Patents by Inventor William J. Westerinen

William J. Westerinen has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20110271335
    Abstract: A system for binding a subscription-based computer to an internet service provider (ISP) may include a binding module and a security module residing on the computer. The binding module may identify and authenticate configuration data from peripheral devices that attempt to connect to the computer, encrypt any requests for data from the computer to the ISP, and decrypt responses from the ISP. If the binding module is able to authenticate the configuration data and the response to the request for data from the ISP, then the security module may allow the communication between the computer and the ISP. However, if either the configuration cycle or the response cannot be properly verified, then the security module may degrade operation of the computer.
    Type: Application
    Filed: June 14, 2011
    Publication date: November 3, 2011
    Applicant: MICROSOFT CORPORATION
    Inventors: Todd Carpenter, Shon Schmidt, David J. Sebesta, William J. Westerinen
  • Patent number: 8041904
    Abstract: In order to provide a more efficient persistent storage device, one or more long-term storage media are included along with a non-volatile memory. In one embodiment, one portion of the non-volatile memory is used as a write buffer and a read cache for writes and reads to the long-term storage media. Interfaces are provided for controlling the use of the non-volatile memory as a write buffer and a read cache. Additionally, a portion of the non-volatile memory is used to provide a direct mapping for specified sectors of the long-term storage media. Descriptive data regarding the persistent storage device is stored in another portion of the non-volatile memory.
    Type: Grant
    Filed: November 30, 2009
    Date of Patent: October 18, 2011
    Assignee: Microsoft Corporation
    Inventors: Cenk Ergan, Clark D. Nicholson, Dan Teodosiu, Dean L. DeWhitt, Emily Nicole Hill, Hanumantha R. Kodavalla, Michael J. Zwilling, John M. Parchem, Michael R. Fortin, Nathan Steven Obr, Rajeev Y. Nagar, Surenda Verma, Therron Powell, William J. Westerinen, Mark Joseph Zbikowski, Patrick L. Stemen
  • Patent number: 8014976
    Abstract: A security module is used to perform an audit of both a computer memory and the computer's processor status. The security module may assert itself as a bus master to read the computer memory without dependence on a program running on the computer. In addition, using a separate hardware path, the security module may access processor register data using a debug port. The security module may collect both memory and processor status information without the use of any of the computer resources being measured, avoiding either alteration of the data by the measurement tool or tampering with the data while being collected.
    Type: Grant
    Filed: October 24, 2007
    Date of Patent: September 6, 2011
    Assignee: Microsoft Corporation
    Inventors: Todd L. Carpenter, William J. Westerinen
  • Patent number: 7984497
    Abstract: A system for binding a subscription-based computer to an internet service provider (ISP) may include a binding module and a security module residing on the computer. The binding module may identify and authenticate configuration data from peripheral devices that attempt to connect to the computer, encrypt any requests for data from the computer to the ISP, and decrypt responses from the ISP. If the binding module is able to authenticate the configuration data and the response to the request for data from the ISP, then the security module may allow the communication between the computer and the ISP. However, if either the configuration cycle or the response cannot be properly verified, then the security module may degrade operation of the computer.
    Type: Grant
    Filed: April 4, 2007
    Date of Patent: July 19, 2011
    Assignee: Microsoft Corporation
    Inventors: Todd Carpenter, Shon Schmidt, David J. Sebesta, William J. Westerinen
  • Patent number: 7979721
    Abstract: A pay-per-use computer, or other electronic device that uses local security, may use a security module or other circuit for monitoring and enforcement of a usage policy. To help prevent physical attacks on the security module, or the circuit board near the security module, a second circuit may be mounted over the security module to help prevent access to the security module. Both circuits may be mounted on a interposer and the interposer mounted to the circuit board, creating a stack including the first circuit, the interposer, the security module, and a main PC board. When the PC board includes dense signal traces under the security module a three dimensional envelope is created around the security module. When the first circuit is a high value circuit, such as a Northbridge, the risk/reward of attacking the security module is increased substantially and may deter all but the most determined hackers.
