Patents by Inventor Tariq Sharif
Tariq Sharif has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 8353029Abstract: Various embodiments provide protection against web resources associated with one or more undesirable activities. In at least some embodiments, a method detects and responds to a user-initiated activity on a computing device. Responding can include, by way of example and not limitation, checking locally, on the computing device, whether a web resource that is associated with the user-initiated activity has been identified as being associated with a safe site. If the web resource is not associated with a safe site, the user will be notified and given the option to check remotely, away from the computing device, whether the web resource is identified as being at least possibly associated with one or more undesirable activities.Type: GrantFiled: November 10, 2005Date of Patent: January 8, 2013Assignee: Microsoft CorporationInventors: Bruce A. Morgan, Cornelis K. Van Dok, Daniel M Saimo, Govind Varshney, Sebastien Zimmermann, Tariq Sharif
-
Patent number: 8346790Abstract: A computer implemented method for ensuring the quality of processed corporate entity data, the method comprising: sequentially processing the corporate entity data through a series of serially connected drivers, the serially connected drivers comprise a data collection driver, an entity matching driver, an identification number driver, a corporate linkage driver, and a predictive indicator driver; and conducting a quality assurance of the corporate entity data as it is processed in each of the driver, wherein the quality assurance comprises: (i) sampling the corporate entity data from each the driver periodically, thereby generating sample data; (ii) evaluating the sample data; and (iii) adjusting the processing based upon the evaluation, thereby producing high quality data.Type: GrantFiled: September 28, 2010Date of Patent: January 1, 2013Assignee: The Dun & Bradstreet CorporationInventors: Sandra L. Stoker, Ahmad Tariq Sharif, Michael E. Prevoznak, Christopher John Lucas, Charles R. Benke, Maria P. Seckler, Alan Duckworth
-
Publication number: 20120239693Abstract: An integrated program lookup browser provides an integrated system with an online program lookup web service that assists the user in finding these unrecognized files, protocols and web page objects by allowing the user to perform a program lookup on a web service that can search one or more databases and return the URL to download the appropriate application or protocol or return the actual program or protocol.Type: ApplicationFiled: June 4, 2012Publication date: September 20, 2012Applicant: Microsoft CorporationInventors: Linda W. Averett, Tariq Sharif, Roberto A. Franco, Anthony T. Chor, Vishu Gupta, Venkatraman V. Kundallur, Joseph T. Farro
-
Patent number: 8256001Abstract: One or more techniques and/or systems are disclosed for providing recommendations for an add-on to a base program operating on a computing device, thus allowing a user to make a more informed decision as to whether to allow the add-on to be installed or not. To make the recommendation, collection software is queried for information about an add-on when installation or instantiation of the add-on is detected on the computing device. Information about the add-on is collected by the collection software, which comprises one or more add-on detection programs. A recommendation for applying the add-on (or not) is generated using the collected information, where the recommendation comprises a ranking based on detection program prioritization.Type: GrantFiled: April 12, 2010Date of Patent: August 28, 2012Assignee: Microsoft CorporationInventors: Douglas Edward Stamper, Tariq Sharif
-
Patent number: 8195640Abstract: An integrated program lookup browser provides an integrated system with an online program lookup web service that assists the user in finding these unrecognized files, protocols and web page objects by allowing the user to perform a program lookup on a web service that can search one or more databases and return the URL to download the appropriate application or protocol or return the actual program or protocol.Type: GrantFiled: June 16, 2006Date of Patent: June 5, 2012Assignee: Microsoft CorporationInventors: Linda W. Averett, Tariq Sharif, Roberto A. Franco, Anthony T. Chor, Vishu Gupta, Venkatraman V. Kudallur, Joseph T. Farro
-
