Patents by Inventor Yogesh Mehta

Yogesh Mehta has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 11512771
    Abstract: A transfer case includes a primary shaft, a secondary shaft radially offset from the primary shaft, and a torque transfer mechanism. The primary shaft includes a central channel and an inclined fluid channel. The torque transfer mechanism is configured to selectively transfer torque from the primary shaft to the secondary shaft, and includes a primary sprocket coupled to the primary shaft for transferring torque to the secondary shaft. The inclined fluid channel is associated with the primary sprocket, and includes an outlet that axially overlaps the primary sprocket.
    Type: Grant
    Filed: May 17, 2018
    Date of Patent: November 29, 2022
    Assignee: BorgWarner Inc.
    Inventors: Susan Stroope, Arun Narayanan, Yogesh Mehta
  • Publication number: 20220207130
    Abstract: A computing device can perform operations to unlock encrypted volumes of the computing device while the computing device is in a recovery environment. In some examples, the computing device can work in conjunction with a test computing device to unlock the encrypted volumes using an unlock token and a PIN. In other examples, the computing device can perform operations without a test computing device. For example, the computing device can, while in the recovery environment, use credentials associated with a user of the computing device to obtain a recovery password to unlock keys for interpreting the encrypted volumes. In some examples, the computing device can use a shortened recovery password in conjunction with anti-hammering capabilities of a Trusted Platform Module in order to unlock keys for interpreting the encrypted volumes. These and other operations can facilitate secure unlock of volumes of encrypted data on a consumer device.
    Type: Application
    Filed: March 17, 2022
    Publication date: June 30, 2022
    Inventors: Yogesh A. MEHTA, Octavian T. URECHE, Scott R. SHELL, Innokentiy BASMOV, Peter NOVOTNEY, Christopher L. WALSTAD
  • Patent number: 11295004
    Abstract: A computing device can perform operations to unlock encrypted volumes of the computing device while the computing device is in a recovery environment. In some examples, the computing device can work in conjunction with a test computing device to unlock the encrypted volumes using an unlock token and a PIN. In other examples, the computing device can perform operations without a test computing device. For example, the computing device can, while in the recovery environment, use credentials associated with a user of the computing device to obtain a recovery password to unlock keys for interpreting the encrypted volumes. In some examples, the computing device can use a shortened recovery password in conjunction with anti-hammering capabilities of a Trusted Platform Module in order to unlock keys for interpreting the encrypted volumes. These and other operations can facilitate secure unlock of volumes of encrypted data on a consumer device.
    Type: Grant
    Filed: January 31, 2020
    Date of Patent: April 5, 2022
    Assignee: Microsoft Technology Licensing, LLC
    Inventors: Yogesh A. Mehta, Octavian T. Ureche, Scott R. Shell, Innokentiy Basmov, Peter Novotney, Christopher L. Walstad
  • Patent number: 10713350
    Abstract: A computing device can perform operations to unlock encrypted volumes of the computing device while the computing device is in a recovery environment. In some examples, the computing device can work in conjunction with a test computing device to unlock the encrypted volumes using an unlock token and a PIN. In other examples, the computing device can perform operations without a test computing device. For example, the computing device can, while in the recovery environment, use credentials associated with a user of the computing device to obtain a recovery password to unlock keys for interpreting the encrypted volumes. In some examples, the computing device can use a shortened recovery password in conjunction with anti-hammering capabilities of a Trusted Platform Module in order to unlock keys for interpreting the encrypted volumes. These and other operations can facilitate secure unlock of volumes of encrypted data on a consumer device.
    Type: Grant
    Filed: August 21, 2018
    Date of Patent: July 14, 2020
    Assignee: Microsoft Technology Licensing, LLC
    Inventors: Yogesh A. Mehta, Octavian T. Ureche, Scott R. Shell, Innokentiy Basmov, Peter Novotney, Christopher L. Walstad
  • Publication number: 20200167462
    Abstract: A computing device can perform operations to unlock encrypted volumes of the computing device while the computing device is in a recovery environment. In some examples, the computing device can work in conjunction with a test computing device to unlock the encrypted volumes using an unlock token and a PIN. In other examples, the computing device can perform operations without a test computing device. For example, the computing device can, while in the recovery environment, use credentials associated with a user of the computing device to obtain a recovery password to unlock keys for interpreting the encrypted volumes. In some examples, the computing device can use a shortened recovery password in conjunction with anti-hammering capabilities of a Trusted Platform Module in order to unlock keys for interpreting the encrypted volumes. These and other operations can facilitate secure unlock of volumes of encrypted data on a consumer device.
