Patents by Inventor Monica Ene-Pietrosanu

Monica Ene-Pietrosanu has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 7602903
    Abstract: Methods and apparatuses are provided that can inform certain processes and/or even the user about the relative strength/weakness of cryptography services being used. In certain methods, for example, at least one cryptography service parameter threshold is established. The method further includes, selectively detecting a request for at least one cryptography service, and selectively performing at least one correctness detection action based on the requested cryptography service and the cryptography service parameter threshold. The cryptography service parameter threshold identifies acceptable/unacceptable cryptography algorithms, acceptable/unacceptable cryptography key size parameters, acceptable/unacceptable cryptography seed size parameters, and other like parameters that the requested cryptography service information can be compared with.
    Type: Grant
    Filed: January 16, 2004
    Date of Patent: October 13, 2009
    Assignee: Microsoft Corporation
    Inventors: Monica Ene-Pietrosanu, Sermet Iskin, Rajesh Ramadoss
  • Publication number: 20070113074
    Abstract: A revocation determination service determines for a client whether a particular digital certificate as issued by a particular certificate authority (CA) has been revoked by such CA. In the service, an engine receives a query from the client, where the query identifies the particular certificate and the CA that issued the particular certificate. At least one provider is resident at the service, where each provider corresponds to a revocation information repository and represents the corresponding repository at the service, and connects to the corresponding repository. Each repository has revocation information from at least one CA. A configuration store includes a configuration information record corresponding to each provider resident at the service. Each configuration information record includes an identification of the provider and of each CA that the repository corresponding to such provider has revocation information for.
    Type: Application
    Filed: November 14, 2005
    Publication date: May 17, 2007
    Applicant: Microsoft Corporation
    Inventors: Avi Ben-Menahem, Monica Ene-Pietrosanu, Vishal Agarwal
  • Publication number: 20060179309
    Abstract: Systems and methods for managing multiple keys for file encryption and decryption may provide an encrypted list of previously used keys. The list itself may be encrypted using a current key. To decrypt files that are encrypted in one or more of the previous keys, the list can be decrypted, and the appropriate previous key can be retrieved. To re-key files, an automated process can decrypt any files using previous keys and encrypt them using the current key. If a new current key is introduced, the prior current key can be used to decrypt the list of keys, the prior current key can be added to the list, and the list can be re-encrypted using the new current key.
    Type: Application
    Filed: February 7, 2005
    Publication date: August 10, 2006
    Applicant: Microsoft Corporation
    Inventors: David Cross, Duncan Bryce, Jianrong Gu, Kelvin Yiu, Monica Ene-Pietrosanu
  • Publication number: 20050235342
    Abstract: Methods and apparatuses are provided that can inform certain processes and/or even the user about the relative strength/weakness of cryptography services being used. In certain methods, for example, at least one cryptography service parameter threshold is established. The method further includes, selectively detecting a request for at least one cryptography service, and selectively performing at least one correctness detection action based on the requested cryptography service and the cryptography service parameter threshold. The cryptography service parameter threshold identifies acceptable/unacceptable cryptography algorithms, acceptable/unacceptable cryptography key size parameters, acceptable/unacceptable cryptography seed size parameters, and other like parameters that the requested cryptography service information can be compared with.
    Type: Application
    Filed: January 16, 2004
    Publication date: October 20, 2005
    Inventors: Monica Ene-Pietrosanu, Sermet Iskin, Rajesh Ramadoss