Patent number: 8074258Abstract: A federated identity provisioning system includes relying parties, identity providers, and clients that obtain tokens from identity providers for access to a relying party's services. When a client contacts a new relying party, the relying party provides information that the client can independently resolve and evaluate for trustworthiness. For example, the relying party provides a generic domain name address. The client can then resolve the domain name address over various, authenticated steps to identity an endpoint for a digital identity provisioning service. The client can further interact with and authenticate the provisioning service (e.g., requiring digital signatures) to establish a trust relationship. Once determining that the client/user trusts the provisioning service, the client/user can then provide information to obtain a digital identity representation.Type: GrantFiled: June 18, 2008Date of Patent: December 6, 2011Assignee: Microsoft CorporationInventors: Arun K. Nanda, Tariq Sharif
-
Publication number: 20110219227Abstract: A certificate management system provides automated management of certificate lifecycles and certificate distribution. Rather than depend upon an administrator to manually distribute and manage certificates, the system self-generates certificates, distributes the certificates to appropriate servers or other parties, and transitions from old certificates to new certificates in a well-defined manner that avoids breaking functionality. After generating one or more certificates, the system securely shares certificates in a way that parties that use them can find the new certificates without an administrator manually distributing the certificates. When it is time to update certificates, the system generates new certificates and shares the new certificates in a similar way. During a transition period, the system provides a protocol by which both old and new certificates can be used to perform authenticated access to resources, so that the transition from an old to a new certificate does not break services.Type: ApplicationFiled: March 8, 2010Publication date: September 8, 2011Applicant: Microsoft CorporationInventors: Tariq Sharif, Colin H. Brace, Nakul Garg
-
Patent number: 7945950Abstract: A challenge mechanism in which a challenge is issued from one message processor to another. In generating the challenge, the message processor may select any one or more of a number of available interactive challenge types, where each type of challenge type might use different user-originated information. Upon receiving the challenge, the challengee message processor may identify the challenge type based on information provided in the challenge, and perform different actions depending on the challenge type. The challengee message processor then generates an appropriate challenge response, and issues that challenge response to the challenger message processor. The challenger message processor may then validate the challenge response.Type: GrantFiled: October 26, 2007Date of Patent: May 17, 2011Assignee: Microsoft CorporationInventors: Arun K. Nanda, Christopher G. Kaler, Tariq Sharif
-
Publication number: 20110055173Abstract: A computer implemented method for ensuring the quality of processed corporate entity data, the method comprising: sequentially processing the corporate entity data through a series of serially connected drivers, the serially connected drivers comprise a data collection driver, an entity matching driver, an identification number driver, a corporate linkage driver, and a predictive indicator driver; and conducting a quality assurance of the corporate entity data as it is processed in each of the driver, wherein the quality assurance comprises: (i) sampling the corporate entity data from each the driver periodically, thereby generating sample data; (ii) evaluating the sample data; and (iii) adjusting the processing based upon the evaluation, thereby producing high quality data.Type: ApplicationFiled: September 28, 2010Publication date: March 3, 2011Applicant: Dun & Bradstreet CorporationInventors: Sandra L. Stoker, Ahmad Tariq Sharif, Michael E. Prevoznak, Christopher John Lucas, Charles R. Benke, Maria P. Seckler, Alan Duckworth
-
Publication number: 20110047617Abstract: Various embodiments provide protection against web resources associated with one or more undesirable activities. In at least some embodiments, a method detects and responds to a user-initiated activity on a computing device. Responding can include, by way of example and not limitation, checking locally, on the computing device, whether a web resource that is associated with the user-initiated activity has been identified as being associated with a safe site. Furthermore, in at least some embodiments, the method checks remotely, away from the computing device, whether the web resource is identified as being at least possibly associated with one or more undesirable activities.Type: ApplicationFiled: November 4, 2010Publication date: February 24, 2011Applicant: Microsoft CorporationInventors: Aaron H. Averbuch, Manav Mishra, Roberto A. Franco, Tariq Sharif
-
