Patents by Inventor Curt Andrew Steeb
Curt Andrew Steeb has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 8839236Abstract: A virtual machine monitor provides a trusted operating environment for a software usage metering application when a qualified virtual machine monitor is loaded as part of trusted boot and when all other programs and operating systems run in containers managed by the virtual machine monitor. The virtual machine monitor may also host a locking application for limiting the functionality of the computer if contractual terms of use are not met. Both the metering and locking applications run at a higher privilege level than ring 0, at the same level as the virtual machine monitor.Type: GrantFiled: April 4, 2007Date of Patent: September 16, 2014Assignee: Microsoft Corp.Inventors: Todd L. Carpenter, William J. Westerinen, Thomas G. Phillips, Curt Andrew Steeb, Zhangwei Xu, Alexander Frank
-
Patent number: 8522043Abstract: A hardware-based security module is used to protect an electronic device, especially a portable electronic device. The security module may determine either via timeout of a watchdog timer or via an explicit message to encrypt selected data on the electronic device. In addition, the electronic device may enter a limited function mode that only allows display of simplistic messages and supports network traffic with a recovery service. The recovery service may be able to use the network traffic to locate the electronic device. The security module may include a secure memory, a cryptographic function, a timer, and support for direct display of data on a monitor.Type: GrantFiled: June 21, 2007Date of Patent: August 27, 2013Assignee: Microsoft CorporationInventors: James S. Duffus, Curt Andrew Steeb, Thomas G. Phillips, Jeffrey Alan Herold, William Poole, William J. Westerinen, Martin H. Hall
-
Patent number: 8151118Abstract: A computer or other electronic device requiring physical integrity of its components, for example, a pay-per-use computer may use a master security device in communication with a plurality of slave security devices, known as security beans. Each security bean may be given a cryptographic key or keys for use in authenticating communication with the master security device. Each security bean may be coupled to an associated component and may have the ability to disable that associated component. In one embodiment, security bean has an analog switch that may be configured to block or attenuate a critical signal used by the associated component. The security bean may start up in the disable mode and respond to a verified signal from the master security device to enable its corresponding component.Type: GrantFiled: January 29, 2007Date of Patent: April 3, 2012Assignee: Microsoft CorporationInventors: David James Foster, Shon Schmidt, David Jaroslav Sebesta, Curt Andrew Steeb, William J. Westerinen, Zhangwei Xu, Todd L. Carpenter
-
Patent number: 7778956Abstract: In a pay-per-use computer environment, particularly when network access is limited, self-monitoring tools on a pay-per-use computer may require special support from a host/server. The host/server must be able to respond to requests quickly and efficiently and yet maintain full information required to service requests and updates. A key management table and a device management table provide critical information required to service requests. Use of SQL notifications allows local database caches to remain current but quickly accessible.Type: GrantFiled: June 21, 2007Date of Patent: August 17, 2010Assignee: Microsoft CorporationInventors: Gokul P. Thirumalai, Munisamy Prabu, Ashok Chandrasekaran, Zeyong Xu, Curt Andrew Steeb
-
Publication number: 20080320312Abstract: A hardware-based security module is used to protect an electronic device, especially a portable electronic device. The security module may determine either via timeout of a watchdog timer or via an explicit message to encrypt selected data on the electronic device. In addition, the electronic device may enter a limited function mode that only allows display of simplistic messages and supports network traffic with a recovery service. The recovery service may be able to use the network traffic to locate the electronic device. The security module may include a secure memory, a cryptographic function, a timer, and support for direct display of data on a monitor.Type: ApplicationFiled: June 21, 2007Publication date: December 25, 2008Applicant: MICROSOFT CORPORATIONInventors: James S. Duffus, Curt Andrew Steeb, Thomas G. Phillips, Jeffrey Alan Herold, William Poole, William J. Westerinen, Martin H. Hall
-
Publication number: 20080319925Abstract: A computer or other electronic device may be used in one of several selectable modes of operation. Computer resources, such as a processor, memory, or a graphics controller, are individually settable for operation at different levels of performance. A mode of operation or performance level is determined by the combination of individual settings for the various resources. Pay-per-use operation is charged at a rate determined by the mode of operation or performance level. Operation in a gaming mode may be charged at a higher rate than operation in web-browsing mode. A metering agent may be associated with each scalable use resource to securely set the performance level and to securely report on metered operation of the resource.Type: ApplicationFiled: June 21, 2007Publication date: December 25, 2008Applicant: MICROSOFT CORPORATIONInventors: Jeffrey Alan Herold, James S. Duffus, Curt Andrew Steeb, Thomas G. Phillips, William J. Westerinen, Martin H. Hall, Todd L. Carpenter, Daniel Makoski, Shon Schmidt
-
Publication number: 20080320024Abstract: In a pay-per-use computer environment, particularly when network access is limited, self-monitoring tools on a pay-per-use computer may require special support from a host/server. The host/server must be able to respond to requests quickly and efficiently and yet maintain full information required to service requests and updates. A key management table and a device management table provide critical information required to service requests. Use of SQL notifications allows local database caches to remain current but quickly accessible.Type: ApplicationFiled: June 21, 2007Publication date: December 25, 2008Applicant: MICROSOFT CORPORATIONInventors: Gokul P. Thirumalai, Munisamy Prabu, Ashok Chandrasekaran, Zeyong Xu, Curt Andrew Steeb