    Type: Application
    Filed: January 31, 2020
    Publication date: May 28, 2020
    Inventors: Yogesh A. MEHTA, Octavian T. URECHE, Scott R. SHELL, Innokentiy BASMOV, Peter NOVOTNEY, Christopher L. WALSTAD
  • Patent number: 10411537
    Abstract: A rotor lamination for an electric motor includes a body and a plurality of tangs. The body defines a shaft aperture, which defines a rotor axis, a plurality of flux directing aperture (FDA) sets, and a plurality of mass reduction apertures that are formed through the body. The FDA sets are spaced circumferentially about the body and each includes one or more apertures that are configured to receive a permanent magnet therein and/or form a flux barrier. The mass reduction apertures are disposed radially between the shaft aperture and the plurality of flux directing aperture sets. Each of the tangs is coupled to the body and extends radially inward into the shaft aperture. Each of the tangs has a pair of side walls that are disposed about a first centerline that intersects the rotor axis and an associated one of the mass reduction apertures that is disposed radially outwardly therefrom.
    Type: Grant
    Filed: August 1, 2017
    Date of Patent: September 10, 2019
    Assignee: AMERICAN AXLE & MANUFACTURING, INC.
    Inventors: Ravi Desai, Yogesh Mehta, Wei Li
  • Patent number: 10404111
    Abstract: An electric motor can include a stator positioning device. First and second housing bodies can define a motor cavity. The stator can be disposed about the rotor within the motor cavity. The stator positioning device can include a plurality of contact members, and a plurality of cover members. The contact members can cooperate to form an annular contact ring that is coaxial with an output axis and has a first side and a second side. The first side can be in contact with a first end of the stator core. The cover members can cooperate to form an annular cover ring that is coaxial with the axis and coupled to the second side of the contact ring. The cover ring can include a flange that extends radially outward of the contact ring and is axially between the first and second housing bodies to inhibit axial movement of the cover ring.
    Type: Grant
    Filed: December 4, 2017
    Date of Patent: September 3, 2019
    Assignee: AMERICAN AXLE & MANUFACTURING, INC.
    Inventors: Thomas J. Oetjens, Yogesh Mehta, Wei Li, Jeffrey J. Ronning, Lars Y. Hessman
  • Publication number: 20190173331
    Abstract: An electric motor can include a stator positioning device. First and second housing bodies can define a motor cavity. The stator can be disposed about the rotor within the motor cavity. The stator positioning device can include a plurality of contact members, and a plurality of cover members. The contact members can cooperate to form an annular contact ring that is coaxial with an output axis and has a first side and a second side. The first side can be in contact with a first end of the stator core. The cover members can cooperate to form an annular cover ring that is coaxial with the axis and coupled to the second side of the contact ring. The cover ring can include a flange that extends radially outward of the contact ring and is axially between the first and second housing bodies to inhibit axial movement of the cover ring.
    Type: Application
    Filed: December 4, 2017
    Publication date: June 6, 2019
    Inventors: Thomas J. Oetjens, Yogesh Mehta, Wei Li, Jeffrey J. Ronning, Lars Y. Hessman
  • Patent number: 10268816
    Abstract: A system for changing policy information of a process is provided. When a process is to execute, the system stores policy information for the process in association with the process code. The system also creates a token for the process. The token provides evidence of the policy for the process and includes at least a reference to the stored policy information. The system provides the token to the process for use by the process as evidence of the policy for the process. When the process provides the token to a service provider, the service provider uses the reference to access the policy information for the process. While the process is executing, the system modifies the stored policy information. When the process subsequently provides the token to a service provider, the service provider uses the reference to access the modified policy information for the process.
    Type: Grant
    Filed: March 31, 2016
    Date of Patent: April 23, 2019
    Assignee: Microsoft Technology Licensing, LLC
    Inventors: Md. Nazmus Sakib, Yogesh Mehta, Kinshumann Kinshumann, Vishal Agarwal, Giridharan Sridharan, Arnold Paul Pereira, Deskin Miller, Narendra Acharya
  • Publication number: 20180357412
    Abstract: A computing device can perform operations to unlock encrypted volumes of the computing device while the computing device is in a recovery environment. In some examples, the computing device can work in conjunction with a test computing device to unlock the encrypted volumes using an unlock token and a PIN. In other examples, the computing device can perform operations without a test computing device. For example, the computing device can, while in the recovery environment, use credentials associated with a user of the computing device to obtain a recovery password to unlock keys for interpreting the encrypted volumes. In some examples, the computing device can use a shortened recovery password in conjunction with anti-hammering capabilities of a Trusted Platform Module in order to unlock keys for interpreting the encrypted volumes. These and other operations can facilitate secure unlock of volumes of encrypted data on a consumer device.
