Patents by Inventor Nelly Porter
Nelly Porter has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 11741251Abstract: Methods, systems, and apparatus, including computer programs encoded on a computer storage medium, for instantiating and managing systems that utilize hierarchal enclaves in a cloud environment.Type: GrantFiled: March 21, 2022Date of Patent: August 29, 2023Assignee: Google LLCInventors: Nelly Porter, David Benson Cross, Uday Ramesh Savagaonkar, Brandon S. Baker, Sergey Simakov
-
Publication number: 20220215112Abstract: Methods, systems, and apparatus, including computer programs encoded on a computer storage medium, for instantiating and managing systems that utilize hierarchal enclaves in a cloud environment.Type: ApplicationFiled: March 21, 2022Publication date: July 7, 2022Applicant: Google LLCInventors: Nelly Porter, David Benson Cross, Uday Ramesh Savagaonkar, Brandon S. Baker, Sergey Simakov
-
Patent number: 11314882Abstract: Methods, systems, and apparatus, including computer programs encoded on a computer storage medium, for instantiating and managing systems that utilize hierarchal enclaves in a cloud environment.Type: GrantFiled: August 11, 2020Date of Patent: April 26, 2022Assignee: Google LLCInventors: Nelly Porter, David Benson Cross, Uday Ramesh Savagaonkar, Brandon S. Baker, Sergey Simakov
-
Patent number: 11055385Abstract: A multi-factor user authentication framework using asymmetric key includes a host device, a user agent, a gesture system, and an authentication system. The multiple factors include a user credential as well as a user gesture that indicates that the user is present. The user interacts with the user agent via the host device in order to obtain access to something for which user authentication is needed. The authentication system maintains the user credentials, which are provided to authenticate the user in response to the authentication system determining that the user is present (which can be determined in different manners, such as using a personal identification number (PIN), biometric information regarding the user, geographic location of the gesture system, etc.). The user agent, gesture system, and authentication system can be implemented on the same device (e.g., the host device), or alternatively implemented across one or more different devices.Type: GrantFiled: March 28, 2019Date of Patent: July 6, 2021Assignee: MICROSOFT TECHNOLOGY LICENSING, LLCInventors: Anooshiravan Saboori, Nelly Porter, Vijay G. Bharadwaj, Alexander Thomas Weinert, Octavian T. Ureche, Benjamin Richard Vincent, Tarek Bahaa El-Din Mahmoud Kamel
-
Publication number: 20200372166Abstract: Methods, systems, and apparatus, including computer programs encoded on a computer storage medium, for instantiating and managing systems that utilize hierarchal enclaves in a cloud environment.Type: ApplicationFiled: August 11, 2020Publication date: November 26, 2020Inventors: Nelly Porter, David Benson Cross, Uday Ramesh Savagaonkar, Brandon S. Baker, Sergey Simakov
-
Patent number: 10776503Abstract: Methods, systems, and apparatus, including computer programs encoded on a computer storage medium, for instantiating and managing systems that utilize hierarchal enclaves in a cloud environment.Type: GrantFiled: November 14, 2017Date of Patent: September 15, 2020Assignee: Google LLCInventors: Nelly Porter, David Benson Cross, Uday Ramesh Savagsonkar, Brandon S. Baker, Sergey Simakov
-
Patent number: 10498846Abstract: Presence based content access control techniques are described in which presence of users is used as a basis for enforcing content restrictions. In an implementation, applications are registered to receive feedback regarding users' presence in relation to a presentation of content via a computing device. The presence of users is recognized independently of authentication of the users to access user accounts. For example, an imaging sensor such as camera may be employed for recognition of multiple users engaged with the computing device. In addition or alternatively, presence devices associated with users such as badges, key fobs, or access cards may be detected to ascertain the presence of users. Feedback indicative of the one or more users that are recognized may then be supplied to the registered applications. The feedback enables the applications to control the presentation of content by enforcing content restrictions and/or taking other presence based actions.Type: GrantFiled: August 17, 2018Date of Patent: December 3, 2019Assignee: Microsoft Technology Licensing, LLCInventors: Peter Dawoud Shenouda Dawoud, Nelly Porter, Himanshu Soni, Dustin Michael Ingalls, Kyle James Krum
-
