Patents by Inventor Aidan T. Hughes

Aidan T. Hughes has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 7644314
    Abstract: Retroactive verbose error logging may be provided. Loggable event entries associated with software installation during installation may be saved. Each of the loggable event entries may have a first level or a second level. In addition, the loggable event entries associated with the first level and the second level may be saved to a log file if an error occurs during the software installation. Furthermore, the loggable event entries associated only with the first level may be saved to the log file if a milestone occurs during the software installation and the error has not occurred before the milestone occurs. The software installation may be stopped if the error occurs during the software installation and the software installation may continue if the milestone occurs during the software installation.
    Type: Grant
    Filed: March 28, 2006
    Date of Patent: January 5, 2010
    Assignee: Microsoft Corporation
    Inventors: Scott E. Kurtzeborn, Mark L. Epstein, Aidan T. Hughes
  • Patent number: 7610296
    Abstract: An entry for a file to be stored in a file system can be created. A priority is assigned to the file that indicates an importance of the file relative to a plurality of additional files stored in the file system, the priority being one of three or more priorities available to files in the file system. Additionally, one or more of the files that are associated with the lowest priority values can be automatically deleted.
    Type: Grant
    Filed: December 17, 2004
    Date of Patent: October 27, 2009
    Assignee: Microsoft Corporation
    Inventors: Aidan T. Hughes, Paul C. Barr
  • Patent number: 7594225
    Abstract: An integrated application setup enables the generation and expression of application customization intent in a generic manner that is indifferent to the way in which the customization intent is implemented. A customization application integrates the process of customizing a target application with the standard setup process for the target application. The customization application allows a user to review customization options for the target application and to specify customization intent through an application configuration user interface (UI). The customization application then generates customization XML that expresses the user's customization intent.
    Type: Grant
    Filed: December 20, 2004
    Date of Patent: September 22, 2009
    Assignee: Microsoft Corporation
    Inventors: Paul C. Barr, John P. Jennings, Aidan T. Hughes
  • Publication number: 20090193392
    Abstract: Embodiments are directed to providing intermediate language (IL) code on a per-method basis for at least one method of a binary. In one embodiment, a computer system selects a method from among various methods included in a binary file, where the methods are configured to perform various intended functions for an application. The computer system appends a descriptive marker to the selected method indicating how to obtain IL code that is to be included in the body of the selected method, receives a command to execute the selected method, and refers to the appended descriptive marker to generate an IL code request based on the indication in the descriptive marker. The computer system submits the generated IL code request to one or more IL code providers to request IL code for the selected method, receives the requested IL code for the selected method and inserts the IL code into the body of the selected method.
    Type: Application
    Filed: January 29, 2008
    Publication date: July 30, 2009
    Inventors: Michael David Downen, Aidan T. Hughes, Jonathan W. Keljo, Simon J. Hall, Xia Li, Raja Krishnaswarny, Atsushi Kanamori
  • Patent number: 7565323
    Abstract: In one embodiment, the invention is a 64 bit hardware ID (H/W ID) for tying a software product to a particular computer to prevent software piracy. The 64 bit hardware ID represents ten different components of the user's computer: the CD-ROM device, the disk adapter, the disk device, the display adapter, the first drive serial number, the MAC address, the processor serial number, the processor type, the RAM size in Mb, and the SCSI adapter. Each time the software product is opened, the expanded H/W ID is compared to the hardware on the computer to determine whether a predetermined minimum number of components match. In one embodiment, the expanded H/W ID allows for expansion of the user's computer because so long as the component originally listed in the expanded H/W ID can be found on the computer, then that component matches the expanded H/W ID. Typically, seven out of ten components in the expanded HIW ID must match the computer before the software product will fully operate.
    Type: Grant
    Filed: September 23, 2003
    Date of Patent: July 21, 2009
    Assignee: Microsoft Corporation
    Inventors: Aidan T. Hughes, David Barnaby Pearce
  • Patent number: 7503072
    Abstract: In one embodiment, the invention is a 64 bit hardware ID (H/W ID) for tying a software product to a particular computer to prevent software piracy. The 64 bit hardware ID represents ten different components of the user's computer: the CD-ROM device, the disk adapter, the disk device, the display adapter, the first drive serial number, the MAC address, the processor serial number, the processor type, the RAM size in Mb, and the SCSI adapter. Each time the software product is opened, the expanded H/W ID is compared to the hardware on the computer to determine whether a predetermined minimum number of components match. In one embodiment, the expanded H/W ID allows for expansion of the user's computer because so long as the component originally listed in the expanded H/W ID can be found on the computer, then that component matches the expanded H/W ID. Typically, seven out of ten components in the expanded H/W ID must match the computer before the software product will fully operate.
