Patents by Inventor Sachin C. Sheth

Sachin C. Sheth has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20120166529
    Abstract: A method and system for tracking context information of a service provider and interceptors of service provider requests is provided. An interceptor modifies a portion of service provider context information to reference interceptor context information associated with a client. When the client requests a service of the service provider, the client provides the modified service provider context information along with the request. The interceptor uses the reference of the modified portion of the service provider context information to retrieve its context information. The interceptor then restores the modified portion of the service provider context information to the original unmodified portion, which the interceptor retained as part of its context information. The interceptor then forwards the request along with the original service provider context information to the service provider.
    Type: Application
    Filed: March 7, 2012
    Publication date: June 28, 2012
    Applicant: Microsoft Corporation
    Inventors: Bhupinder S. Sethi, Sachin C. Sheth
  • Publication number: 20120166527
    Abstract: A method and system for tracking context information of a service provider and interceptors of service provider requests is provided. An interceptor modifies a portion of service provider context information to reference interceptor context information associated with a client. When the client requests a service of the service provider, the client provides the modified service provider context information along with the request. The interceptor uses the reference of the modified portion of the service provider context information to retrieve its context information. The interceptor then restores the modified portion of the service provider context information to the original unmodified portion, which the interceptor retained as part of its context information. The interceptor then forwards the request along with the original service provider context information to the service provider.
    Type: Application
    Filed: March 5, 2012
    Publication date: June 28, 2012
    Applicant: Microsoft Corporation
    Inventors: Bhupinder S. Sethi, Sachin C. Sheth
  • Patent number: 8135741
    Abstract: A method and system for tracking context information of a service provider and interceptors of service provider requests is provided. An interceptor modifies a portion of service provider context information to reference interceptor context information associated with a client. When the client requests a service of the service provider, the client provides the modified service provider context information along with the request. The interceptor uses the reference of the modified portion of the service provider context information to retrieve its context information. The interceptor then restores the modified portion of the service provider context information to the original unmodified portion, which the interceptor retained as part of its context information. The interceptor then forwards the request along with the original service provider context information to the service provider.
    Type: Grant
    Filed: September 20, 2005
    Date of Patent: March 13, 2012
    Assignee: Microsoft Corporation
    Inventors: Bhupinder S. Sethi, Sachin C. Sheth
  • Patent number: 7966643
    Abstract: A method and system for controlling access to files in a remote file system is provided. In one embodiment, a firewall system at a client computer system intercepts requests originating from the client computer system and sent to the remote file system for accessing remote files, that is, files stored on a server computer system. Upon intercepting a remote file access request (e.g., to open a remote file), the firewall system determines whether the file access request should be allowed based on access control criteria.
    Type: Grant
    Filed: January 19, 2005
    Date of Patent: June 21, 2011
    Assignee: Microsoft Corporation
    Inventors: Narasimha Rao Nagampalli, Sachin C. Sheth, Shirish Koti, Yun Lin
  • Patent number: 7831826
    Abstract: A method and system for distributing and enforcing security policies is provided. A firewall agent executing at a host computer system that is to be protected receives security policies for the enforcement engines responsible for enforcing the security policies on the host computer system. A security policy has rules that each provide a condition and action to be performed when the condition is satisfied. A rule also has a rule type that is used by the distribution system to identify the security components that are responsible for enforcing the rules. To distribute the security policies that have been received at a host computer system, the firewall agent identifies to which enforcement engine a rule applies based in part on rule type. The firewall agent then distributes the rule to the identified enforcement engine, which then enforces the rule.
    Type: Grant
    Filed: March 11, 2009
    Date of Patent: November 9, 2010
    Assignee: Microsoft Corporation
    Inventors: Shirish Koti, Narasimha Rao S. S. Nagampalli, Maxim Alexandrovich Ivanov, Sachin C. Sheth, Emanuel Paleologu, Yun Lin, Eric Erwin Youngblut
  • Publication number: 20090172774
    Abstract: A method and system for distributing and enforcing security policies is provided. A firewall agent executing at a host computer system that is to be protected receives security policies for the enforcement engines responsible for enforcing the security policies on the host computer system. A security policy has rules that each provide a condition and action to be performed when the condition is satisfied. A rule also has a rule type that is used by the distribution system to identify the security components that are responsible for enforcing the rules. To distribute the security policies that have been received at a host computer system, the firewall agent identifies to which enforcement engine a rule applies based in part on rule type. The firewall agent then distributes the rule to the identified enforcement engine, which then enforces the rule.
    Type: Application
    Filed: March 11, 2009
    Publication date: July 2, 2009
    Applicant: Microsoft Corporation
    Inventors: Shirish R. Koti, Narasimha Rao S.S. Nagampalli, Maxim A. Ivanov, Sachin C. Sheth, Emanuel Paleologu, Yun Lin, Eric E. Youngblut
  • Patent number: 7536542
    Abstract: A method and system for intercepting communications between a transport client and a transport provider is provided. An interceptor system registers to intercept calls made by the transport client to functions of the transport provider. The interceptor system also replaces callbacks of the transport client so that calls from the transport provider intended for the transport client can be intercepted. When the interceptor system intercepts the call, it provides an indication of the call to a processing component. The processing component may analyze the call and determine whether the call should be allowed or denied. The interceptor system then proceeds to process the call in accordance with the indication of the processing component.
