Patents by Inventor Josh Benaloh
Josh Benaloh has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 7437771Abstract: Transmitter and receiver computing device are interconnected by a network. The transmitter transmits protected digital content to the receiver in a manner so that the receiver can access the content even though the content is directly licensed to the transmitter and not the receiver.Type: GrantFiled: April 19, 2004Date of Patent: October 14, 2008Assignee: Woodcock Washburn LLPInventors: James M. Alkove, Clifford P. Van Dyke, Eduardo Oliveira, Josh Benaloh, Troy Batterberry
-
Publication number: 20080229111Abstract: A forwarding signature comprises a modified digital signature, modified using a predetermined parameter between a sender and an intended recipient. An intended recipient of the forwarding signature can verify that the forwarding signature corresponds to the message, but, can neither derive the original digital signature nor generate a new forwarding signature for a different parameter. Generation and verification of the forwarding signature is accomplished with access to the public key of a public/private cryptographic key pair, the original signed message, and the predetermined parameter. Access to the private key is not needed.Type: ApplicationFiled: March 16, 2007Publication date: September 18, 2008Applicant: Microsoft CorporationInventors: Cem Paya, Josh Benaloh
-
Publication number: 20080183623Abstract: A pay-per-use business model relies on an accurate, or at least, un-tampered, time reference for the administration of prepaid usage time, e.g. hours, or subscription expiration dates. A protocol for provisioning usage requires that any electronic device request for provisioning includes current time at the device. A server responding to the request may evaluate the time at the device and send an updated time when the current time at the device is outside a variance limit. If the electronic device repeatedly sends requests with inaccurate time, the server may cease sending time updates and block the electronic device from further updates for suspected tampering.Type: ApplicationFiled: January 29, 2007Publication date: July 31, 2008Inventors: Zhangwei Xu, Josh Benaloh, Martin H. Hall, David Jaroslav Sebesta, Jeffrey Alan Herold, Zeyong Xu, Douglas Reed Beck, Curt Andrew Steeb
-
Patent number: 7337324Abstract: A system and method for automatically determining if a computer user is a human or an automated script. Human interactive proofs (HIPs) are currently used to deter automated registration for web services by automated computer scripts. Unfortunately, HIPs entail multiple steps (request service, receive challenge, respond to challenge) that can be burdensome. The system and method of the invention in one embodiment provides a “black-box” to potential users consisting of a challenge generator and a secret key. The challenge is generated for the user and the response can be provided as part of the service request, eliminating the need for a separate challenge from a service provider and response to the challenge.Type: GrantFiled: December 1, 2003Date of Patent: February 26, 2008Assignee: Microsoft Corp.Inventors: Josh Benaloh, Ismail Cem Paya
-
Publication number: 20070174921Abstract: Manifest-based trusted agent management in a trusted operating system environment includes receiving a request to execute a process is received and setting up a virtual memory space for the process. Additionally, a manifest corresponding to the process is accessed, and which of a plurality of binaries can be executed in the virtual memory space is limited based on indicators, of the binaries, that are included in the manifest.Type: ApplicationFiled: November 9, 2006Publication date: July 26, 2007Applicant: Microsoft CorporationInventors: Paul England, Marcus Peinado, Daniel Simon, Josh Benaloh
-
Patent number: 7243237Abstract: Secure communication between a keyboard and a component, such as a piece of software running on a computer. A first initial value is known to both the keyboard and the component. The keyboard and the component exchange nonces. The keyboard and the component each compute a second initial value and a third initial value based on the nonces and the first initial value. Both the keyboard and the component perform the same computation, so that the keyboard and the component each have the same second and third initial values. The keyboard encrypts keystrokes destined for the component using CBC-3DES based on the key and the second initial value, and also creates a message authentication code for each keystroke using CBC-3DESMAC based on the key and the third initial value. The component decrypts and verifies the keystrokes using the key and the second and third initial values.Type: GrantFiled: May 2, 2003Date of Patent: July 10, 2007Assignee: Microsoft CorporationInventors: Marcus Peinado, Josh Benaloh
