Patents by Inventor Tarek B. Kamel
Tarek B. Kamel has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 11270173Abstract: According to examples, an apparatus may include a processor that may receive a request from a first device for an authentication token for access to a service, determine whether the first device is authorized to receive the authentication token for access to the service, and based on a determination that the first device is authorized to receive the authentication token for access to the service, generate a machine-readable code including the authentication token that a second device is to use for access to the service by the second device. The processor may also send the generated machine-readable code to the first device. The first device may display the machine-readable code and the second device may use a captured image of the machine-readable code to establish an authenticated session to the service on the second device.Type: GrantFiled: April 3, 2020Date of Patent: March 8, 2022Assignee: MICROSOFT TECHNOLOGY LICENSING, LLCInventors: Rachel Anne Brown Teller, Kristina K. Hotz, Tarek B. Kamel, Neelam Anuradha Reddy, Peter M. Tsang, James Shang Kai Chou
-
Publication number: 20210312251Abstract: According to examples, an apparatus may include a processor that may receive a request from a first device for an authentication token for access to a service, determine whether the first device is authorized to receive the authentication token for access to the service, and based on a determination that the first device is authorized to receive the authentication token for access to the service, generate a machine-readable code including the authentication token that a second device is to use for access to the service by the second device. The processor may also send the generated machine-readable code to the first device. The first device may display the machine-readable code and the second device may use a captured image of the machine-readable code to establish an authenticated session to the service on the second device.Type: ApplicationFiled: April 3, 2020Publication date: October 7, 2021Applicant: Microsoft Technology Licensing, LLCInventors: Rachel Anne Brown TELLER, Kristina K. HOTZ, Tarek B. KAMEL, Neelam Anuradha REDDY, Peter M. TSANG, James Shang Kai CHOU
-
Patent number: 10693873Abstract: Authenticating a secure session between a first user entity and an identity provider using a second user entity. The method includes receiving a request for a session from an entity that purports to be the first user entity. The method further includes sending authentication context from the request, and wherein the authentication context for the request arrives at the second user entity. The method further includes receiving an indication that the authentication context has been verified. As a result, the method further includes authenticating a secure session between a first user entity and an identity provider or approving a secure transaction.Type: GrantFiled: July 20, 2018Date of Patent: June 23, 2020Assignee: MICROSOFT TECHNOLOGY LICENSING, LLCInventors: Tarek B. Kamel, Adrian Frei, James Shang Kai Chou
-
Publication number: 20190182245Abstract: Authenticating a secure session between a first user entity and an identity provider using a second user entity. The method includes receiving a request for a session from an entity that purports to be the first user entity. The method further includes sending authentication context from the request, and wherein the authentication context for the request arrives at the second user entity. The method further includes receiving an indication that the authentication context has been verified. As a result, the method further includes authenticating a secure session between a first user entity and an identity provider or approving a secure transaction.Type: ApplicationFiled: July 20, 2018Publication date: June 13, 2019Inventors: Tarek B. Kamel, Adrian Frei, James Shang Kai Chou
-
Patent number: 10142107Abstract: Binding a security token to a client token binder, such as a trusted platform module, is provided. A bound security token can only be used on the client on which it was obtained. A secret binding key (kbind) is established between the client and an STS. The client derives a key (kmac) from kbind, signs a security token request with kmac, and instructs the STS to bind the requested security token to kbind. The STS validates the request by deriving kmac using a client-provided nonce and kbind to MAC the message and compare the MAC values. If the request is validated, the STS generates a response comprising the requested security token, derives two keys from kbind: one to sign the response and one to encrypt the response, and sends the response to the client. Only a device comprising kbind is enabled to use the bound security token, providing increased security.Type: GrantFiled: December 31, 2015Date of Patent: November 27, 2018Assignee: MICROSOFT TECHNOLOGY LICENSING, LLCInventors: Adrian Frei, Tarek B. Kamel, Guruprasad B. Aphale, Sankara Narayanan Venkataraman, Xiaohong Su, Yordan Rouskov, Vijay G. Bharadwaj
-
