Patents by Inventor Adam G. Poulos

Adam G. Poulos has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20090187772
    Abstract: Various techniques are described to protect secrets held by closed computing devices. In an ecosystem where devices operate and are offered a wide range of services from a service provider, the service provider may want to prevent users from sharing services between devices. In order to guarantee that services are not shared between devices, each device can be manufactured with a different set of secrets such as per device identifiers. Unscrupulous individuals may try to gain access to the secrets and transfer secrets from one device to another. In order to prevent this type of attack, each closed computing system can be manufactured to include a protected memory location that is tied to the device.
    Type: Application
    Filed: January 18, 2008
    Publication date: July 23, 2009
    Applicant: Microsoft Corporation
    Inventors: Sebastian Lange, Victor Tan, Adam G. Poulos
  • Publication number: 20090119475
    Abstract: Systems, methods, and computer readable media are disclosed for making dictionary based attacks difficult and/or time consuming for attackers. In one example embodiment, this can be accomplished by equipping a security service with software and/or circuitry operable to select security questions from different partitions of a question table.
    Type: Application
    Filed: January 18, 2008
    Publication date: May 7, 2009
    Applicant: Microsoft Corporation
    Inventors: Sebastian Lange, Victor Tan, Adam G. Poulos
  • Publication number: 20090119744
    Abstract: Various embodiments of the present disclosure describe techniques for enforcing a subcomponent related security policy for closed computing systems. A closed computing system can include a list of subcomponents that identify the subcomponents it was manufactured with. The list can be used to determine if any currently attached subcomponents are different than the original ones. If a new subcomponent is detected, the device can perform a predetermined action in accordance with a security policy.
    Type: Application
    Filed: January 18, 2008
    Publication date: May 7, 2009
    Applicant: Microsoft Corporation
    Inventors: Sebastian Lange, Victor Tan, Adam G. Poulos