-
Publication number: 20070143216Abstract: Described herein are one or more data signal implementations having at least a database and a compressed key.Type: ApplicationFiled: December 16, 2005Publication date: June 21, 2007Inventor: Josh Benaloh
-
Publication number: 20070124578Abstract: A hierarchical identity based cryptographic system (“HIBC”) is integrated with the domain name system (“DNS”). A private key is assigned to each of the top level domain name authorities responsible for assigning the top level domain names (e.g., net, .com, etc.). The private key is generated according to an HIBC system, wherein the corresponding public key is based on the identity of the particular domain authority. When user requests a domain name from one of the top level domain name authorities, the user is issued a private key that is generated by the top level domain authority using its private key and the identity of the user according to the particular HIBC system implemented. The user's corresponding public key can be derived from the identity of the user and the public key of the top level domain name authority.Type: ApplicationFiled: November 30, 2005Publication date: May 31, 2007Applicant: Microsoft CorporationInventors: Cem Paya, Josh Benaloh
-
Publication number: 20070088947Abstract: One aspect relates to a process and associated device that provides a private key of an asymmetric key pair in a key device. A symmetric master key is derived from the private key of the asymmetric key pair. The symmetric master key is stored in a computer memory location. The symmetric master key is used to encrypt or decrypt a file encryption key. The file encryption key can encrypt or decrypt files. In another aspect, the user can still access the files even if a user deactivates the key device by encrypting or decrypting the file encryption key directly from the symmetric master key.Type: ApplicationFiled: December 14, 2006Publication date: April 19, 2007Applicant: Microsoft CorporationInventors: David Cross, Jianrong Gu, Josh Benaloh, Thomas Jones, Paul Leach, Glenn Pittaway
-
Publication number: 20070076881Abstract: An exclusive encryption system is established using multiple computing devices. The exclusive encryption system allows for the exclusion of certain plaintext (e.g., by one of the computing devices) and ciphertext (e.g., by another of the computing devices) while at the same time maintaining the privacy created by the encryption (e.g., so the other computing device cannot see the plaintext). The exclusive encryption system may be implemented as part of a serverless distributed file system with directory entries (e.g., file names or folder names) being the plaintext, or alternatively as part of other systems.Type: ApplicationFiled: December 16, 2005Publication date: April 5, 2007Applicant: Microsoft CorporationInventors: John Douceur, Josh Benaloh, Gideon Yuval, Atul Adya
-
Publication number: 20060198517Abstract: Exemplary embodiments disclosed herein may include a method and system for creating pair-wise security keys, comprising receiving an identity key from a website, generating a master key, creating a pair-wise symmetric key or asymmetric key pair by utilizing an encryption function of the identity key and the master key, and storing the pair-wise public or symmetric key at the client and the website.Type: ApplicationFiled: March 7, 2005Publication date: September 7, 2006Applicant: Microsoft CorporationInventors: Kim Cameron, Arun Nanda, Josh Benaloh, John Shewchuk, Daniel Simon, Andrew Bortz
-
Publication number: 20060179053Abstract: A system combines individual estimates of the subjective appeal of web pages into a combined rating for each web page that can be used to rank web pages during a web search. In a gaming implementation, a web page recipient estimates the combined rating that other recipients of the web page have formulated. The recipient can be rewarded for accurately estimating the combined rating by receiving a subsequent web page that possesses a high rating.Type: ApplicationFiled: February 4, 2005Publication date: August 10, 2006Applicant: Microsoft CorporationInventors: Luis von Ahn Arellano, Josh Benaloh
-
Publication number: 20060167874Abstract: The subject invention provides a unique system and method that facilitates an interactive game-powered search engine that serve the purposes of both users who may be looking for information as well as game participants who may desire to earn some reward or level of enjoyment by playing the game. More specifically, the system and method provides feedback to a user based on the user's input string or a string derived therefrom. The feedback can be a response or answer to the user's input in the form of text, an image, audio or sound, video, and/or a URL that is provided by one or more game participants when there is some degree of consistency or agreement between the responses or when individual players have demonstrated good reliability in their responses.Type: ApplicationFiled: January 24, 2005Publication date: July 27, 2006Applicant: Microsoft CorporationInventors: Luis von Ahn Arellano, Eric Brill, John Platt, Josh Benaloh