Patent number: 10050963Abstract: Authenticating a secure session between a first user entity and an identity provider using a second user entity. The method includes receiving a request for a session from an entity that purports to be the first user entity. The method further includes sending authentication context from the request, and wherein the authentication context for the request arrives at the second user entity. The method further includes receiving an indication that the authentication context has been verified. As a result, the method further includes authenticating a secure session between a first user entity and an identity provider or approving a secure transaction.Type: GrantFiled: March 29, 2016Date of Patent: August 14, 2018Assignee: Microsoft Technology Licensing, LLCInventors: Tarek B. Kamel, Adrian Frei, James Shang Kai Chou
-
Publication number: 20170289150Abstract: Authenticating a secure session between a first user entity and an identity provider using a second user entity. The method receiving a request for a session from an entity that purports to be the first user entity. The method further includes sending authentication context from the request, and wherein the authentication context for the request arrives at the second user entity. The method further includes receiving an indication that the authentication context has been verified. As a result, the method further includes authenticating a secure session between a first user entity and an identity provider or approving a secure transaction.Type: ApplicationFiled: March 29, 2016Publication date: October 5, 2017Inventors: Tarek B. Kamel, Adrian Frei, James Shang Kai Chou
-
Patent number: 9706401Abstract: User-authentication-based approval of a first device via communication with a second device over a channel (e.g., an insecure channel) is described. The first device receives a session ID and first user-observable information, or an identifier thereof, from an identity provider, presents the first user-observable information to a user, and sends the session ID to the second device. The second device sends the session ID to the identity provider to obtain therefrom second user-observable information, or an identifier thereof, and a security challenge. The second user-observable information bears a user-discernable relationship to the first user-observable information and is presented to the user by the second device. The second device is capable of generating a response to the security challenge for transmission to the identity provider based at least on input received from the user, the response to the security challenge being indicative of the suitability of the first device for approval.Type: GrantFiled: November 25, 2014Date of Patent: July 11, 2017Assignee: Microsoft Technology Licensing, LLCInventors: Benjamin R. Vincent, Tarek B. Kamel, Sparky Toews, Dejan Subotic, Peter E. Zenzerovich, James Shang Kai Chou
-
Publication number: 20170195121Abstract: Binding a security token to a client token binder, such as a trusted platform module, is provided. A bound security token can only be used on the client on which it was obtained. A secret binding key (kbind) is established between the client and an STS. The client derives a key (kmac) from kbind, signs a security token request with kmac, and instructs the STS to bind the requested security token to kbind. The STS validates the request by deriving kmac using a client-provided nonce and kbind to MAC the message and compare the MAC values. If the request is validated, the STS generates a response comprising the requested security token, derives two keys from kbind: one to sign the response and one to encrypt the response, and sends the response to the client. Only a device comprising kbind is enabled to use the bound security token, providing increased security.Type: ApplicationFiled: December 31, 2015Publication date: July 6, 2017Applicant: Microsoft Technology Licensing, LLC.Inventors: Adrian Frei, Tarek B. Kamel, Guruprasad B. Aphale, Sankara Narayanan Venkataraman, Xiaohong Su, Yordan Rouskov, Vijay G. Bharadwaj
-
Patent number: 9648002Abstract: Embodiments are directed to validating the identity of a user. In one scenario, a computer system determines that a login account has been created for a user, where the creation includes generation of a first identifier for the user based on a user's determined location at the time of account creation. The computer system next receives a login attempt from the user that includes a second, different identifier and one or more login credentials. The computer system then determines the location from which the login attempt was received and, using the second identifier and the determined login location, identifies the user account corresponding to the user. The computer system further authenticates the user upon determining that the second identifier and login location match the first identifier.Type: GrantFiled: December 3, 2014Date of Patent: May 9, 2017Assignee: Microsoft Technology Licensing, LLCInventors: Narender Chauhan, Benjamin Vincent, Tarek B. Kamel, Daniel Castro
-
Publication number: 20160164850Abstract: Embodiments are directed to validating the identity of a user. In one scenario, a computer system determines that a login account has been created for a user, where the creation includes generation of a first identifier for the user based on a user's determined location at the time of account creation. The computer system next receives a login attempt from the user that includes a second, different identifier and one or more login credentials. The computer system then determines the location from which the login attempt was received and, using the second identifier and the determined login location, identifies the user account corresponding to the user. The computer system further authenticates the user upon determining that the second identifier and login location match the first identifier.Type: ApplicationFiled: December 3, 2014Publication date: June 9, 2016Inventors: Narender Chauhan, Benjamin Vincent, Tarek B. Kamel, Daniel Castro
