Patents by Inventor Pascal Menezes

Pascal Menezes has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20140149572
    Abstract: Various techniques of network monitoring and diagnostics in computer networks are disclosed herein. In one embodiment, a method includes configuring a network session between a first client device and a second client device interconnected to each other by the computer network. The configured network session having one or more encrypted attributes. The method also includes transmitting one or more of the encrypted attributes of the configured network session to a network management system for collecting information from one or more network elements connecting the first client device to the second client device during the network session.
    Type: Application
    Filed: November 28, 2012
    Publication date: May 29, 2014
    Applicant: MICROSOFT CORPORATION
    Inventors: Pascal Menezes, Anthony Romano, Bill Hanlon, Gunter Leeb, Jon Morrow
  • Publication number: 20140136718
    Abstract: QoS support is detected during discovery of potential media paths between a source and a destination by examining the markings of each available media path and selecting a more suitable media candidate based on a set of QoS prioritization rules. Optionally, each endpoint may update a UC&C monitoring service with the QoS results of the candidate list discovery process so that any automated diagnostic and auditing systems can be alerted to any misconfigured Network Elements.
    Type: Application
    Filed: November 9, 2012
    Publication date: May 15, 2014
    Applicant: Microsoft Corporation
    Inventors: Pascal Menezes, Wajih Yahyaoui, Warren Barkley
  • Patent number: 8706861
    Abstract: A primary call admission controller (CAC) system receives a request from a client to allocate a network resource such as a network bandwidth. The primary CAC system may determine subordinate CAC to delegate the allocation and transfer the request to the subordinate CAC. Subsequently, the subordinate CAC analyzes the communication session attributes to determine an available network resource for the communication session. Upon a positive determination, the subordinate CAC allocates the network resource and signals the allocation up the network chain to the primary CAC and the client.
    Type: Grant
    Filed: September 9, 2011
    Date of Patent: April 22, 2014
    Assignee: Microsoft Corporation
    Inventors: Pascal Menezes, Wajih Yahyaoui, Kapil Sharma, Warren Barkley
  • Publication number: 20130254412
    Abstract: Unified Communication and Collaboration (UC&C) systems are enabled to dynamically enlighten a set of network elements (NEs) and/or network infrastructure with application awareness so that an accurate set of rules or actions can be applied for a given session without needing to lookup the payload of every packet or applying a somewhat ineffective expensive heuristic mechanisms. Taking advantage of typically longer communication session durations and separate control and media planes, a UC&C control point programs a set of NEs for a given UC&C media flow within a scalable and timely manner. Quality of Service (QoS), security, monitoring, and similar functionality may also be programmed into the NEs through the UC&C control point.
    Type: Application
    Filed: March 23, 2012
    Publication date: September 26, 2013
    Applicant: Microsoft Corporation
    Inventors: Pascal Menezes, Wajih Yahyaoui, Kapil Sharma, Warren Barkley
  • Publication number: 20130067042
    Abstract: A primary call admission controller (CAC) system receives a request from a client to allocate a network resource such as a network bandwidth. The primary CAC system may determine subordinate CAC to delegate the allocation and transfer the request to the subordinate CAC. Subsequently, the subordinate CAC analyzes the communication session attributes to determine an available network resource for the communication session. Upon a positive determination, the subordinate CAC allocates the network resource and signals the allocation up the network chain to the primary CAC and the client.
    Type: Application
    Filed: September 9, 2011
    Publication date: March 14, 2013
    Applicant: MICROSOFT CORPORATION
    Inventors: Pascal Menezes, Wajih Yahyaoui, Kapil Sharma, Warren Barkley
  • Patent number: 8352741
    Abstract: A hierarchical key generation and distribution mechanism for a computer system in which devices are organized into secure enclaves. The mechanism enables network access to be tailored to approximate minimum needed privileges for each device. At the lowest level of the hierarchy, keys are used to form security associations between devices. Keys at each level of the hierarchy are generated from keys at a higher level of the hierarchy and key derivation information. Key derivation information is readily ascertainable, either from identifiers for devices or from within messages, supporting hardware offload of cryptographic functions. Because keys may be generated based on the enclaves in which the hosts participating in a security association are located, the system includes a mechanism by which devices can discover the enclave in which they are located.
    Type: Grant
    Filed: June 11, 2009
    Date of Patent: January 8, 2013
    Assignee: Microsoft Corporation
    Inventors: Daniel R. Simon, Brian D. Swander, Pascal Menezes, Gabriel E. Montenegro
  • Patent number: 8301895
    Abstract: Enhanced network data transmission security and individualized data transmission processing can be implemented by intermediaries in a communication path between two endpoint peers individually having the capability to identify and authenticate one or both of the endpoint peers. Communication session establishment, endpoint peer identity processing and authentication and data traffic encryption protocols are modified to allow intermediaries to track the communications between endpoint peers for a particular communication session and obtain information to authenticate the endpoint peers and identify data traffic transmitted between them. Intermediaries can use the identities of one or both of the endpoint peers to enforce identity based rules for processing data traffic between the endpoint peers for a communication session.
