Patents by Inventor Todd Carpenter
Todd Carpenter has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 9436400Abstract: A device configuration silo is arranged to be accessed as an IEEE 1667-compatible silo which exposes interfaces to a host application to make changes to the presence of one or more other silos, as well as make changes to silo configurations on a per-silo basis for data and method sharing among silos across the ACTs on a storage device such as a transient storage device. The interfaces exposed by the device configuration silo are arranged to enable an authenticated provisioner, like administrator in a corporate network environment, to perform configuration changes to silos after the storage device is released into the field through a secure provisioning mechanism. In addition, users may make configuration changes to silos at runtime in some usage scenarios, for example to enable discrete portions of functionality on a storage device, by using a secure secondary authentication mechanism that is exposed by the device configuration silo.Type: GrantFiled: January 5, 2015Date of Patent: September 6, 2016Assignee: MICROSOFT TECHNOLOGY LICENSING, LLCInventors: David Abzarian, Harish S. Kulkarni, Todd Carpenter
-
Publication number: 20150193165Abstract: A device configuration silo is arranged to be accessed as an IEEE 1667-compatible silo which exposes interfaces to a host application to make changes to the presence of one or more other silos, as well as make changes to silo configurations on a per-silo basis for data and method sharing among silos across the ACTs on a storage device such as a transient storage device. The interfaces exposed by the device configuration silo are arranged to enable an authenticated provisioner, like administrator in a corporate network environment, to perform configuration changes to silos after the storage device is released into the field through a secure provisioning mechanism. In addition, users may make configuration changes to silos at runtime in some usage scenarios, for example to enable discrete portions of functionality on a storage device, by using a secure secondary authentication mechanism that is exposed by the device configuration silo.Type: ApplicationFiled: January 5, 2015Publication date: July 9, 2015Inventors: David Abzarian, Harish S. Kulkarni, Todd Carpenter
-
Patent number: 8984653Abstract: An electronic device can be locked and secured by activating a hardware locking mechanism on the device. The locking mechanism is controlled by a locking policy that is defined and implemented from the client side. If the locking mechanism is activated, then the device operates in a limited mode of operation instead of in a normal mode of operation. The locking mechanism can be deactivated, placing the device into the normal mode of operation, when a specified condition is satisfied.Type: GrantFiled: April 3, 2008Date of Patent: March 17, 2015Assignee: Microsoft Technology Licensing, LLCInventors: Mark St. John, Martin Holladay, Todd Carpenter, James Duffus, Ricardo Lopez-Barquilla
-
Patent number: 8930655Abstract: A device configuration silo is arranged to be accessed as an IEEE 1667-compatible silo which exposes interfaces to a host application to make changes to the presence of one or more other silos, as well as make changes to silo configurations on a per-silo basis for data and method sharing among silos across the ACTs on a storage device such as a transient storage device. The interfaces exposed by the device configuration silo are arranged to enable an authenticated provisioner, like administrator in a corporate network environment, to perform configuration changes to silos after the storage device is released into the field through a secure provisioning mechanism. In addition, users may make configuration changes to silos at runtime in some usage scenarios, for example to enable discrete portions of functionality on a storage device, by using a secure secondary authentication mechanism that is exposed by the device configuration silo.Type: GrantFiled: January 19, 2009Date of Patent: January 6, 2015Assignee: Microsoft CorporationInventors: David Abzarian, Harish S. Kulkarni, Todd Carpenter
-
Patent number: 8533801Abstract: A system for binding a subscription-based computer to an internet service provider (ISP) may include a binding module and a security module residing on the computer. The binding module may identify and authenticate configuration data from peripheral devices that attempt to connect to the computer, encrypt any requests for data from the computer to the ISP, and decrypt responses from the ISP. If the binding module is able to authenticate the configuration data and the response to the request for data from the ISP, then the security module may allow the communication between the computer and the ISP. However, if either the configuration cycle or the response cannot be properly verified, then the security module may degrade operation of the computer.Type: GrantFiled: June 14, 2011Date of Patent: September 10, 2013Assignee: Microsoft CorporationInventors: Todd Carpenter, Shon Schmidt, David J. Sebesta, William J. Westerinen
-
Patent number: 8161532Abstract: A system for managing a subscription-based computer independent of an operating system of the computer may include a security module that accesses, decrements, and stores subscription data during operation of the subscription-based computer. Additionally, the system may include a network module in communication with the security module and comprising a network stack, a web server, and a user interface in an operating system independent format. A web browser of the computer may request the user interface from the network stack. The interface may be populated with the subscription data, and a network driver may retrieve the populated user interface from the network module. The populated interface may then be sent to the web server to be served back to the requesting web browser.Type: GrantFiled: April 4, 2007Date of Patent: April 17, 2012Assignee: Microsoft CorporationInventors: David J. Sebesta, Shon Schmidt, William J. Westerinen, Todd Carpenter
-
