Patents by Inventor Peter Dawoud Shenouda Dawoud

Peter Dawoud Shenouda Dawoud has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 9716716
    Abstract: Techniques described herein leverage a trusted entity within a domain to enable devices to establish trust with one another so they can securely discover each other and connect to one another. In various examples discussed herein, a device is configured to provide trust information to, and/or receive trust information from, the trusted entity. The trust information may include, for example, a public key of an encryption key pair, a certificate signed by the trusted entity proving authenticity, and/or a hash function and a hash seed used to compute a series of results that form a hash chain. The device may use the trust information to discover another device and to connect to the other device securely and automatically (e.g., with no user involvement or limited user involvement). Moreover, the device may use the trust information to dynamically change a MAC address being used to communicate with the other device.
    Type: Grant
    Filed: March 6, 2015
    Date of Patent: July 25, 2017
    Assignee: Microsoft Technology Licensing, LLC
    Inventors: Peter Dawoud Shenouda Dawoud, Anoosh Saboori, Himanshu Soni, Dustin Michael Ingalls, Nelly L. Porter
  • Patent number: 9661091
    Abstract: Presence based content access control techniques are described in which presence of users is used as a basis for enforcing content restrictions. In an implementation, applications are registered to receive feedback regarding users' presence in relation to a presentation of content via a computing device. The presence of users is recognized independently of authentication of the users to access user accounts. For example, an imaging sensor such as camera may be employed for recognition of multiple users engaged with the computing device. In addition or alternatively, presence devices associated with users such as badges, key fobs, or access cards may be detected to ascertain the presence of users. Feedback indicative of the one or more users that are recognized may then be supplied to the registered applications. The feedback enables the applications to control the presentation of content by enforcing content restrictions and/or taking other presence based actions.
    Type: Grant
    Filed: September 12, 2014
    Date of Patent: May 23, 2017
    Assignee: Microsoft Technology Licensing, LLC
    Inventors: Peter Dawoud Shenouda Dawoud, Nelly Porter, Himanshu Soni, Dustin Michael Ingalls, Kyle James Krum
  • Publication number: 20160364600
    Abstract: Techniques and apparatuses for biometric gestures are described herein. In one or more implementations, a computing device includes a biometric sensor, such as a fingerprint touch sensor, that is configured to detect gesture input. When gesture input is received from a user, the biometric sensor detects biometric characteristics (e.g., a fingerprint) of the user and determines a gesture (e.g., a tap, touch and hold, or swipe) based on the gesture input. The user is authenticated if the biometric characteristics correspond to an authorized user of the device. If the user is authenticated, the device transitions to an authenticated user state that is associated with the type of gesture, such as by displaying personal information on a lockscreen of the computing device or opening a quick action center.
    Type: Application
    Filed: June 10, 2015
    Publication date: December 15, 2016
    Inventors: Akash Atul Shah, Peter Dawoud Shenouda Dawoud, Nelly Porter, Himanshu Soni, Michael E. Stephens
  • Publication number: 20160275281
    Abstract: A computing device is described that selectively displays or suppresses personalized information on a lock screen based on the results of a biometric user authentication process. In embodiments, a measure of confidence that a user of the computing device is an authorized user is determined based on biometric data collected by one or more biometric sensors. If it is determined that the measure of confidence satisfies a criterion, then personal information associated with the user is selectively rendered to the lock screen while the computing device is in the locked state. If it determined that the measure of confidence does not satisfy the criterion, then such personal information may be suppressed from the lock screen. The application of the foregoing technique to selectively provide or deny access to certain functionality of the computing device via the lock screen is also described.
    Type: Application
    Filed: March 14, 2016
    Publication date: September 22, 2016
    Inventors: Sangeeta Ranjit, Craig T. McIntyre, Kanna Ramasubramanian, Peter Dawoud Shenouda Dawoud
  • Publication number: 20160080510
    Abstract: Presence based content access control techniques are described in which presence of users is used as a basis for enforcing content restrictions. In an implementation, applications are registered to receive feedback regarding users' presence in relation to a presentation of content via a computing device. The presence of users is recognized independently of authentication of the users to access user accounts. For example, an imaging sensor such as camera may be employed for recognition of multiple users engaged with the computing device. In addition or alternatively, presence devices associated with users such as badges, key fobs, or access cards may be detected to ascertain the presence of users. Feedback indicative of the one or more users that are recognized may then be supplied to the registered applications. The feedback enables the applications to control the presentation of content by enforcing content restrictions and/or taking other presence based actions.
    Type: Application
    Filed: September 12, 2014
    Publication date: March 17, 2016
    Inventors: Peter Dawoud Shenouda Dawoud, Nelly Porter, Himanshu Soni, Dustin Michael Ingalls, Kyle James Krum
  • Publication number: 20160080380
    Abstract: Techniques described herein leverage a trusted entity within a domain to enable devices to establish trust with one another so they can securely discover each other and connect to one another. In various examples discussed herein, a device is configured to provide trust information to, and/or receive trust information from, the trusted entity. The trust information may include, for example, a public key of an encryption key pair, a certificate signed by the trusted entity proving authenticity, and/or a hash function and a hash seed used to compute a series of results that form a hash chain. The device may use the trust information to discover another device and to connect to the other device securely and automatically (e.g., with no user involvement or limited user involvement). Moreover, the device may use the trust information to dynamically change a MAC address being used to communicate with the other device.
    Type: Application
    Filed: March 6, 2015
    Publication date: March 17, 2016
    Inventors: Peter Dawoud Shenouda Dawoud, Anoosh Saboori, Himanshu Soni, Dustin Michael Ingalls, Nelly L. Porter