Movatterモバイル変換


[0]ホーム

URL:


US20130283354A1 - Selective cross-realm authentication - Google Patents

Selective cross-realm authentication
Download PDF

Info

Publication number
US20130283354A1
US20130283354A1US13/920,857US201313920857AUS2013283354A1US 20130283354 A1US20130283354 A1US 20130283354A1US 201313920857 AUS201313920857 AUS 201313920857AUS 2013283354 A1US2013283354 A1US 2013283354A1
Authority
US
United States
Prior art keywords
realm
access
resource
authenticated
user
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Abandoned
Application number
US13/920,857
Inventor
Praerit Garg
Cliff Van Dyke
Karthik Jaganathan
Mark Pustilnik
Donald E. Schmidt
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Microsoft Technology Licensing LLC
Original Assignee
Microsoft Corp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Microsoft CorpfiledCriticalMicrosoft Corp
Priority to US13/920,857priorityCriticalpatent/US20130283354A1/en
Publication of US20130283354A1publicationCriticalpatent/US20130283354A1/en
Assigned to MICROSOFT TECHNOLOGY LICENSING, LLCreassignmentMICROSOFT TECHNOLOGY LICENSING, LLCASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS).Assignors: MICROSOFT CORPORATION
Assigned to MICROSOFT CORPORATIONreassignmentMICROSOFT CORPORATIONASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS).Assignors: GARG, PRAERIT, JAGANATHAN, KARTHIK, PUSTILNIK, MARK, SCHMIDT, DONALD E., VAN DYKE, CLIFF
Abandonedlegal-statusCriticalCurrent

Links

Images

Classifications

Definitions

Landscapes

Abstract

A selective cross-realm authenticator associates an identifier with a request from an entity authenticated in one realm to access a resource associated with a second realm. The identifier indicates that the entity was authenticated in a realm other than the realm associated with the requested resource. A domain controller associated with the resource performs an access check to verify that the authenticated user is authorized to authenticate to the requested resource. Permissions associated with the resource can be used to specify levels of access to be granted to entities authenticated by a domain controller associated with another realm.

Description

Claims (20)

1. A method comprising:
receiving, from an entity authenticated in a first realm, a request to access a resource associated with a second realm;
determining whether entities authenticated by other than the second realm are allowed access to the resource according to a selective trust relationship between the second realm and other realms that include the first realm;
in an event that entities authenticated by other than the second realm are allowed access to the resource:
determining other realm access permissions to be assigned to entities authenticated by other than the second realm, based on the selective trust relationship, wherein the other realm access permissions are different from second realm access permissions that are to be assigned to entities authenticated by the second realm; and
granting the entity access to the resource according to the other realm access permissions; and
in an event that entities authenticated by other than the second realm are not allowed to access the resource, refusing to grant the entity access to the resource.
US13/920,8572002-10-312013-06-18Selective cross-realm authenticationAbandonedUS20130283354A1 (en)

Priority Applications (1)

Application NumberPriority DateFiling DateTitle
US13/920,857US20130283354A1 (en)2002-10-312013-06-18Selective cross-realm authentication

Applications Claiming Priority (3)

Application NumberPriority DateFiling DateTitle
US10/285,175US7568218B2 (en)2002-10-312002-10-31Selective cross-realm authentication
US12/469,245US8510818B2 (en)2002-10-312009-05-20Selective cross-realm authentication
US13/920,857US20130283354A1 (en)2002-10-312013-06-18Selective cross-realm authentication

Related Parent Applications (1)

Application NumberTitlePriority DateFiling Date
US12/469,245ContinuationUS8510818B2 (en)2002-10-312009-05-20Selective cross-realm authentication

Publications (1)

Publication NumberPublication Date
US20130283354A1true US20130283354A1 (en)2013-10-24

Family

ID=32175107

Family Applications (3)

Application NumberTitlePriority DateFiling Date
US10/285,175Expired - Fee RelatedUS7568218B2 (en)2002-10-312002-10-31Selective cross-realm authentication
US12/469,245Expired - Fee RelatedUS8510818B2 (en)2002-10-312009-05-20Selective cross-realm authentication
US13/920,857AbandonedUS20130283354A1 (en)2002-10-312013-06-18Selective cross-realm authentication