    Type: Application
    Filed: August 21, 2018
    Publication date: December 13, 2018
    Inventors: Yogesh A. MEHTA, Octavian T. URECHE, Scott R. SHELL, Innokentiy BASMOV, Peter NOVOTNEY, Christopher L. WALSTAD
  • Publication number: 20180335124
    Abstract: A transfer case includes a primary shaft, a secondary shaft radially offset from the primary shaft, and a torque transfer mechanism. The primary shaft includes a central channel and an inclined fluid channel. The torque transfer mechanism is configured to selectively transfer torque from the primary shaft to the secondary shaft, and includes a primary sprocket coupled to the primary shaft for transferring torque to the secondary shaft. The inclined fluid channel is associated with the primary sprocket, and includes an outlet that axially overlaps the primary sprocket.
    Type: Application
    Filed: May 17, 2018
    Publication date: November 22, 2018
    Inventors: Susan STROOPE, Arun NARAYANAN, Yogesh MEHTA
  • Patent number: 10078748
    Abstract: A computing device can perform operations to unlock encrypted volumes of the computing device while the computing device is in a recovery environment. In some examples, the computing device can work in conjunction with a test computing device to unlock the encrypted volumes using an unlock token and a PIN. In other examples, the computing device can perform operations without a test computing device. For example, the computing device can, while in the recovery environment, use credentials associated with a user of the computing device to obtain a recovery password to unlock keys for interpreting the encrypted volumes. In some examples, the computing device can use a shortened recovery password in conjunction with anti-hammering capabilities of a Trusted Platform Module in order to unlock keys for interpreting the encrypted volumes. These and other operations can facilitate secure unlock of volumes of encrypted data on a consumer device.
    Type: Grant
    Filed: November 13, 2015
    Date of Patent: September 18, 2018
    Assignee: Microsoft Technology Licensing, LLC
    Inventors: Yogesh A Mehta, Octavian T. Ureche, Scott R. Shell, Innokentiy Basmov, Peter Novotney, Christopher L Walstad
  • Publication number: 20180054101
    Abstract: A rotor lamination for an electric motor includes a body and a plurality of tangs. The body defines a shaft aperture, which defines a rotor axis, a plurality of flux directing aperture (FDA) sets, and a plurality of mass reduction apertures that are formed through the body. The FDA sets are spaced circumferentially about the body and each includes one or more apertures that are configured to receive a permanent magnet therein and/or form a flux barrier. The mass reduction apertures are disposed radially between the shaft aperture and the plurality of flux directing aperture sets. Each of the tangs is coupled to the body and extends radially inward into the shaft aperture. Each of the tangs has a pair of side walls that are disposed about a first centerline that intersects the rotor axis and an associated one of the mass reduction apertures that is disposed radially outwardly therefrom.
    Type: Application
    Filed: August 1, 2017
    Publication date: February 22, 2018
    Inventors: Ravi Desai, Yogesh Mehta, Wei Li
  • Patent number: 9900325
    Abstract: A data protection policy is implemented on a computing device, the data protection policy indicating how organization data on the computing device is to be protected. Protection of the organization data includes encrypting the organization data, and allowing the organization data to be decrypted only by particular programs and/or under particular circumstances (as indicated by the data protection policy). When implementing a data protection policy, files already stored on the computing device are encrypted using a passive encryption technique. The passive encryption technique can include one or more of an encrypt on close technique, an encrypt on open technique, an encrypt without exclusive access technique, and an encrypt location technique.
    Type: Grant
    Filed: October 9, 2015
    Date of Patent: February 20, 2018
    Assignee: MICROSOFT TECHNOLOGY LICENSING, LLC
    Inventors: Alex M. Semenko, Preston Derek Adam, Innokentiy Basmov, Narendra S. Acharya, Peter J. Novotney, Salil Arun Bhagurkar, Yogesh A. Mehta
  • Patent number: 9900295
    Abstract: Content on a device is encrypted and protected based on a data protection key. The protected content can then be copied to cloud storage, and from the cloud storage the protected content can be transferred to various other ones of the user's devices. A key used to retrieve plaintext content from the protected content is associated with an identifier of a particular device that provides the key, the device providing the key being the device that generated the key, or another managed device to which the protected content was transferred. A wipe command can similarly be transferred to the various ones of the user's devices, causing any keys associated with a particular device to be deleted from each of the various ones of the user's devices.