    Type: Grant
    Filed: January 19, 2005
    Date of Patent: May 19, 2009
    Assignee: Microsoft Corporation
    Inventors: Sachin C. Sheth, Shirish Koti, Vadim Eydelman, Nelamangala Krishnaswamy Srinivas
  • Patent number: 7512081
    Abstract: A system and method for enabling a zero configuration nomadic wireless and wired computing environment presenting a just works experience is presented. The system examines predefined user preference or profile settings to determine to which of a competing number of wireless networks available it should connect, and what type of authentication should be used for such connection. Nomadic wireless computing between infrastructure wireless networks and ad hoc wireless networks may be accomplished without further user intervention required in an auto mode. Also, both infrastructure only and ad hoc only modes are available through the system of the invention. Further, the user may set a preference for infrastructure or ad hoc modes in the auto mode. With an infrastructure mode preference set, the system will automatically detect and transfer connectivity to a newly available infrastructure wireless network if the user was previously operating off-line or in ad hoc mode.
    Type: Grant
    Filed: September 27, 2005
    Date of Patent: March 31, 2009
    Assignee: Microsoft Corporation
    Inventors: Arun Ayyagari, Sachin C. Sheth, Krishna Ganugapati, Timothy M. Moore, Pradeep Bahl, Mihai S. Peicu, Florin Teodorescu
  • Patent number: 7509493
    Abstract: A method and system for distributing and enforcing security policies is provided. A firewall agent executing at a host computer system that is to be protected receives security policies for the enforcement engines responsible for enforcing the security policies on the host computer system. A security policy has rules that each provide a condition and action to be performed when the condition is satisfied. A rule also has a rule type that is used by the distribution system to identify the security components that are responsible for enforcing the rules. To distribute the security policies that have been received at a host computer system, the firewall agent identifies to which enforcement engine a rule applies based in part on rule type. The firewall agent then distributes the rule to the identified enforcement engine, which then enforces the rule.
    Type: Grant
    Filed: November 19, 2004
    Date of Patent: March 24, 2009
    Assignee: Microsoft Corporation
    Inventors: Shirish Koti, Narasimha Rao S. S. Nagampalli, Maxim Alexandrovich Ivanov, Sachin C. Sheth, Emanuel Paleologu, Yun Lin, Eric Erwin Youngblut
  • Patent number: 7353381
    Abstract: A supplicant on a first computing system authenticating the first computing system to an authenticator on a second computing system in a manner that is independent of the underlying data link and physical layer protocols. The first computing system establishes a data link layer connection with the second computing system using specific data link and physical layer protocols. The supplicant on the first computing system and the authenticator on the second computing system then receive an indication that the data link layer connection has been established. The supplicant determines that authentication is to occur with the authenticator, and vice versa. The supplicant (and the authenticator) then instructs that authentication is to occur in a manner that is independent of the underlying data link and physical layer protocols used to establish the connection.
    Type: Grant
    Filed: June 3, 2003
    Date of Patent: April 1, 2008
    Assignee: Microsoft Corporation
    Inventors: Sachin C. Sheth, Mohammad Shabbir Alam, Arun Ayyagari, Abhishek Abhishek
  • Patent number: 7257836
    Abstract: A method for setting up and managing secure data/audio/video links with secure key exchanges, authentication and authorization is described. An embodiment of the invention enables establishment of a secure link with limited privileges using the machine identifier of a trusted machine. This is particularly useful if the user of the machine does not have a user identifying information suitable for authentication. Furthermore, the presentation of a default user identifying information by a user advantageously initiates intervention by a system administrator instead of a blanket denial. This decentralized procedure allows new users access to the network without having to physically access a centralized facility to present their credentials. Another embodiment of the invention enables a remote user to connect to a secure network with limited privileges.
    Type: Grant
    Filed: October 23, 2000
    Date of Patent: August 14, 2007
    Assignee: Microsoft Corporation
    Inventors: Timothy M. Moore, Arun Ayyagari, Sachin C. Sheth, Pradeep Bahl
  • Patent number: 7120129
    Abstract: A system and method for enabling a zero configuration nomadic wireless and wired computing environment presenting a just works experience is presented. The system examines predefined user preference or profile settings to determine to which of a competing number of wireless networks available it should connect, and what type of authentication should be used for such connection. Nomadic wireless computing between infrastructure wireless networks and ad hoc wireless networks may be accomplished without further user intervention required in an auto mode. Also, both infrastructure only and ad hoc only modes are available through the system of the invention. Further, the user may set a preference for infrastructure or ad hoc modes in the auto mode. With an infrastructure mode preference set, the system will automatically detect and transfer connectivity to a newly available infrastructure wireless network if the user was previously operating off-line or in ad hoc mode.
    Type: Grant
    Filed: March 13, 2001
    Date of Patent: October 10, 2006
    Assignee: Microsoft Corporation
    Inventors: Arun Ayyagari, Sachin C. Sheth, Krishna Ganugapati, Timothy M. Moore, Pradeep Bahl, Mihai S. Peicu, Florin Teodorescu
  • Publication number: 20020176366
    Abstract: A system and method for enabling a zero configuration nomadic wireless and wired computing environment presenting a just works experience is presented. The system examines predefined user preference or profile settings to determine to which of a competing number of wireless networks available it should connect, and what type of authentication should be used for such connection. Nomadic wireless computing between infrastructure wireless networks and ad hoc wireless networks may be accomplished without further user intervention required in an auto mode. Also, both infrastructure only and ad hoc only modes are available through the system of the invention. Further, the user may set a preference for infrastructure or ad hoc modes in the auto mode. With an infrastructure mode preference set, the system will automatically detect and transfer connectivity to a newly available infrastructure wireless network if the user was previously operating off-line or in ad hoc mode.
    Type: Application
    Filed: March 13, 2001
    Publication date: November 28, 2002
    Applicant: Microsoft Corporation
    Inventors: Arun Ayyagari, Sachin C. Sheth, Krishna Ganugapati, Timothy M. Moore, Pradeep Bahl, Mihai S. Peicu, Florin Teodorescu