Publication number: 20110271335Abstract: A system for binding a subscription-based computer to an internet service provider (ISP) may include a binding module and a security module residing on the computer. The binding module may identify and authenticate configuration data from peripheral devices that attempt to connect to the computer, encrypt any requests for data from the computer to the ISP, and decrypt responses from the ISP. If the binding module is able to authenticate the configuration data and the response to the request for data from the ISP, then the security module may allow the communication between the computer and the ISP. However, if either the configuration cycle or the response cannot be properly verified, then the security module may degrade operation of the computer.Type: ApplicationFiled: June 14, 2011Publication date: November 3, 2011Applicant: MICROSOFT CORPORATIONInventors: Todd Carpenter, Shon Schmidt, David J. Sebesta, William J. Westerinen
-
Patent number: 7984497Abstract: A system for binding a subscription-based computer to an internet service provider (ISP) may include a binding module and a security module residing on the computer. The binding module may identify and authenticate configuration data from peripheral devices that attempt to connect to the computer, encrypt any requests for data from the computer to the ISP, and decrypt responses from the ISP. If the binding module is able to authenticate the configuration data and the response to the request for data from the ISP, then the security module may allow the communication between the computer and the ISP. However, if either the configuration cycle or the response cannot be properly verified, then the security module may degrade operation of the computer.Type: GrantFiled: April 4, 2007Date of Patent: July 19, 2011Assignee: Microsoft CorporationInventors: Todd Carpenter, Shon Schmidt, David J. Sebesta, William J. Westerinen
-
Publication number: 20100185825Abstract: A device configuration silo is arranged to be accessed as an IEEE 1667-compatible silo which exposes interfaces to a host application to make changes to the presence of one or more other silos, as well as make changes to silo configurations on a per-silo basis for data and method sharing among silos across the ACTs on a storage device such as a transient storage device. The interfaces exposed by the device configuration silo are arranged to enable an authenticated provisioner, like administrator in a corporate network environment, to perform configuration changes to silos after the storage device is released into the field through a secure provisioning mechanism. In addition, users may make configuration changes to silos at runtime in some usage scenarios, for example to enable discrete portions of functionality on a storage device, by using a secure secondary authentication mechanism that is exposed by the device configuration silo.Type: ApplicationFiled: January 19, 2009Publication date: July 22, 2010Applicant: MICROSOFT CORPORATIONInventors: David Abzarian, Harish S. Kulkarni, Todd Carpenter
-
Publication number: 20090287917Abstract: To protect against software piracy, a storage media has a cryptographically protected area that stores software to be installed onto a target device, such as a computer. The storage media may include a non-secure area holding boot files and an installation program. The installation program may gather target device-specific data for use by a certifying authority in generating a key that allows access to the secure area of the storage media only during the installation process. In this manner, a user never has access to the raw installation files, limiting the ability to copy and distribute those files for installation on non-authorized computers. The certifying authority may also prepare target device-specific data applied to the software before installation to create a custom software image that will only execute on the target device and that can be verified by the host OS prior to execution, allowing integrity confirmation.Type: ApplicationFiled: May 19, 2008Publication date: November 19, 2009Applicant: MICROSOFT CORPORATIONInventors: Todd Carpenter, David Abzarian, Mark Myers, David James Foster, Teddy Liu, Ethan Toon Wu Ang, Suzie Mitchell
-
Publication number: 20090254995Abstract: An electronic device can be locked and secured by activating a hardware locking mechanism on the device. The locking mechanism is controlled by a locking policy that is defined and implemented from the client side. If the locking mechanism is activated, then the device operates in a limited mode of operation instead of in a normal mode of operation. The locking mechanism can be deactivated, placing the device into the normal mode of operation, when a specified condition is satisfied.Type: ApplicationFiled: April 3, 2008Publication date: October 8, 2009Applicant: MICROSOFT CORPORATIONInventors: Mark St. John, Martin Holladay, Todd Carpenter, James Duffus, Ricardo Lopez-Barquilla
-
Publication number: 20080250129Abstract: A system for binding a subscription-based computer to an internet service provider (ISP) may include a binding module and a security module residing on the computer. The binding module may identify and authenticate configuration data from peripheral devices that attempt to connect to the computer, encrypt any requests for data from the computer to the ISP, and decrypt responses from the ISP. If the binding module is able to authenticate the configuration data and the response to the request for data from the ISP, then the security module may allow the communication between the computer and the ISP. However, if either the configuration cycle or the response cannot be properly verified, then the security module may degrade operation of the computer.Type: ApplicationFiled: April 4, 2007Publication date: October 9, 2008Applicant: MICROSOFT CORPORATIONInventors: Todd Carpenter, Shon Schmidt, David J. Sebesta, William J. Westerinen
-
Publication number: 20080250476Abstract: A form of removable memory, such as a universal serial bus (USB) flash device, may enable a subscription-based computing system from any PC. The device may include an execution unit including a processor, a private memory including an encrypted application, a computing system interface, a cryptographic unit including a secure storage with a number of metering units, and a computer-readable medium. The computer-readable medium may include instructions for routing messages and data from the execution unit through the computing system interface to a connected computing system. Further, encrypted application data may be routed through the cryptographic unit to the execution unit to thereby transform the encrypted application into executable data for use by the computing system. Also, the device may decrement a number of metering units stored at the device during execution of the encrypted application by the computer.Type: ApplicationFiled: April 4, 2007Publication date: October 9, 2008Applicant: MICROSOFT CORPORATIONInventors: Mark Myers, William J. Westerinen, Todd Carpenter, Shaun Wiley, Don Hyun