Publication number: 20190220579Abstract: A multi-factor user authentication framework using asymmetric key includes a host device, a user agent, a gesture system, and an authentication system. The multiple factors include a user credential as well as a user gesture that indicates that the user is present. The user interacts with the user agent via the host device in order to obtain access to something for which user authentication is needed. The authentication system maintains the user credentials, which are provided to authenticate the user in response to the authentication system determining that the user is present (which can be determined in different manners, such as using a personal identification number (PIN), biometric information regarding the user, geographic location of the gesture system, etc.). The user agent, gesture system, and authentication system can be implemented on the same device (e.g., the host device), or alternatively implemented across one or more different devices.Type: ApplicationFiled: March 28, 2019Publication date: July 18, 2019Inventors: Anooshiravan Saboori, Nelly Porter, Vijay G. Bharadwaj, Alexander Thomas Weinert, Octavian T. Ureche, Benjamin Richard Vincent, Tarek Bahaa El-Din Mahmoud Kamel
-
Patent number: 10268809Abstract: A multi-factor user authentication framework using asymmetric key includes a host device, a user agent, a gesture system, and an authentication system. The multiple factors include a user credential as well as a user gesture that indicates that the user is present. The user interacts with the user agent via the host device in order to obtain access to something for which user authentication is needed. The authentication system maintains the user credentials, which are provided to authenticate the user in response to the authentication system determining that the user is present (which can be determined in different manners, such as using a personal identification number (PIN), biometric information regarding the user, geographic location of the gesture system, etc.). The user agent, gesture system, and authentication system can be implemented on the same device (e.g., the host device), or alternatively implemented across one or more different devices.Type: GrantFiled: April 2, 2018Date of Patent: April 23, 2019Assignee: Microsoft Technology Licensing, LLCInventors: Anooshiravan Saboori, Nelly Porter, Vijay G. Bharadwaj, Alexander Thomas Weinert, Octavian T. Ureche, Benjamin Richard Vincent, Tarek Bahaa El-Din Mahmoud Kamel
-
Publication number: 20180359326Abstract: Presence based content access control techniques are described in which presence of users is used as a basis for enforcing content restrictions. In an implementation, applications are registered to receive feedback regarding users' presence in relation to a presentation of content via a computing device. The presence of users is recognized independently of authentication of the users to access user accounts. For example, an imaging sensor such as camera may be employed for recognition of multiple users engaged with the computing device. In addition or alternatively, presence devices associated with users such as badges, key fobs, or access cards may be detected to ascertain the presence of users. Feedback indicative of the one or more users that are recognized may then be supplied to the registered applications. The feedback enables the applications to control the presentation of content by enforcing content restrictions and/or taking other presence based actions.Type: ApplicationFiled: August 17, 2018Publication date: December 13, 2018Inventors: Peter Dawoud Shenouda Dawoud, Nelly Porter, Himanshu Soni, Dustin Michael Ingalls, Kyle James Krum
-
Patent number: 10097655Abstract: Presence based content access control techniques are described in which presence of users is used as a basis for enforcing content restrictions. In an implementation, applications are registered to receive feedback regarding users' presence in relation to a presentation of content via a computing device. The presence of users is recognized independently of authentication of the users to access user accounts. For example, an imaging sensor such as camera may be employed for recognition of multiple users engaged with the computing device. In addition or alternatively, presence devices associated with users such as badges, key fobs, or access cards may be detected to ascertain the presence of users. Feedback indicative of the one or more users that are recognized may then be supplied to the registered applications. The feedback enables the applications to control the presentation of content by enforcing content restrictions and/or taking other presence based actions.Type: GrantFiled: April 19, 2017Date of Patent: October 9, 2018Assignee: Microsoft Licensing Technology, LLCInventors: Peter Dawoud Shenouda Dawoud, Nelly Porter, Himanshu Soni, Dustin Michael Ingalls, Kyle James Krum
