Patents by Inventor Cem Paya

Cem Paya has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 8239927
    Abstract: Computer-readable media, systems, and methods for validating an authentication ticket to ensure authenticated communications between a client and an online service provider. In embodiments an authentication request is received from a user agent associated with the client and the authentication request includes a set of identification information and a set of authentication information. Additionally, it is determined that the set of identification information and the set of authentication information are associated with a user and an authentication ticket is created including a user identification and an authentication, indicating to the online service provider that the user is authenticated to access one or more online services. Further, a validation token is embedded into the authentication ticket that provides enhanced verification that the access provided by the online service provider is authenticated.
    Type: Grant
    Filed: February 29, 2008
    Date of Patent: August 7, 2012
    Assignee: Microsoft Corporation
    Inventors: Josh D. Benaloh, Ismail Cem Paya
  • Publication number: 20120159148
    Abstract: Systems, methods, computer programs, and devices are disclosed herein for deploying a local trusted service manager within a secure element of a contactless smart card device. The secure element is a component of a contactless smart card incorporated into a contactless smart card device. An asymmetric cryptography algorithm is used to generate public-private key pairs. The private keys are stored in the secure element and are accessible by a trusted service manager (TSM) software application or a control software application in the secure element. A non-TSM computer with access to the public key encrypts and then transmits encrypted application data or software applications to the secure element, where the TSM software application decrypts and installs the software application to the secure element for transaction purposes.
    Type: Application
    Filed: September 26, 2011
    Publication date: June 21, 2012
    Applicant: GOOGLE Inc.
    Inventors: Rob von Behren, Jonathan Wall, Ismail Cem Paya
  • Publication number: 20120159195
    Abstract: Systems, methods, computer programs, and devices are disclosed herein for partitioning the namespace of a secure element in contactless smart card devices and for writing application data in the secure element using requests from a software application outside the secure element. The secure element is a component of a contactless smart card incorporated into a contactless smart card device. A control software application resident in the same or a different secure element provides access types and access bits, for each access memory block of the secure element namespace, thereby portioning the namespace into different access types. Further, a software application outside the secure element manages the control software application by passing commands using a secure channel to the secure element, thereby enabling an end-user of the contactless smart card device or a remote computer to control the partitioning and use of software applications within the secure element.
    Type: Application
    Filed: September 26, 2011
    Publication date: June 21, 2012
    Applicant: GOOGLE Inc.
    Inventors: Rob von Behren, Jonathan Wall, Ismail Cem Paya, Alexej Muehlberg, Hauke Meyn
  • Publication number: 20120159163
    Abstract: Systems, methods, computer programs, and devices are disclosed herein for deploying a local trusted service manager within a secure element of a contactless smart card device. The secure element is a component of a contactless smart card incorporated into a contactless smart card device. An asymmetric cryptography algorithm is used to generate public-private key pairs. The private keys are stored in the secure element and are accessible by a trusted service manager (TSM) software application or a control software application in the secure element. A non-TSM computer with access to the public key encrypts and then transmits encrypted application data or software applications to the secure element, where the TSM software application decrypts and installs the software application to the secure element for transaction purposes.
    Type: Application
    Filed: September 17, 2011
    Publication date: June 21, 2012
    Applicant: GOOGLE Inc.
    Inventors: Rob von BEHREN, Jonathan Wall, Ismail Cem Paya
  • Publication number: 20120159105
    Abstract: Systems, methods, computer programs, and devices are disclosed herein for partitioning the namespace of a secure element in contactless smart card devices and for writing application data in the secure element using requests from a software application outside the secure element. The secure element is a component of a contactless smart card incorporated into a contactless smart card device. A control software application resident in the same or a different secure element provides access types and access bits, for each access memory block of the secure element namespace, thereby portioning the namespace into different access types. Further, a software application outside the secure element manages the control software application by passing commands using a secure channel to the secure element, thereby enabling an end-user of the contactless smart card device or a remote computer to control the partitioning and use of software applications within the secure element.
    Type: Application
    Filed: September 26, 2011
    Publication date: June 21, 2012
    Applicant: Google Inc.
