-
公开(公告)号:CA2460318C
公开(公告)日:2013-05-07
申请号:CA2460318
申请日:2004-03-05
Applicant: MICROSOFT CORP
Inventor: ALAM MOHAMMAD SHABBIR , BARKLEY WARREN VINCENT , MOORE TIMOTHY M , PEASE GEOFFREY E , SHAFER STEVEN A N , TEODORESCU FLORIN , YAO YINGHUA , PAWAR MADHURIMA , KRUMM JOHN C
IPC: G06F9/44 , H04L12/24 , G01C21/00 , G06F3/00 , G06F12/00 , G06F13/00 , G06F15/16 , G06F15/173 , G06F17/00 , G06F19/00 , H04L12/12 , H04L12/16 , H04L29/02 , H04L29/08 , H04W64/00
Abstract: A location service and method provides a location aware computing device that is extensible by allowing different types of location awareness providers operate with the service. The method includes receiving a request for a location context, acquiring data associated with a current location from one or more location detection devices, reconciling the acquired data for any inconsistencies concerning the current location by applying either or both of a hierarchical and a metric process, and generating a location object accessible to applications. The service includes a location management component configured to route location data, a fuser engine configured to receive one or more location reports generated from the location data, reconcile conflicts between the location reports and generate a location object, and one or more location application programming interfaces (APIs) coupled to the location management component to transmit the location object from the fuser engine to an application.
-
62.
公开(公告)号:AU2003266437B2
公开(公告)日:2009-10-29
申请号:AU2003266437
申请日:2003-12-03
Applicant: MICROSOFT CORP
Inventor: MOORE TIMOTHY M , KRANTZ ANTON W , GUDAY SHAI , ABOBA BERNARD D , ABRAHAM DALEN M , BAHL PRADEEP
Abstract: A computer system attempts to authenticate with a server to gain authorization to access a first network. It is determined by the server that the computer system is not authorized to access the first network. The computer system is given authorization to access a second network for at least the purpose of downloading files (e.g., signup and configuration files) needed to access the first network. A user-interface for receiving user-entered signup information is automatically presented at the computer system. A first schema-based document including user-entered information is transferred to the server. If the server determines that the user-entered information is appropriate, a second-schema document, which includes an indication of authorization to access the first network (e.g., a user-identifier and password), is received. A third schema-based document is executed at the computer system to compatible configure the computer system for accessing the first network.
-
63.
公开(公告)号:AU2009208127A1
公开(公告)日:2009-09-03
申请号:AU2009208127
申请日:2009-08-11
Applicant: MICROSOFT CORP
Inventor: GUDAY SHAI , MOORE TIMOTHY M , KRANTZ ANTON W , ABOBA BERNARD D , BAHL PRADEEP , ABRAHAM DALEN M
Abstract: A computer system attempts to authenticate with a server to gain authorization to access a first network. It is determined by the server that the computer system is not authorized to access the first network. The computer system is given authorization to access a second network for at least the purpose of downloading files (e.g., signup and configuration files) needed to access the first network. A user-interface for receiving user-entered signup information is automatically presented at the computer system. A first schema-based document including user-entered information is transferred to the server. If the server determines that the user-entered information is appropriate, a second-schema document, which includes an indication of authorization to access the first network (e.g., a user-identifier and password), is received. A third schema-based document is executed at the computer system to compatible configure the computer system for accessing the first network.
-
公开(公告)号:AU2003203712B2
公开(公告)日:2008-06-05
申请号:AU2003203712
申请日:2003-04-14
Applicant: MICROSOFT CORP
Inventor: MOORE TIMOTHY M , GANUGAPATI KRISHNA , AYYAGARI ARUN , BAHL PRADEEP , SIMON DANIEL R
Abstract: Disclosed are methods for an authentication client, having been authenticated by an authentication server, to leverage the effects of that authentication to implement a new communications password. The authentication client gets a new password from its user. From the new password and from information provided by the authentication server, the authentication client derives a "password verifier." The password verifier is then shared with the authentication server. The new password itself is never sent to the authentication server, and it is essentially impossible to derive the new password from the password verifier. The authentication client and the authentication server, in parallel, derive a new set of authentication and encryption security keys from the new password and from the password verifier, respectively. This process may be repeated to limit the amount of data sent using any one particular set of security keys and thus to limit the effectiveness of any statistical attacker.
-
公开(公告)号:DE60302276D1
公开(公告)日:2005-12-22
申请号:DE60302276
申请日:2003-04-14
Applicant: MICROSOFT CORP
Inventor: AYYAGARI ARUN , GANUGAPATI KRISHNA , SIMON DANIEL R , MOORE TIMOTHY M , BAHL PRADEEP
Abstract: Disclosed are methods for an authentication client, having been authenticated by an authentication server, to leverage the effects of that authentication to implement a new communications password. The authentication client gets a new password from its user. From the new password and from information provided by the authentication server, the authentication client derives a "password verifier." The password verifier is then shared with the authentication server. The new password itself is never sent to the authentication server, and it is essentially impossible to derive the new password from the password verifier. The authentication client and the authentication server, in parallel, derive a new set of authentication and encryption security keys from the new password and from the password verifier, respectively. This process may be repeated to limit the amount of data sent using any one particular set of security keys and thus to limit the effectiveness of any statistical attacker.
