Patents by Inventor Josh Benaloh

Josh Benaloh has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 7437771
    Abstract: Transmitter and receiver computing device are interconnected by a network. The transmitter transmits protected digital content to the receiver in a manner so that the receiver can access the content even though the content is directly licensed to the transmitter and not the receiver.
    Type: Grant
    Filed: April 19, 2004
    Date of Patent: October 14, 2008
    Assignee: Woodcock Washburn LLP
    Inventors: James M. Alkove, Clifford P. Van Dyke, Eduardo Oliveira, Josh Benaloh, Troy Batterberry
  • Publication number: 20080229111
    Abstract: A forwarding signature comprises a modified digital signature, modified using a predetermined parameter between a sender and an intended recipient. An intended recipient of the forwarding signature can verify that the forwarding signature corresponds to the message, but, can neither derive the original digital signature nor generate a new forwarding signature for a different parameter. Generation and verification of the forwarding signature is accomplished with access to the public key of a public/private cryptographic key pair, the original signed message, and the predetermined parameter. Access to the private key is not needed.
    Type: Application
    Filed: March 16, 2007
    Publication date: September 18, 2008
    Applicant: Microsoft Corporation
    Inventors: Cem Paya, Josh Benaloh
  • Publication number: 20080183623
    Abstract: A pay-per-use business model relies on an accurate, or at least, un-tampered, time reference for the administration of prepaid usage time, e.g. hours, or subscription expiration dates. A protocol for provisioning usage requires that any electronic device request for provisioning includes current time at the device. A server responding to the request may evaluate the time at the device and send an updated time when the current time at the device is outside a variance limit. If the electronic device repeatedly sends requests with inaccurate time, the server may cease sending time updates and block the electronic device from further updates for suspected tampering.
    Type: Application
    Filed: January 29, 2007
    Publication date: July 31, 2008
    Inventors: Zhangwei Xu, Josh Benaloh, Martin H. Hall, David Jaroslav Sebesta, Jeffrey Alan Herold, Zeyong Xu, Douglas Reed Beck, Curt Andrew Steeb
  • Patent number: 7337324
    Abstract: A system and method for automatically determining if a computer user is a human or an automated script. Human interactive proofs (HIPs) are currently used to deter automated registration for web services by automated computer scripts. Unfortunately, HIPs entail multiple steps (request service, receive challenge, respond to challenge) that can be burdensome. The system and method of the invention in one embodiment provides a “black-box” to potential users consisting of a challenge generator and a secret key. The challenge is generated for the user and the response can be provided as part of the service request, eliminating the need for a separate challenge from a service provider and response to the challenge.
    Type: Grant
    Filed: December 1, 2003
    Date of Patent: February 26, 2008
    Assignee: Microsoft Corp.
    Inventors: Josh Benaloh, Ismail Cem Paya
  • Publication number: 20070174921
    Abstract: Manifest-based trusted agent management in a trusted operating system environment includes receiving a request to execute a process is received and setting up a virtual memory space for the process. Additionally, a manifest corresponding to the process is accessed, and which of a plurality of binaries can be executed in the virtual memory space is limited based on indicators, of the binaries, that are included in the manifest.
    Type: Application
    Filed: November 9, 2006
    Publication date: July 26, 2007
    Applicant: Microsoft Corporation
    Inventors: Paul England, Marcus Peinado, Daniel Simon, Josh Benaloh
  • Patent number: 7243237
    Abstract: Secure communication between a keyboard and a component, such as a piece of software running on a computer. A first initial value is known to both the keyboard and the component. The keyboard and the component exchange nonces. The keyboard and the component each compute a second initial value and a third initial value based on the nonces and the first initial value. Both the keyboard and the component perform the same computation, so that the keyboard and the component each have the same second and third initial values. The keyboard encrypts keystrokes destined for the component using CBC-3DES based on the key and the second initial value, and also creates a message authentication code for each keystroke using CBC-3DESMAC based on the key and the third initial value. The component decrypts and verifies the keystrokes using the key and the second and third initial values.
    Type: Grant
    Filed: May 2, 2003
    Date of Patent: July 10, 2007
    Assignee: Microsoft Corporation
    Inventors: Marcus Peinado, Josh Benaloh
  • Publication number: 20070143216
    Abstract: Described herein are one or more data signal implementations having at least a database and a compressed key.