-
Publication number: 20060137023Abstract: Described herein are one or more implementations that generate and encrypted content data structure package and/or data tree.Type: ApplicationFiled: September 28, 2005Publication date: June 22, 2006Applicant: Microsoft CorporationInventor: Josh Benaloh
-
Publication number: 20060129502Abstract: Methods, systems, and apparatus for generation, distribution and verification of tokens are described. In an implementation, a method is described in which a value of an offer is determined and a token for representing the offer is generated. The token has a number of characters based on the determination of the value of the offer.Type: ApplicationFiled: December 15, 2004Publication date: June 15, 2006Applicant: Microsoft CorporationInventors: Andrzej Pastusiak, Arun Sacheti, Ting Cai, Deuane Martin, Josh Benaloh, Rajesh Kuppuswamy
-
Publication number: 20060129501Abstract: Methods, systems, and apparatus for generation, distribution and verification of tokens are described. In an implementation, a method is described in which a value of an offer is determined and a token for representing the offer is generated. The token has a number of characters based on the determination of the value of the offer.Type: ApplicationFiled: December 15, 2004Publication date: June 15, 2006Applicant: Microsoft CorporationInventors: Andrzej Pastusiak, Arun Sacheti, Ting Cai, Deuane Martin, Josh Benaloh, Rajesh Kuppuswamy
-
Publication number: 20060107048Abstract: An exclusive encryption system is established using multiple computing devices. The exclusive encryption system allows for the exclusion of certain plaintext (e.g., by one of the computing devices) and ciphertext (e.g., by another of the computing devices) while at the same time maintaining the privacy created by the encryption (e.g., so the other computing device cannot see the plaintext). The exclusive encryption system may be implemented as part of a serverless distributed file system with directory entries (e.g., file names or folder names) being the plaintext, or alternatively as part of other systems.Type: ApplicationFiled: December 19, 2005Publication date: May 18, 2006Applicant: Microsoft CorporationInventors: John Douceur, Josh Benaloh, Gideon Yuval, Atul Adya
-
Publication number: 20060104441Abstract: Systems and methods for password protection are described. In one aspect, an asymmetric key pair is deterministically formed by combining a password and other data. The public key of the asymmetric key pair is exported to an external device. The private key of the asymmetric key pair is used to effect subsequent authentications to the external device.Type: ApplicationFiled: November 17, 2004Publication date: May 18, 2006Applicant: Microsoft CorporationInventors: Jesper Johansson, Josh Benaloh
-
Publication number: 20060095578Abstract: A human interactive proof (HIP) service is described. In response to a request from a web server, the HIP service generates a HIP challenge and an associated attestation. The web server can then embed the generated HIP challenge in a requested web page. The attestation is used to determine whether or not a user response to the HIP challenge is correct.Type: ApplicationFiled: October 29, 2004Publication date: May 4, 2006Applicant: Microsoft CorporationInventors: Ismail Paya, Josh Benaloh, Raja Perumal, Trevin Chow, Erren Lester, Jeffrey Steinbok, Julien Couvreur
-
Publication number: 20060059571Abstract: Software is licensed for use on a particular computing device, such as a gaming console or a multimedia console. An unlocking code is provided from a distribution service to the computing device (either directly or via a user), which in turn, unlocks the appropriate software or portion of software for use with the associated computing device. The software may reside on a computer-readable medium, such as a CD-ROM or DVD disk, that is being used in conjunction with the computing device. The unlocking code may be provided directly to the user in private (e.g., via email or a mobile phone) or in public (e.g., published on a website). Portions of the software that may be unlocked include a particular level of a game or other features (such as additional characters or weapons), or a working or more advanced version of an application that was otherwise provided as a demo or older version.Type: ApplicationFiled: September 1, 2004Publication date: March 16, 2006Applicant: Microsoft CorporationInventors: Ling Chen, Josh Benaloh