-
Publication number: 20080250237Abstract: A system for managing a subscription-based computer independent of an operating system of the computer may include a security module that accesses, decrements, and stores subscription data during operation of the subscription-based computer. Additionally, the system may include a network module in communication with the security module and comprising a network stack, a web server, and a user interface in an operating system independent format. A web browser of the computer may request the user interface from the network stack. The interface may be populated with the subscription data, and a network driver may retrieve the populated user interface from the network module. The populated interface may then be sent to the web server to be served back to the requesting web browser.Type: ApplicationFiled: April 4, 2007Publication date: October 9, 2008Applicant: MICROSOFT CORPORATIONInventors: David J. Sebesta, Shon Schmidt, William J. Westerinen, Todd Carpenter
-
Publication number: 20080250250Abstract: A form of removable memory, such as a universal serial bus (USB) flash device (UFD), may allow secure storage of and access to a time balance of a pay-per-use or subscription computing system. A computing device may establish a secure connection to a portable secure computing device to access a stored time balance or other device-enabling, exhaustible data. During operation, the device may deplete the balance. Upon reaching a threshold depletion of the balance, the user may add more data to continue device use. The device may include a processor and a secure memory including identification and subscription data. Further, the device may store configuration data that may be used by the computer to bind the device to a particular subscription service or internet service provider.Type: ApplicationFiled: April 4, 2007Publication date: October 9, 2008Applicant: MICROSOFT CORPORATIONInventors: William J. Westerinen, Todd Carpenter, Stephen R. Drake, Mark Myers
-
Publication number: 20070244820Abstract: A method and apparatus for assuring delivery of paid advertising to a user may involve asking a question about an advertisement or requiring data about the advertisement to be entered. In one embodiment, a human presence indicator, such as stylized letters, may be displayed during or after the presentation of an advertisement to be copied by a user to indicate presence during the advertisement. When the challenge relating to ad viewing is correctly answered, a value associated with viewing the ad may be credited to a user account, either locally or at a clearinghouse or other repository.Type: ApplicationFiled: June 20, 2007Publication date: October 18, 2007Applicant: MICROSOFT CORPORATIONInventors: William Westerinen, Hanumant Yadav, James Duffus, Todd Carpenter
-
Publication number: 20070234088Abstract: Embodiments of the present invention are directed at identifying an idle state for a processor that minimizes power consumption. In accordance with one embodiment, a method for identifying a target idle state that does not require a linear progression into any intermediate states is provided. More specifically the method includes collecting data from a plurality of data sources that describes activities occurring on the computer and/or attributes of the hardware platform. Then, using the collected data, a target idle state for the processor is calculated. Finally, if the current idle state of the processor is different than the target idle state, the method causes the idle state of the processor to be changed to the target idle state.Type: ApplicationFiled: April 4, 2006Publication date: October 4, 2007Applicant: Microsoft CorporationInventors: Allen Marshall, Andrew Ritz, Todd Carpenter
-
Publication number: 20070180047Abstract: A system and method for providing authentication of remotely collected external sensor measures is presented. Physiological measures are collected from a source situated remotely from a repository for accumulating such collected physiological measures. An identification of the source from which the physiological measures were collected is determined against authentication data that uniquely identifies a specific patient. The physiological measures are forwarded to the repository upon authenticating the patient identification as originating from the specific patient.Type: ApplicationFiled: December 12, 2005Publication date: August 2, 2007Inventors: Yanting Dong, Todd Carpenter, Quan Ni, Kenneth Hoyme
-
Publication number: 20070162776Abstract: Processor power management capabilities that enable an operating system kernel to interact with a plurality of ACPI-compliant computing devices to manage processor power using a generic processor description is described. Specifications of power processor management capabilities of processor types are stored in data structures, i.e., objects. Each object contains a control value field and a control mask field and may also contain a status value field and a status mask field. The kernel loads a generic processor driver and objects for each processor type enabling the kernel to respond to power management events such as, but are not limited to, processor utilization and processor operating temperature events. In response to a power management event, the kernel calculates a desired processor performance state; sets bits in the control mask field to describe the desired processor performance state; and passes the control mask to the generic processor driver which controls the processor.Type: ApplicationFiled: January 9, 2006Publication date: July 12, 2007Inventors: Todd Carpenter, Allen Marshall, Andrew Ritz
-
Publication number: 20060288326Abstract: A method of domain modeling for use in generating a computer application. The method includes selecting a generic signature for a general domain element type, creating a specific signature for a specific domain element within the domain element type, and saving the specific signature to a memory for use in the computer application. The generic signature including a plurality of attributes. Creating the specific signature includes populating each of the plurality of attributes with a specific attribute datum.Type: ApplicationFiled: May 25, 2005Publication date: December 21, 2006Inventors: Michelle Raymond, Todd Carpenter, Dal Vernon Reising, Christopher Miller