Patents by Inventor Mark F. Novak
Mark F. Novak has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 8880667Abstract: Attestation by a self-regulating attestation client. The attestation client requests a credential of health from an attestation service, which includes an ordered attestation log and proof of integrity and freshness of the log. The attestation client receives the requested credential of health, which certifies the attestation client was healthy when it requested the credential of health and that the attestation service trusts the attestation client to be healthy each time the attestation client authenticates using the credential of health. The attestation client receives a request to authenticate that it is healthy using the credential of health, verifies that it is currently healthy, and performs the requested authentication.Type: GrantFiled: February 9, 2011Date of Patent: November 4, 2014Assignee: Microsoft CorporationInventors: Mark F. Novak, Stefan Thom, Yair Tor, Alexey Efron, Amos Ortal
-
Publication number: 20140304506Abstract: A system that includes an account management module configured to maintain protected accounts. For instance, a particular protected account includes a protected data set that is not readable outside of the system, and perhaps not even readable outside of the account. The particular data set corresponds to a particular entity assigned to the particular account and that includes keys corresponding to the particular entity. A security processor uses at least some of the plurality of keys to perform cryptographic processes in response to one or more trusted execution environment commands received from the particular entity.Type: ApplicationFiled: June 23, 2014Publication date: October 9, 2014Inventors: Mark F. Novak, Andrew John Layman, Magnus Nyström, Stefan Thom
-
Patent number: 8850553Abstract: Embodiments for performing service binding between a client and a target server are disclosed. In accordance with one embodiment, a clear text client service binding value is received from a client at the target server, the client service binding value is compared to a server service binding value, and a communication channel is formed between the client and the target server when the client service binding value matches the server service binding value.Type: GrantFiled: September 12, 2008Date of Patent: September 30, 2014Assignee: Microsoft CorporationInventors: Mark F. Novak, Daniel Kaminsky
-
Patent number: 8813170Abstract: A policy that governs access to a resource may be tested against real-world access requests before being used to control access to the resource. In one example, access to a resource is governed by a policy, referred to as an effective policy. When the policy is to be modified or replaced, the modification or replacement may become a test policy. When a request is made to access the resource, the request may be evaluated under both the effective policy and the test policy. Whether access is granted is determined under the effective policy, but the decision that would be made under the test policy is noted, and may be logged. If the test policy is determined to behave acceptably when confronted with real-world access requests, then the current effective policy may be replaced with the test policy.Type: GrantFiled: November 10, 2011Date of Patent: August 19, 2014Assignee: Microsoft CorporationInventors: Mark F. Novak, Paul Leach, Vishal Agarwal, David McPherson, Sunil Gottumukkala, Jignesh Shah, Arun K. Nanda, Nir Ben Zvi, Pranav Kukreja, Ramaswamy Ranganathan
-
Patent number: 8782423Abstract: A system that includes an account management module configured to maintain protected accounts. For instance, a particular protected account includes a protected data set that is not readable outside of the system, and perhaps not even readable outside of the account. The particular data set corresponds to a particular entity assigned to the particular account and that includes keys corresponding to the particular entity. A security processor uses at least some of the plurality of keys to perform cryptographic processes in response to one or more trusted execution environment commands received from the particular entity.Type: GrantFiled: June 19, 2012Date of Patent: July 15, 2014Assignee: Microsoft CorporationInventors: Mark F. Novak, Andrew John Layman, Magnus Nyström, Stefan Thom
-
Publication number: 20140173286Abstract: Input challenge based authentication techniques are described in which data regarding a user's input signature is employed for authentication of the user to access resources. Different users have distinct input signatures that are indicative of the manner in which each individual user provides input including at least typing characteristics and timing data. Data regarding input signatures may be captured from user interaction with computing devices and associated with user accounts. Once sufficient data regarding a user's input signature is captured, access to a user account may be controlled at least in part based on the input signature. To do so, an input challenge that indicates a non-secret pattern of input is presented to the user in connection with an authentication sequence. The user reproduces the non-secret pattern of input and selective access to the user account is granted depending upon whether or not the reproduction matches the input signature.Type: ApplicationFiled: December 14, 2012Publication date: June 19, 2014Applicant: Microsoft CorporationInventor: Mark F. Novak
-