    Type: Grant
    Filed: December 18, 2006
    Date of Patent: July 12, 2011
    Assignee: Microsoft Corporation
    Inventors: William J. Westerinen, Todd L. Carpenter, Alexander Frank, Shon Schmidt, Stephen Richard Drake, David James Foster, Tse-Ching James Yu
  • Patent number: 7971056
    Abstract: A computer is configured for either full operation with metering or limited mode operation. When in limited mode operation, the system memory may be partitioned into active and restricted memory. The active memory may be limited to an amount needed to execute a limited mode operation application. The remaining restricted memory may be made inaccessible to the computer's processor. To verify the restricted memory remains unused, it may be filled with a pattern and the pattern periodically verified to determine that unauthorized programs are not using the restricted memory.
    Type: Grant
    Filed: December 18, 2006
    Date of Patent: June 28, 2011
    Assignee: Microsoft Corporation
    Inventors: William J. Westerinen, Todd L. Carpenter
  • Patent number: 7913182
    Abstract: A method and system for auxiliary display of information for a computing device. An auxiliary display is integrated with a computing system to provide an area where notifications can be peripherally presented off-screen. Whenever a background task sends a notification to the main display of the system, the notification may be redirected to appear instead on the auxiliary display. A user may then glance at the notification appearing on the auxiliary display to be informed of the message without interruption from the current task onscreen. Any type of information may be presented on the auxiliary display including incoming communications, meeting reminders, system alerts, and information from Internet subscription services. The auxiliary display may be placed on the central processor chassis or on the monitor border along with LED indicator lights to provide simple peripheral-vision notification. By pressing a button, a user may obtain additional detailed follow-up information.
    Type: Grant
    Filed: August 23, 2006
    Date of Patent: March 22, 2011
    Assignee: Microsoft Corporation
    Inventors: Eric Gould Bear, Chad Magendanz, Aditha May Adams, Carl Ledbetter, Steve Kaneko, Chris Schoppa, Adrian Chandley, William J. Westerinen, Dale C. Crosier, Robert Scott Plank
  • Patent number: 7913295
    Abstract: A form of removable memory, such as a universal serial bus (USB) flash device, may enable a subscription-based computing system from any PC. The device may include an execution unit including a processor, a private memory including an encrypted application, a computing system interface, a cryptographic unit including a secure storage with a number of metering units, and a computer-readable medium. The computer-readable medium may include instructions for routing messages and data from the execution unit through the computing system interface to a connected computing system. Further, encrypted application data may be routed through the cryptographic unit to the execution unit to thereby transform the encrypted application into executable data for use by the computing system. Also, the device may decrement a number of metering units stored at the device during execution of the encrypted application by the computer.
    Type: Grant
    Filed: April 4, 2007
    Date of Patent: March 22, 2011
    Assignee: Microsoft Corporation
    Inventors: Mark Myers, William J. Westerinen, Todd L. Carpenter, Shaun Wiley, Don Hyun
  • Publication number: 20100325559
    Abstract: Techniques are disclosed herein for allowing sharing of notes and ideas between electronic devices. The presence of a number of electronic devices is determined. A determination is made that the electronic devices are to be part of a shared workspace. A shared workspace is generated for the electronic devices. The shared workspace is displayed on a display screen of at least one of the electronic devices. The shared workspace that is displayed may be based on the capabilities of the electronic device. The shared workspace that is displayed may reflect the location of the electronic devices.
    Type: Application
    Filed: June 18, 2009
    Publication date: December 23, 2010
    Inventors: William J. Westerinen, J. Edward Allard, Julio Estrada, Michael Alan Dougherty
  • Publication number: 20100317371
    Abstract: A context-aware mobile device such as a cell phone automatically determines appropriate user interface (UI) settings to implement at different times and/or locations. A behavior of the mobile device is tracked by determining locations visited and UI settings which are manually configured by the user. Patterns in the movement and UI settings relative to one another and to time are detected. When a particular location or time is subsequently reached which corresponds to the pattern, an appropriate UI setting can be implemented, thereby relieving the user of this task. Locations can be detected by electromagnetic signals at different locations, such as from a Wi-Fi network, Bluetooth network, RF or infrared beacon, or a wireless point-of-sale terminal. An identifier from the signals such as an SSID can be stored. Labels for locations can be automatically assigned, or the user can be prompted to provide a label for commonly visited locations.
