Patents by Inventor Sunil S. Kadam

Sunil S. Kadam has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 9088580
    Abstract: For a particular request to access a resource, both a user associated with the request and a service through which the request is made are identified. Whether requested access to a resource is permitted is determined based on a user associated with the requested access and a service through which the access is requested. This determination can be made based on an access control entry of an access control list corresponding to the resource, the access control entry identifying access to the resource that is permitted to the user when accessing the resource through the service.
    Type: Grant
    Filed: December 31, 2009
    Date of Patent: July 21, 2015
    Assignee: Microsoft Technology Licensing, LLC
    Inventors: Sunil P. Gottumukkala, Thomas C. Jones, Sunil S. Kadam
  • Publication number: 20120255033
    Abstract: The claimed subject matter provides a method for licensing software in a computing environment. An exemplary method includes initiating application software program on a computer system having a plurality of authorized users, one of the authorized users having a single-user license to use the software program. An identity of a current user of the computer system is checked. Operation of the software program is prohibited if the current user is one of the plurality of authorized users other than the user who is granted the single-user license.
    Type: Application
    Filed: March 28, 2011
    Publication date: October 4, 2012
    Applicant: Microsoft Corporation
    Inventors: Sanjeev Dwivedi, Sunil S. Kadam, Ziquan Li, Alwin Vyhmeister, Ariye M. Cohen, Varun Eda Naarayana Kulothungan, Saurabh Boyed, Aravind Aluri
  • Publication number: 20120253959
    Abstract: The claimed subject matter provides a method for managing license upgrades in a computing environment. An exemplary method includes sending a request to upgrade a license status of application software program. The method further includes receiving licensing information indicating a change to the license status of the software program, the change to the license status of the software program being sufficient to allow the user to use the software program under the changed status automatically, and without further action by a user.
    Type: Application
    Filed: March 31, 2011
    Publication date: October 4, 2012
    Applicant: Microsoft Corporation
    Inventors: Ziquan Li, Sunil S. Kadam, Sanjeev Dwivedi, Alwin Vyhmeister, Ariye M. Cohen
  • Publication number: 20120254610
    Abstract: The claimed subject matter provides a method for revoking licensed software in a computing environment. An exemplary method includes receiving a machine ID from a computer system. An application program and a license credential for the application program are sent to the computer system. Subsequently, upon theft or other loss of the computer system, a request to revoke the license credential is received. The request identifies the machine ID. When the computer system subsequently initiates a connection, the connection is detected based on the machine ID. An indication that the license credential for the application program is revoked is sent to the computer system. When the application program is later initiated, its operation is disabled because of the revocation of the license credential.
    Type: Application
    Filed: March 31, 2011
    Publication date: October 4, 2012
    Applicant: Microsoft Corporation
    Inventors: Ziquan Li, Sanjeev Dwivedi, Sunil S. Kadam, Alwin Vyhmeister, Ariye M. Cohen
  • Patent number: 8140642
    Abstract: A system, method and computer program product are provided for communicating over a network without a direct connection to the network. A process is first initiated on a first computer without a direct connection to a network. In response to the process, a second computer coupled to the first computer with a direct connection to the network is automatically identified. Data is then communicated between the first computer and a server computer over the network via the direct connection of the second computer.
    Type: Grant
    Filed: May 17, 2002
    Date of Patent: March 20, 2012
    Assignee: McAfee, Inc.
    Inventors: Sunil S. Kadam, Tianying Fu, Mike Patrick Bacus
  • Publication number: 20110162057
    Abstract: For a particular request to access a resource, both a user associated with the request and a service through which the request is made are identified. Whether requested access to a resource is permitted is determined based on a user associated with the requested access and a service through which the access is requested. This determination can be made based on an access control entry of an access control list corresponding to the resource, the access control entry identifying access to the resource that is permitted to the user when accessing the resource through the service.