Publication number: 20140040890Abstract: Cloning of a virtual machine having a trusted executed environment such as a software-based trusted platform module. In order to clone the virtual machine, the virtual machine state of the source virtual machine is copied to formulate a target virtual machine state that is to be associated with a target virtual machine. The target virtual machine is a clone of the source virtual machine state, and thus the storage hierarchy of the trusted execution environment may be the same for the trusted execution environment in the source and target virtual machine states. However, because the identity of the target virtual machine is different than that of the source virtual machine, the endorsement hierarchy of the target virtual machine state is altered such that it is based on the identity of the target virtual machine, rather than the source virtual machine.Type: ApplicationFiled: August 3, 2012Publication date: February 6, 2014Applicant: Microsoft CorporationInventors: Mark F. Novak, Andrew John Layman, Magnus Nyström, Stefan Thom
-
Patent number: 8621561Abstract: Embodiments for providing differentiated access based on authentication input attributes are disclosed. In accordance with one embodiment, a method includes receiving an authentication input at an authentication authority using an authentication protocol. The authentication input being associated with a client. The method also includes providing one or more representations for the authentication input, wherein each of the representations represents an attribute of the authentication input.Type: GrantFiled: January 4, 2008Date of Patent: December 31, 2013Assignee: Microsoft CorporationInventors: David B. Cross, Mark F. Novak, Oded Ye Shekel, Paul J. Leach, Andreas Luther, Thomas C. Jones
-
Publication number: 20130339729Abstract: A system that includes an account management module configured to maintain protected accounts. For instance, a particular protected account includes a protected data set that is not readable outside of the system, and perhaps not even readable outside of the account. The particular data set corresponds to a particular entity assigned to the particular account and that includes keys corresponding to the particular entity. A security processor uses at least some of the plurality of keys to perform cryptographic processes in response to one or more trusted execution environment commands received from the particular entity.Type: ApplicationFiled: June 19, 2012Publication date: December 19, 2013Applicant: Microsoft CorporationInventors: Mark F. Novak, Andrew John Layman, Magnus Nyström, Stefan Thom
-
Patent number: 8561152Abstract: A context of a principal is built, at a target system controlling access to a resource, independently of the principal requesting access to the resource. An authorization policy is applied, at the target system, to the context to determine whether the principal is permitted to access the resource, and an indication of whether the principal is permitted to access the resource is provided (e.g., to an administrator). Modifications can be made to the context and the authorization re-applied to determine whether a principal having the modified context is permitted to access the resource.Type: GrantFiled: May 17, 2011Date of Patent: October 15, 2013Assignee: Microsoft CorporationInventors: Mark F. Novak, Karanbir Singh, David M. McPherson, Andrey Popov, Ming Tang
-
Publication number: 20130205360Abstract: Protecting user credentials from a computing device includes establishing a secure session between a computing device and an identity provider (e.g., a Web service). Parameters of the secure session are communicated to a credential service, which renegotiates or resumes the secure session to establish a new secure session between the credential service and the identity provider. User credentials are passed from the credential service to the identity provider via the new secure session, but the computing device does not have the parameters of the new secure session and thus does not have access to the passed user credentials. The credential service then renegotiates or resumes the secure session again to establish an additional secure session between the credential service and the identity provider. Parameters of the additional secure session are communicated to the computing device to allow the computing device to continue communicating securely with the identity provider.Type: ApplicationFiled: February 8, 2012Publication date: August 8, 2013Applicant: MICROSOFT CORPORATIONInventors: Mark F. Novak, Andrew J. Layman
-
Publication number: 20130125199Abstract: A policy that governs access to a resource may be tested against real-world access requests before being used to control access to the resource. In one example, access to a resource is governed by a policy, referred to as an effective policy. When the policy is to be modified or replaced, the modification or replacement may become a test policy. When a request is made to access the resource, the request may be evaluated under both the effective policy and the test policy. Whether access is granted is determined under the effective policy, but the decision that would be made under the test policy is noted, and may be logged. If the test policy is determined to behave acceptably when confronted with real-world access requests, then the current effective policy may be replaced with the test policy.Type: ApplicationFiled: November 10, 2011Publication date: May 16, 2013Applicant: MICROSOFT CORPORATIONInventors: Mark F. Novak, Paul Leach, Vishal Agarwal, David McPherson, Sunil Gottumukkala, Jignesh Shah, Arun K. Nanda, Nir Ben Zvi, Pranav Kukreja, Ramaswamy Ranganathan
-
Patent number: 8417962Abstract: Booting a computing device includes executing one or more firmware components followed by a boot loader component. A protection component for the computing device, such as an anti-malware program, is identified and executed as an initial component after executing the boot loader component. One or more boot components are also executed, these one or more boot components including only boot components that have been approved by the protection component. A list of boot components that have been previously approved by the protection component can also be maintained in a tamper-proof manner.Type: GrantFiled: June 11, 2010Date of Patent: April 9, 2013Assignee: Microsoft CorporationInventors: Mark F. Novak, Robert Karl Spiger, Stefan Thom, David J. Linsley, Scott A. Field, Anil Francis Thomas
