Patents by Inventor Rohit Gupta

Rohit Gupta has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20070124584
    Abstract: Establishing proof of authorized receipt of information between two recipients involves a sender developing an asymmetric key pair and sending one key to each of the two recipients. A first recipient develops a challenge and sends it to the second recipient. The second recipient uses a first key to encrypt the challenge and return it to the first recipient. The first recipient decrypts the response using the second key. A correct response allows the first recipient to trust that the second recipient has an authorized copy of the information because they each have a key associated with the information that came from the sender. No prior relationship between the recipients is assumed and a public key infrastructure is not required.
    Type: Application
    Filed: November 30, 2005
    Publication date: May 31, 2007
    Applicant: MICROSOFT CORPORATION
    Inventor: Rohit Gupta
  • Patent number: 7215360
    Abstract: A method and system for providing condition information associated with an entity being analyzed. The method includes presenting nodes corresponding to components of the entity according to a tree-like configuration, and providing condition information associated with at least one of the components using the nodes.
    Type: Grant
    Filed: April 5, 2002
    Date of Patent: May 8, 2007
    Assignee: Triveni Digital, Inc.
    Inventor: Jimmy Rohit Gupta
  • Publication number: 20070086262
    Abstract: A semiconductor integrated circuit (IC) chip includes at least one core logic module located in a central area of the chip and having a core input/output (I/O) and a plurality of I/O pads disposed on a periphery of the chip. Narrow logic blocks including buffers and delay elements separate the core logic module from the I/O pads. The core I/O is coupled to the I/O pads by way of the buffers and delay elements of the narrow logic blocks.
    Type: Application
    Filed: October 17, 2006
    Publication date: April 19, 2007
    Applicant: Freescale Semiconductor, Inc.
    Inventors: Chetan Verma, Rohit Gupta, Piyush Mishra
  • Publication number: 20070047638
    Abstract: A system and method are provided for decoding an audio signal. In one embodiment, a first pulse is identified with a predetermined relative duration with respect to a second pulse. A sampling frequency is then calculated based on such identification. In another embodiment, an audio signal is decoded utilizing a threshold. In still yet another embodiment, a decoder is provided for decoding an audio signal utilizing a clock that is independent of the audio signal.
    Type: Application
    Filed: October 20, 2006
    Publication date: March 1, 2007
    Inventors: Bruce Lam, Andrew Bell, Douglas Solomon, Rohit Gupta
  • Publication number: 20060239295
    Abstract: Methods and computer readable mediums are described that facilitate inviting user entities on a network. The method may include initiating a first application for sending an invitation by a first user entity on a first endpoint, selecting a second user entity to receive the invitation, and selecting an activity. The method may also include sending from the first endpoint to the second user entity the invitation to participate in the activity if the first endpoint determines the activity is supported by a computing application on the first endpoint.
    Type: Application
    Filed: April 22, 2005
    Publication date: October 26, 2006
    Applicant: MICROSOFT CORPORATION
    Inventors: Ravi Rao, Eliot Flannery, Tomer Weisberg, Upshur Parks, Rohit Gupta, Kevin Tao, Anirudh Anirudh, David Thaler, Andre Classen, Todd Manion
  • Publication number: 20060239279
    Abstract: Systems and methods are described that facilitate the management of contact information, at least some of the contact information related to entities in a serverless, peer-to-peer system. A contact store may store information regarding which other entities of a plurality of other entities are authorized to monitor presence of a user entity. Presence of an entity may generally indicate the willingness and/or ability of the entity to communicate and/or collaborate with other entities, for example. The contact store may also store information regarding which other entities of the plurality of other entities the presence of which should be monitored by the system. A user entity may be able to add contacts to and/or delete contacts from the contact store, for example.