    Inventors: Rob von BEHREN, Jonathan Wall, Ismail Cem Paya, Alexej Muehlberg, Hauke Meyn
  • Patent number: 8166406
    Abstract: A method and system that provide an intuitive user interface and related components for making Internet users aware of Internet cookie-related privacy issues, and enabling users to control Internet privacy through automatic cookie handling. Default privacy settings for handling cookies are provided, and through the user interface, the privacy settings may be customized to a user's liking. Further, through the user interface, for each individual site that forms a page of content, the site's privacy policy may be reviewed and/or the privacy controlled by specifying how cookies from that site are to be handled. To make users aware, the user interface provides an active alert on a first instance of a retrieved web site's content that fails to include satisfactory privacy information, and thereafter, provides a distinctive passive alert to allow the user selective access to privacy information, per-site cookie handling and cookie handling settings.
    Type: Grant
    Filed: June 28, 2002
    Date of Patent: April 24, 2012
    Assignee: Microsoft Corporation
    Inventors: Aaron Goldfeder, Cem Paya, Joseph J. Gallagher, Roberto A. Franco, Stephen J. Purpura, Darren Mitchell, Frank M. Schwieterman, Viresh Ramdatmisier
  • Publication number: 20120079585
    Abstract: Embodiments of proxy authentication and indirect certificate chaining are described herein. In an implementation, authentication for a client occurs via a proxy service. Proxy service communicates between client and server, and caches security tokens on behalf of the client. In an implementation, trustworthiness of certificate presented to a client to establish trust is determined utilizing a signed data package which incorporates a plurality of known certificates. The presented certificate is verified without utilizing root certificates installed on the client device.
    Type: Application
    Filed: December 6, 2011
    Publication date: March 29, 2012
    Applicant: MICROSOFT CORPORATION
    Inventors: Kok Wai Chan, Colin Chow, Trevin M. Chow, Lin Huang, Ryan Hurst, Naresh Jain, Wei Jiang, Yordan I. Rouskov, Pui-Yin Winfred Wong, Ismail Cem Paya, Ryan Hurst
  • Patent number: 8090954
    Abstract: A forwarding signature comprises a modified digital signature, modified using a predetermined parameter between a sender and an intended recipient. An intended recipient of the forwarding signature can verify that the forwarding signature corresponds to the message, but, can neither derive the original digital signature nor generate a new forwarding signature for a different parameter. Generation and verification of the forwarding signature is accomplished with access to the public key of a public/private cryptographic key pair, the original signed message, and the predetermined parameter. Access to the private key is not needed.
    Type: Grant
    Filed: March 16, 2007
    Date of Patent: January 3, 2012
    Assignee: Microsoft Corporation
    Inventors: Cem Paya, Josh Benaloh
  • Patent number: 8087073
    Abstract: A system enabling an application desiring access to a resource addressable by a URI to produce a response to an authentication challenge to a request to access the URI without including code specific to an authentication system and/or method is provided. The system includes an authentication manager that can pass an authentication challenge to authentication modules and/or objects operable to produce a response to the authentication challenge. The system may also include a cache adapted to store one or more responses to the authentication challenge communicated from the authentication modules, with such cache also being employed to facilitate pre-authenticating test challenges and/or pseudo-challenges.
    Type: Grant
    Filed: January 14, 2008
    Date of Patent: December 27, 2011
    Assignee: Microsoft Corporation
    Inventors: Lance E. Olson, Henrik Frystyk Nielsen, Cem Paya
  • Publication number: 20110138179
    Abstract: Scalable session management is achieved by generating a cookie that includes an encrypted session key and encrypted cookie data. The cookie data is encrypted using the session key. The session key is then signed and encrypted using one or more public/private key pairs. The encrypted session key can be decrypted and verified using the same private/public key pair(s). Once verified, the decrypted session key can then be used to decrypt and verify the encrypted cookie data. A first server having the private/public key pair(s) may generate the cookie using a randomly generated session key. A second server having the same private/public key pair(s) may decrypt and verify the cookie even if the session key is not initially installed on the second server. A session key cache may be used to provide session key lookup to save public/private key operations on the servers.