-
Patent number: 8365264Abstract: A password may be provided along with a validation code, which can help prevent the password from being sent to the wrong recipient. When a password is created, a validation code may be created based on (a) the password, and (b) the identity of the target of authentication (TA) to which the password is intended to be sent. When a user is requested to provide a password, validation component intercepts the request and asks the user to enter both the password and validation code. The validation component then re-calculates the validation code based on the entered password and on the TA that is requesting the password. If the re-calculated validation code matches the validation code entered by the user, then the password is released to the user agent that the user uses to communicate with the TA, and the user agent sends the password to the requesting TA.Type: GrantFiled: October 12, 2009Date of Patent: January 29, 2013Assignee: Microsoft CorporationInventor: Mark F. Novak
-
Publication number: 20120297455Abstract: A context of a principal is built, at a target system controlling access to a resource, independently of the principal requesting access to the resource. An authorization policy is applied, at the target system, to the context to determine whether the principal is permitted to access the resource, and an indication of whether the principal is permitted to access the resource is provided (e.g., to an administrator). Modifications can be made to the context and the authorization re-applied to determine whether a principal having the modified context is permitted to access the resource.Type: ApplicationFiled: May 17, 2011Publication date: November 22, 2012Applicant: MICROSOFT CORPORATIONInventors: Mark F. Novak, Karanbir Singh, David M. McPherson, Andrey Popov, Ming Tang
-
Publication number: 20120204020Abstract: Attestation by a self-regulating attestation client. The attestation client requests a credential of health from an attestation service, which includes an ordered attestation log and proof of integrity and freshness of the log. The attestation client receives the requested credential of health, which certifies the attestation client was healthy when it requested the credential of health and that the attestation service trusts the attestation client to be healthy each time the attestation client authenticates using the credential of health. The attestation client receives a request to authenticate that it is healthy using the credential of health, verifies that it is currently healthy, and performs the requested authentication.Type: ApplicationFiled: February 9, 2011Publication date: August 9, 2012Applicant: MICROSOFT CORPORATIONInventors: Mark F. Novak, Stefan Thom, Yair Tor, Alexey Efron, Amos Ortal
-
Publication number: 20110307711Abstract: Booting a computing device includes executing one or more firmware components followed by a boot loader component. A protection component for the computing device, such as an anti-malware program, is identified and executed as an initial component after executing the boot loader component. One or more boot components are also executed, these one or more boot components including only boot components that have been approved by the protection component. A list of boot components that have been previously approved by the protection component can also be maintained in a tamper-proof manner.Type: ApplicationFiled: June 11, 2010Publication date: December 15, 2011Applicant: MICROSOFT CORPORATIONInventors: Mark F. Novak, Robert Karl Spiger, Stefan Thom, David J. Linsley, Scott A. Field, Anil Francis Thomas
-
Publication number: 20110088085Abstract: A password may be provided along with a validation code, which can help prevent the password from being sent to the wrong recipient. When a password is created, a validation code may be created based on (a) the password, and (b) the identity of the target of authentication (TA) to which the password is intended to be sent. When a user is requested to provide a password, validation component intercepts the request and asks the user to enter both the password and validation code. The validation component then re-calculates the validation code based on the entered password and on the TA that is requesting the password. If the re-calculated validation code matches the validation code entered by the user, then the password is released to the user agent that the user uses to communicate with the TA, and the user agent sends the password to the requesting TA.Type: ApplicationFiled: October 12, 2009Publication date: April 14, 2011Applicant: MICROSOFT CORPORATIONInventor: Mark F. Novak
-
Publication number: 20100071048Abstract: Embodiments for performing service binding between a client and a target server are disclosed. In accordance with one embodiment, a clear text client service binding value is received from a client at the target server, the client service binding value is compared to a server service binding value, and a communication channel is formed between the client and the target server when the client service binding value matches the server service binding value.Type: ApplicationFiled: September 12, 2008Publication date: March 18, 2010Applicant: MICROSOFT CORPORATIONInventors: Mark F. Novak, Daniel Kaminsky
-
Publication number: 20090178129Abstract: Embodiments for providing differentiated access based on authentication input attributes are disclosed. In accordance with one embodiment, a method includes receiving an authentication input at an authentication authority using an authentication protocol. The authentication input being associated with a client. The method also includes providing one or more representations for the authentication input, wherein each of the representations represents an attribute of the authentication input.Type: ApplicationFiled: January 4, 2008Publication date: July 9, 2009Applicant: MICROSOFT CORPORATIONInventors: David B. Cross, Mark F. Novak, Oded Ye Shekel, Paul J. Leach, Andreas Luther, Thomas C. Jones