Patents by Inventor Nimisha Asthagiri
Nimisha Asthagiri has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Publication number: 20150213506Abstract: Systems, methods, and devices for providing improved data analysis of mass communication campaigns, such as e-mail campaigns. Various embodiments include receiving interaction data for multiple contact points over one or more mass communication campaigns, associating the interaction data for multiple contact points with each of a plurality of recipients of the one or more mass communication campaigns, for each recipient, generating at least one parameter based on the interaction data associated with the recipient over multiple contact points, and providing the at least one parameter to an originator of the mass communication campaign.Type: ApplicationFiled: January 28, 2015Publication date: July 30, 2015Inventors: Nirmal PARIKH, Nimisha ASTHAGIRI
-
Patent number: 7624421Abstract: Proper user-to-data associations are maintained in shared spaces created in a peer-to-peer collaborative system by means of a simplified and minimal user interface that permits users to easily authenticate other members of a shared space. In particular, support is provided for automatically building authenticated relationships even if users do not take the time to authenticate other users. When a user enters a shared space and views the contacts in that space, the display names of each contact are accompanied by distinctive icons that identify that authentication status of that contact. A mechanism is provided for resolving conflicts between contacts with the same display names to prevent confusion and contact “spoofing.” Security policies can be established to provide a uniform approach to authentication. These policies can be set by a user or, alternatively, the policies can be set by an administrator.Type: GrantFiled: July 31, 2003Date of Patent: November 24, 2009Assignee: Microsoft CorporationInventors: Raymond E. Ozzie, George P. Moromisato, Nimisha Asthagiri, Wei Dai, Alexei Evdokimov, Mark Cote, Adam Weiss
-
Publication number: 20090150968Abstract: Proper user-to-data associations are maintained in shared spaces created in a peer-to-peer collaborative system by means of a simplified and minimal user interface that permits users to easily authenticate other members of a shared space. In particular, support is provided for automatically building authenticated relationships even if users do not take the time to authenticate other users. When a user enters a shared space and views the contacts in that space, the display names of each contact are accompanied by distinctive icons that identify that authentication status of that contact. A mechanism is provided for resolving conflicts between contacts with the same display names to prevent confusion and contact “spoofing.” Security policies can be established to provide a uniform approach to authentication. These policies can be set by a user or, alternatively, the policies can be set by an administrator.Type: ApplicationFiled: July 31, 2003Publication date: June 11, 2009Applicant: Groove Networks, Inc.Inventors: Raymond E. Ozzie, George P. Moromisato, Nimisha Asthagiri, Wei Dai, Alexei Evdokimov, Mark Cote, Adam Weiss
-
Patent number: 7415606Abstract: Different levels of security are provided in a security system so that users can decide the security level of their own communications. Users can choose a low level of security and maintain the security overhead as low as possible. Alternatively, they can choose higher levels of security with attendant increases in security overhead. The different levels of security are created by the use of one or more of two keys: an encryption key is used to encrypt plaintext data in a delta and a message authentication key is used to authenticate and insure integrity of the data. Two keys are used to avoid re-encrypting the encrypted data for each member of the telespace. In one embodiment, the security level is determined when a telespace is created and remains fixed through out the life of the telespace. For a telespace, the security level may range from no security at all to security between the members of the telespace and outsiders to security between pairs of members of the telespace.Type: GrantFiled: October 24, 2005Date of Patent: August 19, 2008Assignee: Microsoft CorporationInventors: Walter Tuvell, Nimisha Asthagiri
-
Patent number: 7213147Abstract: Different levels of security are provided in a security system so that users can decide the security level of their own communications. Users can choose a low level of security and maintain the security overhead as low as possible. Alternatively, they can choose higher levels of security with attendant increases in security overhead. The different levels of security are created by the use of one or more of two keys: an encryption key is used to encrypt plaintext data in a delta and a message authentication key is used to authenticate and insure integrity of the data. Two keys are used to avoid re-encrypting the encrypted data for each member of the telespace. In one embodiment, the security level is determined when a telespace is created and remains fixed through out the life of the telespace. For a telespace, the security level may range from no security at all to security between the members of the telespace and outsiders to security between pairs of members of the telespace.Type: GrantFiled: October 24, 2005Date of Patent: May 1, 2007Assignee: Microsoft CorporationInventors: Walter E. Tuvell, Nimisha Asthagiri
-