    Type: Application
    Filed: February 14, 2011
    Publication date: June 9, 2011
    Applicant: Microsoft Corporation
    Inventors: Wei Jiang, Ismail Cem Paya, John D. Whited, Wei-Quiang Michael Guo, Yordan Rouskov, Adam Back
  • Publication number: 20110093613
    Abstract: An exemplary network gateway is capable of accepting a session-related message having a session identifier field; the network gateway is adapted to extract a host identifier from a value populating the session identifier field and to perform a routing operation for the session-related message using the host identifier. For an exemplary media implementation, processor-executable instructions direct a device to perform actions including: ascertaining a host identifier from a session identifier field of a session message; and routing the session message responsive to the ascertained host identifier. An exemplary apparatus includes: at least one processor; and one or more media including processor-executable instructions that are capable of being executed by the at least one processor to direct the apparatus to perform actions including: receiving a session message having a session identifier including a host identifier; and routing the session message responsive to the host identifier.
    Type: Application
    Filed: December 22, 2010
    Publication date: April 21, 2011
    Applicant: Microsoft Corporation
    Inventors: John A. Banes, Joseph M. Joy, David R. Mowers, Cem Paya, Feng Sun
  • Patent number: 7890634
    Abstract: Scalable session management is achieved by generating a cookie that includes an encrypted session key and encrypted cookie data. The cookie data is encrypted using the session key. The session key is then signed and encrypted using one or more public/private key pairs. The encrypted session key can be decrypted and verified using the same private/public key pair(s). Once verified, the decrypted session key can then be used to decrypt and verify the encrypted cookie data. A first server having the private/public key pair(s) may generate the cookie using a randomly generated session key. A second server having the same private/public key pair(s) may decrypt and verify the cookie even if the session key is not initially installed on the second server. A session key cache may be used to provide session key lookup to save public/private key operations on the servers.
    Type: Grant
    Filed: March 18, 2005
    Date of Patent: February 15, 2011
    Assignee: Microsoft Corporation
    Inventors: Wei Jiang, Ismail Cem Paya, John D Whited, Wei-Quiang Michael Guo, Yordan Rouskov, Adam Back
  • Patent number: 7882251
    Abstract: An exemplary network gateway is capable of accepting a session-related message having a session identifier field; the network gateway is adapted to extract a host identifier from a value populating the session identifier field and to perform a routing operation for the session-related message using the host identifier. For an exemplary media implementation, processor-executable instructions direct a device to perform actions including: ascertaining a host identifier from a session identifier field of a session message; and routing the session message responsive to the ascertained host identifier. An exemplary apparatus includes: at least one processor; and one or more media including processor-executable instructions that are capable of being executed by the at least one processor to direct the apparatus to perform actions including: receiving a session message having a session identifier including a host identifier; and routing the session message responsive to the host identifier.
    Type: Grant
    Filed: August 13, 2003
    Date of Patent: February 1, 2011
    Assignee: Microsoft Corporation
    Inventors: John A. Banes, Joseph M. Joy, David R. Mowers, Cem Paya, Feng Sun
  • Patent number: 7849324
    Abstract: A permission level associated with a user's access to a Web server is identified. A relationship ticket is obtained from an authentication server and a request is generated to set or modify the identified permission level. The request and the relationship ticket are sent to the Web server and a success code is received from the Web server if the requested permission level is established.
    Type: Grant
    Filed: September 9, 2008
    Date of Patent: December 7, 2010
    Assignee: Microsoft Corporation
    Inventors: Baskaran Dharmarajan, Ismail Cem Paya, Ashvin J Mathew
  • Patent number: 7844826
    Abstract: A permission level associated with an entity's access to a Web server is identified. A relationship ticket is obtained from an authentication server and a request is generated to set the identified permission level. The request and the relationship ticket are sent to the Web server and a success code is received from the Web server if the requested permission level is established.
