Patents by Inventor Aaron Goldfeder

Aaron Goldfeder has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20120240050
    Abstract: A method and system that provide an intuitive user interface and related components for making Internet users aware of Internet cookie-related privacy issues, and enabling users to control Internet privacy through automatic cookie handling. Default privacy settings for handling cookies are provided, and through the user interface, the privacy settings may be customized to a user's liking. Further, through the user interface, for each individual site that forms a page of content, the site's privacy policy may be reviewed and/or the privacy controlled by specifying how cookies from that site are to be handled. To make users aware, the user interface provides an active alert on a first instance of a retrieved web site's content that fails to include satisfactory privacy information, and thereafter, provides a distinctive passive alert to allow the user selective access to privacy information, per-site cookie handling and cookie handling settings.
    Type: Application
    Filed: April 18, 2012
    Publication date: September 20, 2012
    Applicant: Microsoft Corporation
    Inventors: Aaron Goldfeder, Cem Paya, Joseph J. Gallagher, Roberto A. Franco, Stephen J. Purpura, Darren Mitchell, Frank M. Schwieterman, Viresh Ramdatmisier
  • Publication number: 20120216123
    Abstract: An online energy audit system poses and collects responses to a list of survey questions regarding a subject house from a remote occupant via a survey UI. Survey responses are stored in an energy-use profile associated with the subject house and are used to populate model inputs to an energy-use software model, from which an energy-efficiency score is derived. To help a remote occupant choose appropriate answers and to facilitate completion of the survey, the survey UI includes question-specific house-feature images associated with some or all questions. Survey questions are designed to be easy for a homeowner to understand, and the survey is kept short. The energy-efficiency score of the subject house is presented to the remote occupant in comparison with comparison energy-use data together with an action message to encourage the remote occupant to improve the energy score of the subject house.
    Type: Application
    Filed: February 23, 2012
    Publication date: August 23, 2012
    Applicant: EVOWORX INC.
    Inventors: Leo Shklovskii, Aaron Goldfeder, Scott Case, Michael Blasnik
  • Patent number: 8166406
    Abstract: A method and system that provide an intuitive user interface and related components for making Internet users aware of Internet cookie-related privacy issues, and enabling users to control Internet privacy through automatic cookie handling. Default privacy settings for handling cookies are provided, and through the user interface, the privacy settings may be customized to a user's liking. Further, through the user interface, for each individual site that forms a page of content, the site's privacy policy may be reviewed and/or the privacy controlled by specifying how cookies from that site are to be handled. To make users aware, the user interface provides an active alert on a first instance of a retrieved web site's content that fails to include satisfactory privacy information, and thereafter, provides a distinctive passive alert to allow the user selective access to privacy information, per-site cookie handling and cookie handling settings.
    Type: Grant
    Filed: June 28, 2002
    Date of Patent: April 24, 2012
    Assignee: Microsoft Corporation
    Inventors: Aaron Goldfeder, Cem Paya, Joseph J. Gallagher, Roberto A. Franco, Stephen J. Purpura, Darren Mitchell, Frank M. Schwieterman, Viresh Ramdatmisier
  • Patent number: 7743423
    Abstract: All execution paths of one or more assemblies in managed code are simulated to find the permissions for each execution path. The managed code can correspond to a managed shared library or a managed application. Each call in each execution path has a corresponding permissions set. When the library or application has permissions to execute that are not less than the required permission sets for the execution paths, any dynamic execution of the library or application will not trigger a security exception The simulated execution provides a tool that can be used to ensure that code being written will not exceed a maximum security permission for the code. A permission set can be determined by the tool for each assembly corresponding to an application and for each entry point corresponding to a shared library.
    Type: Grant
    Filed: February 3, 2004
    Date of Patent: June 22, 2010
    Assignee: Microsoft Corporation
    Inventors: Sebastian Lange, Gregory D. Fee, Aaron Goldfeder, Ivan Medvedev, Michael Gashler
  • Patent number: 7669238
    Abstract: Evidence-based application security may be implemented at the application and/or application group levels. A manifest may be provided defining at least one trust condition for the application or application group. A policy manager evaluates application evidence (e.g., an XrML license) for an application or group of applications relative to the manifest. The application is only granted permissions on the computer system if the application evidence indicates that the application is trusted. Similarly, a group of applications are only granted permissions on the computer system if the evidence indicates that the group of applications is trusted. If the application evidence satisfies the at least one trust condition defined by the manifest, the policy manager generates a permission grant set for each code assembly that is a member of the at least one application. Evidence may be further evaluated for code assemblies that are members of the trusted application or application group.
