Patents by Inventor Arthur H. Baker
Arthur H. Baker has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 9686274Abstract: In one embodiment, a user login device may create a user identifier template 400 for identifying a user by implicitly capturing one or more biometric identifier readings. A user login device may capture an enrollment biometric identifier reading of a user during an operational user action. The user login device may apply the enrollment biometric identifier reading in creating a user identifier template 400.Type: GrantFiled: October 11, 2013Date of Patent: June 20, 2017Assignee: Microsoft Technology Licensing, LLCInventors: Himanshu Soni, Vijay Bharadwaj, Arthur H. Baker, Gopinathan Kannan, Ryan Segeberg, Nelly Porter
-
Patent number: 9330513Abstract: The techniques and systems disclosed herein pertain to preventing unauthorized access to computing resources by unauthorized persons by deploying biometric security. To implement biometric security, the computing device, possibly by the OS, may obtain samples of one or more biometric factors unique to the owner. The computing device may construct pattern-matching templates corresponding to the biometric samples, which may be stored for later use when a protected resource is requested. Computing resources may be selected for protection by a biometric security mechanism by an authorized user or by other techniques or default settings. Before allowing certain restricted actions, the OS may request that the user provide one of the previously registered biometric samples. If the biometric sample matches the user's stored pattern-matching template, the OS may grant access to the computing resource, otherwise, the OS may deny access to the computing resource.Type: GrantFiled: September 5, 2013Date of Patent: May 3, 2016Assignee: Microsoft Technology Licensing, LLCInventors: Himanshu Soni, Karanbir Singh, Arthur H. Baker, Vijay G. Bharadwaj, Nelly L. Porter, Violet Anna Barhudarian, John D. T. Wood, Jeffrey E. Shipman, Jeremy D. Viegas
-
Publication number: 20150106891Abstract: In one embodiment, a user login device may create a user identifier template 400 for identifying a user by implicitly capturing one or more biometric identifier readings. A user login device may capture an enrollment biometric identifier reading of a user during an operational user action. The user login device may apply the enrollment biometric identifier reading in creating a user identifier template 400.Type: ApplicationFiled: October 11, 2013Publication date: April 16, 2015Applicant: Microsoft CorporationInventors: Himanshu Soni, Vijay Bharadwaj, Arthur H. Baker, Gopinathan Kannan, Ryan Segeberg, Nelly Porter
-
Publication number: 20140354401Abstract: The techniques and systems disclosed herein pertain to preventing unauthorized access to computing resources by unauthorized persons by deploying biometric security. To implement biometric security, the computing device, possibly by the OS, may obtain samples of one or more biometric factors unique to the owner. The computing device may construct pattern-matching templates corresponding to the biometric samples, which may be stored for later use when a protected resource is requested. Computing resources may be selected for protection by a biometric security mechanism by an authorized user or by other techniques or default settings. Before allowing certain restricted actions, the OS may request that the user provide one of the previously registered biometric samples. If the biometric sample matches the user's stored pattern-matching template, the OS may grant access to the computing resource, otherwise, the OS may deny access to the computing resource.Type: ApplicationFiled: September 5, 2013Publication date: December 4, 2014Applicant: Microsoft CorporationInventors: Himanshu Soni, Karanbir Singh, Arthur H. Baker, Vijay G. Bharadwaj, Nelly L. Porter, Violet Anna Barhudarian, John D. T. Wood, Jeffrey E. Shipman, Jeremy D. Viegas
-
Patent number: 8838991Abstract: A biometric identity broker can obtain exclusive control of biometric sensors communicationally coupled to a computing device, and can create biometric unit components for each of the sensors. Each biometric unit component can utilize a sensor plug-in, a processing plug-in and a storage plug-in, that can either be provided with the sensor or can be default plug-ins, in order to provide a baseline level of functionality irrespective of the functionality provided by, or with, the sensor to which the biometric unit is associated. A factor-specific service provider can act across all biometric units associated with sensors directed to a common biometric factor and can arbitrate among multiple clients simultaneously awaiting input and can manage multiple identities associated with a single biometric template based on the sensor receiving the biometric input. The biometric identity broker, factor-specific service providers and biometric units can be part of the trusted computing base.Type: GrantFiled: April 1, 2009Date of Patent: September 16, 2014Assignee: Microsoft CorporationInventor: Arthur H. Baker
-
Patent number: 8683549Abstract: A computer related security mechanism requires that a human participate in an access verification sequence. Upon a request to access secure data, a puzzle is provided to the requester. Proper solution of the puzzle requires human participation. The puzzle is chosen such that its solution is within the capabilities of a human, but beyond the current state of the art for computer systems. The puzzled can be visually and/or audibly rendered to the user. In one configuration, the puzzle is obtained via a library of pluggable puzzle generators. Puzzle generators in the library can be replaced as the state of the art of computing technology improves.Type: GrantFiled: March 23, 2007Date of Patent: March 25, 2014Assignee: Microsoft CorporationInventors: Arthur H. Baker, Brian J. Guarraci, Andrew Stewart Tucker, Gennady Medvinsky, Tanmoy Dutta
-
