Patents by Inventor Sachin Sheth
Sachin Sheth has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 9065903Abstract: Architecture for a communications system enabling a user to provision a telephone at a new location without network administrative pre-configuring. An input component (e.g., keypad) receives a numeric extension and PIN. The extension is a telephone extension of the user and the PIN can be administratively assigned. A location component provides location information of an enterprise communications server to the telephone based on the extension. The telephone uses the location information to send messages to the enterprise communications server. A registration component registers the telephone with the enterprise communications server based on the numeric extension. A telephony address is returned to the telephone. An authentication component authenticates the telephone based on the PIN. Upon authentication, the extension is assigned to the telephone, and telephone communications can be sent and received from that location.Type: GrantFiled: January 29, 2013Date of Patent: June 23, 2015Assignee: Microsoft Technology Licensing, LLCInventors: Anton W. Krantz, Amey Parandekar, Vadim Eydelman, Sankaran Narayanan, Namendra Kumar, Sachin Sheth
-
Patent number: 9065814Abstract: Call control messages and audio signals between a telephone device and a computer network telephone client on a computing device can be intercepted. For control messages from the computer network telephone client, the control messages can be translated from a first control protocol to a second control protocol and forwarded to the telephone device. For control messages from the telephone device, the control messages can be translated from the second control protocol to the first control protocol and forwarded to the computer network telephone client. For audio signals from the computer network telephone client, the audio signals can be translated from a first audio protocol to a second audio protocol and forwarded to the telephone device. For audio signals from the telephone device, the audio signals can be translated from the second audio protocol to the first audio protocol and forwarded to the computer network telephone client.Type: GrantFiled: January 31, 2012Date of Patent: June 23, 2015Assignee: Microsoft Technology Licensing, LLCInventors: Sachin Sheth, Vinit Deshpande, Timothy J. Rang, Alexandre M. Gimenez, Yu An, Ajit Kalele
-
Publication number: 20130195118Abstract: Call control messages and audio signals between a telephone device and a computer network telephone client on a computing device can be intercepted. For control messages from the computer network telephone client, the control messages can be translated from a first control protocol to a second control protocol and forwarded to the telephone device. For control messages from the telephone device, the control messages can be translated from the second control protocol to the first control protocol and forwarded to the computer network telephone client. For audio signals from the computer network telephone client, the audio signals can be translated from a first audio protocol to a second audio protocol and forwarded to the telephone device. For audio signals from the telephone device, the audio signals can be translated from the second audio protocol to the first audio protocol and forwarded to the computer network telephone client.Type: ApplicationFiled: January 31, 2012Publication date: August 1, 2013Applicant: MICROSOFT CORPORATIONInventors: Sachin Sheth, Vinit Deshpande, Timothy J. Rang, Alexandre M. Gimenez, Yu An, Ajit Kalele
-
Patent number: 8391452Abstract: Architecture for a communications system enabling a user to provision a telephone at a new location without network administrative pre-configuring. An input component (e.g., keypad) receives a numeric extension and PIN. The extension is a telephone extension of the user and the PIN can be administratively assigned. A location component provides location information of an enterprise communications server to the telephone based on the extension. The telephone uses the location information to send messages to the enterprise communications server. A registration component registers the telephone with the enterprise communications server based on the numeric extension. A telephony address is returned to the telephone. An authentication component authenticates the telephone based on the PIN. Upon authentication, the extension is assigned to the telephone, and telephone communications can be sent and received from that location.Type: GrantFiled: April 30, 2009Date of Patent: March 5, 2013Assignee: Microsoft CorporationInventors: Anton W. Krantz, Amey Parandekar, Vadim Eydelman, Sankaran Narayanan, Namendra Kumar, Sachin Sheth
-
Patent number: 8250147Abstract: In one embodiment, a user paired controller communication device may pair with a user paired server communication device. The user paired controller communication device may direct the user paired server communication device to execute a first mode communication session of a multimodal conversation, such as a voice session. The user paired controller communication may execute a second mode communication session of the multimodal conversation, such as an instant messaging session.Type: GrantFiled: June 25, 2008Date of Patent: August 21, 2012Assignee: Microsoft CorporationInventors: Rajesh Ramanathan, Adrian Potra, Vinit Deshpande, Ankit Tandon, Stephen Houchen, Anton Krantz, Sachin Sheth, Pradipta Kumar Basu, Sriram Parameswar