-
Publication number: 20080319910Abstract: A computer with scalable performance level components and selectable software and service options has a user interface that allows individual performance levels to be selected. The scalable performance level components may include a processor, memory, graphics controller, etc. Software and services may include word processing, email, browsing, database access, etc. To support a pay-per-use business model, each selectable item may have a cost associated with it, allowing a user to pay for the services actually selected and that presumably correspond to the task or tasks being performed. An administrator may use a similar user interface to set performance levels for each computer in a network, allowing performance and cost to be set according to a user's requirements.Type: ApplicationFiled: June 21, 2007Publication date: December 25, 2008Applicant: MICROSOFT CORPORATIONInventors: James S. Duffus, Curt Andrew Steeb, Thomas G. Phillips, Todd L. Carpenter, Martin H. Hall, Ricardo Lopez-Barquilla, Judy Tandog, Katie Ann Aldrich, Daniel Makoski, David James Foster, Krista L. Johnson
-
Publication number: 20080250406Abstract: A virtual machine monitor provides a trusted operating environment for a software usage metering application when a qualified virtual machine monitor is loaded as part of trusted boot and when all other programs and operating systems run in containers managed by the virtual machine monitor. The virtual machine monitor may also host a locking application for limiting the functionality of the computer if contractual terms of use are not met. Both the metering and locking applications run at a higher privilege level than ring 0, at the same level as the virtual machine monitor.Type: ApplicationFiled: April 4, 2007Publication date: October 9, 2008Applicant: MICROSOFT CORPORATIONInventors: Todd L. Carpenter, William J. Westerinen, Thomas G. Phillips, Curt Andrew Steeb, Zhangwei Xu, Alexander Frank
-
Publication number: 20080183305Abstract: A computer or other electronic device requiring physical integrity of its components, for example, a pay-per-use computer may use a master security device in communication with a plurality of slave security devices, known as security beans. Each security bean may be given a cryptographic key or keys for use in authenticating communication with the master security device. Each security bean may be coupled to an associated component and may have the ability to disable that associated component. In one embodiment, security bean has an analog switch that may be configured to block or attenuate a critical signal used by the associated component. The security bean may start up in the disable mode and respond to a verified signal from the master security device to enable its corresponding component.Type: ApplicationFiled: January 29, 2007Publication date: July 31, 2008Inventors: David James Foster, Shon Schmidt, David Jaroslav Sebesta, Curt Andrew Steeb, William J. Westerinen, Zhangwei Xu, Todd L. Carpenter
-
Publication number: 20080183623Abstract: A pay-per-use business model relies on an accurate, or at least, un-tampered, time reference for the administration of prepaid usage time, e.g. hours, or subscription expiration dates. A protocol for provisioning usage requires that any electronic device request for provisioning includes current time at the device. A server responding to the request may evaluate the time at the device and send an updated time when the current time at the device is outside a variance limit. If the electronic device repeatedly sends requests with inaccurate time, the server may cease sending time updates and block the electronic device from further updates for suspected tampering.Type: ApplicationFiled: January 29, 2007Publication date: July 31, 2008Inventors: Zhangwei Xu, Josh Benaloh, Martin H. Hall, David Jaroslav Sebesta, Jeffrey Alan Herold, Zeyong Xu, Douglas Reed Beck, Curt Andrew Steeb
-
Publication number: 20080184026Abstract: A metered-use computer is operable in a number of states or modes to accommodate manufacture, test, operation and end-of-life. During manufacturing, a security module may be set to a non-metered mode, where no measurements are taken. At the end of the manufacturing process, the security module may be set to an active mode where metering and measurement of the computer are enforced. When terms of a purchase contract or other user agreement are satisfied, the computer may be set to a non-enforcement state where all metering and metering-related security are disabled. A one-time reset of the active mode is supported to allow end-of-line quality assurance testing.Type: ApplicationFiled: January 29, 2007Publication date: July 31, 2008Inventors: Martin H. Hall, Zhangwei Xu, Jeffrey Alan Herold, Curt Andrew Steeb, Rajagopal Venkatachalam, Douglas Reed Beck, David James Foster
-
Publication number: 20080184283Abstract: A management console may be used to monitor available usage on a pay-per-use electronic device, such as a pay-per-use computer. When the management console determines that any of tie monitored electronic devices has reached a trigger level the management console may re-charge the electronic device with value. The value may be taken from a local pool of value stored at the management console or the an add-value transaction may be generated at the management console on behalf of the pay-per-use electronic device. In an Internet cafe or similar environment, the use of the management console shields individual users from usage purchase transactions for individual pay-per-use electronic devices.Type: ApplicationFiled: April 6, 2007Publication date: July 31, 2008Applicant: MICROSOFT CORPORATIONInventors: Michelle Maislen, Garrett R. Vargas, Curt Andrew Steeb, Jeffrey Alan Herold, Martin H. Hall, Isaac P. Ahdout