Patents by Inventor Simon Earnshaw

Simon Earnshaw has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20090228823
    Abstract: A user interface for portable storage devices is disclosed. The user interface includes an icon that is displayed as part of the portable storage device. The icon can provide storage information. It can also provide a synchronization, backup, and file transfer animation. One or more of the following visual cues can be provided: a visual cue to indicate the amount of additional memory that will be consumed before performing a copy/transfer task, a visual cue to indicate whether it is safe or unsafe to eject the portable storage device, a visual cue to indicate an alert or conflict condition, and a visual cue to indicate the success or completion of an activity. The same type of icon and visual cues can be displayed on the host system. The host system can also display an enhanced version of the icon as well as a menu to give additional details pertaining to the state and contents of the portable storage device. An expanded view can be implemented to provide protection information.
    Type: Application
    Filed: March 7, 2008
    Publication date: September 10, 2009
    Applicant: MICROSOFT CORPORATION
    Inventors: Rodney Edwards, Cinthya Urasaki, Adam Bronsther, William Poole, Simon Earnshaw
  • Publication number: 20060005249
    Abstract: Tampering with pieces of software is inhibited. Installation setup protection inhibits tampering during the installation of various pieces of software. Profiles are stored in a central hierarchical database and such profiles are protected from tampering. The obfuscation of a software image so as to becloud the comprehension of hackers in reverse engineering pieces of software comprising the software image is provided.
    Type: Application
    Filed: February 17, 2005
    Publication date: January 5, 2006
    Applicant: Microsoft Corporation
    Inventors: Wei Wu, Frank Chu, Julie Bennett, Mohammed El-Gammal, Simon Earnshaw, Rerkboon Suwanasuk
  • Publication number: 20060005251
    Abstract: Tampering with pieces of software is inhibited. The obfuscation of a software image so as to becloud the comprehension of hackers in reverse engineering pieces of software comprising the software image is provided. A process of verifying whether the pieces of software together constitute a software package that requires protection from tampering is also provided. Another process for determining whether the hardware resources, such as the central processing unit or the cache memory on a computing machine, belong to a class for which inhibiting software tampering is possible, is also provided.
    Type: Application
    Filed: February 17, 2005
    Publication date: January 5, 2006
    Applicant: Microsoft Corporation
    Inventors: Wei Wu, Frank Chu, Erik Fortune, Julie Bennett, Mohammed El-Gammal, Simon Earnshaw
  • Publication number: 20060005248
    Abstract: Tampering with pieces of software is inhibited. Registry protection prevents changes made to keys and values in a central hierarchical database. Hardware protection prevents hackers from forcing various pieces of software from running on unauthorized pieces of hardware. The obfuscation of a software image so as to becloud the comprehension of hackers in reverse engineering pieces of software comprising the software image is provided. Image verification ensures the originality of the pieces of software to be installed.
    Type: Application
    Filed: February 17, 2005
    Publication date: January 5, 2006
    Applicant: Microsoft Corporation
    Inventors: Wei Wu, Julie Bennett, Frank Chu, Mohammed El-Gammal, Simon Earnshaw
  • Publication number: 20050278553
    Abstract: Tampering with pieces of software is inhibited. Hardware protection prevents hackers from forcing various pieces of software from running on unauthorized pieces of hardware. The obfuscation of a software image so as to becloud the comprehension of hackers in reverse engineering pieces of software comprising the software image is provided. Image verification ensures the originality of the pieces of software to be installed.
    Type: Application
    Filed: February 17, 2005
    Publication date: December 15, 2005
    Applicant: Microsoft Corporation
    Inventors: Wei Wu, Erik Fortune, Julie Bennett, Frank Chu, Mohammed El-Gammal, Simon Earnshaw
  • Publication number: 20050278791
    Abstract: Tampering with pieces of software is inhibited. Service protection inhibits tampering by allowing various unauthorized services to execute. Profiles are stored in a central hierarchical database and such profiles are protected from tampering. The obfuscation of a software image so as to becloud the comprehension of hackers in reverse engineering pieces of software comprising the software image is provided.
    Type: Application
    Filed: February 17, 2005
    Publication date: December 15, 2005
    Applicant: Microsoft Corporation
    Inventors: Frank Chu, Wei Wu, Julie Bennett, Mohammed El-Gammal, Simon Earnshaw