Family Applications Before (2)

Application NumberTitlePriority DateFiling Date
US10/285,175Expired - Fee RelatedUS7568218B2 (en)2002-10-312002-10-31Selective cross-realm authentication
US12/469,245Expired - Fee RelatedUS8510818B2 (en)2002-10-312009-05-20Selective cross-realm authentication

Country Status (1)

CountryLink
US (3)US7568218B2 (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US20130283362A1 (en)*2012-04-192013-10-24Microsoft CorporationAuthenticating user through web extension using token based authentication scheme

Families Citing this family (70)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
CN1372201A (en)*2002-04-032002-10-02张平Novel network safety method
US8544084B2 (en)2002-08-192013-09-24Blackberry LimitedSystem and method for secure control of resources of wireless mobile communication devices
US20060171402A1 (en)*2003-03-062006-08-03Moore John AMethod and system for providing broadband multimedia services
US20040199768A1 (en)*2003-04-042004-10-07Nail Robert A.System and method for enabling enterprise application security
US7275259B2 (en)*2003-06-182007-09-25Microsoft CorporationSystem and method for unified sign-on
KR101060482B1 (en)*2003-07-242011-08-31코닌클리케 필립스 일렉트로닉스 엔.브이. Hybrid device and person-based licensed domain architecture
US20050108575A1 (en)*2003-11-182005-05-19Yung Chong M.Apparatus, system, and method for faciliating authenticated communication between authentication realms
EP1551146B1 (en)*2004-01-052011-08-24Ricoh Company, Ltd.Document security management for repeatedly reproduced hardcopy and electronic documents
US8606875B1 (en)*2004-06-302013-12-10Oracle America, Inc.Method and system for automatic distribution and installation of a client certificate in a secure manner
US8990254B2 (en)*2004-07-022015-03-24Ellie Mae, Inc.Loan origination software system for processing mortgage loans over a distributed network
US7617501B2 (en)2004-07-092009-11-10Quest Software, Inc.Apparatus, system, and method for managing policies on a computer having a foreign operating system
JP4696721B2 (en)*2005-06-272011-06-08富士ゼロックス株式会社 Document management server, document management system
US7904949B2 (en)2005-12-192011-03-08Quest Software, Inc.Apparatus, systems and methods to provide authentication services to a legacy application
JP4779678B2 (en)*2006-02-022011-09-28株式会社日立製作所 Context information management system
US8087075B2 (en)2006-02-132011-12-27Quest Software, Inc.Disconnected credential validation using pre-fetched service tickets
US7924780B2 (en)2006-04-122011-04-12Fon Wireless LimitedSystem and method for linking existing Wi-Fi access points into a single unified network
US9826102B2 (en)2006-04-122017-11-21Fon Wireless LimitedLinking existing Wi-Fi access points into unified network for VoIP
US8429712B2 (en)2006-06-082013-04-23Quest Software, Inc.Centralized user authentication system apparatus and method
JP4876734B2 (en)*2006-06-222012-02-15富士ゼロックス株式会社 Document use management system and method, document management server and program thereof
US8046823B1 (en)*2006-10-032011-10-25Stamps.Com Inc.Secure application bridge server
US7895332B2 (en)2006-10-302011-02-22Quest Software, Inc.Identity migration system apparatus and method
US8086710B2 (en)2006-10-302011-12-27Quest Software, Inc.Identity migration apparatus and method
JP5003131B2 (en)*2006-12-042012-08-15富士ゼロックス株式会社 Document providing system and information providing program
JP4305510B2 (en)*2006-12-282009-07-29富士ゼロックス株式会社 Information processing system, information processing apparatus, and program
JP5082460B2 (en)*2007-01-192012-11-28富士ゼロックス株式会社 Information processing apparatus, program, and information processing system
JP5023715B2 (en)*2007-01-252012-09-12富士ゼロックス株式会社 Information processing system, information processing apparatus, and program
JP2008257317A (en)*2007-04-022008-10-23Fuji Xerox Co LtdInformation processing apparatus, information processing system and program
US9769177B2 (en)*2007-06-122017-09-19Syracuse UniversityRole-based access control to computing resources in an inter-organizational community
JP2009042856A (en)*2007-08-072009-02-26Fuji Xerox Co LtdDocument management device, document management system, and program
US8332922B2 (en)*2007-08-312012-12-11Microsoft CorporationTransferable restricted security tokens
JP5119840B2 (en)*2007-10-022013-01-16富士ゼロックス株式会社 Information processing apparatus, information processing system, and program
US8839386B2 (en)2007-12-032014-09-16At&T Intellectual Property I, L.P.Method and apparatus for providing authentication