    Type: Grant
    Filed: November 5, 2014
    Date of Patent: February 20, 2018
    Assignee: MICROSOFT TECHNOLOGY LICENSING, LLC
    Inventors: Yogesh A. Mehta, Octavian T. Ureche, Preston Derek Adam, Narendra S. Acharya
  • Patent number: 9853812
    Abstract: Content on a device is encrypted and protected based on a data protection key corresponding to a particular identity of the user of the device. The protected content can then be stored to cloud storage, and from the cloud storage the protected content can be transferred to various other ones of the user's devices. A data protection key that is used to retrieve the plaintext content from the protected content is maintained by the user's device. This data protection key can be securely transferred to other of the user's devices, allowing any of the user's devices to access the protected content.
    Type: Grant
    Filed: September 17, 2014
    Date of Patent: December 26, 2017
    Assignee: MICROSOFT TECHNOLOGY LICENSING, LLC
    Inventors: Yogesh A. Mehta, Innokentiy Basmov, Octavian T. Ureche, Peter J. Novotney, Preston Derek Adam, Mugdha Lakhani, Saurav Sinha, Narendra S. Acharya, Karanbir Singh
  • Patent number: 9853820
    Abstract: A program on a device communicates with services of an organization and obtains data associated with the organization (also referred to as organization data). The organization data is optionally encrypted using one or more encryption keys, in which case the program has access to one or more decryption keys allowing the organization data to be decrypted and used at the device. Situations can arise in which the organization data stored on the device is to no longer be accessible to a user and/or the device, which is also referred to as the data being revoked. In response to organization data being revoked at the device, various techniques are used to intelligently delete the data, which refers to determining, based on the revocation that occurred and the nature of the data on the device, which data on the device is to be deleted from the device.
    Type: Grant
    Filed: June 30, 2015
    Date of Patent: December 26, 2017
    Assignee: MICROSOFT TECHNOLOGY LICENSING, LLC
    Inventors: Preston Derek Adam, Adrian F. Teran, Yogesh A. Mehta, John C. Spaith, Steve Roger May
  • Patent number: 9825945
    Abstract: Data files are encrypted based on a key associated with an entity that sets a data protection policy controlling access to the data files. The data protection policy identifies various restrictions on how the plaintext data of the encrypted data in the data files can be used. The data files have corresponding metadata identifying the entity that sets the data protection policy, and processes that are running instances of applications that are allowed to access the plaintext data are also associated with the identifier of the entity. These identifiers of the entity, as well as the data protection policy, are used by an operating system of a computing device to protect the data in accordance with the data protection policy, including having the protection be transferred to other devices with the protected data, or preventing the protected data from being transferred to other devices.
    Type: Grant
    Filed: September 9, 2014
    Date of Patent: November 21, 2017
    Assignee: Microsoft Technology Licensing, LLC
    Inventors: Preston Derek Adam, Narendra S. Acharya, Innokentiy Basmov, Octavian T. Ureche, Yogesh A. Mehta, Alex M. Semenko
  • Publication number: 20170286664
    Abstract: A system for changing policy information of a process is provided. When a process is to execute, the system stores policy information for the process in association with the process code. The system also creates a token for the process. The token provides evidence of the policy for the process and includes at least a reference to the stored policy information. The system provides the token to the process for use by the process as evidence of the policy for the process. When the process provides the token to a service provider, the service provider uses the reference to access the policy information for the process. While the process is executing, the system modifies the stored policy information. When the process subsequently provides the token to a service provider, the service provider uses the reference to access the modified policy information for the process.
    Type: Application
    Filed: March 31, 2016
    Publication date: October 5, 2017
    Inventors: Nazmus Sakib, Yogesh Mehta, Kinshumann Kinshumann, Vishal Agarwal, Giridharan Sridharan, Arnold Paul Pereira, Deskin Miller, Narendra Acharya
  • Publication number: 20170140146
    Abstract: A computing device can perform operations to unlock encrypted volumes of the computing device while the computing device is in a recovery environment. In some examples, the computing device can work in conjunction with a test computing device to unlock the encrypted volumes using an unlock token and a PIN. In other examples, the computing device can perform operations without a test computing device. For example, the computing device can, while in the recovery environment, use credentials associated with a user of the computing device to obtain a recovery password to unlock keys for interpreting the encrypted volumes. In some examples, the computing device can use a shortened recovery password in conjunction with anti-hammering capabilities of a Trusted Platform Module in order to unlock keys for interpreting the encrypted volumes. These and other operations can facilitate secure unlock of volumes of encrypted data on a consumer device.
    Type: Application
    Filed: November 13, 2015
    Publication date: May 18, 2017
    Inventors: Yogesh A. Mehta, Octavian T. Ureche, Scott R. Shell, Innokentiy Basmov, Peter Novotney, Christopher L. Walstad