    Type: Grant
    Filed: December 2, 2009
    Date of Patent: October 30, 2012
    Assignee: Microsoft Corporation
    Inventors: Brian Swander, Daniel R. Simon, Pascal Menezes
  • Publication number: 20120157038
    Abstract: A mobile computing device that supports cost-aware application components for operation over a metered network. A current basis for computing usage charges over one or more networks may be made available to the cost-aware application components through an application programming interface supported by an operating system service. That service may receive a policy for charging for data usage over a network and may also obtain information defining data usage for the mobile computing device. Based on this information, the service may determine a current basis for charging for data usage. With this information, the application component can determine a manner for executing network operations that involve data transmission over the network, such as deferring the operation or selecting an alternative network.
    Type: Application
    Filed: December 17, 2010
    Publication date: June 21, 2012
    Applicant: Microsoft Corporation
    Inventors: Pascal Menezes, Marco Piumatti, Upshur W. Parks, Ravi Rao
  • Publication number: 20110131417
    Abstract: Enhanced network data transmission security and individualized data transmission processing can be implemented by intermediaries in a communication path between two endpoint peers individually having the capability to identify and authenticate one or both of the endpoint peers. Communication session establishment, endpoint peer identity processing and authentication and data traffic encryption protocols are modified to allow intermediaries to track the communications between endpoint peers for a particular communication session and obtain information to authenticate the endpoint peers and identify data traffic transmitted between them. Intermediaries can use the identities of one or both of the endpoint peers to enforce identity based rules for processing data traffic between the endpoint peers for a communication session.
    Type: Application
    Filed: December 2, 2009
    Publication date: June 2, 2011
    Applicant: Microsoft Corporation
    Inventors: Brian Swander, Daniel R. Simon, Pascal Menezes
  • Publication number: 20100318800
    Abstract: A hierarchical key generation and distribution mechanism for a computer system in which devices are organized into secure enclaves. The mechanism enables network access to be tailored to approximate minimum needed privileges for each device. At the lowest level of the hierarchy, keys are used to form security associations between devices. Keys at each level of the hierarchy are generated from keys at a higher level of the hierarchy and key derivation information. Key derivation information is readily ascertainable, either from identifiers for devices or from within messages, supporting hardware offload of cryptographic functions. Because keys may be generated based on the enclaves in which the hosts participating in a security association are located, the system includes a mechanism by which devices can discover the enclave in which they are located.
    Type: Application
    Filed: June 11, 2009
    Publication date: December 16, 2010
    Applicant: Microsoft Corporation
    Inventors: Daniel R. Simon, Brian D. Swander, Pascal Menezes, Gabriel E. Montenegro
  • Publication number: 20100318799
    Abstract: A hierarchical key generation and distribution mechanism for a computer system in which devices are organized into secure enclaves. The mechanism enables network access to be tailored to approximate minimum needed privileges for each device. At the lowest level of the hierarchy, keys are used to form security associations between devices. Keys at each level of the hierarchy are generated from keys at a higher level of the hierarchy and key derivation information. Key derivation information is readily ascertainable, either from identifiers for devices or from within messages, supporting hardware offload of cryptographic functions. Because keys may be generated based on the enclaves in which the hosts participating in a security association are located, the system includes a mechanism by which devices can discover the enclave in which they are located.
    Type: Application
    Filed: June 11, 2009
    Publication date: December 16, 2010
    Applicant: Microsoft Corporation
    Inventors: Daniel R. Simon, Brian D. Swander, Pascal Menezes, Gabriel E. Montenegro
  • Publication number: 20100228962
    Abstract: Some embodiments are directed to processing packet data sent according to a security protocol between a first computer and a second computer via a forwarding device. The forwarding device performs a portion of the processing, and forwards the packet data to a third computer, connected to the forwarding device, for other processing. The third computer may support non-standard extensions to the security protocol, such as extensions used in authorizing and establishing a connection over the secure protocol. The packet data may be subject to policies, such as firewall policies or security policies, that may be detected by the third computer. The third computer sends the results of its processing, such as a cryptographic key, or a detected access control policy, to the forwarding device.
    Type: Application
    Filed: March 9, 2009
    Publication date: September 9, 2010
    Applicant: Microsoft Corporation
    Inventors: Daniel R. Simon, Pascal Menezes, Brian D. Swander