Patents by Inventor Yogesh Mehta
Yogesh Mehta has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 11512771Abstract: A transfer case includes a primary shaft, a secondary shaft radially offset from the primary shaft, and a torque transfer mechanism. The primary shaft includes a central channel and an inclined fluid channel. The torque transfer mechanism is configured to selectively transfer torque from the primary shaft to the secondary shaft, and includes a primary sprocket coupled to the primary shaft for transferring torque to the secondary shaft. The inclined fluid channel is associated with the primary sprocket, and includes an outlet that axially overlaps the primary sprocket.Type: GrantFiled: May 17, 2018Date of Patent: November 29, 2022Assignee: BorgWarner Inc.Inventors: Susan Stroope, Arun Narayanan, Yogesh Mehta
-
Publication number: 20220207130Abstract: A computing device can perform operations to unlock encrypted volumes of the computing device while the computing device is in a recovery environment. In some examples, the computing device can work in conjunction with a test computing device to unlock the encrypted volumes using an unlock token and a PIN. In other examples, the computing device can perform operations without a test computing device. For example, the computing device can, while in the recovery environment, use credentials associated with a user of the computing device to obtain a recovery password to unlock keys for interpreting the encrypted volumes. In some examples, the computing device can use a shortened recovery password in conjunction with anti-hammering capabilities of a Trusted Platform Module in order to unlock keys for interpreting the encrypted volumes. These and other operations can facilitate secure unlock of volumes of encrypted data on a consumer device.Type: ApplicationFiled: March 17, 2022Publication date: June 30, 2022Inventors: Yogesh A. MEHTA, Octavian T. URECHE, Scott R. SHELL, Innokentiy BASMOV, Peter NOVOTNEY, Christopher L. WALSTAD
-
Patent number: 11295004Abstract: A computing device can perform operations to unlock encrypted volumes of the computing device while the computing device is in a recovery environment. In some examples, the computing device can work in conjunction with a test computing device to unlock the encrypted volumes using an unlock token and a PIN. In other examples, the computing device can perform operations without a test computing device. For example, the computing device can, while in the recovery environment, use credentials associated with a user of the computing device to obtain a recovery password to unlock keys for interpreting the encrypted volumes. In some examples, the computing device can use a shortened recovery password in conjunction with anti-hammering capabilities of a Trusted Platform Module in order to unlock keys for interpreting the encrypted volumes. These and other operations can facilitate secure unlock of volumes of encrypted data on a consumer device.Type: GrantFiled: January 31, 2020Date of Patent: April 5, 2022Assignee: Microsoft Technology Licensing, LLCInventors: Yogesh A. Mehta, Octavian T. Ureche, Scott R. Shell, Innokentiy Basmov, Peter Novotney, Christopher L. Walstad
-
Patent number: 10713350Abstract: A computing device can perform operations to unlock encrypted volumes of the computing device while the computing device is in a recovery environment. In some examples, the computing device can work in conjunction with a test computing device to unlock the encrypted volumes using an unlock token and a PIN. In other examples, the computing device can perform operations without a test computing device. For example, the computing device can, while in the recovery environment, use credentials associated with a user of the computing device to obtain a recovery password to unlock keys for interpreting the encrypted volumes. In some examples, the computing device can use a shortened recovery password in conjunction with anti-hammering capabilities of a Trusted Platform Module in order to unlock keys for interpreting the encrypted volumes. These and other operations can facilitate secure unlock of volumes of encrypted data on a consumer device.Type: GrantFiled: August 21, 2018Date of Patent: July 14, 2020Assignee: Microsoft Technology Licensing, LLCInventors: Yogesh A. Mehta, Octavian T. Ureche, Scott R. Shell, Innokentiy Basmov, Peter Novotney, Christopher L. Walstad
-
Publication number: 20200167462Abstract: A computing device can perform operations to unlock encrypted volumes of the computing device while the computing device is in a recovery environment. In some examples, the computing device can work in conjunction with a test computing device to unlock the encrypted volumes using an unlock token and a PIN. In other examples, the computing device can perform operations without a test computing device. For example, the computing device can, while in the recovery environment, use credentials associated with a user of the computing device to obtain a recovery password to unlock keys for interpreting the encrypted volumes. In some examples, the computing device can use a shortened recovery password in conjunction with anti-hammering capabilities of a Trusted Platform Module in order to unlock keys for interpreting the encrypted volumes. These and other operations can facilitate secure unlock of volumes of encrypted data on a consumer device.Type: ApplicationFiled: January 31, 2020Publication date: May 28, 2020Inventors: Yogesh A. MEHTA, Octavian T. URECHE, Scott R. SHELL, Innokentiy BASMOV, Peter NOVOTNEY, Christopher L. WALSTAD
