Patents by Inventor Sachin Sheth

Sachin Sheth has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 9065903
    Abstract: Architecture for a communications system enabling a user to provision a telephone at a new location without network administrative pre-configuring. An input component (e.g., keypad) receives a numeric extension and PIN. The extension is a telephone extension of the user and the PIN can be administratively assigned. A location component provides location information of an enterprise communications server to the telephone based on the extension. The telephone uses the location information to send messages to the enterprise communications server. A registration component registers the telephone with the enterprise communications server based on the numeric extension. A telephony address is returned to the telephone. An authentication component authenticates the telephone based on the PIN. Upon authentication, the extension is assigned to the telephone, and telephone communications can be sent and received from that location.
    Type: Grant
    Filed: January 29, 2013
    Date of Patent: June 23, 2015
    Assignee: Microsoft Technology Licensing, LLC
    Inventors: Anton W. Krantz, Amey Parandekar, Vadim Eydelman, Sankaran Narayanan, Namendra Kumar, Sachin Sheth
  • Patent number: 9065814
    Abstract: Call control messages and audio signals between a telephone device and a computer network telephone client on a computing device can be intercepted. For control messages from the computer network telephone client, the control messages can be translated from a first control protocol to a second control protocol and forwarded to the telephone device. For control messages from the telephone device, the control messages can be translated from the second control protocol to the first control protocol and forwarded to the computer network telephone client. For audio signals from the computer network telephone client, the audio signals can be translated from a first audio protocol to a second audio protocol and forwarded to the telephone device. For audio signals from the telephone device, the audio signals can be translated from the second audio protocol to the first audio protocol and forwarded to the computer network telephone client.
    Type: Grant
    Filed: January 31, 2012
    Date of Patent: June 23, 2015
    Assignee: Microsoft Technology Licensing, LLC
    Inventors: Sachin Sheth, Vinit Deshpande, Timothy J. Rang, Alexandre M. Gimenez, Yu An, Ajit Kalele
  • Publication number: 20130195118
    Abstract: Call control messages and audio signals between a telephone device and a computer network telephone client on a computing device can be intercepted. For control messages from the computer network telephone client, the control messages can be translated from a first control protocol to a second control protocol and forwarded to the telephone device. For control messages from the telephone device, the control messages can be translated from the second control protocol to the first control protocol and forwarded to the computer network telephone client. For audio signals from the computer network telephone client, the audio signals can be translated from a first audio protocol to a second audio protocol and forwarded to the telephone device. For audio signals from the telephone device, the audio signals can be translated from the second audio protocol to the first audio protocol and forwarded to the computer network telephone client.
    Type: Application
    Filed: January 31, 2012
    Publication date: August 1, 2013
    Applicant: MICROSOFT CORPORATION
    Inventors: Sachin Sheth, Vinit Deshpande, Timothy J. Rang, Alexandre M. Gimenez, Yu An, Ajit Kalele
  • Patent number: 8391452
    Abstract: Architecture for a communications system enabling a user to provision a telephone at a new location without network administrative pre-configuring. An input component (e.g., keypad) receives a numeric extension and PIN. The extension is a telephone extension of the user and the PIN can be administratively assigned. A location component provides location information of an enterprise communications server to the telephone based on the extension. The telephone uses the location information to send messages to the enterprise communications server. A registration component registers the telephone with the enterprise communications server based on the numeric extension. A telephony address is returned to the telephone. An authentication component authenticates the telephone based on the PIN. Upon authentication, the extension is assigned to the telephone, and telephone communications can be sent and received from that location.
    Type: Grant
    Filed: April 30, 2009
    Date of Patent: March 5, 2013
    Assignee: Microsoft Corporation
    Inventors: Anton W. Krantz, Amey Parandekar, Vadim Eydelman, Sankaran Narayanan, Namendra Kumar, Sachin Sheth
  • Patent number: 8250147
    Abstract: In one embodiment, a user paired controller communication device may pair with a user paired server communication device. The user paired controller communication device may direct the user paired server communication device to execute a first mode communication session of a multimodal conversation, such as a voice session. The user paired controller communication may execute a second mode communication session of the multimodal conversation, such as an instant messaging session.