US8621561B2 (en)*2008-01-042013-12-31Microsoft CorporationSelective authorization based on authentication input attributes
US8220032B2 (en)*2008-01-292012-07-10International Business Machines CorporationMethods, devices, and computer program products for discovering authentication servers and establishing trust relationships therewith
US9735964B2 (en)*2008-06-192017-08-15Microsoft Technology Licensing, LlcFederated realm discovery
US8413222B1 (en)*2008-06-272013-04-02Symantec CorporationMethod and apparatus for synchronizing updates of authentication credentials
US10146926B2 (en)*2008-07-182018-12-04Microsoft Technology Licensing, LlcDifferentiated authentication for compartmentalized computing resources
US8887271B2 (en)*2009-06-152014-11-11Sap SeMethod and system for managing object level security using an object definition hierarchy
US20110004926A1 (en)*2009-07-012011-01-06International Business Machines CoporationAutomatically Handling Proxy Server and Web Server Authentication
US8255984B1 (en)2009-07-012012-08-28Quest Software, Inc.Single sign-on system for shared resource environments
US9426142B2 (en)*2010-06-072016-08-23Salesforce.Com, Inc.Systems and methods for logging into an application on a second domain from a first domain in a multi-tenant database system environment
EP2453631B1 (en)*2010-11-152016-06-22BlackBerry LimitedData source based application sandboxing
US9959415B1 (en)*2010-12-172018-05-01The Boeing CompanyMethods and systems for accessing data from different security domains
US8910300B2 (en)2010-12-302014-12-09Fon Wireless LimitedSecure tunneling platform system and method
CN103416020B (en)*2011-01-282015-12-23加拿大皇家铸币厂Controlled security domain
US20120291089A1 (en)*2011-05-132012-11-15Raytheon CompanyMethod and system for cross-domain data security
US9143498B2 (en)*2012-08-302015-09-22Aerohive Networks, Inc.Internetwork authentication
US10382202B1 (en)*2012-09-282019-08-13EMC IP Holding Company LLCMethod and apparatus for federated identity and authentication services
JP6255858B2 (en)*2012-10-312018-01-10株式会社リコー System and service providing apparatus
JP6102296B2 (en)*2013-02-062017-03-29株式会社リコー Information processing system, information processing apparatus, authentication method, and program
US9769056B2 (en)2013-03-152017-09-19Aerohive Networks, Inc.Gateway using multicast to unicast conversion
US9762679B2 (en)2013-03-152017-09-12Aerohive Networks, Inc.Providing stateless network services
US9621530B2 (en)*2013-06-282017-04-11Qualcomm IncorporatedTrust heuristic model for reducing control load in IoT resource access networks
US9300671B1 (en)*2013-12-302016-03-29Ca, Inc.Shared access with account restriction and promotion utilizing virtual accounts
US9992619B2 (en)2014-08-122018-06-05Aerohive Networks, Inc.Network device based proximity beacon locating
US10171447B2 (en)2015-06-152019-01-01Airwatch LlcSingle sign-on for unmanaged mobile devices
US10944738B2 (en)*2015-06-152021-03-09Airwatch, Llc.Single sign-on for managed mobile devices using kerberos
US10812464B2 (en)2015-06-152020-10-20Airwatch LlcSingle sign-on for managed mobile devices
US11057364B2 (en)*2015-06-152021-07-06Airwatch LlcSingle sign-on for managed mobile devices
US10158605B2 (en)*2015-11-242018-12-18Cisco Technology, Inc.Delegated access control of an enterprise network
US10372484B2 (en)2016-06-272019-08-06Microsoft Technology Licensing, LlcSecured computing system
CN106506521B (en)*2016-11-282020-08-07腾讯科技(深圳)有限公司Resource access control method and device
US11159511B1 (en)2019-01-102021-10-26Microstrategy IncorporatedAuthentication protocol management
US11552947B2 (en)*2019-07-102023-01-10Microsoft Technology Licensing, LlcHome realm discovery with flat-name usernames
US11765152B2 (en)*2019-07-252023-09-19Microsoft Technology Licensing, LlcRelated asset access based on proven primary asset access
CN112995097B (en)*2019-12-132023-09-22中兴通讯股份有限公司 Cross-domain access system, method and device
US11552943B2 (en)*2020-11-132023-01-10Cyberark Software Ltd.Native remote access to target resources using secretless connections
US11606351B2 (en)*2020-12-152023-03-14International Business Machines CorporationSecond factor based realm selection for federated authentications
US12261833B2 (en)2022-10-192025-03-25Delinea Inc.System and method for safely relaying and filtering Kerberos authentication and authorization requests across network boundaries
US12323428B2 (en)*2022-11-112025-06-03At&T Intellectual Property I, L.P.Federated identity verification and access control for public service entities