-
Patent number: 10411537Abstract: A rotor lamination for an electric motor includes a body and a plurality of tangs. The body defines a shaft aperture, which defines a rotor axis, a plurality of flux directing aperture (FDA) sets, and a plurality of mass reduction apertures that are formed through the body. The FDA sets are spaced circumferentially about the body and each includes one or more apertures that are configured to receive a permanent magnet therein and/or form a flux barrier. The mass reduction apertures are disposed radially between the shaft aperture and the plurality of flux directing aperture sets. Each of the tangs is coupled to the body and extends radially inward into the shaft aperture. Each of the tangs has a pair of side walls that are disposed about a first centerline that intersects the rotor axis and an associated one of the mass reduction apertures that is disposed radially outwardly therefrom.Type: GrantFiled: August 1, 2017Date of Patent: September 10, 2019Assignee: AMERICAN AXLE & MANUFACTURING, INC.Inventors: Ravi Desai, Yogesh Mehta, Wei Li
-
Patent number: 10404111Abstract: An electric motor can include a stator positioning device. First and second housing bodies can define a motor cavity. The stator can be disposed about the rotor within the motor cavity. The stator positioning device can include a plurality of contact members, and a plurality of cover members. The contact members can cooperate to form an annular contact ring that is coaxial with an output axis and has a first side and a second side. The first side can be in contact with a first end of the stator core. The cover members can cooperate to form an annular cover ring that is coaxial with the axis and coupled to the second side of the contact ring. The cover ring can include a flange that extends radially outward of the contact ring and is axially between the first and second housing bodies to inhibit axial movement of the cover ring.Type: GrantFiled: December 4, 2017Date of Patent: September 3, 2019Assignee: AMERICAN AXLE & MANUFACTURING, INC.Inventors: Thomas J. Oetjens, Yogesh Mehta, Wei Li, Jeffrey J. Ronning, Lars Y. Hessman
-
Publication number: 20190173331Abstract: An electric motor can include a stator positioning device. First and second housing bodies can define a motor cavity. The stator can be disposed about the rotor within the motor cavity. The stator positioning device can include a plurality of contact members, and a plurality of cover members. The contact members can cooperate to form an annular contact ring that is coaxial with an output axis and has a first side and a second side. The first side can be in contact with a first end of the stator core. The cover members can cooperate to form an annular cover ring that is coaxial with the axis and coupled to the second side of the contact ring. The cover ring can include a flange that extends radially outward of the contact ring and is axially between the first and second housing bodies to inhibit axial movement of the cover ring.Type: ApplicationFiled: December 4, 2017Publication date: June 6, 2019Inventors: Thomas J. Oetjens, Yogesh Mehta, Wei Li, Jeffrey J. Ronning, Lars Y. Hessman
-
Patent number: 10268816Abstract: A system for changing policy information of a process is provided. When a process is to execute, the system stores policy information for the process in association with the process code. The system also creates a token for the process. The token provides evidence of the policy for the process and includes at least a reference to the stored policy information. The system provides the token to the process for use by the process as evidence of the policy for the process. When the process provides the token to a service provider, the service provider uses the reference to access the policy information for the process. While the process is executing, the system modifies the stored policy information. When the process subsequently provides the token to a service provider, the service provider uses the reference to access the modified policy information for the process.Type: GrantFiled: March 31, 2016Date of Patent: April 23, 2019Assignee: Microsoft Technology Licensing, LLCInventors: Md. Nazmus Sakib, Yogesh Mehta, Kinshumann Kinshumann, Vishal Agarwal, Giridharan Sridharan, Arnold Paul Pereira, Deskin Miller, Narendra Acharya
-
Publication number: 20180357412Abstract: A computing device can perform operations to unlock encrypted volumes of the computing device while the computing device is in a recovery environment. In some examples, the computing device can work in conjunction with a test computing device to unlock the encrypted volumes using an unlock token and a PIN. In other examples, the computing device can perform operations without a test computing device. For example, the computing device can, while in the recovery environment, use credentials associated with a user of the computing device to obtain a recovery password to unlock keys for interpreting the encrypted volumes. In some examples, the computing device can use a shortened recovery password in conjunction with anti-hammering capabilities of a Trusted Platform Module in order to unlock keys for interpreting the encrypted volumes. These and other operations can facilitate secure unlock of volumes of encrypted data on a consumer device.Type: ApplicationFiled: August 21, 2018Publication date: December 13, 2018Inventors: Yogesh A. MEHTA, Octavian T. URECHE, Scott R. SHELL, Innokentiy BASMOV, Peter NOVOTNEY, Christopher L. WALSTAD
