukula, Robert D. Young, Nathan C. Sherman, Chirag Shah, Brandon Records, Astha Keshan, Eric Kotz, M. Nashaat Soliman
  • Publication number: 20210326459
    Abstract: An accessory device receives authentication information from a host computing device connected thereto and determines whether the authentication information is valid. If the authentication information is valid, the accessory device applies a first access policy that specifies whether the accessory device can provide the host computing device with access to none, some, or all of various computing resources of the accessory device. If the authentication information is not valid, the accessory device applies a second access policy that is different than the first access policy. The accessory device can also be provisioned with access policies by a host computing device if the host computing device successfully authenticates with the accessory device. In either case, authenticating the host computing device may include verifying a digital signature of a certificate provided by the host computing device using a public key of a certificate authority that has been provisioned to the accessory device.
    Type: Application
    Filed: April 21, 2020
    Publication date: October 21, 2021
    Inventors: Ravi Kiran Chivukula, Robert D. Young, Nathan C. Sherman, Chirag Shah, Brandon Records, Astha Keshan, Eric Kotz, M. Nashaat Soliman
  • Patent number: 9490842
    Abstract: Architecture for enabling continuous operation of a control command issued by a control input (e.g., a control key on a computer keyboard or game controller). For example, for a user of a software application (e.g., a gaming application), an activation modifier is used for enabling continuous operation of the control command. The activation modifier can be a lock key or other type of input used in combination with the control key. During continuous operation of the control command, one or more alternate control inputs (e.g., from alternate control keys) are enabled to concurrently issue alternate control commands to the software application.
    Type: Grant
    Filed: July 27, 2012
    Date of Patent: November 8, 2016
    Assignee: Microsoft Technology Licensing, LLC
    Inventors: Daniel L. Odell, Joshua E. Baber, Nathan C. Sherman
  • Patent number: 8935774
    Abstract: Accessory device authentication techniques are described. In one or more embodiments, connection of an accessory device to a host computing device is detected. Responsive to the detection, an authentication sequence may occur to verify an identity and/or capabilities of the accessory device. Upon successful authentication of the accessory device, the host device may authorize the accessory device for power exchange interactions with the host device. The host device may then draw supplemental power from a power source associated with the authorized accessory device, such as a battery or power adapter. The host device may also enable the accessory device to obtain and use power supplied by the host device in some scenarios. Power exchange between a host device and an authorized accessory may be managed in accordance with capabilities of the accessory device that are identified during authentication.
    Type: Grant
    Filed: May 14, 2012
    Date of Patent: January 13, 2015
    Assignee: Microsoft Corporation
    Inventors: Jim Tom Belesiu, Gene Robert Obie, James Charles Marshall, Robert D. Young, Nathan C. Sherman, Edward C. Giaimo, III, David Neff, Jose R. Sousa
  • Publication number: 20140354550
    Abstract: Disclosed are techniques and systems for obtaining contextual information at least in part from a keyboard, to improve typing efficiencies and user experience. The contextual information may include keyboard attributes, typing metadata, user actions, and the like. The keyboard may be configured to detect an input event at the keyboard. A human interface device (HID) stack is configured to receive the contextual information, and a keyboard manager is configured to determine an output based at least in part on the input event and the contextual information. The output may be a most probable function (non-text-based output), or character or word (text-based output) that can be suggested or used to auto-correct application data. In some embodiments, the user action received in the contextual information may be translated to a gesture to manipulate application data.
    Type: Application
    Filed: September 6, 2013
    Publication date: December 4, 2014
    Applicant: Microsoft Corporation
    Inventors: Rouella J. Mendonca, Alex G. Snitkovskiy, Hirofumi Yamamoto, Randall E. Aull, Nathan C. Sherman, James C. Marshall, Scott Mail
  • Patent number: 8793786
    Abstract: Computer-readable media, computerized methods, and computer systems for alerting a user that an operating system has entered a secure mode is provided. Initially, inputs are received at an operating system residing in a default mode. Typically, the default mode allows applications running on the operating system to access the inputs. If the inputs are identified as a call to perform a protected operation, the operating system is transitioned from the default mode to the secure mode. Typically, the secure mode restricts the applications from intercepting the inputs. The transition to the secure mode is automatically communicated to the user via an indicator device. Generally, automatic communication includes providing a message from the operating system to the indicator device over a secure pathway that triggers the indicator device to generate a user-perceivable output. Accordingly, the operating system exerts exclusive control over the operation of the indicator device.
    Type: Grant
    Filed: February 8, 2008
    Date of Patent: July 29, 2014
    Assignee: Microsoft Corporation
    Inventors: Firdosh K. Bhesania, Alain Michaud, Nathan C. Sherman, Hirofumi Yamamoto, Yashabh Sethi, Steve Wright
  • Patent number: 8719603
    Abstract: Accessory device authentication techniques are described. In one or more embodiments, connection of an accessory device to a host computing device is detected. Responsive to the detection, an authentication sequence may occur to verify an identity and/or capabilities of the accessory device. Upon successful authentication of the accessory device, the host device may authorize the accessory device for power exchange interactions with the host device. The host device may then draw supplemental power from a power source associated with the authorized accessory device, such as a battery or power adapter. The host device may also enable the accessory device to obtain and use power supplied by the host device in some scenarios. Power exchange between a host device and an authorized accessory may be managed in accordance with capabilities of the accessory device that are identified during authentication.