    Type: Grant
    Filed: September 8, 2008
    Date of Patent: November 30, 2010
    Assignee: Microsoft Corporation
    Inventors: Baskaran Dharmarajan, Ismail Cem Paya, Ashvin J Mathew
  • Patent number: 7788484
    Abstract: A hierarchical identity based cryptographic system (“HIBC”) is integrated with the domain name system (“DNS”). A private key is assigned to each of the top level domain name authorities responsible for assigning the top level domain names (e.g., .net, .com, etc.). The private key is generated according to an HIBC system, wherein the corresponding public key is based on the identity of the particular domain authority. When user requests a domain name from one of the top level domain name authorities, the user is issued a private key that is generated by the top level domain authority using its private key and the identity of the user according to the particular HIBC system implemented. The user's corresponding public key can be derived from the identity of the user and the public key of the top level domain name authority.
    Type: Grant
    Filed: November 30, 2005
    Date of Patent: August 31, 2010
    Assignee: Microsoft Corporation
    Inventors: Cem Paya, Josh D. Benaloh
  • Publication number: 20100115594
    Abstract: Protecting a user against web spoofing in which the user confirms the authenticity of a web page prior to submitting sensitive information such as user credentials (e.g., a login name and password) via the web page. The web page provides the user with an identifiable piece of information representing a shared secret between the user and the server. The user confirms the correctness of the shared secret to ensure the legitimacy of the web page prior to disclosing any sensitive information via the web page.
    Type: Application
    Filed: January 13, 2010
    Publication date: May 6, 2010
    Applicant: MICROSOFT CORPORATION
    Inventors: Ismail Cem Paya, Trevin Chow, Christopher N. Peterson
  • Patent number: 7685631
    Abstract: Protecting a user against web spoofing in which the user confirms the authenticity of a web page prior to submitting sensitive information such as user credentials (e.g., a login name and password) via the web page. The web page provides the user with an identifiable piece of information representing a shared secret between the user and the server. The user confirms the correctness of the shared secret to ensure the legitimacy of the web page prior to disclosing any sensitive information via the web page.
    Type: Grant
    Filed: February 5, 2003
    Date of Patent: March 23, 2010
    Assignee: Microsoft Corporation
    Inventors: Ismail Cem Paya, Trevin Chow, Christopher N. Peterson
  • Patent number: 7653944
    Abstract: The subject invention provides a unique system and method that facilitates creating HIP challenges (HIPs) that can be readily segmented and solved by human users but that are too difficult for non-human users. More specifically, the system and method utilize a variety of unique alteration techniques that are segmentation-based. For example, the system and method employ thicker arcs or occlusions that do not intersect characters already placed in the HIP. The thickness of the arc can be measured or determined by the thickness of the characters in the HIP. In addition to increasing the thickness, the arcs can be lengthened because longer arcs tend to resemble pieces of characters and may be harder to erode. Usability maps can be generated and used to selectively place clutter or occlusions and to selectively warp characters or the character sequence to facilitate human recognition of the characters.
    Type: Grant
    Filed: January 31, 2005
    Date of Patent: January 26, 2010
    Assignee: Microsoft Corporation
    Inventors: Kumar H. Chellapilla, Patrice Y. Simard, Shannon A. Kallin, Erren Dusan Lester, Ismail Cem Paya
  • Patent number: 7634570
    Abstract: Managing state information across communication sessions between a client and a server via a stateless protocol. The server delivers to the client a cacheable web page with a hyperlink to non-cacheable embedded content. In the hyperlink to the non-cacheable embedded content, the server adds a token or an identifier uniquely associated with the user. When the user obtains embedded content from the cached web page via the hyperlink, the identifier is also sent to the server. Upon receipt of the identifier from the client, the server accesses the stored state information. In this manner, the server manages state information related to the client across communication sessions without the use of cookies as long as the client caches the web page with the unique identifier.
    Type: Grant
    Filed: April 29, 2003
    Date of Patent: December 15, 2009
    Assignee: Microsoft Corporation
    Inventors: Ismail Cem Paya, Trevin Chow, Stephen J. Purpura