Patents by Inventor John Michael Walton

John Michael Walton has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20220141029
    Abstract: Techniques are described herein that are capable of using multi-factor and/or inherence-based authentication to selectively enable performance of an operation prior to or during release of code. For example, a user-specific digital signature that identifies a user of a code development service is generated based at least in part on factor(s) obtained from the user as a result of initiating or receiving a request to perform an operation with regard to the code prior to or during the release of the code. Multi-factor and/or inherence-based authentication may be selectively performed based at least in part on the user-specific digital signature. The performance of the operation is selectively enabled based at least in part on whether the user is authenticated.
    Type: Application
    Filed: October 29, 2020
    Publication date: May 5, 2022
    Inventors: Karen Lowe Dahmen, Eugene Wilson Hodges, IV, John Michael Walton, Kadri Tahsildoost, Filip {hacek over (S)}ebesta
  • Patent number: 10715338
    Abstract: A system includes determination of first public key certificate policies based on first data files, generation of a first public key certificate conforming to the first public key certificate policies, storage of the first public key certificate in a secret store system, reception of a second public key certificate, determination of second public key certificate policies based on second data files stored in the secret store system, determination of whether the received second public key certificate conforms to the second public key certificate policies, and storage of the second public key certificate in the secret store system if it is determined that the received second public key certificate conforms to the second public key certificate policies.
    Type: Grant
    Filed: February 21, 2018
    Date of Patent: July 14, 2020
    Assignee: MICROSOFT TECHNOLOGY LICENSING, LLC
    Inventors: John Michael Walton, Shawn Valentine Hernan, Shrikant Adhikarla
  • Publication number: 20190260595
    Abstract: A system includes determination of first public key certificate policies based on first data files, generation of a first public key certificate conforming to the first public key certificate policies, storage of the first public key certificate in a secret store system, reception of a second public key certificate, determination of second public key certificate policies based on second data files stored in the secret store system, determination of whether the received second public key certificate conforms to the second public key certificate policies, and storage of the second public key certificate in the secret store system if it is determined that the received second public key certificate conforms to the second public key certificate policies.
    Type: Application
    Filed: February 21, 2018
    Publication date: August 22, 2019
    Inventors: John Michael WALTON, Shawn Valentine HERNAN, Shrikant ADHIKARLA
  • Patent number: 10204241
    Abstract: Systems and methods are provided for adding security to client data by maintaining keys providing access to the client data remotely from the client data. In some circumstances, the systems encrypt a cluster of data using an encryption key, associate the cluster of encrypted data with a unique identifier and send the unique identifier and the decryption key to a server for storage. The decryption key is then received from the server and is used to decrypt the cluster of encrypted data. A server can also perform policy checks or trigger additional authentication such as SMS, phone, or email notification before allowing access to a key. Furthermore, in some instances, the server can also prevent access to the stored keys in response to anomalies, such as decommissioning and other asset management events.
    Type: Grant
    Filed: June 30, 2017
    Date of Patent: February 12, 2019
    Assignee: Microsoft Technology Licensing, LLC
    Inventors: Scott A. Field, Aravind N. Thoram, John Michael Walton, Dayi Zhou, Alex M. Semenko, Avraham Michael Ben-Menahem
  • Patent number: 10200194
    Abstract: Systems and methods are provided for adding security to client data by maintaining decryption keys at a server that provide access to encrypted keys that are maintained at a client system with encrypted client data. A specialized protocol is utilized for accessing the decryption keys from the server. Once obtained, the decryption key is used to decrypt the encrypted key at the client and then the newly decrypted decryption key is used to decrypt the encrypted data. A server can also perform policy checks or trigger additional authentication such as SMS, phone, or email notification before allowing access to the server decryption key. Furthermore, in some instances, the server can also prevent access to the server decryption keys in response to anomalies, such as decommissioning and other asset management events.
    Type: Grant
    Filed: June 30, 2017
    Date of Patent: February 5, 2019
    Assignee: Microsoft Technology Licensing, LLC
    Inventors: Scott A. Field, Aravind N. Thoram, John Michael Walton, Dayi Zhou, Alex M. Semenko, Avraham Michael Ben-Menahem
  • Publication number: 20190005274
    Abstract: Systems and methods are provided for adding security to client data by maintaining keys providing access to the client data remotely from the client data. In some circumstances, the systems encrypt a cluster of data using an encryption key, associate the cluster of encrypted data with a unique identifier and send the unique identifier and the decryption key to a server for storage. The decryption key is then received from the server and is used to decrypt the cluster of encrypted data. A server can also perform policy checks or trigger additional authentication such as SMS, phone, or email notification before allowing access to a key. Furthermore, in some instances, the server can also prevent access to the stored keys in response to anomalies, such as decommissioning and other asset management events.
    Type: Application
    Filed: June 30, 2017
    Publication date: January 3, 2019
    Inventors: Scott A. Field, Aravind N. Thoram, John Michael Walton, Dayi Zhou, Alex M. Semenko, Avraham Michael Ben-Menahem
  • Publication number: 20190007204
    Abstract: Systems and methods are provided for adding security to client data by maintaining decryption keys at a server that provide access to encrypted keys that are maintained at a client system with encrypted client data. A specialized protocol is utilized for accessing the decryption keys from the server. Once obtained, the decryption key is used to decrypt the encrypted key at the client and then the newly decrypted decryption key is used to decrypt the encrypted data. A server can also perform policy checks or trigger additional authentication such as SMS, phone, or email notification before allowing access to the server decryption key. Furthermore, in some instances, the server can also prevent access to the server decryption keys in response to anomalies, such as decommissioning and other asset management events.
    Type: Application
    Filed: June 30, 2017
    Publication date: January 3, 2019
    Inventors: Scott A. Field, Aravind N. Thoram, John Michael Walton, Dayi Zhou, Alex M. Semenko, Avraham Michael Ben-Menahem
  • Publication number: 20120203270
    Abstract: A flexural grasper for use in laparoscopic procedures and the like includes an end effector with digits having rigid elements coupled by flexural bearings. The flexural bearings can be controlled to flex and straighten using cables deployed through the digits and tensioned remotely from a handle for the flexural grasper.
    Type: Application
    Filed: February 6, 2012
    Publication date: August 9, 2012
    Inventors: Yuanyu Chen, Audrey Paulette Solange Maertens, Harrison Fagan O'Hanley, Matthew Jon Rosario, John Michael Walton, Mitchell Terrance Westwood, Jennifer Erica Rosen
  • Patent number: 7653188
    Abstract: A system and method are provided for detecting extension attacks made to a communication enterprise, and taking appropriate remedial action to prevent ongoing attacks and future attacks. One or more attributes of a suspect call are analyzed, and a risk is associated with each analyzed attribute. An overall risk or assessment is then made of the analyzed attributes, attack attributes are logged, and one or more remedial actions may be triggered as a result of the analyzed call attributes. The remedial actions may include recording the call, notifying an administrator of a suspect call, or isolating the communication enterprise from the attack by terminating the call or shutting down selected communication endpoints to prevent calls being made to those extensions. Rules may be applied to the analyzed attributes in order to trigger the appropriate remedial action.
    Type: Grant
    Filed: October 4, 2005
    Date of Patent: January 26, 2010
    Assignee: Avaya Inc.
    Inventors: Michael James Kloberdans, John Michael Walton