Patents by Inventor Ryan M. Burkhardt

Ryan M. Burkhardt has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 7933413
    Abstract: Key exchanges between peer-to-peer devices can be vulnerable to man in the middle attacks. Verification of the key exchanges can be made on a channel, network and/or device different from the channel, network and/or device used for the key exchange to determine whether the key exchange was secure. Verification of the key exchange can also be made through an established and trusted device and/or entity. If the key exchange was secure, the parties to a communication utilizing the key(s) exchanged can be notified, if desired. If the key exchange was not secure, the parties can be notified and the communication can be selectively disconnected.
    Type: Grant
    Filed: February 2, 2007
    Date of Patent: April 26, 2011
    Assignee: Microsoft Corporation
    Inventors: David J. Steeves, Gregory D. Hartrell, Ryan M. Burkhardt, Jason L. Cohen
  • Publication number: 20100228825
    Abstract: The claimed subject matter provides a system and/or a method that facilitates enhancing the employment of a telepresence session. An automatic telepresence engine that can evaluate data associated with at least one of an attendee, a schedule for an attendee, or a portion of an electronic communication for an attendee. The automatic telepresence engine can identify at least one the following for a telepresence session based upon the evaluated data: a participant to include for the telepresence session, a portion of data related to a presentation within the telepresence session, a portion of data related to a meeting topic within the telepresence session, a device utilized by an attendee to communicate within the telepresence session. The automatic telepresence engine can initiate the telepresence session within a communication framework that includes two or more virtually represented users that communicate therein.
    Type: Application
    Filed: March 6, 2009
    Publication date: September 9, 2010
    Applicant: MICROSOFT CORPORATION
    Inventors: Rajesh Kutpadi Hegde, Xuedong David Huang, Sharon Kay Cunnington, Jin Li, Michel Pahud, Ryan M. Burkhardt, Kori Marie Quinn, Jayman Dalal, Zhengyou Zhang
  • Publication number: 20080189548
    Abstract: Key exchanges between peer-to-peer devices can be vulnerable to man in the middle attacks. Verification of the key exchanges can be made on a channel, network and/or device different from the channel, network and/or device used for the key exchange to determine whether the key exchange was secure. Verification of the key exchange can also be made through an established and trusted device and/or entity. If the key exchange was secure, the parties to a communication utilizing the key(s) exchanged can be notified, if desired. If the key exchange was not secure, the parties can be notified and the communication can be selectively disconnected.
    Type: Application
    Filed: February 2, 2007
    Publication date: August 7, 2008
    Applicant: MICROSOFT CORPORATION
    Inventors: David J. Steeves, Gregory D. Hartrell, Ryan M. Burkhardt, Jason L. Cohen
  • Publication number: 20080016572
    Abstract: To detect the presence of malicious software in a system, selected data in memory of the system is stored in a designated storage location and analyzed by a known safe operating system. In an example configuration, a snapshot of system memory is downloaded to a dedicated device coupled to the motherboard of the system. A clean, uncorrupted operating system is loaded into the dedicated device, and the snapshot is analyzed utilizing the clean operating system. If malicious software is detected, the system is repaired using the clean operating system. In an example embodiment, this process is initiated when the system goes into a hibernation state, and/or during a system restoration operation.
    Type: Application
    Filed: July 12, 2006
    Publication date: January 17, 2008
    Applicant: Microsoft Corporation
    Inventors: Ryan M. Burkhardt, Alexey Polyakov