    Type: Application
    Filed: April 22, 2005
    Publication date: October 26, 2006
    Applicant: MICROSOFT CORPORATION
    Inventors: Andre Classen, Anirudh Anirudh, David Thaler, Kevin Tao, Ravi Rao, Rohit Gupta, Tomer Weisberg, Upshur Parks
  • Publication number: 20060239234
    Abstract: Methods are described that facilitate presence publication which may include authorizing publication of presence at a first endpoint, if the publication is authorized, assembling a presence data structure, and broadcasting the presence data structure from the first endpoint. The method may also include the presence structure including a friendly name, contact information, and endpoint information. The method further including contact information in at least one of XML format, vCard format, and the endpoint information obtained from a peer name resolution protocol. The method may additionally include the presence data structure encoded as at least one of a generic discovery protocol message, a simple service discovery protocol message, and associating a globally unique identifier with the discovery protocol messages.
    Type: Application
    Filed: April 22, 2005
    Publication date: October 26, 2006
    Applicant: MICROSOFT CORPORATION
    Inventors: Ravi Rao, Eliot Flannery, Tomer Weisberg, Upshur Parks, Rohit Gupta, Kevin Tao, Anirudh Anirudh, David Thaler, Andre Classen
  • Publication number: 20060242235
    Abstract: Systems and methods are described for facilitiating collaboration and/or communication in a peer-to-peer serverless system. The system may transmit to other computing systems associated with other entities information regarding presence information associated with a user entity. Also, the system may request of other computing systems associated with other entities information regarding presence information associated with the other entities. Presence information may generally indicate the willingness and/or ability of an entity to communicate and/or collaborate with other entities, for example.
    Type: Application
    Filed: April 22, 2005
    Publication date: October 26, 2006
    Applicant: MICROSOFT CORPORATION
    Inventors: Andre Classen, Anirudh Anirudh, David Thaler, Kevin Tao, Radu Simionescu, Ravi Rao, Rohit Gupta, Tomer Weisberg, Upshur Parks, Todd Manion
  • Publication number: 20060242405
    Abstract: An authentication mechanism uses a trusted people store that can be populated on an individual basis by users of computing devices, and can comprise certificates of entities that the user wishes to allow to act as certification authorities. Consequently, peer-to-peer connections can be made even if neither device presents a certificate or certificate chain signed by a third-party certificate authority, so long as each device present a certificate or certificate chain signed by a device present in the trusted people store. Once authenticated, a remote user can access trusted resources on a host device by having local processes mimic the user and create an appropriate token by changing the user's password or password type to a hash of the user's certificate and then logging the user on. The token can be referenced in a standard manner to determine whether the remote user is authorized to access the trusted resource.
    Type: Application
    Filed: April 20, 2005
    Publication date: October 26, 2006
    Applicant: Microsoft Corporation
    Inventors: Rohit Gupta, Todd Manion, Ravi Rao, Sandeep Singhal
  • Publication number: 20060242639
    Abstract: A set of collaborative contacts may be selected with an invitation user interface. An invitation to participate in a collaborative activity may be sent to the selected contacts from the invitation user interface or from a collaborative application. The invitation may be received by a collaborative services platform. A user of the collaborative services platform may be presented with the invitation along with an ability to choose one of accept, decline and ignore in response to the invitation. The user may choose to accept, decline or explicitly ignore the invitation, and a response may be sent to the sender of the invitation indicating the user's choice. An application programming interface for a collaborative invitation service of the collaborative services platform may include an invitation element, a send invitation element, a respond to invitation element and a cancel invitation element. The cancel invitation element may be used to cancel issued invitations.
    Type: Application
    Filed: April 25, 2005
    Publication date: October 26, 2006
    Applicant: Microsoft Corporation
    Inventors: Todd Manion, David Thaler, Rohit Gupta, Sandeep Singhal, Ravi Rao, Tomer Weisberg
  • Publication number: 20060239206
    Abstract: A method of identification used for communication within a network includes generating a network identity associated with a user, modifying the network identity according to a user preference to create a modified network identity, identifying the user with the modified network identity within a first network communication for a first network communication application, and identifying the user with the modified network identity within a second network communication for a second network communication application.