-
Publication number: 20180225433Abstract: A multi-factor user authentication framework using asymmetric key includes a host device, a user agent, a gesture system, and an authentication system. The multiple factors include a user credential as well as a user gesture that indicates that the user is present. The user interacts with the user agent via the host device in order to obtain access to something for which user authentication is needed. The authentication system maintains the user credentials, which are provided to authenticate the user in response to the authentication system determining that the user is present (which can be determined in different manners, such as using a personal identification number (PIN), biometric information regarding the user, geographic location of the gesture system, etc.). The user agent, gesture system, and authentication system can be implemented on the same device (e.g., the host device), or alternatively implemented across one or more different devices.Type: ApplicationFiled: April 2, 2018Publication date: August 9, 2018Applicant: Microsoft Technology Licensing, LLCInventors: Anooshiravan Saboori, Nelly Porter, Vijay G. Bharadwaj, Alexander Thomas Weinert, Octavian T. Ureche, Benjamin Richard Vincent, Tarek Bahaa El-Din Mahmoud Kamel
-
Publication number: 20180137299Abstract: Methods, systems, and apparatus, including computer programs encoded on a computer storage medium, for instantiating and managing systems that utilize hierarchal enclaves in a cloud environment.Type: ApplicationFiled: November 14, 2017Publication date: May 17, 2018Inventors: Nelly Porter, David Benson Cross, Uday Ramesh Savagsonkar, Brandon S. Baker, Sergey Simakov
-
Patent number: 9967244Abstract: A multi-factor user authentication framework using asymmetric key includes a host device, a user agent, a gesture system, and an authentication system. The multiple factors include a user credential as well as a user gesture that indicates that the user is present. The user interacts with the user agent via the host device in order to obtain access to something for which user authentication is needed. The authentication system maintains the user credentials, which are provided to authenticate the user in response to the authentication system determining that the user is present (which can be determined in different manners, such as using a personal identification number (PIN), biometric information regarding the user, geographic location of the gesture system, etc.). The user agent, gesture system, and authentication system can be implemented on the same device (e.g., the host device), or alternatively implemented across one or more different devices.Type: GrantFiled: October 14, 2015Date of Patent: May 8, 2018Assignee: MICROSOFT TECHNOLOGY LICENSING, LLCInventors: Anooshiravan Saboori, Nelly Porter, Vijay G. Bharadwaj, Alexander Thomas Weinert, Octavian T. Ureche, Benjamin Richard Vincent, Tarek Bahaa El-Din Mahmoud Kamel
-
Patent number: 9819620Abstract: The claimed subject matter provides systems and/or methods that facilitate interpreting Multipurpose Internet Mail Extensions (MIME) data. An interface can obtain MIME data. For instance, a stream of MIME data can be obtained, MIME data can be loaded from a static file, etc. Moreover, any disparate type of RFC 822 data can additionally or alternatively be received by the interface. Also, a MIME reader can analyze the MIME data (and/or normalized RFC 822 data) to interpret encoded structural information and generate at least one primitive based on the encoded structural information. Further, a hierarchical model can be built utilizing the at least one primitive.Type: GrantFiled: May 7, 2015Date of Patent: November 14, 2017Assignee: Microsoft Technology Licensing, LLCInventors: Roy Williams, Yuriy M. Inglikov, Oleg V. Ouliankine, Nelly Porter, Loren Curtis
-
Publication number: 20170223125Abstract: Presence based content access control techniques are described in which presence of users is used as a basis for enforcing content restrictions. In an implementation, applications are registered to receive feedback regarding users' presence in relation to a presentation of content via a computing device. The presence of users is recognized independently of authentication of the users to access user accounts. For example, an imaging sensor such as camera may be employed for recognition of multiple users engaged with the computing device. In addition or alternatively, presence devices associated with users such as badges, key fobs, or access cards may be detected to ascertain the presence of users. Feedback indicative of the one or more users that are recognized may then be supplied to the registered applications. The feedback enables the applications to control the presentation of content by enforcing content restrictions and/or taking other presence based actions.Type: ApplicationFiled: April 19, 2017Publication date: August 3, 2017Applicant: Microsoft Technology Licensing, LLCInventors: Peter Dawoud Shenouda Dawoud, Nelly Porter, Himanshu Soni, Dustin Michael Ingalls, Kyle James Krum