Patent number: 7171001Abstract: Different levels of security are provided in a security system so that users can decide the security level of their own communications. Users can choose a low level of security and maintain the security overhead as low as possible. Alternatively, they can choose higher levels of security with attendant increases in security overhead. The different levels of security are created by the use of one or more of two keys: an encryption key is used to encrypt plaintext data in a delta and a message authentication key is used to authenticate and insure integrity of the data. Two keys are used to avoid re-encrypting the encrypted data for each member of the telespace. In one embodiment, the security level is determined when a telespace is created and remains fixed through out the life of the telespace. For a telespace, the security level may range from no security at all to security between the members of the telespace and outsiders to security between pairs of members of the telespace.Type: GrantFiled: October 24, 2005Date of Patent: January 30, 2007Assignee: Microsoft CorporationInventors: Walter Tuvell, Nimisha Asthagiri
-
Publication number: 20060050869Abstract: Different levels of security are provided in a security system so that users can decide the security level of their own communications. Users can choose a low level of security and maintain the security overhead as low as possible. Alternatively, they can choose higher levels of security with attendant increases in security overhead. The different levels of security are created by the use of one or more of two keys: an encryption key is used to encrypt plaintext data in a delta and a message authentication key is used to authenticate and insure integrity of the data. Two keys are used to avoid re-encrypting the encrypted data for each member of the telespace. In one embodiment, the security level is determined when a telespace is created and remains fixed through out the life of the telespace. For a telespace, the security level may range from no security at all to security between the members of the telespace and outsiders to security between pairs of members of the telespace.Type: ApplicationFiled: October 24, 2005Publication date: March 9, 2006Applicant: Groove Networks, Inc.Inventors: Walter Tuvell, Nimisha Asthagiri
-
Publication number: 20060041752Abstract: Different levels of security are provided in a security system so that users can decide the security level of their own communications. Users can choose a low level of security and maintain the security overhead as low as possible. Alternatively, they can choose higher levels of security with attendant increases in security overhead. The different levels of security are created by the use of one or more of two keys: an encryption key is used to encrypt plaintext data in a delta and a message authentication key is used to authenticate and insure integrity of the data. Two keys are used to avoid re-encrypting the encrypted data for each member of the telespace. In one embodiment, the security level is determined when a telespace is created and remains fixed through out the life of the telespace. For a telespace, the security level may range from no security at all to security between the members of the telespace and outsiders to security between pairs of members of the telespace.Type: ApplicationFiled: October 24, 2005Publication date: February 23, 2006Applicant: Groove Networks, Inc.Inventors: Walter Tuvell, Nimisha Asthagiri
-
Publication number: 20060036862Abstract: Different levels of security are provided in a security system so that users can decide the security level of their own communications. Users can choose a low level of security and maintain the security overhead as low as possible. Alternatively, they can choose higher levels of security with attendant increases in security overhead. The different levels of security are created by the use of one or more of two keys: an encryption key is used to encrypt plaintext data in a delta and a message authentication key is used to authenticate and insure integrity of the data. Two keys are used to avoid re-encrypting the encrypted data for each member of the telespace. In one embodiment, the security level is determined when a telespace is created and remains fixed through out the life of the telespace. For a telespace, the security level may range from no security at all to security between the members of the telespace and outsiders to security between pairs of members of the telespace.Type: ApplicationFiled: October 24, 2005Publication date: February 16, 2006Applicant: Groove Networks, Inc.Inventors: Walter Tuvell, Nimisha Asthagiri
-
Patent number: 6986046Abstract: Different levels of security are provided in a security system so that users can decide the security level of their own communications. Users can choose a low level of security and maintain the security overhead as low as possible. Alternatively, they can choose higher levels of security with attendant increases in security overhead. The different levels of security are created by the use of one or more of two keys: an encryption key is used to encrypt plaintext data in a delta and a message authentication key is used to authenticate and insure integrity of the data. Two keys are used to avoid re-encrypting the encrypted data for each member of the telespace. In one embodiment, the security level is determined when a telespace is created and remains fixed through out the life of the telespace. For a telespace, the security level may range from no security at all to security between the members of the telespace and outsiders to security between pairs of members of the telespace.Type: GrantFiled: May 12, 2000Date of Patent: January 10, 2006Assignee: Groove Networks, IncorporatedInventors: Walter Tuvell, Nimisha Asthagiri