    Type: Grant
    Filed: November 10, 2003
    Date of Patent: February 23, 2010
    Assignee: Microsoft Corporation
    Inventors: Gregory D. Fee, Aaron Goldfeder, John M. Hawkins, Jamie L. Cool, Sebastian Lange, Sergey Khorun
  • Patent number: 7516477
    Abstract: Described is a system and method by which an application program is evaluated for trustworthiness based on the permissions and/or privileges it requests relative to a program category. The program describes the permissions needed to operate, and identifies itself as belonging to a particular category. Security components compare the requested permission set against the permissions that programs of that category actually need in order to operate properly. Programs requesting more permissions than needed are deemed untrustworthy. For example, screen saver application programs need only a limited permission set to operate properly, including full screen access and the ability to read files, but do not need network access permissions or write access to files. Any screensaver application that requests only the needed permission set is deemed trustworthy, while others that request permissions beyond what is actually needed are not deemed trustworthy, and a user or automated policy process may then intervene.
    Type: Grant
    Filed: October 21, 2004
    Date of Patent: April 7, 2009
    Assignee: Microsoft Corporation
    Inventors: Karen E. Corby, Aaron Goldfeder, John M. Hawkins
  • Patent number: 7359976
    Abstract: A system and method that prevents certain cookies, as specified by an Internet server, from being accessed through client-side script, thereby mitigating the amount of damage that cross-site scripting attacks can accomplish. The server marks selected cookies with an attribute that flags such cookies as being protected, and a security mechanism in the client prevents protected cookies from being accessed via script. A protected (flagged) cookie can still be accessed by the server, (e.g., via HTTP), while non-flagged cookies can be accessed by the server or script. An API or similar layer implements the security mechanism that checks for the attribute, and fails requests for any cookies having that attribute set. The present invention can also be adapted to prevent a malicious script from overwriting existing HTTP-only cookies on a client machine.
    Type: Grant
    Filed: November 23, 2002
    Date of Patent: April 15, 2008
    Assignee: Microsoft Corporation
    Inventors: David A. Ross, Cem Paya, Aaron Goldfeder
  • Publication number: 20070209073
    Abstract: Described is a technology including an evaluation methodology by which a set of privileged code such as a platform's API method may be marked as being security critical and/or safe for being called by untrusted code. The set of code is evaluated to determine whether the code is security critical code, and if so, it is identified as security critical. Such code is further evaluated to determine whether the code is safe with respect to being called by untrusted code, and if so, is marked as safe. To determine whether the code is safe, a determination is made as to whether the first set of code leaks criticality, including by evaluating one or more code paths corresponding to one or more callers of the first set of code, and by evaluating one or more code paths corresponding to one or more callees of the first set of code.
    Type: Application
    Filed: February 28, 2006
    Publication date: September 6, 2007
    Applicant: Microsoft Corporation
    Inventors: Karen Corby, Mark Alcazar, Viresh Ramdatmisier, Ariel Kirsman, Andre Needham, Akhilesh Kaza, Raja Krishnaswamy, Jeff Cooperstein, Charles Kaufman, Chris Anderson, Venkata Prasad, Aaron Goldfeder, John Hawkins
  • Publication number: 20070050854
    Abstract: Access to a resource by sandboxed code is dynamically authorized by a client security system based on a resource based policy. A sandboxed application running on a client is granted access to a resource based on a resource based policy despite denial of the access based on a static policy associated with the client security system. The granting of access coincides with the determination that the threat to a user or the user's information is not increased should the access be granted.
