Patents by Inventor Neil Shipp

Neil Shipp has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 10715530
    Abstract: When a user inputs an action request, such as a requested command, to be performed on a target machine, a management system receives the request and verifies it with a separate authentication and permission system. The verified command request is sent to the target machine. An authentication worker on the target machine accesses a set of policies, local to the target machine, to identify a least privileged execution environment in which the requested command can be performed. The authentication worker on the target machine launches the requested command within the identified least privileged execution environment on the target machine.
    Type: Grant
    Filed: September 6, 2017
    Date of Patent: July 14, 2020
    Assignee: Microsoft Technology Licensing, LLC
    Inventors: Liqiang Zhu, Anand Menon, Guanghui He, Jiahui Wang, Neil Shipp, Nick Voicu, Yi Zeng, Yu Huang, Rajalakshmi Dani, David Hetherington, Zhaoan Liu, Gavin Ackroyd
  • Publication number: 20180063153
    Abstract: When a user inputs an action request, such as a requested command, to be performed on a target machine, a management system receives the request and verifies it with a separate authentication and permission system. The verified command request is sent to the target machine. An authentication worker on the target machine accesses a set of policies, local to the target machine, to identify a least privileged execution environment in which the requested command can be performed. The authentication worker on the target machine launches the requested command within the identified least privileged execution environment on the target machine.
    Type: Application
    Filed: September 6, 2017
    Publication date: March 1, 2018
    Inventors: Liqiang Zhu, Anand Menon, Guanghui He, Jiahui Wang, Neil Shipp, Nick Voicu, Yi Zeng, Yu (Kyle) Huang, Rajalakshmi Dani, David Hetherington, Zhaoan Liu, Gavin Ackroyd
  • Patent number: 9787690
    Abstract: When a user inputs an action request, such as a requested command, to be performed on a target machine, a management system receives the request and verifies it with a separate authentication and permission system. The verified command request is sent to the target machine. An authentication worker on the target machine accesses a set of policies, local to the target machine, to identify a least privileged execution environment in which the requested command can be performed. The authentication worker on the target machine launches the requested command within the identified least privileged execution environment on the target machine.
    Type: Grant
    Filed: May 18, 2015
    Date of Patent: October 10, 2017
    Assignee: Microsoft Technology Licensing, LLC
    Inventors: Liqiang Zhu, Anand Menon, Guanghui He, Jiahui Wang, Neil Shipp, Nick Voicu, Yi Zeng, Yu (Kyle) Huang, Rajalakshmi Dani, David Hetherington, Zhaoan Liu, Gavin Ackroyd
  • Patent number: 9736153
    Abstract: Techniques to perform federated authentication are described. An apparatus may comprise a resource server may have an authentication proxy component to perform authentication operations on behalf of a client. The authentication proxy component comprises an authentication handling module operative to receive an authentication request to authenticate the client using a basic authentication protocol. The authentication proxy component also comprises an authentication discovery module communicatively coupled to the authentication handling module, the authentication discovery module operative to discover an identity server for the client.
    Type: Grant
    Filed: June 27, 2008
    Date of Patent: August 15, 2017
    Assignee: MICROSOFT TECHNOLOGY LICENSING, LLC
    Inventors: Paul McDaniel, Neil Shipp
  • Publication number: 20160182525
    Abstract: When a user inputs an action request, such as a requested command, to be performed on a target machine, a management system receives the request and verifies it with a separate authentication and permission system. The verified command request is sent to the target machine. An authentication worker on the target machine accesses a set of policies, local to the target machine, to identify a least privileged execution environment in which the requested command can be performed. The authentication worker on the target machine launches the requested command within the identified least privileged execution environment on the target machine.
    Type: Application
    Filed: May 18, 2015
    Publication date: June 23, 2016
    Inventors: Liqiang Zhu, Anand Menon, Guanghui He, Jiahui Wang, Neil Shipp, Nick Voicu, Yi Zeng, Yu (Kyle) Huang, Rajalakshmi Dani, David Hetherington, Zhaoan Liu, Gavin Ackroyd
  • Publication number: 20090328178
    Abstract: Techniques to perform federated authentication are described. An apparatus may comprise a resource server may have an authentication proxy component to perform authentication operations on behalf of a client. The authentication proxy component comprises an authentication handling module operative to receive an authentication request to authenticate the client using a basic authentication protocol. The authentication proxy component also comprises an authentication discovery module communicatively coupled to the authentication handling module, the authentication discovery module operative to discover an identity server for the client.
    Type: Application
    Filed: June 27, 2008
    Publication date: December 31, 2009
    Applicant: MICROSOFT CORPORATION
    Inventors: Paul McDaniel, Neil Shipp
  • Publication number: 20060235878
    Abstract: A method of building an offline address book (OAB). An OAB data file and a table of attributes are generated at a server. The data file and table are transferred from the server to a client. The transferred data file and table are indexed by the client.
    Type: Application
    Filed: April 14, 2005
    Publication date: October 19, 2006
    Applicant: Microsoft Corporation
    Inventors: Neil Shipp, Victor Romano
  • Publication number: 20060179066
    Abstract: Mechanisms for updating an address book. A first computing system generates an address book update file format and provides the file to a second computing system. The file format contains several data fields. One of the data fields consists of a configurable list of attribute property identifications. These property identifications represent address book information such as e-mail address, phone number, first name, surname, and the like. A second data field comprises contact data that includes at least some of the properties identified by the configurable list. Changes to the information contained in the address book update may be made by simply adding or deleting attribute property identifications. This has the effect of allowing modifications to the address book file format without having to generate a new file format.
    Type: Application
    Filed: February 4, 2005
    Publication date: August 10, 2006
    Applicant: Microsoft Corporation
    Inventors: Neil Shipp, Victor Romano, Michael Sliger
  • Publication number: 20050049997
    Abstract: Disclosed is a method for persisting an offline address book in a Unicode compatible format without changing the underlying file formats, record representations, and low level string comparisons. By storing the text information in UCS Transformation Format-8 (UTF-8), Unicode strings can be represented in 8-bit widths and thus are interpreted as just another multi byte character representation. Additionally the offline address book files can still be efficiently searched using the same algorithms for text searching as long as the search key is converted to UTF-8 first.
    Type: Application
    Filed: August 27, 2003
    Publication date: March 3, 2005
    Applicant: Microsoft Corporation
    Inventor: Neil Shipp