    Type: Grant
    Filed: October 16, 2012
    Date of Patent: May 6, 2014
    Assignee: Microsoft Corporation
    Inventors: Jim Tom Belesiu, Gene Robert Obie, James Charles Marshall, Robert D. Young, Nathan C. Sherman, Edward C. Giaimo, III, David Neff, Jose R. Sousa
  • Publication number: 20130232350
    Abstract: Accessory device authentication techniques are described. In one or more embodiments, connection of an accessory device to a host computing device is detected. Responsive to the detection, an authentication sequence may occur to verify an identity and/or capabilities of the accessory device. Upon successful authentication of the accessory device, the host device may authorize the accessory device for power exchange interactions with the host device. The host device may then draw supplemental power from a power source associated with the authorized accessory device, such as a battery or power adapter. The host device may also enable the accessory device to obtain and use power supplied by the host device in some scenarios. Power exchange between a host device and an authorized accessory may be managed in accordance with capabilities of the accessory device that are identified during authentication.
    Type: Application
    Filed: October 16, 2012
    Publication date: September 5, 2013
    Applicant: MICROSOFT CORPORATION
    Inventors: Jim Tom Belesiu, Gene Robert Obie, James Charles Marshall, Robert D. Young, Nathan C. Sherman, Edward C. Giaimo, III, David Neff, Jose R. Sousa
  • Publication number: 20130232571
    Abstract: Accessory device authentication techniques are described. In one or more embodiments, connection of an accessory device to a host computing device is detected. Responsive to the detection, an authentication sequence may occur to verify an identity and/or capabilities of the accessory device. Upon successful authentication of the accessory device, the host device may authorize the accessory device for power exchange interactions with the host device. The host device may then draw supplemental power from a power source associated with the authorized accessory device, such as a battery or power adapter. The host device may also enable the accessory device to obtain and use power supplied by the host device in some scenarios. Power exchange between a host device and an authorized accessory may be managed in accordance with capabilities of the accessory device that are identified during authentication.
    Type: Application
    Filed: May 14, 2012
    Publication date: September 5, 2013
    Inventors: Jim Tom Belesiu, Gene Robert Obie, James Charles Marshall, Robert D. Young, Nathan C. Sherman, Edward C. Giaimo, III, David Neff, Jose R. Sousa
  • Publication number: 20120295711
    Abstract: Architecture for enabling continuous operation of a control command issued by a control input (e.g., a control key on a computer keyboard or game controller). For example, for a user of a software application (e.g., a gaming application), an activation modifier is used for enabling continuous operation of the control command. The activation modifier can be a lock key or other type of input used in combination with the control key. During continuous operation of the control command, one or more alternate control inputs (e.g., from alternate control keys) are enabled to concurrently issue alternate control commands to the software application.
    Type: Application
    Filed: July 27, 2012
    Publication date: November 22, 2012
    Applicant: Microsoft Corporation
    Inventors: Daniel L. Odell, Joshua E. Baber, Nathan C. Sherman
  • Patent number: 8296474
    Abstract: A peripheral device is connectable to a computer having one of a first interface and a second interface. The first interface communicates with the peripheral device over a differential data connection having a first data conductor and a second data conductor. The second interface communicates with the peripheral device over a clock conductor and a single ended data connection which includes a data conductor. The peripheral device has first and second communication conductors. The peripheral device includes an interface detection component coupled to the first and second communication conductors and configured to detect which of the first and second interfaces the peripheral device is connected to.
    Type: Grant
    Filed: December 29, 2011
    Date of Patent: October 23, 2012
    Assignee: Microsoft Corporation
    Inventors: Mark T. Hanson, Nathan C. Sherman, Lord Nigel Featherston, Mark W. Casebolt, Victor P. Drake, Keith Mullins, David L. Holo, Terry M. Lipscomb
  • Patent number: 8264381
    Abstract: Architecture for enabling continuous operation of a control command issued by a control input (e.g., a control key on a computer keyboard or game controller). For example, for a user of a software application (e.g., a gaming application), an activation modifier is used for enabling continuous operation of the control command. The activation modifier can be a lock key or other type of input used in combination with the control key. During continuous operation of the control command, one or more alternate control inputs (e.g., from alternate control keys) are enabled to concurrently issue alternate control commands to the software application.