-
Publication number: 20160150406Abstract: User-authentication-based approval of a first device via communication with a second device over a channel (e.g., an insecure channel) is described. The first device receives a session ID and first user-observable information, or an identifier thereof, from an identity provider, presents the first user-observable information to a user, and sends the session ID to the second device. The second device sends the session ID to the identity provider to obtain therefrom second user-observable information, or an identifier thereof, and a security challenge. The second user-observable information bears a user-discernable relationship to the first user-observable information and is presented to the user by the second device. The second device is capable of generating a response to the security challenge for transmission to the identity provider based at least on input received from the user, the response to the security challenge being indicative of the suitability of the first device for approval.Type: ApplicationFiled: November 25, 2014Publication date: May 26, 2016Inventors: Benjamin R. Vincent, Tarek B. Kamel, Sparky Toews, Dejan Subotic, Peter E. Zenzerovich, James Shang Kai Chou
-
Publication number: 20160142409Abstract: Methods, systems, apparatuses, and computer program products are provided for authentication of users in a service-to-service context. At a first service, a user authentication token is received from a client device that was obtained from an identity provider. The user authentication token was received to enable access to the first service by a user. The user is authenticated based on the user authentication token. A second service is determined to be needed to be accessed by the first service on behalf of the user. The user authentication token is converted into a proxy token that is not convertible back to the user authentication token. The proxy token is forwarded from the first service to the second service to enable access to the second service. A response is received by the first service from the second service due to the user having been authenticated based on the proxy token.Type: ApplicationFiled: November 18, 2014Publication date: May 19, 2016Inventors: Adrian Frei, Tarek B. Kamel, Allan Edwin Wetter, Benjamin R. Vincent
-
Publication number: 20150222614Abstract: Sharing resources on a network include, for example, a domain controller hierarchy scheme, which is used in some implementations to organize and share both secure and non-secure resources in an efficient manner. Using authentication information can be used to architect a trustworthy system to divulging sensitive client data (such as user/computer passwords) to a host system. The sensitive client data can be released to the host system when a client establishes a relationship having a degree of trust with the host.Type: ApplicationFiled: April 17, 2015Publication date: August 6, 2015Applicant: Microsoft Technology Licensing, LLCInventors: Gregory C. Johnson, William S. Jack, Nathan D. Muggli, Tarek B. Kamel
-
Patent number: 8132246Abstract: An exemplary group ticket for a Kerberos protocol includes a service ticket encrypted with a dynamic group key and a plurality of enveloped pairs where each pair includes a name associated with a member of a group and an encrypted the dynamic group key for decryption by a key possessed by the member of the group where decryption of an encrypted dynamic group key allows for decryption of the service ticket. Other exemplary methods, systems, etc., are also disclosed.Type: GrantFiled: February 27, 2008Date of Patent: March 6, 2012Assignee: Microsoft CorporationInventors: Cristian Ilac, Paul J. Leach, Tarek B. Kamel, Liqiang Zhu
-
Publication number: 20090217029Abstract: An exemplary group ticket for a Kerberos protocol includes a service ticket encrypted with a dynamic group key and a plurality of enveloped pairs where each pair includes a name associated with a member of a group and an encrypted the dynamic group key for decryption by a key possessed by the member of the group where decryption of an encrypted dynamic group key allows for decryption of the service ticket. Other exemplary methods, systems, etc., are also disclosed.Type: ApplicationFiled: February 27, 2008Publication date: August 27, 2009Applicant: Microsoft CorporationInventors: Cristian Ilac, Paul J. Leach, Tarek B. Kamel, Liqiang Zhu
-
Publication number: 20080098120Abstract: Sharing resources on a network include, for example, a domain controller hierarchy scheme, which is used in some implementations to organize and share both secure and non-secure resources in an efficient manner. Using authentication information can be used to architect a trustworthy system to divulging sensitive client data (such as user/computer passwords) to a host system. The sensitive client data can be released to the host system when a client establishes a relationship having a degree of trust with the host.Type: ApplicationFiled: October 23, 2006Publication date: April 24, 2008Applicant: Microsoft CorporationInventors: Gregory C. Johnson, William S. Jack, Nathan D. Muggli, Tarek B. Kamel