    Type: Application
    Filed: December 16, 2005
    Publication date: June 21, 2007
    Inventor: Josh Benaloh
  • Publication number: 20070124578
    Abstract: A hierarchical identity based cryptographic system (“HIBC”) is integrated with the domain name system (“DNS”). A private key is assigned to each of the top level domain name authorities responsible for assigning the top level domain names (e.g., net, .com, etc.). The private key is generated according to an HIBC system, wherein the corresponding public key is based on the identity of the particular domain authority. When user requests a domain name from one of the top level domain name authorities, the user is issued a private key that is generated by the top level domain authority using its private key and the identity of the user according to the particular HIBC system implemented. The user's corresponding public key can be derived from the identity of the user and the public key of the top level domain name authority.
    Type: Application
    Filed: November 30, 2005
    Publication date: May 31, 2007
    Applicant: Microsoft Corporation
    Inventors: Cem Paya, Josh Benaloh
  • Publication number: 20070088947
    Abstract: One aspect relates to a process and associated device that provides a private key of an asymmetric key pair in a key device. A symmetric master key is derived from the private key of the asymmetric key pair. The symmetric master key is stored in a computer memory location. The symmetric master key is used to encrypt or decrypt a file encryption key. The file encryption key can encrypt or decrypt files. In another aspect, the user can still access the files even if a user deactivates the key device by encrypting or decrypting the file encryption key directly from the symmetric master key.
    Type: Application
    Filed: December 14, 2006
    Publication date: April 19, 2007
    Applicant: Microsoft Corporation
    Inventors: David Cross, Jianrong Gu, Josh Benaloh, Thomas Jones, Paul Leach, Glenn Pittaway
  • Publication number: 20070076881
    Abstract: An exclusive encryption system is established using multiple computing devices. The exclusive encryption system allows for the exclusion of certain plaintext (e.g., by one of the computing devices) and ciphertext (e.g., by another of the computing devices) while at the same time maintaining the privacy created by the encryption (e.g., so the other computing device cannot see the plaintext). The exclusive encryption system may be implemented as part of a serverless distributed file system with directory entries (e.g., file names or folder names) being the plaintext, or alternatively as part of other systems.
    Type: Application
    Filed: December 16, 2005
    Publication date: April 5, 2007
    Applicant: Microsoft Corporation
    Inventors: John Douceur, Josh Benaloh, Gideon Yuval, Atul Adya
  • Publication number: 20060198517
    Abstract: Exemplary embodiments disclosed herein may include a method and system for creating pair-wise security keys, comprising receiving an identity key from a website, generating a master key, creating a pair-wise symmetric key or asymmetric key pair by utilizing an encryption function of the identity key and the master key, and storing the pair-wise public or symmetric key at the client and the website.
    Type: Application
    Filed: March 7, 2005
    Publication date: September 7, 2006
    Applicant: Microsoft Corporation
    Inventors: Kim Cameron, Arun Nanda, Josh Benaloh, John Shewchuk, Daniel Simon, Andrew Bortz
  • Publication number: 20060179053
    Abstract: A system combines individual estimates of the subjective appeal of web pages into a combined rating for each web page that can be used to rank web pages during a web search. In a gaming implementation, a web page recipient estimates the combined rating that other recipients of the web page have formulated. The recipient can be rewarded for accurately estimating the combined rating by receiving a subsequent web page that possesses a high rating.
    Type: Application
    Filed: February 4, 2005
    Publication date: August 10, 2006
    Applicant: Microsoft Corporation
    Inventors: Luis von Ahn Arellano, Josh Benaloh
  • Publication number: 20060167874
    Abstract: The subject invention provides a unique system and method that facilitates an interactive game-powered search engine that serve the purposes of both users who may be looking for information as well as game participants who may desire to earn some reward or level of enjoyment by playing the game. More specifically, the system and method provides feedback to a user based on the user's input string or a string derived therefrom. The feedback can be a response or answer to the user's input in the form of text, an image, audio or sound, video, and/or a URL that is provided by one or more game participants when there is some degree of consistency or agreement between the responses or when individual players have demonstrated good reliability in their responses.