-
Publication number: 20120017172Abstract: Application user interfaces can be displayed on different sizes and types of displays without having to modify the application for each different display by scaling a layout of the user interface automatically for specific displays, especially smaller size displays such as mobile device displays, reducing a need to create customized versions of the application.Type: ApplicationFiled: July 15, 2010Publication date: January 19, 2012Applicant: Microsoft CorporationInventors: Sachin Sheth, Anton Krantz, Ravi Jaiswal, Sanjib Biswas
-
Publication number: 20100278322Abstract: Architecture for a communications system enabling a user to provision a telephone at a new location without network administrative pre-configuring. An input component (e.g., keypad) receives a numeric extension and PIN. The extension is a telephone extension of the user and the PIN can be administratively assigned. A location component provides location information of an enterprise communications server to the telephone based on the extension. The telephone uses the location information to send messages to the enterprise communications server. A registration component registers the telephone with the enterprise communications server based on the numeric extension. A telephony address is returned to the telephone. An authentication component authenticates the telephone based on the PIN. Upon authentication, the extension is assigned to the telephone, and telephone communications can be sent and received from that location.Type: ApplicationFiled: April 30, 2009Publication date: November 4, 2010Applicant: Microsoft CorporationInventors: Anton W. Krantz, Amey Parandekar, Vadim Eydelman, Sankaran Narayanan, Namendra Kumar, Sachin Sheth
-
Publication number: 20090327426Abstract: In one embodiment, a user paired controller communication device may pair with a user paired server communication device. The user paired controller communication device may direct the user paired server communication device to execute a first mode communication session of a multimodal conversation, such as a voice session. The user paired controller communication may execute a second mode communication session of the multimodal conversation, such as an instant messaging session.Type: ApplicationFiled: June 25, 2008Publication date: December 31, 2009Applicant: Microsoft CorporationInventors: Rajesh Ramanathan, Adrian Potra, Vinit Deshpande, Ankit Tandon, Stephen Houchen, Anton Krantz, Sachin Sheth, Pradipta Kumar Basu, Sriram Parameswar
-
Publication number: 20070198525Abstract: A managed network with a quarantine enforcement policy based on the status of installed updates for software on each client seeking access to the managed network. To determine whether a client requesting access has up-to-date software, an access server may communicate directly with an update server to determine the update status of the client requesting access. Information from the update server allows the update server to determine which update the client requesting access is missing. The access server may also receive an indication of the severity of the updates missing from the client requesting access. The access server may use the severity information to apply a quarantine enforcement policy, thereby avoiding the need for either the client or access server to be programmed to identify specific software updates that must be installed for a client to comply with a quarantine enforcement policy.Type: ApplicationFiled: February 13, 2006Publication date: August 23, 2007Applicant: Microsoft CorporationInventors: Arindam Chatterjee, Bashar Kachachi, Bruce Leban, Calvin Choe, Charles Jeffries, Jeffrey Shipman, Lakshmanan Venkitaraman, Marc Shepard, Sachin Sheth, Shankar Seal, Yang Gao, Patrick Stratton, Michael Lee
-
Publication number: 20070079007Abstract: A method and system for tracking context information of a service provider and interceptors of service provider requests is provided. An interceptor modifies a portion of service provider context information to reference interceptor context information associated with a client. When the client requests a service of the service provider, the client provides the modified service provider context information along with the request. The interceptor uses the reference of the modified portion of the service provider context information to retrieve its context information. The interceptor then restores the modified portion of the service provider context information to the original unmodified portion, which the interceptor retained as part of its context information. The interceptor then forwards the request along with the original service provider context information to the service provider.Type: ApplicationFiled: September 20, 2005Publication date: April 5, 2007Applicant: Microsoft CorporationInventors: Bhupinder Sethi, Sachin Sheth