-
Publication number: 20180335124Abstract: A transfer case includes a primary shaft, a secondary shaft radially offset from the primary shaft, and a torque transfer mechanism. The primary shaft includes a central channel and an inclined fluid channel. The torque transfer mechanism is configured to selectively transfer torque from the primary shaft to the secondary shaft, and includes a primary sprocket coupled to the primary shaft for transferring torque to the secondary shaft. The inclined fluid channel is associated with the primary sprocket, and includes an outlet that axially overlaps the primary sprocket.Type: ApplicationFiled: May 17, 2018Publication date: November 22, 2018Inventors: Susan STROOPE, Arun NARAYANAN, Yogesh MEHTA
-
Patent number: 10078748Abstract: A computing device can perform operations to unlock encrypted volumes of the computing device while the computing device is in a recovery environment. In some examples, the computing device can work in conjunction with a test computing device to unlock the encrypted volumes using an unlock token and a PIN. In other examples, the computing device can perform operations without a test computing device. For example, the computing device can, while in the recovery environment, use credentials associated with a user of the computing device to obtain a recovery password to unlock keys for interpreting the encrypted volumes. In some examples, the computing device can use a shortened recovery password in conjunction with anti-hammering capabilities of a Trusted Platform Module in order to unlock keys for interpreting the encrypted volumes. These and other operations can facilitate secure unlock of volumes of encrypted data on a consumer device.Type: GrantFiled: November 13, 2015Date of Patent: September 18, 2018Assignee: Microsoft Technology Licensing, LLCInventors: Yogesh A Mehta, Octavian T. Ureche, Scott R. Shell, Innokentiy Basmov, Peter Novotney, Christopher L Walstad
-
Publication number: 20180054101Abstract: A rotor lamination for an electric motor includes a body and a plurality of tangs. The body defines a shaft aperture, which defines a rotor axis, a plurality of flux directing aperture (FDA) sets, and a plurality of mass reduction apertures that are formed through the body. The FDA sets are spaced circumferentially about the body and each includes one or more apertures that are configured to receive a permanent magnet therein and/or form a flux barrier. The mass reduction apertures are disposed radially between the shaft aperture and the plurality of flux directing aperture sets. Each of the tangs is coupled to the body and extends radially inward into the shaft aperture. Each of the tangs has a pair of side walls that are disposed about a first centerline that intersects the rotor axis and an associated one of the mass reduction apertures that is disposed radially outwardly therefrom.Type: ApplicationFiled: August 1, 2017Publication date: February 22, 2018Inventors: Ravi Desai, Yogesh Mehta, Wei Li
-
Patent number: 9900325Abstract: A data protection policy is implemented on a computing device, the data protection policy indicating how organization data on the computing device is to be protected. Protection of the organization data includes encrypting the organization data, and allowing the organization data to be decrypted only by particular programs and/or under particular circumstances (as indicated by the data protection policy). When implementing a data protection policy, files already stored on the computing device are encrypted using a passive encryption technique. The passive encryption technique can include one or more of an encrypt on close technique, an encrypt on open technique, an encrypt without exclusive access technique, and an encrypt location technique.Type: GrantFiled: October 9, 2015Date of Patent: February 20, 2018Assignee: MICROSOFT TECHNOLOGY LICENSING, LLCInventors: Alex M. Semenko, Preston Derek Adam, Innokentiy Basmov, Narendra S. Acharya, Peter J. Novotney, Salil Arun Bhagurkar, Yogesh A. Mehta
-
Patent number: 9900295Abstract: Content on a device is encrypted and protected based on a data protection key. The protected content can then be copied to cloud storage, and from the cloud storage the protected content can be transferred to various other ones of the user's devices. A key used to retrieve plaintext content from the protected content is associated with an identifier of a particular device that provides the key, the device providing the key being the device that generated the key, or another managed device to which the protected content was transferred. A wipe command can similarly be transferred to the various ones of the user's devices, causing any keys associated with a particular device to be deleted from each of the various ones of the user's devices.Type: GrantFiled: November 5, 2014Date of Patent: February 20, 2018Assignee: MICROSOFT TECHNOLOGY LICENSING, LLCInventors: Yogesh A. Mehta, Octavian T. Ureche, Preston Derek Adam, Narendra S. Acharya
-