    Type: Application
    Filed: April 22, 2005
    Publication date: October 26, 2006
    Applicant: MICROSOFT CORPORATION
    Inventors: Ravi Rao, Rohit Gupta, Tomer Weisberg
  • Publication number: 20060242237
    Abstract: Collaboration between collaborative endpoints may be facilitated by a serverless publication service of a collaborative services platform. The serverless publication service may be configured to accept communicative connections from the collaborative endpoints. Users of the collaborative services platform may publish their associated collaborative presences with the serverless publication service. For example, the collaborative presence of a user may include information with respect to valid collaborative endpoints for the user and collaborative capabilities at those endpoints. Subscriptions to published collaborative presences may be placed through the serverless publication service. A collaborative presence subscribe message may specify a subscription to a collaborative presence of a user. Upon receipt of a presence subscribe message, if there is no subscription policy with respect to the sender, the recipient may be queried for a subscription policy with respect to the sender.
    Type: Application
    Filed: April 25, 2005
    Publication date: October 26, 2006
    Applicant: Microsoft Corporation
    Inventors: Todd Manion, David Thaler, Rohit Gupta, Sandeep Singhal, Ravi Rao, Radu Simionescu
  • Publication number: 20060242236
    Abstract: A collaborative services platform may include a connectivity service, an activity service and a contact management service. The connectivity service may provide communicative connectivity between users of the collaborative services platform. The activity service may provide one or more collaborative activities supporting various modes of communication. The contact management service may maintain contact information for each of the users of the collaborative service platform. It may be that not every user is capable of participating in every collaborative activity. The contact information maintained by the contact management service may indicate the collaborative activities in which each user is capable of participating. A set of programmatic objects utilized to implement the collaborative services platform may include contact objects, conference objects, MeContact objects, endpoint objects, published objects and presence objects.
    Type: Application
    Filed: April 22, 2005
    Publication date: October 26, 2006
    Applicant: Microsoft Corporation
    Inventors: Todd Manion, Daniel Crevier, David Thaler, Gursharan Sidhu, Rohit Gupta, Sandeep Singhal
  • Publication number: 20060193265
    Abstract: A system, method, and computer product for a host node to participate in a peer network through a proxy, wherein the peer network includes a plurality of nodes, each node having a peer identifier (ID) and a cache of peer IDs for one or more known nodes, is provided. The method comprises acquiring the peer ID of a proxy node in the peer network; requesting the proxy node to act as a proxy; sending a message to at least one node in the peer network through the proxy node; and receiving a response from the at least one node in the peer network through the proxy node, wherein the at least one node in the peer network is unaware of a network address for the host node.
    Type: Application
    Filed: February 25, 2005
    Publication date: August 31, 2006
    Applicant: Microsoft Corporation
    Inventors: Radu Simionescu, Rohit Gupta, Christian Huitema, John Miller, Ravi Rao, Adam Sapek
  • Publication number: 20060179139
    Abstract: A security infrastructure and methods are presented that inhibit the ability of a malicious node from disrupting the normal operations of a peer-to-peer network. The methods of the invention allow both secure and insecure identities to be used by nodes by making them self-verifying. When necessary or opportunistic, ID ownership is validated by piggybacking the validation on existing messages. The probability of connecting initially to a malicious node is reduced by randomly selecting to which node to connect. Further, information from malicious nodes is identified and can be disregarded by maintaining information about prior communications that will require a future response. Denial of service attacks are inhibited by allowing the node to disregard requests when its resource utilization exceeds a predetermined limit. The ability for a malicious node to remove a valid node is reduced by requiring that revocation certificates be signed by the node to be removed.
    Type: Application
    Filed: March 15, 2006
    Publication date: August 10, 2006
    Applicant: MICROSOFT CORPORATION
    Inventors: Rohit Gupta, Alexandru Gavrilescu, John Miller, Graham Wheeler
  • Publication number: 20060174005
    Abstract: A security infrastructure and methods are presented that inhibit the ability of a malicious node from disrupting the normal operations of a peer-to-peer network. The methods of the invention allow both secure and insecure identities to be used by nodes by making them self-verifying. When necessary or opportunistic, ID ownership is validated by piggybacking the validation on existing messages. The probability of connecting initially to a malicious node is reduced by randomly selecting to which node to connect. Further, information from malicious nodes is identified and can be disregarded by maintaining information about prior communications that will require a future response. Denial of service attacks are inhibited by allowing the node to disregard requests when its resource utilization exceeds a predetermined limit. The ability for a malicious node to remove a valid node is reduced by requiring that revocation certificates be signed by the node to be removed.