Publication number: 20100293604Abstract: A system and method for authenticating a request for a resource. A requester sends the request for a resource to a server in a first protocol. The server may send a challenge message to the requester. In response, the requester employs a challenge handler that performs an interactive challenge with a challenge server in a second protocol. Upon successful conclusion of the interactive challenge, the challenge handler synchronizes with a request handler, which sends a challenge response message to the server. The server may then enable access to the requested resource.Type: ApplicationFiled: May 14, 2009Publication date: November 18, 2010Applicant: Microsoft CorporationInventors: Arun K. Nanda, Tariq Sharif, Kim Cameron
-
Patent number: 7831915Abstract: Various embodiments provide protection against web resources associated with one or more undesirable activities. In at least some embodiments, a method detects and responds to a user-initiated activity on a computing device. Responding can include, by way of example and not limitation, checking locally, on the computing device, whether a web resource that is associated with the user-initiated activity has been identified as being associated with a safe site. Furthermore, in at least some embodiments, the method checks remotely, away from the computing device, whether the web resource is identified as being at least possibly associated with one or more undesirable activities.Type: GrantFiled: November 10, 2005Date of Patent: November 9, 2010Assignee: Microsoft CorporationInventors: Aaron H Averbuch, Manav Mishra, Roberto A. Franco, Tariq Sharif
-
Patent number: 7822757Abstract: A data integration method involves a unique method of collecting raw business data and processing it to produce highly useful and highly accurate information to enable business decisions. This process includes collecting global data, entity matching, applying an identification number, performing corporate linkage, and providing predictive indicators. These process steps work in series to filter and organize the raw business data and provide quality information to customers. In addition, the information is enhanced by quality assurance at each step in this process to ensure the high quality of the resulting data.Type: GrantFiled: February 18, 2003Date of Patent: October 26, 2010Assignee: Dun & Bradstreet, Inc.Inventors: Sandra L. Stoker, Ahmad Tariq Sharif, Michael E. Prevoznak, Christopher John Lucas, Charles R. Benke, Maria P. Seckler, Alan Duckworth
-
Publication number: 20100198838Abstract: One or more techniques and/or systems are disclosed for providing recommendations for an add-on to a base program operating on a computing device, thus allowing a user to make a more informed decision as to whether to allow the add-on to be installed or not. To make the recommendation, collection software is queried for information about an add-on when installation or instantiation of the add-on is detected on the computing device. Information about the add-on is collected by the collection software, which comprises one or more add-on detection programs. A recommendation for applying the add-on (or not) is generated using the collected information, where the recommendation comprises a ranking based on detection program prioritization.Type: ApplicationFiled: April 12, 2010Publication date: August 5, 2010Applicant: Microsoft CorporationInventors: Douglas Edward Stamper, Tariq Sharif
-
Patent number: 7721332Abstract: Retrieval software and add-on collection software are integrated to provide a computer user information on add-ons attempting to instantiate, or alternatively, install, on the user's computer system. The retrieval software, i.e., software for locating and retrieving information from networked information services, uses information from data the collection software, i.e., software capable of collecting information about add-ons that exist via the World Wide Web, can retrieve on an add-on to create a record of status information on the add-on. The retrieval software displays this record of status information to the computer user. The retrieval software can also use information collected on an add-on to generate a recommendation identification for the add-on. The recommendation identification is an indication of what the retrieval software suggests the computer user should do with the add-on, e.g., allow its instantiation or deny its instantiation, or, alternatively, allow or block its installation.Type: GrantFiled: August 16, 2005Date of Patent: May 18, 2010Assignee: Microsoft CorporationInventors: Douglas Edward Stamper, Tariq Sharif
-
Publication number: 20100037303Abstract: In one implementation, form field(s) of a form of a website or application are populated with data obtained using a digital identity, and the populated form field(s) are submitted to the website or application. A form field specification specifying information about the form fields of the form is obtained. A user selects or creates a digital identity. Data is obtained using the digital identity, and the data is used to provide values to the form. The data is submitted to the website or application. In another implementation, a username and password are automatically generated. The username and password that are generated meet parameters that may be specified by the website or application. The username and password are submitted to the website or application for a purpose such as registration or authentication, and stored away for future authentication.Type: ApplicationFiled: August 8, 2008Publication date: February 11, 2010Applicant: Microsoft CorporationInventors: Tariq Sharif, Arun K. Nanda, Roberto A. Franco, Richard Randall