Patent number: 9853812Abstract: Content on a device is encrypted and protected based on a data protection key corresponding to a particular identity of the user of the device. The protected content can then be stored to cloud storage, and from the cloud storage the protected content can be transferred to various other ones of the user's devices. A data protection key that is used to retrieve the plaintext content from the protected content is maintained by the user's device. This data protection key can be securely transferred to other of the user's devices, allowing any of the user's devices to access the protected content.Type: GrantFiled: September 17, 2014Date of Patent: December 26, 2017Assignee: MICROSOFT TECHNOLOGY LICENSING, LLCInventors: Yogesh A. Mehta, Innokentiy Basmov, Octavian T. Ureche, Peter J. Novotney, Preston Derek Adam, Mugdha Lakhani, Saurav Sinha, Narendra S. Acharya, Karanbir Singh
-
Patent number: 9853820Abstract: A program on a device communicates with services of an organization and obtains data associated with the organization (also referred to as organization data). The organization data is optionally encrypted using one or more encryption keys, in which case the program has access to one or more decryption keys allowing the organization data to be decrypted and used at the device. Situations can arise in which the organization data stored on the device is to no longer be accessible to a user and/or the device, which is also referred to as the data being revoked. In response to organization data being revoked at the device, various techniques are used to intelligently delete the data, which refers to determining, based on the revocation that occurred and the nature of the data on the device, which data on the device is to be deleted from the device.Type: GrantFiled: June 30, 2015Date of Patent: December 26, 2017Assignee: MICROSOFT TECHNOLOGY LICENSING, LLCInventors: Preston Derek Adam, Adrian F. Teran, Yogesh A. Mehta, John C. Spaith, Steve Roger May
-
Patent number: 9825945Abstract: Data files are encrypted based on a key associated with an entity that sets a data protection policy controlling access to the data files. The data protection policy identifies various restrictions on how the plaintext data of the encrypted data in the data files can be used. The data files have corresponding metadata identifying the entity that sets the data protection policy, and processes that are running instances of applications that are allowed to access the plaintext data are also associated with the identifier of the entity. These identifiers of the entity, as well as the data protection policy, are used by an operating system of a computing device to protect the data in accordance with the data protection policy, including having the protection be transferred to other devices with the protected data, or preventing the protected data from being transferred to other devices.Type: GrantFiled: September 9, 2014Date of Patent: November 21, 2017Assignee: Microsoft Technology Licensing, LLCInventors: Preston Derek Adam, Narendra S. Acharya, Innokentiy Basmov, Octavian T. Ureche, Yogesh A. Mehta, Alex M. Semenko
-
Publication number: 20170286664Abstract: A system for changing policy information of a process is provided. When a process is to execute, the system stores policy information for the process in association with the process code. The system also creates a token for the process. The token provides evidence of the policy for the process and includes at least a reference to the stored policy information. The system provides the token to the process for use by the process as evidence of the policy for the process. When the process provides the token to a service provider, the service provider uses the reference to access the policy information for the process. While the process is executing, the system modifies the stored policy information. When the process subsequently provides the token to a service provider, the service provider uses the reference to access the modified policy information for the process.Type: ApplicationFiled: March 31, 2016Publication date: October 5, 2017Inventors: Nazmus Sakib, Yogesh Mehta, Kinshumann Kinshumann, Vishal Agarwal, Giridharan Sridharan, Arnold Paul Pereira, Deskin Miller, Narendra Acharya
-
Publication number: 20170140146Abstract: A computing device can perform operations to unlock encrypted volumes of the computing device while the computing device is in a recovery environment. In some examples, the computing device can work in conjunction with a test computing device to unlock the encrypted volumes using an unlock token and a PIN. In other examples, the computing device can perform operations without a test computing device. For example, the computing device can, while in the recovery environment, use credentials associated with a user of the computing device to obtain a recovery password to unlock keys for interpreting the encrypted volumes. In some examples, the computing device can use a shortened recovery password in conjunction with anti-hammering capabilities of a Trusted Platform Module in order to unlock keys for interpreting the encrypted volumes. These and other operations can facilitate secure unlock of volumes of encrypted data on a consumer device.Type: ApplicationFiled: November 13, 2015Publication date: May 18, 2017Inventors: Yogesh A. Mehta, Octavian T. Ureche, Scott R. Shell, Innokentiy Basmov, Peter Novotney, Christopher L. Walstad