-
Patent number: 9686274Abstract: In one embodiment, a user login device may create a user identifier template 400 for identifying a user by implicitly capturing one or more biometric identifier readings. A user login device may capture an enrollment biometric identifier reading of a user during an operational user action. The user login device may apply the enrollment biometric identifier reading in creating a user identifier template 400.Type: GrantFiled: October 11, 2013Date of Patent: June 20, 2017Assignee: Microsoft Technology Licensing, LLCInventors: Himanshu Soni, Vijay Bharadwaj, Arthur H. Baker, Gopinathan Kannan, Ryan Segeberg, Nelly Porter
-
Patent number: 9660817Abstract: In many information security scenarios, a certificate issued by a certificate authority may be presented to a client in order to assert a trust level of a certificated item, such as a message or a web page. However, due to a decentralized structure and incomplete coordination among certificate authorities, the presence and exploitation of security vulnerabilities to issue untrustworthy certificates may be difficult to determine, particularly for an individual client. Presented herein are techniques for advising clients of the reputations of respective certificate authorities by evaluating the certificates issued by such certificate authorities, such as the number and types of domains certified by the certificate; the number and pattern of certificates issued for the domain; and the certification techniques used to issue the certificates. Such evaluation enables a determination of a certificate authority trust level that may be distributed to the clients in a certificate authority trust set.Type: GrantFiled: August 1, 2014Date of Patent: May 23, 2017Assignee: Microsoft Technology Licensing, LLCInventors: Anooshiravan Saboori, Muhammad Umar Janjua, Nelly Porter, Philip Hallin, Haitao Li, Xiaohong Su, Kelvin Yiu, Anthony Paul Penta, Vassil Dimitrov Bakalov, Bryston Mitsuo Nitta
-
Patent number: 9661091Abstract: Presence based content access control techniques are described in which presence of users is used as a basis for enforcing content restrictions. In an implementation, applications are registered to receive feedback regarding users' presence in relation to a presentation of content via a computing device. The presence of users is recognized independently of authentication of the users to access user accounts. For example, an imaging sensor such as camera may be employed for recognition of multiple users engaged with the computing device. In addition or alternatively, presence devices associated with users such as badges, key fobs, or access cards may be detected to ascertain the presence of users. Feedback indicative of the one or more users that are recognized may then be supplied to the registered applications. The feedback enables the applications to control the presentation of content by enforcing content restrictions and/or taking other presence based actions.Type: GrantFiled: September 12, 2014Date of Patent: May 23, 2017Assignee: Microsoft Technology Licensing, LLCInventors: Peter Dawoud Shenouda Dawoud, Nelly Porter, Himanshu Soni, Dustin Michael Ingalls, Kyle James Krum
-
Publication number: 20170111337Abstract: A multi-factor user authentication framework using asymmetric key includes a host device, a user agent, a gesture system, and an authentication system. The multiple factors include a user credential as well as a user gesture that indicates that the user is present. The user interacts with the user agent via the host device in order to obtain access to something for which user authentication is needed. The authentication system maintains the user credentials, which are provided to authenticate the user in response to the authentication system determining that the user is present (which can be determined in different manners, such as using a personal identification number (PIN), biometric information regarding the user, geographic location of the gesture system, etc.). The user agent, gesture system, and authentication system can be implemented on the same device (e.g., the host device), or alternatively implemented across one or more different devices.Type: ApplicationFiled: October 14, 2015Publication date: April 20, 2017Applicant: Microsoft Technology Licensing, LLCInventors: Anooshiravan Saboori, Nelly Porter, Vijay G. Bharadwaj, Alexander Thomas Weinert, Octavian T. Ureche, Benjamin Richard Vincent, Tarek Bahaa El-Din Mahmoud Kamel