Citations (2)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US5815574A (en)*1994-12-151998-09-29International Business Machines CorporationProvision of secure access to external resources from a distributed computing environment
US20020150253A1 (en)*2001-04-122002-10-17Brezak John E.Methods and arrangements for protecting information in forwarded authentication messages

Family Cites Families (62)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US4853843A (en)*1987-12-181989-08-01Tektronix, Inc.System for merging virtual partitions of a distributed database
US4896319A (en)*1988-03-311990-01-23American Telephone And Telegraph Company, At&T Bell LaboratoriesIdentification and authentication of end user systems for packet communications network services
US5560008A (en)*1989-05-151996-09-24International Business Machines CorporationRemote authentication and authorization in a distributed data processing system
DE69031191T2 (en)*1989-05-151998-02-12Ibm System for controlling access privileges
US5048085A (en)1989-10-061991-09-10International Business Machines CorporationTransaction system security method and apparatus
US5120939A (en)1989-11-091992-06-09At&T Bell LaboratoriesDatabaseless security system
US4993068A (en)*1989-11-271991-02-12Motorola, Inc.Unforgeable personal identification system
US5073933A (en)1989-12-011991-12-17Sun Microsystems, Inc.X window security system
US5204961A (en)*1990-06-251993-04-20Digital Equipment CorporationComputer network operating with multilevel hierarchical security with selectable common trust realms and corresponding security protocols
US5224163A (en)*1990-09-281993-06-29Digital Equipment CorporationMethod for delegating authorization from one entity to another through the use of session encryption keys
US5557518A (en)*1994-04-281996-09-17Citibank, N.A.Trusted agents for open electronic commerce
US5313465A (en)*1992-05-131994-05-17Digital Equipment CorporationMethod of merging networks across a common backbone network
JPH05333775A (en)1992-06-031993-12-17Toshiba CorpUser authentication system
EP0581421B1 (en)*1992-07-202003-01-15Compaq Computer CorporationMethod and system for certificate based alias detection
US5235642A (en)*1992-07-211993-08-10Digital Equipment CorporationAccess control subsystem and method for distributed computer system using locally cached authentication credentials
US5577252A (en)*1993-07-281996-11-19Sun Microsystems, Inc.Methods and apparatus for implementing secure name servers in an object-oriented system
US5689700A (en)*1993-12-291997-11-18Microsoft CorporationUnification of directory service with file system services
US5497486A (en)*1994-03-151996-03-05Salvatore J. StolfoMethod of merging large databases in parallel
US5557678A (en)*1994-07-181996-09-17Bell Atlantic Network Services, Inc.System and method for centralized session key distribution, privacy enhanced messaging and information distribution using a split private key public cryptosystem
US5588061A (en)*1994-07-201996-12-24Bell Atlantic Network Services, Inc.System and method for identity verification, forming joint signatures and session key agreement in an RSA public cryptosystem
CA2223933C (en)1995-06-142001-02-06Novell, Inc.Method for managing globally distributed software components
US5991887A (en)*1996-02-281999-11-23Dallas Semiconductor CorporationLow power wake up circuitry, with internal power down of the wake up circuitry itself
US6466947B2 (en)*1998-03-202002-10-15Sun Microsystems, Inc.Apparatus and method for dynamically verifying information in a distributed system
US5978484A (en)*1996-04-251999-11-02Microsoft CorporationSystem and method for safety distributing executable objects
US5958050A (en)*1996-09-241999-09-28Electric CommunitiesTrusted delegation system
US5815571A (en)*1996-10-281998-09-29Finley; Phillip ScottComputer system with secured data paths and method of protection
US6167520A (en)1996-11-082000-12-26Finjan Software, Inc.System and method for protecting a client during runtime from hostile downloadables
US5915087A (en)*1996-12-121999-06-22Secure Computing CorporationTransparent security proxy for unreliable message exchange protocols
US5960084A (en)*1996-12-131999-09-28Compaq Computer CorporationSecure method for enabling/disabling power to a computer system following two-piece user verification