    Type: Grant
    Filed: June 25, 2008
    Date of Patent: August 21, 2012
    Assignee: Microsoft Corporation
    Inventors: Rajesh Ramanathan, Adrian Potra, Vinit Deshpande, Ankit Tandon, Stephen Houchen, Anton Krantz, Sachin Sheth, Pradipta Kumar Basu, Sriram Parameswar
  • Publication number: 20120017172
    Abstract: Application user interfaces can be displayed on different sizes and types of displays without having to modify the application for each different display by scaling a layout of the user interface automatically for specific displays, especially smaller size displays such as mobile device displays, reducing a need to create customized versions of the application.
    Type: Application
    Filed: July 15, 2010
    Publication date: January 19, 2012
    Applicant: Microsoft Corporation
    Inventors: Sachin Sheth, Anton Krantz, Ravi Jaiswal, Sanjib Biswas
  • Publication number: 20100278322
    Abstract: Architecture for a communications system enabling a user to provision a telephone at a new location without network administrative pre-configuring. An input component (e.g., keypad) receives a numeric extension and PIN. The extension is a telephone extension of the user and the PIN can be administratively assigned. A location component provides location information of an enterprise communications server to the telephone based on the extension. The telephone uses the location information to send messages to the enterprise communications server. A registration component registers the telephone with the enterprise communications server based on the numeric extension. A telephony address is returned to the telephone. An authentication component authenticates the telephone based on the PIN. Upon authentication, the extension is assigned to the telephone, and telephone communications can be sent and received from that location.
    Type: Application
    Filed: April 30, 2009
    Publication date: November 4, 2010
    Applicant: Microsoft Corporation
    Inventors: Anton W. Krantz, Amey Parandekar, Vadim Eydelman, Sankaran Narayanan, Namendra Kumar, Sachin Sheth
  • Publication number: 20090327426
    Abstract: In one embodiment, a user paired controller communication device may pair with a user paired server communication device. The user paired controller communication device may direct the user paired server communication device to execute a first mode communication session of a multimodal conversation, such as a voice session. The user paired controller communication may execute a second mode communication session of the multimodal conversation, such as an instant messaging session.
    Type: Application
    Filed: June 25, 2008
    Publication date: December 31, 2009
    Applicant: Microsoft Corporation
    Inventors: Rajesh Ramanathan, Adrian Potra, Vinit Deshpande, Ankit Tandon, Stephen Houchen, Anton Krantz, Sachin Sheth, Pradipta Kumar Basu, Sriram Parameswar
  • Publication number: 20070198525
    Abstract: A managed network with a quarantine enforcement policy based on the status of installed updates for software on each client seeking access to the managed network. To determine whether a client requesting access has up-to-date software, an access server may communicate directly with an update server to determine the update status of the client requesting access. Information from the update server allows the update server to determine which update the client requesting access is missing. The access server may also receive an indication of the severity of the updates missing from the client requesting access. The access server may use the severity information to apply a quarantine enforcement policy, thereby avoiding the need for either the client or access server to be programmed to identify specific software updates that must be installed for a client to comply with a quarantine enforcement policy.
    Type: Application
    Filed: February 13, 2006
    Publication date: August 23, 2007
    Applicant: Microsoft Corporation
    Inventors: Arindam Chatterjee, Bashar Kachachi, Bruce Leban, Calvin Choe, Charles Jeffries, Jeffrey Shipman, Lakshmanan Venkitaraman, Marc Shepard, Sachin Sheth, Shankar Seal, Yang Gao, Patrick Stratton, Michael Lee
  • Publication number: 20070079007
    Abstract: A method and system for tracking context information of a service provider and interceptors of service provider requests is provided. An interceptor modifies a portion of service provider context information to reference interceptor context information associated with a client. When the client requests a service of the service provider, the client provides the modified service provider context information along with the request. The interceptor uses the reference of the modified portion of the service provider context information to retrieve its context information. The interceptor then restores the modified portion of the service provider context information to the original unmodified portion, which the interceptor retained as part of its context information. The interceptor then forwards the request along with the original service provider context information to the service provider.