-
Publication number: 20060239209Abstract: A system and method for enabling a zero configuration nomadic wireless and wired computing environment presenting a just works experience is presented. The system examines predefined user preference or profile settings to determine to which of a competing number of wireless networks available it should connect, and what type of authentication should be used for such connection. Nomadic wireless computing between infrastructure wireless networks and ad hoc wireless networks may be accomplished without further user intervention required in an auto mode. Also, both infrastructure only and ad hoc only modes are available through the system of the invention. Further, the user may set a preference for infrastructure or ad hoc modes in the auto mode. With an infrastructure mode preference set, the system will automatically detect and transfer connectivity to a newly available infrastructure wireless network if the user was previously operating off-line or in ad hoc mode.Type: ApplicationFiled: September 27, 2005Publication date: October 26, 2006Applicant: Microsoft CorporationInventors: Arun Ayyagari, Sachin Sheth, Krishna Ganugapati, Timothy Moore, Pradeep Bahl, Mihai Peicu, Florin Teodorescu
-
Publication number: 20060161966Abstract: A method and system for controlling access to files in a remote file system is provided. In one embodiment, a firewall system at a client computer system intercepts requests originating from the client computer system and sent to the remote file system for accessing remote files, that is, files stored on a server computer system. Upon intercepting a remote file access request (e.g., to open a remote file), the firewall system determines whether the file access request should be allowed based on access control criteria.Type: ApplicationFiled: January 19, 2005Publication date: July 20, 2006Applicant: Microsoft CorporationInventors: Narasimha Rao Nagampalli, Sachin Sheth, Shirish Koti, Yun Lin
-
Publication number: 20060161981Abstract: A method and system for intercepting communications between a transport client and a transport provider is provided. An interceptor system registers to intercept calls made by the transport client to functions of the transport provider. The interceptor system also replaces callbacks of the transport client so that calls from the transport provider intended for the transport client can be intercepted. When the interceptor system intercepts the call, it provides an indication of the call to a processing component. The processing component may analyze the call and determine whether the call should be allowed or denied. The interceptor system then proceeds to process the call in accordance with the indication of the processing component.Type: ApplicationFiled: January 19, 2005Publication date: July 20, 2006Applicant: Microsoft CorporationInventors: Sachin Sheth, Shirish Koti, Vadim Eydelman, Nelamangala Srinivas
-
Publication number: 20060129808Abstract: A method and system for distributing and enforcing security policies is provided. A firewall agent executing at a host computer system that is to be protected receives security policies for the enforcement engines responsible for enforcing the security policies on the host computer system. A security policy has rules that each provide a condition and action to be performed when the condition is satisfied. A rule also has a rule type that is used by the distribution system to identify the security components that are responsible for enforcing the rules. To distribute the security policies that have been received at a host computer system, the firewall agent identifies to which enforcement engine a rule applies based in part on rule type. The firewall agent then distributes the rule to the identified enforcement engine, which then enforces the rule.Type: ApplicationFiled: November 19, 2004Publication date: June 15, 2006Applicant: Microsoft CorporationInventors: Shirish Koti, Narasimha Nagampalli, Maxim Ivanov, Sachin Sheth, Emanuel Paleologu, Yun Lin, Eric Youngblut
-
Publication number: 20050010755Abstract: A supplicant on a first computing system authenticating the first computing system to an authenticator on a second computing system in a manner that is independent of the underlying data link and physical layer protocols. The first computing system establishes a data link layer connection with the second computing system using specific data link and physical layer protocols. The supplicant on the first computing system and the authenticator on the second computing system then receive an indication that the data link layer connection has been established. The supplicant determines that authentication is to occur with the authenticator, and vice versa. The supplicant (and the authenticator) then instructs that authentication is to occur in a manner that is independent of the underlying data link and physical layer protocols used to establish the connection.Type: ApplicationFiled: June 3, 2003Publication date: January 13, 2005Inventors: Sachin Sheth, Mohammad Alam, Arun Ayyagari, Abhishek Abhishek