    Type: Application
    Filed: June 12, 2009
    Publication date: December 16, 2010
    Inventors: William J. Westerinen, Miller T. Abel, Charles J. Migos
  • Publication number: 20100317332
    Abstract: A mobile device such as a cell phone is used to remotely control an electronic appliance such as a television or personal computer. In a setup phase, the mobile device captures an image of the electronic appliance and identifies and stores scale-invariant features of the image. A user interface configuration such as a virtual keypad configuration, and a communication protocol, can be associated with the stored data. Subsequently, in an implementation phase, another image of the electronic appliance is captured and compared to the stored features in a library to identify a match. In response, the associated user interface configuration and communication protocol are implemented to control the electronic appliance. In a polling and reply process, the mobile device captures a picture of a display of the electronic device and compares it to image data which is transmitted by the electronic appliance.
    Type: Application
    Filed: June 12, 2009
    Publication date: December 16, 2010
    Inventors: Steven N. Bathiche, William J. Westerinen, Miller T. Abel, Julio Estrada, Charles J. Migos
  • Publication number: 20100313150
    Abstract: The claimed subject matter relates to a display that is physically separable and to an associated architecture that can facilitate data mobility or collaboration in connection with the separable display. In particular, the separable display can be configured as an apparent unitary or singular UI for an associated multi-node computer, yet for which portion of the separable display can be physically decoupled. The multi-node computer can include a set of computing nodes, each of which can potentially operate autonomously, yet also in unison with other nodes to form a collective multiprocessor computing platform. Moreover, each of the computing nodes can be embedded in and distributed throughout the separable display. Accordingly, when a portion of the separable display is decoupled from a remainder of the separable display, both the portion and the remainder can include some subset of the computing nodes, and can therefore maintain the UI.
    Type: Application
    Filed: June 3, 2009
    Publication date: December 9, 2010
    Applicant: MICROSOFT CORPORATION
    Inventors: Meredith J. Morris, Steven N. Bathiche, Stephen Edward Hodges, Ian C. LeGrow, Victor Kevin Russ, Ian M. Sands, William J. Westerinen, John Christopher Whytock, Andrew D. Wilson, David Alexander Butler, Shahram Izadi
  • Patent number: 7844808
    Abstract: A security module for a pay-per-use computer supplies an appropriate BIOS for a given mode of operation. A power manager in the security module powers only essential circuits until the BIOS is operational to help prevent substitution of a non-authorized BIOS. The security module also includes a capability to monitor and restrict data lines on a bus between a main computer processor and computer system memory. When the computer is operating in a restricted use mode, data lines may be restricted to allow only minimal access to the computer system memory. Bus transactions may be monitored to ensure that only valid transactions are occurring and are within the designated memory space.
    Type: Grant
    Filed: December 18, 2006
    Date of Patent: November 30, 2010
    Assignee: Microsoft Corporation
    Inventors: William J. Westerinen, Todd L. Carpenter, Alexander Frank, Shon Schmidt, Stephen Richard Drake
  • Patent number: 7818608
    Abstract: An improved system and method for using a file system to automatically backup a file in persistent storage is provided. A storage aggregator may organize nonvolatile memory for use in aggregate to store backup copies of a file. A file system filter driver may receive a request from an application for storing a file and may access a policy to determining whether to create a backup copy of the file and what type of backup to apply to the file. A generational file handler may create and manage a set of generational files as backup copies of a particular application file. And a recovery user interface may be provided to retrieve one or more backup copies, such as the set of generational files, for inspection by a user to recover whatever copy of the file may be desired by the user.
    Type: Grant
    Filed: February 18, 2005
    Date of Patent: October 19, 2010
    Assignee: Microsoft Corporation
    Inventors: Pasquale DeMaio, Thomas G. Phillips, William J. Westerinen, Justin Maguire, III
  • Patent number: 7814543
    Abstract: A network security system for protecting computing devices connected to a communication network from identified security threats is presented. A security service published security information intended for network security modules in the communication network. A network security module is interposed, either logically or physically, between a computer and the communication network. The security information comprises security measures which, when implemented by a network security module, protect the corresponding computer from an identified security threat to the computer.