    Type: Application
    Filed: September 20, 2005
    Publication date: April 5, 2007
    Applicant: Microsoft Corporation
    Inventors: Bhupinder Sethi, Sachin Sheth
  • Publication number: 20060239209
    Abstract: A system and method for enabling a zero configuration nomadic wireless and wired computing environment presenting a just works experience is presented. The system examines predefined user preference or profile settings to determine to which of a competing number of wireless networks available it should connect, and what type of authentication should be used for such connection. Nomadic wireless computing between infrastructure wireless networks and ad hoc wireless networks may be accomplished without further user intervention required in an auto mode. Also, both infrastructure only and ad hoc only modes are available through the system of the invention. Further, the user may set a preference for infrastructure or ad hoc modes in the auto mode. With an infrastructure mode preference set, the system will automatically detect and transfer connectivity to a newly available infrastructure wireless network if the user was previously operating off-line or in ad hoc mode.
    Type: Application
    Filed: September 27, 2005
    Publication date: October 26, 2006
    Applicant: Microsoft Corporation
    Inventors: Arun Ayyagari, Sachin Sheth, Krishna Ganugapati, Timothy Moore, Pradeep Bahl, Mihai Peicu, Florin Teodorescu
  • Publication number: 20060161966
    Abstract: A method and system for controlling access to files in a remote file system is provided. In one embodiment, a firewall system at a client computer system intercepts requests originating from the client computer system and sent to the remote file system for accessing remote files, that is, files stored on a server computer system. Upon intercepting a remote file access request (e.g., to open a remote file), the firewall system determines whether the file access request should be allowed based on access control criteria.
    Type: Application
    Filed: January 19, 2005
    Publication date: July 20, 2006
    Applicant: Microsoft Corporation
    Inventors: Narasimha Rao Nagampalli, Sachin Sheth, Shirish Koti, Yun Lin
  • Publication number: 20060161981
    Abstract: A method and system for intercepting communications between a transport client and a transport provider is provided. An interceptor system registers to intercept calls made by the transport client to functions of the transport provider. The interceptor system also replaces callbacks of the transport client so that calls from the transport provider intended for the transport client can be intercepted. When the interceptor system intercepts the call, it provides an indication of the call to a processing component. The processing component may analyze the call and determine whether the call should be allowed or denied. The interceptor system then proceeds to process the call in accordance with the indication of the processing component.
    Type: Application
    Filed: January 19, 2005
    Publication date: July 20, 2006
    Applicant: Microsoft Corporation
    Inventors: Sachin Sheth, Shirish Koti, Vadim Eydelman, Nelamangala Srinivas
  • Publication number: 20060129808
    Abstract: A method and system for distributing and enforcing security policies is provided. A firewall agent executing at a host computer system that is to be protected receives security policies for the enforcement engines responsible for enforcing the security policies on the host computer system. A security policy has rules that each provide a condition and action to be performed when the condition is satisfied. A rule also has a rule type that is used by the distribution system to identify the security components that are responsible for enforcing the rules. To distribute the security policies that have been received at a host computer system, the firewall agent identifies to which enforcement engine a rule applies based in part on rule type. The firewall agent then distributes the rule to the identified enforcement engine, which then enforces the rule.
    Type: Application
    Filed: November 19, 2004
    Publication date: June 15, 2006
    Applicant: Microsoft Corporation
    Inventors: Shirish Koti, Narasimha Nagampalli, Maxim Ivanov, Sachin Sheth, Emanuel Paleologu, Yun Lin, Eric Youngblut
  • Publication number: 20050010755
    Abstract: A supplicant on a first computing system authenticating the first computing system to an authenticator on a second computing system in a manner that is independent of the underlying data link and physical layer protocols. The first computing system establishes a data link layer connection with the second computing system using specific data link and physical layer protocols. The supplicant on the first computing system and the authenticator on the second computing system then receive an indication that the data link layer connection has been established. The supplicant determines that authentication is to occur with the authenticator, and vice versa. The supplicant (and the authenticator) then instructs that authentication is to occur in a manner that is independent of the underlying data link and physical layer protocols used to establish the connection.
    Type: Application
    Filed: June 3, 2003
    Publication date: January 13, 2005
    Inventors: Sachin Sheth, Mohammad Alam, Arun Ayyagari, Abhishek Abhishek