    Type: Application
    Filed: September 1, 2005
    Publication date: March 1, 2007
    Applicant: Microsoft Corporation
    Inventors: Jeffrey Cooperstein, Aaron Goldfeder, Gregory Fee, John Hawkins, Venkatraman Kudallur
  • Publication number: 20060090192
    Abstract: Described is a system and method by which an application program is evaluated for trustworthiness based on the permissions and/or privileges it requests relative to a program category. The program describes the permissions needed to operate, and identifies itself as belonging to a particular category. Security components compare the requested permission set against the permissions that programs of that category actually need in order to operate properly. Programs requesting more permissions than needed are deemed untrustworthy. For example, screen saver application programs need only a limited permission set to operate properly, including full screen access and the ability to read files, but do not need network access permissions or write access to files. Any screensaver application that requests only the needed permission set is deemed trustworthy, while others that request permissions beyond what is actually needed are not deemed trustworthy, and a user or automated policy process may then intervene.
    Type: Application
    Filed: October 21, 2004
    Publication date: April 27, 2006
    Applicant: Microsoft Corporation
    Inventors: Karen Corby, Aaron Goldfeder, John Hawkins
  • Publication number: 20050257250
    Abstract: A system and method that evaluates privacy policies from web sites to determine whether each site is permitted to perform operations (e.g., store, retrieve or delete) directed to cookies on a user's computer. Various properties of each cookie and the context in which it is being used are evaluated against a user's privacy preference settings to make the determination. An evaluation engine accomplishes the evaluation and determination via a number of criteria and considerations, including the cookie properties, its current context, the site, the zone that contains the site, and any P3P data (compact policy) provided with the site's response. The user privacy preferences are evaluated against these criteria to determine whether a requested cookie operation is allowed, denied or modified. A formalized distinction between first-party cookies versus third-party cookies may be used in the determination, along with whether the cookie is a persistent cookie or a session cookie.
    Type: Application
    Filed: July 1, 2005
    Publication date: November 17, 2005
    Applicant: Microsoft Corporation
    Inventors: Darren Mitchell, Cem Paya, Rajeev Dujari, Stephen Purpura, Aaron Goldfeder, Frank Schwieterman
  • Publication number: 20050172126
    Abstract: All execution paths of one or more assemblies in managed code are simulated to find the permissions for each execution path. The managed code can correspond to a managed shared library or a managed application. Each call in each execution path has a corresponding permissions set. When the library or application has permissions to execute that are not less than the required permission sets for the execution paths, any dynamic execution of the library or application will not trigger a security exception The simulated execution provides a tool that can be used to ensure that code being written will not exceed a maximum security permission for the code. A permission set can be determined by the tool for each assembly corresponding to an application and for each entry point corresponding to a shared library.
    Type: Application
    Filed: February 3, 2004
    Publication date: August 4, 2005
    Inventors: Sebastian Lange, Gregory Fee, Aaron Goldfeder, Ivan Medvedev, Michael Gashler
  • Publication number: 20040148514
    Abstract: Evidence-based application security may be implemented at the application and/or application group levels. A manifest may be provided defining at least one trust condition for the application or application group. A policy manager evaluates application evidence (e.g., an XrML license) for an application or group of applications relative to the manifest. The application is only granted permissions on the computer system if the application evidence indicates that the application is trusted. Similarly, a group of applications are only granted permissions on the computer system if the evidence indicates that the group of applications is trusted. If the application evidence satisfies the at least one trust condition defined by the manifest, the policy manager generates a permission grant set for each code assembly that is a member of the at least one application. Evidence may be further evaluated for code assemblies that are members of the trusted application or application group.
    Type: Application
    Filed: November 10, 2003
    Publication date: July 29, 2004
    Inventors: Gregory D. Fee, Aaron Goldfeder, John M. Hawkins, Jamie L. Cool, Sebastian Lange, Sergey Khorun
  • Publication number: 20040103200
    Abstract: A system and method that prevents certain cookies, as specified by an Internet server, from being accessed through client-side script, thereby mitigating the amount of damage that cross-site scripting attacks can accomplish. The server marks selected cookies with an attribute that flags such cookies as being protected, and a security mechanism in the client prevents protected cookies from being accessed via script. A protected (flagged) cookie can still be accessed by the server, (e.g., via HTTP), while non-flagged cookies can be accessed by the server or script. An API or similar layer implements the security mechanism that that checks for the attribute, and fails requests for any cookies having that attribute set. The present invention can also be adapted to prevent a malicious script from overwriting existing HTTP-only cookies on a client machine.
    Type: Application
    Filed: November 23, 2002
    Publication date: May 27, 2004
    Applicant: Microsoft Corporation
    Inventors: David A. Ross, Cem Paya, Aaron Goldfeder