Patent number: 8675926Abstract: Multiple images including a face presented by a user are accessed. One or more determinations are made based on the multiple images, such as a determination of whether the face included in the multiple images is a 3-dimensional structure or a flat surface and/or a determination of whether motion is present in one or more face components (e.g., eyes or mouth). If it is determined that the face included in the multiple images is a 3-dimensional structure or that that motion is present in the one or more face components, then an indication is provided that the user can be authenticated. However, if it is determined that the face included in the multiple images is a flat surface or that motion is not present in the one or more face components, then an indication is provided that the user cannot be authenticated.Type: GrantFiled: June 8, 2010Date of Patent: March 18, 2014Assignee: Microsoft CorporationInventors: Zhengyou Zhang, Qin Cai, Pieter R. Kasselman, Arthur H. Baker
-
Patent number: 8607299Abstract: A method and system for enforcing a security policy encoded in an instruction set of a security virtual machine is provided. A security system provides a security virtual machine that executes security programs expressed in the instruction set of the security virtual machine. The security system stores the security program in an instruction store of the security virtual machine. When a security enforcement event occurs, the security virtual machine executes the instructions of its instruction store using data of the security enforcement event to enforce the security policy.Type: GrantFiled: April 27, 2004Date of Patent: December 10, 2013Assignee: Microsoft CorporationInventor: Arthur H. Baker
-
Publication number: 20110299741Abstract: Multiple images including a face presented by a user are accessed. One or more determinations are made based on the multiple images, such as a determination of whether the face included in the multiple images is a 3-dimensional structure or a flat surface and/or a determination of whether motion is present in one or more face components (e.g., eyes or mouth). If it is determined that the face included in the multiple images is a 3-dimensional structure or that that motion is present in the one or more face components, then an indication is provided that the user can be authenticated. However, if it is determined that the face included in the multiple images is a flat surface or that motion is not present in the one or more face components, then an indication is provided that the user cannot be authenticated.Type: ApplicationFiled: June 8, 2010Publication date: December 8, 2011Applicant: Microsoft CorporationInventors: Zhengyou Zhang, Qin Cai, Pieter R. Kasselman, Arthur H. Baker
-
Publication number: 20100257369Abstract: A biometric identity broker can obtain exclusive control of biometric sensors communicationally coupled to a computing device, and can create biometric unit components for each of the sensors. Each biometric unit component can utilize a sensor plug-in, a processing plug-in and a storage plug-in, that can either be provided with the sensor or can be default plug-ins, in order to provide a baseline level of functionality irrespective of the functionality provided by, or with, the sensor to which the biometric unit is associated. A factor-specific service provider can act across all biometric units associated with sensors directed to a common biometric factor and can arbitrate among multiple clients simultaneously awaiting input and can manage multiple identities associated with a single biometric template based on the sensor receiving the biometric input. The biometric identity broker, factor-specific service providers and biometric units can be part of the trusted computing base.Type: ApplicationFiled: April 1, 2009Publication date: October 7, 2010Applicant: MICROSOFT CORPORATIONInventor: Arthur H. Baker
-
Patent number: 7779465Abstract: A system and method for distributed peer attack alerting is disclosed. The method includes accessing a peer community wherein the peer community comprises a plurality of nodes comprising a network and wherein at least one of the plurality of nodes comprises an attack identifier. The method further includes identifying an attack at one of the plurality of nodes. In addition, the method includes transmitting an alert to the plurality of nodes, the alert comprising information associated with the attack and automatically configuring at least one attack identifier associated with one of the plurality of nodes in response to the alert.Type: GrantFiled: May 26, 2006Date of Patent: August 17, 2010Assignee: Microsoft CorporationInventors: Arthur H. Baker, Gregory D. Hartrell, Carl Ellison
-
Publication number: 20080320554Abstract: A computer related security mechanism requires that a human participate in an access verification sequence. Upon a request to access secure data, a puzzle is provided to the requester. Proper solution of the puzzle requires human participation. The puzzle is chosen such that its solution is within the capabilities of a human, but beyond the current state of the art for computer systems. The puzzled can be visually and/or audibly rendered to the user. In one configuration, the puzzle is obtained via a library of pluggable puzzle generators. Puzzle generators in the library can be replaced as the state of the art of computing technology improves.Type: ApplicationFiled: March 23, 2007Publication date: December 25, 2008Applicant: Microsoft CorporationInventors: Arthur H. Baker, Brian J. Guarraci, Andrew Stewart Tucker, Gennady Medvinsky, Tanmoy Dutta
-
Publication number: 20070277242Abstract: A system and method for distributed peer attack alerting is disclosed. The method includes accessing a peer community wherein the peer community comprises a plurality of nodes comprising a network and wherein at least one of the plurality of nodes comprises an attack identifier. The method further includes identifying an attack at one of the plurality of nodes. In addition, the method includes transmitting an alert to the plurality of nodes, the alert comprising information associated with the attack and automatically configuring at least one attack identifier associated with one of the plurality of nodes in response to the alert.Type: ApplicationFiled: May 26, 2006Publication date: November 29, 2007Applicant: Microsoft CorporationInventors: Arthur H. Baker, Gregory D. Hartrell, Carl Ellison