-
公开(公告)号:AT310272T
公开(公告)日:2005-12-15
申请号:AT03008063
申请日:2003-04-14
Applicant: MICROSOFT CORP
Inventor: AYYAGARI ARUN , GANUGAPATI KRISHNA , SIMON DANIEL R , MOORE TIMOTHY M , BAHL PRADEEP
Abstract: Disclosed are methods for an authentication client, having been authenticated by an authentication server, to leverage the effects of that authentication to implement a new communications password. The authentication client gets a new password from its user. From the new password and from information provided by the authentication server, the authentication client derives a "password verifier." The password verifier is then shared with the authentication server. The new password itself is never sent to the authentication server, and it is essentially impossible to derive the new password from the password verifier. The authentication client and the authentication server, in parallel, derive a new set of authentication and encryption security keys from the new password and from the password verifier, respectively. This process may be repeated to limit the amount of data sent using any one particular set of security keys and thus to limit the effectiveness of any statistical attacker.
-
公开(公告)号:DE60300158D1
公开(公告)日:2004-12-23
申请号:DE60300158
申请日:2003-05-06
Applicant: MICROSOFT CORP
Inventor: HERNANDEZ EDWIN , AYYAGARI ARUN , MOORE TIMOTHY M , GANUGAPATI KRISHNA , BAHL PRADEEP
Abstract: A power management scheme for use in a wireless device reduces the power consumption of the network interface module of the wireless device by selectively putting the network interface module into a low-power state for an idle time. The length of the idle time is calculated such that the amount of delayed traffic data accumulated is expected to be less than or equal to a pre-selected threshold when the network interface module is put in the low-power state for the calculated idle time. The amount of delayed traffic data as a function of the idle time is modeled using average inter-arrival and service rates that are derived from traffic statistics data.
-
公开(公告)号:AU2004200733A1
公开(公告)日:2004-10-14
申请号:AU2004200733
申请日:2004-02-24
Applicant: MICROSOFT CORP
Inventor: PAWAR MADHURIMA , TEODORESCU FLORIN , PEASE GEOFFREY E , BARKLEY WARREN VINCENT , KRUMM JOHN C , YAO YINGHUA , SHAFER STEVEN A N , MOORE TIMOTHY M , ALAM MOHAMMAD SHABBIR
IPC: G06F9/44 , G01C21/00 , G06F3/00 , G06F12/00 , G06F13/00 , G06F15/16 , G06F15/173 , G06F17/00 , H04L12/12 , H04L12/16 , H04L29/02 , H04L29/08 , H04W64/00
Abstract: A location service and method provides a location aware computing device that is extensible by allowing different types of location awareness providers operate with the service. The method includes receiving a request for a location context, acquiring data associated with a current location from one or more location detection devices, reconciling the acquired data for any inconsistencies concerning the current location by applying either or both of a hierarchical and a metric process, and generating a location object accessible to applications. The service includes a location management component configured to route location data, a fuser engine configured to receive one or more location reports generated from the location data, reconcile conflicts between the location reports and generate a location object, and one or more location application programming interfaces (APIs) coupled to the location management component to transmit the location object from the fuser engine to an application.
-
公开(公告)号:BR0301303A
公开(公告)日:2004-08-17
申请号:BR0301303
申请日:2003-05-08
Applicant: MICROSOFT CORP
Inventor: HERNANDEZ EDWIN , AYYAGARI ARUN , MOORE TIMOTHY M , GANUGAPATI KRISHNA , BAHL PRADEEP
Abstract: A power management scheme for use in a wireless device reduces the power consumption of the network interface module of the wireless device by selectively putting the network interface module into a low-power state for an idle time. The length of the idle time is calculated such that the amount of delayed traffic data accumulated is expected to be less than or equal to a pre-selected threshold when the network interface module is put in the low-power state for the calculated idle time. The amount of delayed traffic data as a function of the idle time is modeled using average inter-arrival and service rates that are derived from traffic statistics data.
-
公开(公告)号:BR0301154A
公开(公告)日:2004-08-17
申请号:BR0301154
申请日:2003-04-28
Applicant: MICROSOFT CORP
Inventor: AYYAGARI ARUN , GANUGAPATI KRISHNA , SIMON DANIEL R , MOORE TIMOTHY M , BAHL PRADEEP
Abstract: Disclosed are methods for an authentication client, having been authenticated by an authentication server, to leverage the effects of that authentication to implement a new communications password. The authentication client gets a new password from its user. From the new password and from information provided by the authentication server, the authentication client derives a "password verifier." The password verifier is then shared with the authentication server. The new password itself is never sent to the authentication server, and it is essentially impossible to derive the new password from the password verifier. The authentication client and the authentication server, in parallel, derive a new set of authentication and encryption security keys from the new password and from the password verifier, respectively. This process may be repeated to limit the amount of data sent using any one particular set of security keys and thus to limit the effectiveness of any statistical attacker.
-
-
-
-
-
-
-
-
-