Patents by Inventor Robert C. Fruth

Robert C. Fruth has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 9853940
    Abstract: To protect network-based services, offering computer implemented functionality, from attacks, a passive web application firewall reactively identifies vulnerabilities, enabling such vulnerabilities to be quickly ameliorated, without intercepting communications or introducing other suboptimal aspects of traditional web application firewalls. Communications directed to the network-based services are logged and such logs are scanned for entries evidencing attacks, such as based on predetermined attack syntax. Further evaluation of the entries identified as evidencing attacks identifies a subset of those entries that correspond to likely successful attacks. Such further evaluation includes attacking the network-based service in an equivalent manner. Attacks that are found to be successful identify vulnerabilities, and a notification of such vulnerabilities is provided to facilitate amelioration of such vulnerabilities.
    Type: Grant
    Filed: September 24, 2015
    Date of Patent: December 26, 2017
    Assignee: Microsoft Technology Licensing, LLC
    Inventors: Robert C. Fruth, Viresh Ramdatmisier, Barry Markey, Robert Fish, Erik Tayler, Dragos Boia, Donald Ankney
  • Publication number: 20170093795
    Abstract: To protect network-based services, offering computer implemented functionality, from attacks, a passive web application firewall reactively identifies vulnerabilities, enabling such vulnerabilities to be quickly ameliorated, without intercepting communications or introducing other suboptimal aspects of traditional web application firewalls. Communications directed to the network-based services are logged and such logs are scanned for entries evidencing attacks, such as based on predetermined attack syntax. Further evaluation of the entries identified as evidencing attacks identifies a subset of those entries that correspond to likely successful attacks. Such further evaluation includes attacking the network-based service in an equivalent manner. Attacks that are found to be successful identify vulnerabilities, and a notification of such vulnerabilities is provided to facilitate amelioration of such vulnerabilities.
    Type: Application
    Filed: September 24, 2015
    Publication date: March 30, 2017
    Inventors: Robert C. Fruth, Viresh Ramdatmisier, Barry Markey, Robert Fish, Erik Tayler, Dragos Boia, Donald Ankney
  • Patent number: 9047477
    Abstract: Architecture that stores specific passwords on behalf of users, and encrypts the passwords using encryption keys managed by a distributed key management system. The encryption keys are stored in a directory service (e.g., hierarchical) in an area that is inaccessible by selected entities (e.g., administrative users) having superior permissions such as supervisory administrators, but accessible to the account components that need to access the unencrypted passwords. The distributed key management system makes the encryption key stored in the directory service available to all hardware/software components that need the key to encrypt or decrypt the passwords.
    Type: Grant
    Filed: May 26, 2009
    Date of Patent: June 2, 2015
    Assignee: Microsoft Technology Licensing, LLC
    Inventors: Fabian Nunez-Tejerina, Jeffrey B. Kay, Robert C. Fruth, Naveen A. Palavalli, Ramesh Chinta, Tolga Acar
  • Publication number: 20100306554
    Abstract: Architecture that stores specific passwords on behalf of users, and encrypts the passwords using encryption keys managed by a distributed key management system. The encryption keys are stored in a directory service (e.g., hierarchical) in an area that is inaccessible by selected entities (e.g., administrative users) having superior permissions such as supervisory administrators, but accessible to the account components that need to access the unencrypted passwords. The distributed key management system makes the encryption key stored in the directory service available to all hardware/software components that need the key to encrypt or decrypt the passwords.
    Type: Application
    Filed: May 26, 2009
    Publication date: December 2, 2010
    Applicant: Microsoft Corporation
    Inventors: Fabian Nunez-Tejerina, Jeffrey B. Kay, Robert C. Fruth, Naveen A. Palavalli, Ramesh Chinta, Tolga Acar