-
Publication number: 20090320095Abstract: A federated identity provisioning system includes relying parties, identity providers, and clients that obtain tokens from identity providers for access to a relying party's services. When a client contacts a new relying party, the relying party provides information that the client can independently resolve and evaluate for trustworthiness. For example, the relying party provides a generic domain name address. The client can then resolve the domain name address over various, authenticated steps to identity an endpoint for a digital identity provisioning service. The client can further interact with and authenticate the provisioning service (e.g., requiring digital signatures) to establish a trust relationship. Once determining that the client/user trusts the provisioning service, the client/user can then provide information to obtain a digital identity representation.Type: ApplicationFiled: June 18, 2008Publication date: December 24, 2009Applicant: MICROSOFT CORPORATIONInventors: Arun K. Nanda, Tariq Sharif
-
Publication number: 20090319795Abstract: Creating a token for use by an entity when digitally signing documents. In a computing environment, a digital identity representation for an entity is accessed. The digital identity representation includes information identifying identity attributes about the entity and capabilities of an identity provider that provides tokens for use by the entity. Context information is accessed. The context information includes information about one or more of which, how or where the attributes for the entity identified in the digital identity representation will be used. A security token is created from the information in the digital identity representation and the context information. The security token makes assertions by the identity provider. The assertions are based on the information in the digital identity representation. The token further includes information related to at least a portion of the context information.Type: ApplicationFiled: June 20, 2008Publication date: December 24, 2009Applicant: Microsoft CorporationInventors: Tariq Sharif, Arun K. Nanda, Craig H. Wittenberg, Lucas R. Melton, Richard Randall, Kim Cameron, Hervey O. Wilson
-
Publication number: 20090150826Abstract: A Web browser includes a quick pick search provider menu that provides a user interface which provides a user with the ability to quickly select a new search provider which appears when the user places focus in the Web browser's search box. In one or more embodiments, the Web browser's search box comprises a native part of the Web browser and is not a search box associated with an installed tool bar. In other embodiments, search box functionality is provided as an extension to the Web browser. Further, various embodiments enable the user to switch between search providers in an easy and intuitive way. Yet other embodiments provide an opportunity for users to switch between search providers using keywords in the search box. Further embodiments enable users to define collections of search providers to which individual searches can be sent.Type: ApplicationFiled: December 10, 2007Publication date: June 11, 2009Applicant: MICROSOFT CORPORATIONInventors: Sean Lyndersay, Warren G. Stevens, Benjamin N. Truelove, Amy Adams Placzkiewicz, Sebastien Zimmermann, Tariq Sharif, Eric A. Vera, Sharon Cohen, Mike Pell, Jonathan A. Gass
-
Publication number: 20090144234Abstract: Various embodiments enable information, in addition to textual information, to be presented to a user when the user enters a search query in a search box forming part of a user interface of an application. In one or more embodiments, a Web browser provides a search box in which a user can enter a search query. While the user is entering a search query, the Web browser can communicate with a third-party search provider to receive information, such as non-textual information, which can be presented to the user to assist in formulating their search query. The non-textual information can include images and other visual information of a non-textual nature.Type: ApplicationFiled: November 30, 2007Publication date: June 4, 2009Applicant: MICROSOFT CORPORATIONInventors: Tariq Sharif, Warren G. Stevens, Sebastien Zimmermann, Sean Lyndersay, Amy Adams Placzkiewicz, Eric A. Vera, Jonathan A. Gass, Benjamin N. Truelove, Sharon Cohen, Mike Pell