    Type: Application
    Filed: January 24, 2005
    Publication date: July 27, 2006
    Applicant: Microsoft Corporation
    Inventors: Luis von Ahn Arellano, Eric Brill, John Platt, Josh Benaloh
  • Publication number: 20060137023
    Abstract: Described herein are one or more implementations that generate and encrypted content data structure package and/or data tree.
    Type: Application
    Filed: September 28, 2005
    Publication date: June 22, 2006
    Applicant: Microsoft Corporation
    Inventor: Josh Benaloh
  • Publication number: 20060129502
    Abstract: Methods, systems, and apparatus for generation, distribution and verification of tokens are described. In an implementation, a method is described in which a value of an offer is determined and a token for representing the offer is generated. The token has a number of characters based on the determination of the value of the offer.
    Type: Application
    Filed: December 15, 2004
    Publication date: June 15, 2006
    Applicant: Microsoft Corporation
    Inventors: Andrzej Pastusiak, Arun Sacheti, Ting Cai, Deuane Martin, Josh Benaloh, Rajesh Kuppuswamy
  • Publication number: 20060129501
    Abstract: Methods, systems, and apparatus for generation, distribution and verification of tokens are described. In an implementation, a method is described in which a value of an offer is determined and a token for representing the offer is generated. The token has a number of characters based on the determination of the value of the offer.
    Type: Application
    Filed: December 15, 2004
    Publication date: June 15, 2006
    Applicant: Microsoft Corporation
    Inventors: Andrzej Pastusiak, Arun Sacheti, Ting Cai, Deuane Martin, Josh Benaloh, Rajesh Kuppuswamy
  • Publication number: 20060107048
    Abstract: An exclusive encryption system is established using multiple computing devices. The exclusive encryption system allows for the exclusion of certain plaintext (e.g., by one of the computing devices) and ciphertext (e.g., by another of the computing devices) while at the same time maintaining the privacy created by the encryption (e.g., so the other computing device cannot see the plaintext). The exclusive encryption system may be implemented as part of a serverless distributed file system with directory entries (e.g., file names or folder names) being the plaintext, or alternatively as part of other systems.
    Type: Application
    Filed: December 19, 2005
    Publication date: May 18, 2006
    Applicant: Microsoft Corporation
    Inventors: John Douceur, Josh Benaloh, Gideon Yuval, Atul Adya
  • Publication number: 20060104441
    Abstract: Systems and methods for password protection are described. In one aspect, an asymmetric key pair is deterministically formed by combining a password and other data. The public key of the asymmetric key pair is exported to an external device. The private key of the asymmetric key pair is used to effect subsequent authentications to the external device.
    Type: Application
    Filed: November 17, 2004
    Publication date: May 18, 2006
    Applicant: Microsoft Corporation
    Inventors: Jesper Johansson, Josh Benaloh
  • Publication number: 20060095578
    Abstract: A human interactive proof (HIP) service is described. In response to a request from a web server, the HIP service generates a HIP challenge and an associated attestation. The web server can then embed the generated HIP challenge in a requested web page. The attestation is used to determine whether or not a user response to the HIP challenge is correct.
    Type: Application
    Filed: October 29, 2004
    Publication date: May 4, 2006
    Applicant: Microsoft Corporation
    Inventors: Ismail Paya, Josh Benaloh, Raja Perumal, Trevin Chow, Erren Lester, Jeffrey Steinbok, Julien Couvreur
  • Publication number: 20060059571
    Abstract: Software is licensed for use on a particular computing device, such as a gaming console or a multimedia console. An unlocking code is provided from a distribution service to the computing device (either directly or via a user), which in turn, unlocks the appropriate software or portion of software for use with the associated computing device. The software may reside on a computer-readable medium, such as a CD-ROM or DVD disk, that is being used in conjunction with the computing device. The unlocking code may be provided directly to the user in private (e.g., via email or a mobile phone) or in public (e.g., published on a website). Portions of the software that may be unlocked include a particular level of a game or other features (such as additional characters or weapons), or a working or more advanced version of an application that was otherwise provided as a demo or older version.
    Type: Application
    Filed: September 1, 2004
    Publication date: March 16, 2006
    Applicant: Microsoft Corporation
    Inventors: Ling Chen, Josh Benaloh