    Type: Application
    Filed: March 15, 2006
    Publication date: August 3, 2006
    Applicant: MICROSOFT CORPORATION
    Inventors: Rohit Gupta, Alexandru Gavrilescu, John Miller, Graham Wheeler
  • Publication number: 20060161657
    Abstract: A security infrastructure and methods are presented that inhibit the ability of a malicious node from disrupting the normal operations of a peer-to-peer network. The methods of the invention allow both secure and insecure identities to be used by nodes by making them self-verifying. When necessary or opportunistic, ID ownership is validated by piggybacking the validation on existing messages. The probability of connecting initially to a malicious node is reduced by randomly selecting to which node to connect. Further, information from malicious nodes is identified and can be disregarded by maintaining information about prior communications that will require a future response. Denial of service attacks are inhibited by allowing the node to disregard requests when its resource utilization exceeds a predetermined limit. The ability for a malicious node to remove a valid node is reduced by requiring that revocation certificates be signed by the node to be removed.
    Type: Application
    Filed: March 15, 2006
    Publication date: July 20, 2006
    Applicant: MICROSOFT CORPORATION
    Inventors: Rohit Gupta, Alexandru Gavrilescu, John Miller, Graham Wheeler
  • Publication number: 20060114851
    Abstract: A multi-tone synchronous collision resolution system permits communication nodes within a MANET to contend simultaneously for a plurality of available channels. The communication nodes contend for access using a synchronous signaling mechanism that utilizes multiple tones in a synchronous manner to resolve contentions. Contentions are arbitrated locally, and a surviving subset of communication nodes is selected. The communication nodes of the surviving subset then transmit data packets simultaneously across the available communication channels.
    Type: Application
    Filed: November 30, 2004
    Publication date: June 1, 2006
    Applicant: STMicroelectronics Asia Pacific Pte. Ltd.
    Inventors: Rohit Gupta, Ravindra Singh, Sajal Das
  • Patent number: 7051102
    Abstract: A security infrastructure and methods are presented that inhibit the ability of a malicious node from disrupting the normal operations of a peer-to-peer network. The methods of the invention allow both secure and insecure identities to be used by nodes by making them self-verifying. When necessary or opportunistic, ID ownership is validated by piggybacking the validation on existing messages. The probability of connecting initially to a malicious node is reduced by randomly selecting to which node to connect. Further, information from malicious nodes is identified and can be disregarded by maintaining information about prior communications that will require a future response. Denial of service attacks are inhibited by allowing the node to disregard requests when its resource utilization exceeds a predetermined limit. The ability for a malicious node to remove a valid node is reduced by requiring that revocation certificates be signed by the node to be removed.
    Type: Grant
    Filed: April 29, 2002
    Date of Patent: May 23, 2006
    Assignee: Microsoft Corporation
    Inventors: Rohit Gupta, Alexandru Gavrilescu, John L. Miller, Graham A. Wheeler
  • Publication number: 20050177715
    Abstract: Disclosed is a system for organizing and storing information about multiple peer identities. New certificates are introduced that enable a user to efficiently create, modify, and delete identities and groups. New storage structures enable the user to list and search through existing identities, groups, and their related certificates. An identity certificate contains information about a peer identity. A group root certificate is created by a user when he decides to create a new group. When the group creator user wishes to invite another entity to join the group, it creates another type of certificate called a group membership certificate. The group membership certificate is logically “chained” to the group root certificate. The invitee checks the validity of these certificates by checking that the chaining has been properly done. The invitee may then be allowed to invite other entities to join the group by sending out its own group membership certificates.
    Type: Application
    Filed: February 9, 2004
    Publication date: August 11, 2005
    Applicant: Microsoft Corporation
    Inventors: Grigori Somin, Rohit Gupta