Patents by Inventor Ambrose T. Treacy

Ambrose T. Treacy has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 9769137
    Abstract: An extensible mechanism for providing access control for logical objects in a network environment. A security broker is able to dynamically register one or more claims providers, each of which can assert one or more claims about logical objects. The claims providers may be purpose built or may be third party applications which expose data or business rules for use. Claims may be augmented by additional claims providers after the original claim is asserted. The applicability of claims may be scope limited either at the time the claims provider is registered or when the user requests that a security token be issued.
    Type: Grant
    Filed: February 17, 2015
    Date of Patent: September 19, 2017
    Assignee: Microsoft Technology Licensing, LLC
    Inventors: Venkatesh Veeraraghavan, Javier Dalzell, Benoit Schmitlin, Ambrose T. Treacy, Bryant Fong, Christian Roy
  • Publication number: 20150180853
    Abstract: An extensible mechanism for providing access control for logical objects in a network environment. A security broker is able to dynamically register one or more claims providers, each of which can assert one or more claims about logical objects. The claims providers may be purpose built or may be third party applications which expose data or business rules for use. Claims may be augmented by additional claims providers after the original claim is asserted. The applicability of claims may be scope limited either at the time the claims provider is registered or when the user requests that a security token be issued.
    Type: Application
    Filed: February 17, 2015
    Publication date: June 25, 2015
    Applicant: Microsoft Technology Licensing, LLC
    Inventors: Venkatesh Veeraraghavan, Javier Dalzell, Benoit Schmitlin, Ambrose T. Treacy, Bryant Fong, Christian Roy
  • Patent number: 8990896
    Abstract: An extensible mechanism for providing access control for logical objects in a network environment. A security broker is able to dynamically register one or more claims providers, each of which can assert one or more claims about logical objects. The claims providers may be purpose built or may be third party applications which expose data or business rules for use. Claims may be augmented by additional claims providers after the original claim is asserted. The applicability of claims may be scope limited either at the time the claims provider is registered or when the user requests that a security token be issued.
    Type: Grant
    Filed: June 24, 2008
    Date of Patent: March 24, 2015
    Assignee: Microsoft Technology Licensing, LLC
    Inventors: Venkatesh Veeraraghavan, Javier Dalzell, Benoit Schmitlin, Ambrose T. Treacy, Bryant Fong, Christian Roy
  • Patent number: 7797742
    Abstract: Embodiments are described for blocking the opening of a file. Some embodiments include receiving a request to open a file. In response, a portion of the file's data is examined to determine a true file format for the file. A determination is then made as to whether the true file format of the file has been set as blocked. Based on the determination that the file format is blocked from opening, the file is prevented from being loaded into memory and from being accessed. A message is then displayed to a user indicating that the file has been blocked from opening.
    Type: Grant
    Filed: February 26, 2007
    Date of Patent: September 14, 2010
    Assignee: Microsoft Corporation
    Inventors: Elizabeth Jeanne Sheldon, Ambrose T. Treacy, Maithili V. Dandige, Walter D. Pullen, Bikramjit S. Kalra, Jonathan B. Bailor
  • Patent number: 7797743
    Abstract: Embodiments are described for removing malicious code from a file in a first file format by converting the file into a converted file of a second file format. In embodiments, converting the file eliminates malicious code embedded within the file from being stored in the converted file. The conversion is performed within a restricted computer process that has restricted privileges limiting its access to an operating system and an underlying computer system. As a result, even if malicious code embedded within the file executes while the file is being converted into the converted file, the damage to a computer system is mitigated because of the limited privileges provided to the restricted process.
    Type: Grant
    Filed: February 26, 2007
    Date of Patent: September 14, 2010
    Assignee: Microsoft Corporation
    Inventors: Ambrose T. Treacy, Maithili V. Dandige, Eric Fox, Robert A. Little, Christopher C. White, David LeBlanc, Benjamin J. Bunker, Aaron E. Erlandson
  • Publication number: 20090320103
    Abstract: An extensible mechanism for providing access control for logical objects in a network environment. A security broker is able to dynamically register one or more claims providers, each of which can assert one or more claims about logical objects. The claims providers may be purpose built or may be third party applications which expose data or business rules for use. Claims may be augmented by additional claims providers after the original claim is asserted. The applicability of claims may be scope limited either at the time the claims provider is registered or when the user requests that a security token be issued.
    Type: Application
    Filed: June 24, 2008
    Publication date: December 24, 2009
    Applicant: Microsoft Corporation
    Inventors: Venkatesh Veeraraghavan, Javier Dalzell, Benoit Schmitlin, Ambrose T. Treacy, Bryant Fong, Christian Roy
  • Publication number: 20080209551
    Abstract: Embodiments are described for removing malicious code from a file in a first file format by converting the file into a converted file of a second file format. In embodiments, converting the file eliminates malicious code embedded within the file from being stored in the converted file. The conversion is performed within a restricted computer process that has restricted privileges limiting its access to an operating system and an underlying computer system. As a result, even if malicious code embedded within the file executes while the file is being converted into the converted file, the damage to a computer system is mitigated because of the limited privileges provided to the restricted process.
    Type: Application
    Filed: February 26, 2007
    Publication date: August 28, 2008
    Applicant: Microsoft Corporation
    Inventors: Ambrose T. Treacy, Maithili V. Dandige, Eric Fox, Robert A. Little, Christopher C. White, David LeBlanc, Benjamin J. Bunker, Aaron E. Erlandson
  • Publication number: 20080209138
    Abstract: Embodiments are described for blocking the opening of a file. Some embodiments include receiving a request to open a file. In response, a portion of the file's data is examined to determine a true file format for the file. A determination is then made as to whether the true file format of the file has been set as blocked. Based on the determination that the file format is blocked from opening, the file is prevented from being loaded into memory and from being accessed. A message is then displayed to a user indicating that the file has been blocked from opening.
    Type: Application
    Filed: February 26, 2007
    Publication date: August 28, 2008
    Applicant: Microsoft Corporation
    Inventors: Elizabeth Jeanne Sheldon, Ambrose T. Treacy, Maithili V. Dandige, Walter D. Pullen, Bikramjit S. Kalra, Jonathan B. Bailor