    Type: Grant
    Filed: June 29, 2004
    Date of Patent: October 12, 2010
    Assignee: Microsoft Corporation
    Inventors: Thomas G Phillips, Alexander Frank, Adrian M Chandley, Christopher A Schoppa, William J Westerinen
  • Publication number: 20100218249
    Abstract: The claimed subject matter provides a system and/or a method that facilitates authentication of a user in a surface computing environment. A device or authentication object can be carried by a user and employed to retain authentication information. An authentication component can obtain the authentication information from the device and analyze the information to verify an identity of the user. A touch input component can ascertain if a touch input is authentication by associating touch input with the user. In addition, authentication information can be employed to establish a secure communications channel for transfer of user data.
    Type: Application
    Filed: February 25, 2009
    Publication date: August 26, 2010
    Applicant: MICROSOFT CORPORATION
    Inventors: Andrew D. Wilson, Stephen E. Hodges, Peter B. Thompson, Meredith June Morris, Paul Armistead Hoover, William J. Westerinen, Steven N. Bathiche, Ian M. Sands, Shahram Izadi, David Alexander Butler, Matthew B. MacLaurin, Arthur T. Whitten, William Ben Kunz, Shawn R. LeProwse, Hrvoje Benko
  • Publication number: 20100205190
    Abstract: The claimed subject matter relates to architectures that can provide rich features associated with information-based collaborative searches by leveraging a multi-touch surface computing-based display. In particular, a first architecture can include a multi-touch surface configured to support interactivity with multiple collocated users simultaneously. Based upon such interaction, the first architecture can transmit to a search engine a multiuser surface identifier and a set of search terms input by collocated users that share a collaborative task. In response, the architecture can receive a set of search results from a second architecture, and present those results to the multi-touch surface in a variety of ways. The second architecture can relate to a search engine that can process the search terms to generate corresponding search results and also process information associated with the multiuser surface identifier.
    Type: Application
    Filed: February 9, 2009
    Publication date: August 12, 2010
    Applicant: MICROSOFT CORPORATION
    Inventors: Meredith J. Morris, Stephen Edward Hodges, Ian C. LeGrow, William J. Westerinen, Andrew D. Wilson
  • Patent number: 7774437
    Abstract: A method and system for configuring a new device are disclosed. The method includes using a host system to create a configuration file including data useable to configure the new device. A portable storage device is interfaced to the host and the configuration file is transferred to the storage device. The storage device is then interfaced to the new device and the configuration file is transferred to the new device. The configuration file is optionally used to configure the new device for communication over a network. A method for configuring the new device using a direct connection between the new device and a system bus of the host is also disclosed.
    Type: Grant
    Filed: November 30, 2004
    Date of Patent: August 10, 2010
    Assignee: Microsoft Corporation
    Inventors: Dale C. Crosier, Aditha M. Adams, Taryn K. Beck, Adrian M. Chandley, Pasquale DeMaio, Steven T. Kaneko, Carl J. Ledbetter, Scott Manchester, Benjamin Nick, Thomas G. Phillips, William J. Westerinen
  • Patent number: 7769993
    Abstract: A security circuit in a computer monitors data busses that support memory capable of booting the computer during the computer reset/boot cycle. When activity oil one of the data busses indicates the computer is booting from a non-authorized memory location, the security circuit disrupts the computer, for example, by causing a reset. Execution from the non-authorized memory location may occur when an initial jump address at a known location, such as the top of memory, is re-programmed to a memory location having a rogue BIOS program.
    Type: Grant
    Filed: March 9, 2007
    Date of Patent: August 3, 2010
    Assignee: Microsoft Corporation
    Inventors: Todd L. Carpenter, William J. Westerinen
  • Patent number: 7750923
    Abstract: A display device for use with a computer adapted for operation in an unrestricted use mode and a limited function mode and a method for enforcing a limited function mode display is disclosed. The display device enters a limited function mode when a condition of non-compliance with an operating policy is discovered by the computer. Additionally, the display device may also enter a limited function mode upon powering up or when connections to the computer and/or selected components of the display are disabled or disconnected. When in the limited function mode, the display may support a limited function interface for use in correcting the condition of non-compliance.
    Type: Grant
    Filed: April 5, 2007
    Date of Patent: July 6, 2010
    Assignee: Microsoft Corporation
    Inventors: Hanumant Kumar Yadav, William J. Westerinen, Todd L. Carpenter, Stephen Richard Drake