Patents by Inventor Erik L Holt
Erik L Holt has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 9787674Abstract: Techniques are provided to allow remote initialization of a Trusted Platform Module. The results may be trusted and confidential even if the target device has malicious operating system or other software running.Type: GrantFiled: December 28, 2015Date of Patent: October 10, 2017Assignee: MICROSOFT TECHNOLOGY LICENSING, LLCInventors: Stefan Thom, Kevin M. Litwack, Shon Eizenhoefer, Erik L. Holt, Yash Gandhi
-
Publication number: 20170078279Abstract: Techniques are provided to allow remote initialization of a Trusted Platform Module. The results may be trusted and confidential even if the target device has malicious operating system or other software running.Type: ApplicationFiled: December 28, 2015Publication date: March 16, 2017Inventors: Stefan Thom, Kevin M. Litwack, Shon Eizenhoefer, Erik L. Holt, Yash Gandhi
-
Patent number: 9237135Abstract: Techniques are provided to allow remote initialization of a Trusted Platform Module. The results may be trusted and confidential even if the target device has malicious operating system or other software running.Type: GrantFiled: November 26, 2013Date of Patent: January 12, 2016Assignee: MICROSOFT TECHNOLOGY LICENSING, LLCInventors: Stefan Thom, Kevin M. Litwack, Shon Eizenhoefer, Erik L. Holt, Yash Gandhi
-
Patent number: 8700893Abstract: Certification of a key, which a Trusted Platform Module (TPM) has attested as being non-migratable, can be performed in a single round trip between the certificate authority (CA) and the client that requests the certificate. The client creates a certificate request, and then has the TPM create an attestation identity key (AIK) that is bound to the certificate request. The client then asks the TPM to sign the new key as an attestation of non-migratability. The client then sends the certificate request, along with the attestation of non-migratability to the CA. The CA examines the certificate request and attestation of non-migratability. However, since the CA does not know whether the attestation has been made by a trusted TPM, it certifies the key but includes, in the certificate, an encrypted signature that can only be decrypted using the endorsement key of the trusted TPM.Type: GrantFiled: October 28, 2009Date of Patent: April 15, 2014Assignee: Microsoft CorporationInventors: Stefan Thom, Scott D. Anderson, Erik L. Holt
-
Publication number: 20140089664Abstract: Techniques are provided to allow remote initialization of a Trusted Platform Module. The results may be trusted and confidential even if the target device has malicious operating system or other software running.Type: ApplicationFiled: November 26, 2013Publication date: March 27, 2014Applicant: Microsoft CorporationInventors: Stefan Thom, Kevin M. Litwack, Shon Eizenhoefer, Erik L. Holt, Yash Gandhi
-
Patent number: 8607065Abstract: Techniques are provided to allow remote initialization of a Trusted Platform Module. The results may be trusted and confidential even if the target device has malicious operating system or other software running.Type: GrantFiled: October 10, 2008Date of Patent: December 10, 2013Assignee: Microsoft CorporationInventors: Stefan Thom, Kevin M. Litwack, Shon Eizenhoefer, Erik L. Holt, Yash Gandhi
-
Patent number: 7953983Abstract: Image based login procedures for computer systems include: (a) displaying a first image on a computer screen; (b) receiving user input indicating a portion of the first image; (c) determining if the user input corresponds to a first acceptable user input for user authentication; and (d) proceeding with the authentication procedure when this user input corresponds to the first acceptable user input for user authentication. Additionally or optionally, when proceeding with this authentication procedure, the systems and methods further may include: displaying a second image on the screen; receiving new user input indicating a portion of the second image; and determining if this new input corresponds to a second acceptable user input for user authentication.Type: GrantFiled: March 8, 2005Date of Patent: May 31, 2011Assignee: Microsoft CorporationInventors: Erik L Holt, Matthew E Kowalczyk, Russell Humphries
-
Publication number: 20110099367Abstract: Certification of a key, which a Trusted Platform Module (TPM) has attested as being non-migratable, can be performed in a single round trip between the certificate authority (CA) and the client that requests the certificate. The client creates a certificate request, and then has the TPM create an attestation identity key (AIK) that is bound to the certificate request. The client then asks the TPM to sign the new key as an attestation of non-migratability. The client then sends the certificate request, along with the attestation of non-migratability to the CA. The CA examines the certificate request and attestation of non-migratability. However, since the CA does not know whether the attestation has been made by a trusted TPM, it certifies the key but includes, in the certificate, an encrypted signature that can only be decrypted using the endorsement key of the trusted TPM.Type: ApplicationFiled: October 28, 2009Publication date: April 28, 2011Applicant: MICROSOFT CORPORATIONInventors: Stefan Thom, Scott D. Anderson, Erik L. Holt
-
Publication number: 20100095120Abstract: Techniques are provided to allow remote initialization of a Trusted Platform Module. The results may be trusted and confidential even if the target device has malicious operating system or other software running.Type: ApplicationFiled: October 10, 2008Publication date: April 15, 2010Applicant: Microsoft CorporationInventors: Stefan Thom, Kevin M. Litwack, Shon Eizenhoefer, Erik L. Holt, Yash Gandhi
-
Patent number: RE44725Abstract: Image based login procedures for computer systems include: (a) displaying a first image on a computer screen; (b) receiving user input indicating a portion of the first image; (c) determining if the user input corresponds to a first acceptable user input for user authentication; and (d) proceeding with the authentication procedure when this user input corresponds to the first acceptable user input for user authentication. Additionally or optionally, when proceeding with this authentication procedure, the systems and methods further may include: displaying a second image on the screen; receiving new user input indicating a portion of the second image; and determining if this new input corresponds to a second acceptable user input for user authentication.Type: GrantFiled: March 1, 2012Date of Patent: January 21, 2014Assignee: Microsoft CorporationInventors: Erik L. Holt, Matthew E. Kowalczyk, Russell Humphries
-
Patent number: RE46301Abstract: Image based login procedures for computer systems include: (a) displaying a first image on a computer screen; (b) receiving user input indicating a portion of the first image; (c) determining if the user input corresponds to a first acceptable user input for user authentication; and (d) proceeding with the authentication procedure when this user input corresponds to the first acceptable user input for user authentication. Additionally or optionally, when proceeding with this authentication procedure, the systems and methods further may include: displaying a second image on the screen; receiving new user input indicating a portion of the second image; and determining if this new input corresponds to a second acceptable user input for user authentication.Type: GrantFiled: January 15, 2014Date of Patent: February 7, 2017Assignee: Microsoft Technology Licensing, LLCInventors: Erik L. Holt, Matthew E. Kowalczyk, Russell Humphries
-
Patent number: RE47518Abstract: Image based login procedures for computer systems include: (a) displaying a first image on a computer screen; (b) receiving user input indicating a portion of the first image; (c) determining if the user input corresponds to a first acceptable user input for user authentication; and (d) proceeding with the authentication procedure when this user input corresponds to the first acceptable user input for user authentication. Additionally or optionally, when proceeding with this authentication procedure, the systems and methods further may include: displaying a second image on the screen; receiving new user input indicating a portion of the second image; and determining if this new input corresponds to a second acceptable user input for user authentication.Type: GrantFiled: January 12, 2017Date of Patent: July 16, 2019Assignee: Microsoft Technology Licensing, LLCInventors: Matthew E. Kowalczyk, Russell Humphries, Erik L. Holt