US5892905A (en)*1996-12-231999-04-06International Business Machines CorporationComputer apparatus and method for providing a common user interface for software applications accessed via the world-wide web
US5922074A (en)*1997-02-281999-07-13Xcert Software, Inc.Method of and apparatus for providing secure distributed directory services and public key infrastructure
US6105027A (en)*1997-03-102000-08-15Internet Dynamics, Inc.Techniques for eliminating redundant access checking by access filters
US5925126A (en)*1997-03-181999-07-20Memco Software, Ltd.Method for security shield implementation in computer system's software
US5991877A (en)*1997-04-031999-11-23Lockheed Martin CorporationObject-oriented trusted application framework
US6105012A (en)*1997-04-222000-08-15Sun Microsystems, Inc.Security system and method for financial institution server and client web browser
US6101255A (en)*1997-04-302000-08-08Motorola, Inc.Programmable cryptographic processing system and method
US5987608A (en)*1997-05-131999-11-16Netscape Communications CorporationJava security mechanism
WO1999007145A1 (en)*1997-08-011999-02-11Scientific-Atlanta, Inc.Verification of the source of program of information in a conditional access system
US6317868B1 (en)*1997-10-242001-11-13University Of WashingtonProcess for transparently enforcing protection domains and access control as well as auditing operations in software components
US6085191A (en)1997-10-312000-07-04Sun Microsystems, Inc.System and method for providing database access control in a secure distributed network
US6108788A (en)*1997-12-082000-08-22Entrust Technologies LimitedCertificate management system and method for a communication security system
US6965999B2 (en)*1998-05-012005-11-15Microsoft CorporationIntelligent trust management method and system
US6308273B1 (en)*1998-06-122001-10-23Microsoft CorporationMethod and system of security location discrimination
US6205480B1 (en)*1998-08-192001-03-20Computer Associates Think, Inc.System and method for web server user authentication
US6336096B1 (en)*1998-10-092002-01-01Donald V. JernbergSystem and method for evaluating liability
US6167445A (en)*1998-10-262000-12-26Cisco Technology, Inc.Method and apparatus for defining and implementing high-level quality of service policies in computer networks
US6081900A (en)*1999-03-162000-06-27Novell, Inc.Secure intranet access
US6957186B1 (en)*1999-05-272005-10-18Accenture LlpSystem method and article of manufacture for building, managing, and supporting various components of a system
US6339423B1 (en)*1999-08-232002-01-15Entrust, Inc.Multi-domain access control
US8719562B2 (en)*2002-10-252014-05-06William M. RandleSecure service network and user gateway
US7194764B2 (en)*2000-07-102007-03-20Oracle International CorporationUser authentication
US6826541B1 (en)*2000-11-012004-11-30Decision Innovations, Inc.Methods, systems, and computer program products for facilitating user choices among complex alternatives using conjoint analysis
US7062654B2 (en)*2000-11-102006-06-13Sri InternationalCross-domain access control
US7185364B2 (en)*2001-03-212007-02-27Oracle International CorporationAccess system interface
US7370351B1 (en)*2001-03-222008-05-06Novell, Inc.Cross domain authentication and security services using proxies for HTTP access
US6954792B2 (en)*2001-06-292005-10-11Sun Microsystems, Inc.Pluggable authentication and access control for a messaging system
US7010600B1 (en)*2001-06-292006-03-07Cisco Technology, Inc.Method and apparatus for managing network resources for externally authenticated users
GB2378010A (en)*2001-07-272003-01-29Hewlett Packard CoMulit-Domain authorisation and authentication
US6993596B2 (en)*2001-12-192006-01-31International Business Machines CorporationSystem and method for user enrollment in an e-community
US6892309B2 (en)*2002-02-082005-05-10Enterasys Networks, Inc.Controlling usage of network resources by a user at the user's entry point to a communications network based on an identity of the user
US20030177388A1 (en)*2002-03-152003-09-18International Business Machines CorporationAuthenticated identity translation within a multiple computing unit environment
NO318842B1 (en)*2002-03-182005-05-09Telenor Asa Authentication and access control

