1
Deepak Rao, Lei Tan, Xin Guo: Method and system for reliable protocol tunneling over HTTP. Microsoft Corporation, Merchant & Gould, August 6, 2013: US08504818 (26 worldwide citation)

The embodiments described herein generally relate to methods and systems for tunneling arbitrary binary data between an HTTP endpoint and an arbitrary destination. Such tunneling of data is valuable in an environment, for example, in which a browser-based client communicates in the HTTP protocol and ...


2
Sundar Anantharaman, Deepak Rao, Xin Guo, Dhruv Chopra: Tunneling of remote desktop sessions through firewalls. Microsoft Corporation, Turk IP Law, May 10, 2011: US07941551 (11 worldwide citation)

Endpoints are enabled to facilitate desktop and/or application sharing in enhanced communication systems using Session Initiation Protocol (SIP) and Remote Desktop Protocol (RDP) protocols by tunneling RDP packets through an Interactive Connection Establishment (ICE) channel built-in within the Real ...


3
Nirav Kamdar, Deepak Rao, Bimal K Mehta: Extensible framework for template-based user settings management. Microsoft Corporation, April 13, 2010: US07698639 (7 worldwide citation)

Extensible architecture for template-baser user setting management by creating logical groupings of per-user settings using different template types. A manageable way to assign templates to sets of users based on different criteria is provided. Templates can be defined in a declarative format (e.g., ...


4
Deepak Rao, Alan L Winick, Gurpreet S Dayal: SAS panel mount connector cable assembly with LEDs and a system including the same. Oracle America, Osha Liang, February 22, 2011: US07892019 (5 worldwide citation)

A SAS panel mount cable assembly for providing access of target hard-drive resources to an initiator-host includes an initiator-side connector, two target-side connectors, and a wire-harness. Each of the two target-side connectors includes a power-link portion, a signal-link portion, an interface se ...


5
Deepak Rao, Han Y Ko: Accurate hardware Power OK (POK) generation methodology for processors with varying core voltage requirements. Sun Microsystems, Martine Penilla & Gencarella, February 16, 2010: US07663517 (3 worldwide citation)

A method for configuring a circuit for providing a power OK (POK) signal is described. The method includes identifying a voltage range and voltage interval, dividing the voltage range into a plurality of segments, selecting a reference voltage for each segment, and selecting resistor values for a pl ...


6
Paul Tidwell, Yves Pitsch, Deepak Rao, Vadim Eydelman, Satya Kondepudi: Web ticket based upon a symmetric key usable for user authentication. MICROSOFT TECHNOLOGY LICENSING, Medley Behrens & Lewis, April 24, 2018: US09954843

Described herein are various aspects pertaining to a web ticket that is used in connection with authenticating a user. The web ticket is generated through use of a symmetric key, and is less than two hundred bytes in size. A ticket issuer executing on a first computing device generates the web ticke ...


7
Yves Pitsch, Rastan Boroujerdi, Amit Sehgal, Santhosh Kopparapu, Yong Lim, Deepak Rao, Vadim Eydelman: Techniques to discover services recursively in a distributed environment. Microsoft Corporation, Andrew Smith, Raghu Chinagudabha, Micky Minhas, October 28, 2014: US08874717

Techniques to recursively discover services in a distributed environment may include receiving a request, including a unique client identifier, from a client device to access a home resource at a services site. The services site may identify which services site is mapped to the client domain of the ...


8
Girija Bhagavatula, Aidan Downes, Vadim Eydelman, Neeraj Garg, Anand Lakshminarayanan, Bimal K Mehta, Deepak Rao, Rahul Thatte: Centralized service for distributed service deployments. MICROSOFT TECHNOLOGY LICENSING, Tom Wong, Micky Minhas, May 24, 2016: US09350819

A centralized service communicatively links an application provider to a plurality of different message forwarding services. The centralized service receives a request and authenticates the application provider associated with the request. Further, the centralized service delivers a message embodied ...


9
Deepak Rao, Argyrios Zymnis, Kelton Lynn, Michael Ducker, Sean Cook: Application graph builder. Twitter, Fenwick & West, November 21, 2017: US09825987

Disclosed is a system for recommending content of a predefined category to an account holder, or account holders based on the account holder application graphs. The system receives information corresponding to applications executing on the client device of the account holders and generates an applic ...


10
Nirav Kamdar, Deepak Rao, Bimal K Mehta: Extensible framework for template-based user settings management. Microsoft Corporation, Microsoft Corporation, June 19, 2008: US20080148157-A1

Extensible architecture for template-baser user setting management by creating logical groupings of per-user settings using different template types. A manageable way to assign templates to sets of users based on different criteria is provided. Templates can be defined in a declarative format (e.g., ...