    Type: Application
    Filed: December 31, 2009
    Publication date: June 30, 2011
    Applicant: Microsoft Corporation
    Inventors: Sunil P. Gottumukkala, Thomas C. Jones, Sunil S. Kadam
  • Patent number: 7237122
    Abstract: One embodiment of the present invention provides a system that facilitates software installation using embedded user credentials. The system receives a software installation package at a computer to be installed on the computer. The system then extracts an installation program from the software installation package. Next, the system determines if the current user has sufficient privileges to run the installation program. If not, the system recovers a set of user credentials from the software installation package that is associated with sufficient privileges to run the installation program. The system then authenticates to the computer using this set of user credentials. Finally, the system runs the installation program on the computer.
    Type: Grant
    Filed: October 19, 2001
    Date of Patent: June 26, 2007
    Assignee: McAfee, Inc.
    Inventors: Sunil S. Kadam, Tianying Fu, Michael P. Bacus
  • Patent number: 7069581
    Abstract: One embodiment of the present invention provides a system to facilitate cross-domain push deployment of software in an enterprise environment. The system operates by receiving a machine name and a domain name associated with a client at a server. Next, the system creates an entry in a database, which associates the machine name with the domain name. This entry establishes what software to deploy to the client. The system then accepts a user name and a password from the server administrator to gain access to the client. The system authenticates the server to the client using the user name and password. After authenticating the server to the client, the system pushes the software package to the client.
    Type: Grant
    Filed: October 4, 2001
    Date of Patent: June 27, 2006
    Assignee: McAfee, Inc.
    Inventors: Tianying Fu, Sunil S. Kadam, Michael P. Bacus
  • Patent number: 6976068
    Abstract: One embodiment of the present invention provides a system to facilitate software management by applying network address-sorting rules on a hierarchical directory structure. The system operates by creating a hierarchical directory structure that reflects the logical coupling among computers within an enterprise. This hierarchical directory structure is sorted based on network addresses of the constituent computers of the enterprise. The system establishes a software policy at the root level of the hierarchical directory structure. Individual computers within the enterprise inherit the software policy from the root level of the hierarchical directory structure.
    Type: Grant
    Filed: September 13, 2001
    Date of Patent: December 13, 2005
    Assignee: McAfee, Inc.
    Inventors: Sunil S. Kadam, Tianying Fu, Satish K. Shetty, Michael P. Bacus
  • Publication number: 20030079126
    Abstract: One embodiment of the present invention provides a system that facilitates software installation using embedded user credentials. The system receives a software installation package at a computer to be installed on the computer. The system then extracts an installation program from the software installation package. Next, the system determines if the current user has sufficient privileges to run the installation program. If not, the system recovers a set of user credentials from the software installation package that is associated with sufficient privileges to run the installation program. The system then authenticates to the computer using this set of user credentials. Finally, the system runs the installation program on the computer.
    Type: Application
    Filed: October 19, 2001
    Publication date: April 24, 2003
    Inventors: Sunil S. Kadam, Tianying Fu, Michael P. Bacus
  • Publication number: 20030070089
    Abstract: One embodiment of the present invention provides a system to facilitate cross-domain push deployment of software in an enterprise environment. The system operates by receiving a machine name and a domain name associated with a client at a server. Next, the system creates an entry in a database, which associates the machine name with the domain name. This entry establishes what software to deploy to the client. The system then accepts a user name and a password from the server administrator to gain access to the client. The system authenticates the server to the client using the user name and password. After authenticating the server to the client, the system pushes the software package to the client.
    Type: Application
    Filed: October 4, 2001
    Publication date: April 10, 2003
    Inventors: Tianying Fu, Sunil S. Kadam, Michael P. Bacus
  • Publication number: 20030051020
    Abstract: One embodiment of the present invention provides a system to facilitate software management by applying network address-sorting rules on a hierarchical directory structure. The system operates by creating a hierarchical directory structure that reflects the logical coupling among computers within an enterprise. This hierarchical directory structure is sorted based on network addresses of the constituent computers of the enterprise. The system establishes a software policy at the root level of the hierarchical directory structure. Individual computers within the enterprise inherit the software policy from the root level of the hierarchical directory structure.
    Type: Application
    Filed: September 13, 2001
    Publication date: March 13, 2003
    Inventors: Sunil S. Kadam, Tianying Fu, Satish K. Shetty, Michael P. Bacus