    Type: Grant
    Filed: May 17, 2001
    Date of Patent: March 10, 2009
    Assignee: Microsoft Corporation
    Inventors: Aidan T. Hughes, David Barnaby Pearce
  • Publication number: 20080319779
    Abstract: Techniques are described for generating a license for software installed on a device. An entitlement certificate is generated including one or more entitlements describing license characteristics of the software. The one or more entitlements are determined in accordance with first information about the software. The first information includes at least one of a purchase token and package information. A binding certificate in accordance with a binding type for the software is generated. A license in accordance with said binding certificate and said entitlement certificate is generated. The binding certificate identifies an entity to which the license is bound.
    Type: Application
    Filed: June 25, 2007
    Publication date: December 25, 2008
    Applicant: Microsoft Corporation
    Inventors: Aidan T. Hughes, Alexander V. Baxter, Mark Kenworthy, Alexander Frank, Oliver Szimmetat
  • Publication number: 20080189549
    Abstract: A serial number for a software product is secured with an authenticator value. The authenticator value and the serial number are evaluated entirely by a remote authentication server such that no cryptographic authentication occurs on a local computer on which the software product is being installed. An abbreviated portion of the authenticator value is used for offline authentication.
    Type: Application
    Filed: February 1, 2007
    Publication date: August 7, 2008
    Applicant: Microsoft Corporation
    Inventor: Aidan T. Hughes
  • Publication number: 20080172560
    Abstract: Embodiments of the present invention relate to systems and methods to authenticate software licenses. One embodiment of the present invention comprises a method where a vendor creates a reversible hash from a known, predetermined seed value, encrypts the hash to generate a digital signature, and sends the digital signature to the customer. The customer enters the digital signature. The customer's client computer reverses the reversible hash to obtain a determined seed value. The client has access to the known seed value used by the vendor. The known seed value is compared to the determined seed value. If the seed values compare, the software license and the associated software is authenticate.
    Type: Application
    Filed: January 15, 2007
    Publication date: July 17, 2008
    Applicant: Microsoft Corporation
    Inventors: Aidan T. Hughes, Vladimir Tankovich
  • Patent number: 7379918
    Abstract: A method for reactivation of software products includes activating a first software product associated with a reactivation policy group. A hardware identifier derived from the computer hardware configuration is bound with the first software product activation. A second software product is activated having an associated reactivation binding list. Reactivation is requested for the first software product and an updated hardware identifier is associated with a reactivation policy group of the first software product. The second software product may be spared the request for reactivation if the second product can be associated with the reactivation of the first software product given the binding list is compatible with the reactivation policy group.
    Type: Grant
    Filed: July 30, 2004
    Date of Patent: May 27, 2008
    Assignee: Microsoft Corporation
    Inventors: Xiaoxi Tan, Caglar Gunyakti, Ravindra Nath Pandya, Aidan T. Hughes, Kristjan Hatlelid, Yue Liu
  • Patent number: 7346585
    Abstract: Integrated computer services and software licensing processing methods and systems are provided. A license processing service (LPS) receives a services or software license request from a user via a client computer. The LPS communicates the request to a billing system for the services or software provider to obtain an expiration date for use of a desired service or software product. The LPS receives and forwards the expiration date from the billing system to a licensing clearinghouse operated by the provider of the desired service or software product. The clearinghouse, in turn, provides a use license for the desired service or software application to the client computer via the LPS.
    Type: Grant
    Filed: February 28, 2003
    Date of Patent: March 18, 2008
    Assignee: Microsoft Corporation
    Inventors: Ferdinand Jay Alabraba, Aidan T. Hughes, Matthew William Pearson
  • Patent number: 7308542
    Abstract: The present invention leverages selections of data locations and comparative analysis of data values stored in these locations to provide a secure means of maintaining data integrity with minimal computational burdens. This provides, in one instance of the present invention, a tamper-resistant process to ensure that software application usage data is protected from malicious attacks. By storing and recalling data in an untraceable fashion, the present invention substantially increases the effort required to spoof the stored data. Additionally, comparative analysis is utilized with the randomized approach to facilitate in maintaining consistency of the stored data both in retrieval of information and when storing new data values. This allows checking of the data prior to overwriting sensitive data, thwarting malicious attacks that spoof new data as a means to alter the stored data.