    Type: Grant
    Filed: August 22, 2008
    Date of Patent: September 11, 2012
    Assignee: Microsoft Corporation
    Inventors: Daniel L. Odell, Joshua E Baber, Nathan C Sherman
  • Publication number: 20120124247
    Abstract: A peripheral device is connectable to a computer having one of a first interface and a second interface. The first interface communicates with the peripheral device over a differential data connection having a first data conductor and a second data conductor. The second interface communicates with the peripheral device over a clock conductor and a single ended data connection which includes a data conductor. The peripheral device has first and second communication conductors. The peripheral device includes an interface detection component coupled to the first and second communication conductors and configured to detect which of the first and second interfaces the peripheral device is connected to.
    Type: Application
    Filed: December 29, 2011
    Publication date: May 17, 2012
    Applicant: MICROSOFT CORPORATION
    Inventors: Mark T. Hanson, Nathan C. Sherman, Lord Nigel Featherston, Mark W. Casebolt, Victor P. Drake, Keith Mullins, David L. Holo, Terry M. Lipscomb
  • Patent number: 8159372
    Abstract: Keyboard apparatus and methods for processing keyboard depressions are disclosed. One disclosed keyboard apparatus includes a keyboard having a plurality of keys configured to be depressed in a concurrent depression state, and a plurality of key switch matrices. Each key switch of the plurality of key switch matrices may be configured to be actuated by a corresponding key of the keyboard. The keyboard apparatus may further include a keyboard controller configured to determine whether a sensed key depression in the concurrent depression state is a ghost key depression, based on sensed key switch states of respective key switches in each of the plurality of key switch matrices which correspond to the sensed key depression.
    Type: Grant
    Filed: October 16, 2007
    Date of Patent: April 17, 2012
    Assignee: Microsoft Corporation
    Inventor: Nathan C Sherman
  • Patent number: 8140855
    Abstract: A security-enhanced login technique that provides a convenient and easy-to-use two factor technique to enhance the security of passwords without requiring any changes on the server side of a client-server network. The technique employs a convenient and easy-to-use two-factor technique to generate strong passwords for Web and other applications. In this technique, a convenient or personal device such as a mouse is used as the other factor besides a user password. A secret stored in the mouse or other personal device is hashed together with the password entered by a user and the server ID, to generate a strong, server-specific password which is used to authenticate the user to the server. This password enhancement operation is carried out inside the personal device.
    Type: Grant
    Filed: April 11, 2008
    Date of Patent: March 20, 2012
    Assignee: Microsoft Corp.
    Inventors: Bin Benjamin Zhu, Min Feng, Aimin Pan, Yuan Kong, Nathan C. Sherman, Hui Fan, Rui Guo, Josh Benaloh
  • Patent number: 8112556
    Abstract: A peripheral device, with first and second communication conductors, is connectable to a computer having one of a first interface and a second interface. The first interface communicates with the peripheral device over a differential data connection having a first data conductor and a second data conductor. The second interface communicates with the peripheral device over a clock conductor and a single ended data connection which includes a data conductor. The peripheral device includes an interface detection component coupled to the first and second communication conductors to detect which of the first and second interfaces the peripheral device is connected to.
    Type: Grant
    Filed: May 31, 2011
    Date of Patent: February 7, 2012
    Assignee: Microsoft Corporation
    Inventors: Mark T. Hanson, Lord Nigel Featherston, Nathan C. Sherman, Victor P. Drake, Keith Mullins, David L. Holo
  • Publication number: 20110231585
    Abstract: A peripheral device is connectable to a computer having one of a first interface and a second interface. The first interface communicates with the peripheral device over a differential data connection having a first data conductor and a second data conductor. The second interface communicates with the peripheral device over a clock conductor and a single ended data connection which includes a data conductor. The peripheral device has first and second communication conductors configured for connection to the first and second data conductors in the differential data connection when the computer includes the first interface and is configured for connection to the first data conductor in the single ended data connection and the clock conductor when the computer is provided with the second interface.
    Type: Application
    Filed: May 31, 2011
    Publication date: September 22, 2011
    Applicant: MICROSOFT CORPORATION
    Inventors: Mark T. Hanson, Lord Nigel Featherston, Nathan C. Sherman, Victor P. Drake, Keith Mullins, David L. Holo
  • Patent number: 7975078
    Abstract: A peripheral device, connected to a computer, has either a first or second interface. The first interface communicates over a differential data connection and the second interface communicates over a clock conductor and a single ended data connection. The peripheral device has first and second communication conductors that are either connected to the differential data connection when the computer includes the first interface or to the single ended data connection and the clock conductor when the computer includes the second interface. The peripheral device has an interface detection component that detects which of the first and second interfaces the peripheral device is connected to. The peripheral device also has a controller that communicates according to a protocol corresponding to the detected interface.
    Type: Grant
    Filed: June 17, 2010
    Date of Patent: July 5, 2011
    Assignee: Microsoft Corporation
    Inventors: Mark T. Hanson, Nathan C. Sherman, Lord Nigel Featherston, Mark W. Casebolt, Victor P. Drake, Keith Mullins, David L. Holo, Terry M. Lipscomb