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US5815574A (en)*1994-12-151998-09-29International Business Machines CorporationProvision of secure access to external resources from a distributed computing environment
US20020150253A1 (en)*2001-04-122002-10-17Brezak John E.Methods and arrangements for protecting information in forwarded authentication messages

Cited By (2)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US20130283362A1 (en)*2012-04-192013-10-24Microsoft CorporationAuthenticating user through web extension using token based authentication scheme
US8898764B2 (en)*2012-04-192014-11-25Microsoft CorporationAuthenticating user through web extension using token based authentication scheme

Also Published As

Publication numberPublication date
US20040088543A1 (en)2004-05-06
US7568218B2 (en)2009-07-28
US20090228969A1 (en)2009-09-10
US8510818B2 (en)2013-08-13

Similar Documents

PublicationPublication DateTitle
US8510818B2 (en)Selective cross-realm authentication
CN112637214B (en)Resource access method and device and electronic equipment
US9332019B2 (en)Establishment of a trust index to enable connections from unknown devices
CN111416822B (en)Method for access control, electronic device and storage medium
US7237118B2 (en)Methods and systems for authentication of a user for sub-locations of a network location
US7845003B2 (en)Techniques for variable security access information
US7092942B2 (en)Managing secure resources in web resources that are accessed by multiple portals
US9166966B2 (en)Apparatus and method for handling transaction tokens
US8904549B2 (en)Server system, control method, and storage medium for securely executing access to data of a tenant
US8572686B2 (en)Method and apparatus for object transaction session validation
US8990896B2 (en)Extensible mechanism for securing objects using claims
US8281374B2 (en)Attested identities
US20060184646A1 (en)Authentication and Authorization Across Autonomous Network Systems
US20140123207A1 (en)Keystore access control system
US20080034412A1 (en)System to prevent misuse of access rights in a single sign on environment
WO2007047798A1 (en)Method and apparatus for providing secure access control for protected information
US8572690B2 (en)Apparatus and method for performing session validation to access confidential resources
US8572724B2 (en)Method and apparatus for network session validation
US20240248979A1 (en)Persistent source values for assumed alternative identities
US20080271114A1 (en)System for providing and utilizing a network trusted context
US8726335B2 (en)Consigning authentication method
US8726340B2 (en)Apparatus and method for expert decisioning
US20070079116A1 (en)Method, system and computer program product for access control
US8572688B2 (en)Method and apparatus for session validation to access third party resources
CN119402221A (en) A dynamic management and control architecture, method and system for cross-region and cross-domain data sharing

Legal Events

DateCodeTitleDescription
ASAssignment

Owner name:MICROSOFT TECHNOLOGY LICENSING, LLC, WASHINGTON

Free format text:ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:MICROSOFT CORPORATION;REEL/FRAME:034544/0541

Effective date:20141014

ASAssignment

Owner name:MICROSOFT CORPORATION, WASHINGTON

Free format text:ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:GARG, PRAERIT;VAN DYKE, CLIFF;JAGANATHAN, KARTHIK;AND OTHERS;REEL/FRAME:038182/0023

Effective date:20021030

STCBInformation on status: application discontinuation

Free format text:ABANDONED -- FAILURE TO RESPOND TO AN OFFICE ACTION


[8]ページ先頭

©2009-2025 Movatter.jp