    Type: Grant
    Filed: June 23, 2004
    Date of Patent: December 11, 2007
    Assignee: Microsoft Corporation
    Inventors: R. David Chicks, Aidan T. Hughes, Jay Ferdinand N. Alabraba, Jr.
  • Patent number: 7302590
    Abstract: Systems and methods for implementing a hardware ID with time- and weight-based flexibility use a hardware ID (HWID) including identifying information about hardware components. When software is run, a current HWID is generated. When the current HWID is compared to a stored HWID to determine if the two HWIDs match, a time vector and a weight vector are used in the comparison. A running matching score is kept of matches. For each hardware component, the weight vector indicates the weight given to a correct match of the hashed value for the hardware component. For example, if the weight value for the hardware component is three and there is a match, then the running total is increased by three. For each hardware component, the time vector may indicate an expiration period after which a change in the component may be allowed.
    Type: Grant
    Filed: January 6, 2003
    Date of Patent: November 27, 2007
    Assignee: Microsoft Corporation
    Inventors: Pratul Dublish, Caglar Gunyakti, Aidan T. Hughes
  • Patent number: 7296294
    Abstract: Systems and methods for binding a secret to a computer system are disclosed. Systems and methods for generating a strong hardware identification (SHWID) for a given computer system are also disclosed. The strong hardware identification (SHWID) is coupled to a bound secret. The strong hardware identification (SHWID) may be used to control the use of software on the given computer system depending on the degree of hardware changes to the computer system.
    Type: Grant
    Filed: March 3, 2003
    Date of Patent: November 13, 2007
    Assignee: Microsoft Corporation
    Inventor: Aidan T. Hughes
  • Patent number: 7290149
    Abstract: Systems and methods for generating a verbose hardware identification (VHWID) for a given computer system are disclosed. The verbose hardware identification (VHWID) may be used to control the use of software on the given computer system depending on the degree of hardware changes to the computer system.
    Type: Grant
    Filed: March 3, 2003
    Date of Patent: October 30, 2007
    Assignee: Microsoft Corporation
    Inventors: Ferdinand Jay Alabraba, Aidan T. Hughes, Caglar Gunyakti
  • Patent number: 7278131
    Abstract: Systems and methods for generating a-compact hardware identification (CHWID) for a given computer system are disclosed. The compact hardware identification (CHWID) may be used to control the use of software on the given computer system depending on the degree of hardware changes to the computer system. The compact hardware identification (CHWID) may be electronically transmitted over limited bandwidth media, such as a telephone.
    Type: Grant
    Filed: March 3, 2003
    Date of Patent: October 2, 2007
    Assignee: Microsoft Corporation
    Inventors: Caglar Gunyakti, Ferdinand Jay Alabraba, Aidan T. Hughes
  • Patent number: 7257712
    Abstract: Systems and methods for providing incremental verification of the authenticity of a document for a given computer system are disclosed.
    Type: Grant
    Filed: May 30, 2003
    Date of Patent: August 14, 2007
    Assignee: Microsoft Corporation
    Inventors: Aidan T. Hughes, Joel Downer, Raymond Fowkes
  • Publication number: 20040243807
    Abstract: Systems and methods for providing incremental verification of the authenticity of a document for a given computer system are disclosed.
    Type: Application
    Filed: May 30, 2003
    Publication date: December 2, 2004
    Applicant: Microsoft Corporation
    Inventors: Aidan T. Hughes, Joel Downer, Raymond Fowkes
  • Publication number: 20040177255
    Abstract: Systems and methods for binding a secret to a computer system are disclosed. Systems and methods for generating a strong hardware identification (SHWID) for a given computer system are also disclosed. The strong hardware identification (SHWID) is coupled to a bound secret. The strong hardware identification (SHWID) may be used to control the use of software on the given computer system depending on the degree of hardware changes to the computer system.
    Type: Application
    Filed: March 3, 2003
    Publication date: September 9, 2004
    Applicant: Microsoft Corporation
    Inventor: Aidan T. Hughes
  • Publication number: 20040177168
    Abstract: Systems and methods for generating a verbose hardware identification (VHWID) for a given computer system are disclosed. The verbose hardware identification (VHWID) may be used to control the use of software on the given computer system depending on the degree of hardware changes to the computer system.
    Type: Application
    Filed: March 3, 2003
    Publication date: September 9, 2004
    Applicant: Microsoft Corporation
    Inventors: Ferdinand Jay Alabraba, Aidan T. Hughes, Caglar Gunyakti