1
Mario C Goertzel, Susi E Strom, Praerit Garg, Bharat Shah: Method and system of security location discrimination. Microsoft Corporation, Michalik & Wylie PLLC, October 23, 2001: US06308273 (419 worldwide citation)

An improved computer network security system and method wherein access to network resources is based on information that includes the location of the connecting user. In general, the less trusted the location of the user, the more the access rights assigned to the user are restricted. A discriminati ...


2
Clifford P Van Dyke, Peter T Brundrett, Michael M Swift, Praerit Garg, Richard B Ward: Extensible security system and method for controlling access to objects in a computing environment. Microsoft Corporation, Lee & Hayes PLLC, June 25, 2002: US06412070 (210 worldwide citation)

A method and computing system for extending access control of system objects in a computing environment beyond traditional rights such as read, write, create and delete. According to the invention, a system administrator or user application is able to create control rights that are unique to the typ ...


3
Peter Brundrett, Praerit Garg, Jianrong Gu, James W Kelly Jr, Keith S Kaplan, Robert P Reichel, Brian Andrew, Gary D Kimura, Thomas J Miller: Encrypting file system and method. Microsoft Corporation, Michalik & Wylie PLLC, June 19, 2001: US06249866 (149 worldwide citation)

A system and method for encryption and decryption of files. The system and method operate in conjunction with the file system to transparently encrypt and decrypt files in using a public key-private key pair encryption scheme. When a user puts a file in an encrypted directory or encrypts a file, all ...


4
John J Lambert, Praerit Garg, Jeffrey A Lawson: Policies for secure software execution. Microsoft Corporation, Workman Nydegger, March 25, 2008: US07350204 (128 worldwide citation)

A system and method that automatically, transparently and securely controls software execution by identifying and classifying software, and locating a rule and associated security level for executing executable software. The security level may disallow the software's execution, restrict the executio ...


5
Gregory Jensenworth, Praerit Garg, Michael M Swift, Mario C Goertzel, Shannon J Chan: Security model using restricted tokens. Microsoft Corporation, Michalik & Wylie PLLC, August 21, 2001: US06279111 (125 worldwide citation)

A restrict ed access token is created from an existing token, and provides less access than that token. A restricted token may be created by changing an attribute of one or more security identifiers allowing access in the parent token to a setting that denies access in the restricted token and/or re ...


6
Praerit Garg, Michael M Swift, Clifford P Van Dyke, Richard B Ward, Peter T Brundrett: Per property access control mechanism. Microsoft Corporation, Lee & Hayes PLLC, September 11, 2001: US06289458 (62 worldwide citation)

Providing access control to individual properties of an object is described. In one embodiment, a computer system comprises an operating system operative to control applications and services running on the system. The service maintains a service object having at least one property. Also included in ...


7
Praerit Garg, Michael M Swift, Clifford P Van Dyke, Richard B Ward, Peter T Brundrett: Object type specific access control. Microsoft Corporation, Lee & Hayes PLLC, September 23, 2003: US06625603 (54 worldwide citation)

Providing object type specific access control to an object is described. In one embodiment, a computer system comprises an operating system operative to control an application and a service running on a computer. The service maintains a service object having a link to an access control entry. The ac ...


8
Donald E Schmidt, Clifford P Van Dyke, Paul J Leach, Praerit Garg, Murli D Satagopan: Authentication and authorization across autonomous network systems. Microsoft Corporation, Merchant & Gould PC, February 27, 2007: US07185359 (53 worldwide citation)

An enterprise network architecture has a trust link established between two autonomous network systems that enables transitive resource access between network domains of the two network systems. The trust link is defined by data structures maintained by each of the respective network systems. The fi ...


9
Brian Andrew, Jianrong Gu, Mark J Zbikowski, Praerit Garg, Mike K Lai, Wesley Witt, Klaus U Schutz: Encrypting file system and method. Microsoft Corporation, Law Offices of Albert S Michalik PLLC, January 10, 2006: US06986043 (31 worldwide citation)

A system and method for encryption and decryption of files. The system and method operate in conjunction with the file system to transparently encrypt and decrypt files in using a public key-private key pair encryption scheme. When a user puts a file in an encrypted directory or encrypts a file, dat ...


10
David A Orbits, Praerit Garg, Sudarshan A Chitre, Balan Sethu Raman: System and method for replicating data in resource sets. Microsoft Corporation, Merchant & Gould P C, July 12, 2005: US06917951 (30 worldwide citation)

Described is a system and method for replicating each of a set of resources to a subject computer in a replica set prior to making use of a resource in the set of resources. The set of resources includes resources that are dependent upon each other for a proper functioning of the group. A manifest f ...



Click the thumbnails below to visualize the patent trend.