Patents by Inventor Ambrose T. Treacy
Ambrose T. Treacy has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 9769137Abstract: An extensible mechanism for providing access control for logical objects in a network environment. A security broker is able to dynamically register one or more claims providers, each of which can assert one or more claims about logical objects. The claims providers may be purpose built or may be third party applications which expose data or business rules for use. Claims may be augmented by additional claims providers after the original claim is asserted. The applicability of claims may be scope limited either at the time the claims provider is registered or when the user requests that a security token be issued.Type: GrantFiled: February 17, 2015Date of Patent: September 19, 2017Assignee: Microsoft Technology Licensing, LLCInventors: Venkatesh Veeraraghavan, Javier Dalzell, Benoit Schmitlin, Ambrose T. Treacy, Bryant Fong, Christian Roy
-
Publication number: 20150180853Abstract: An extensible mechanism for providing access control for logical objects in a network environment. A security broker is able to dynamically register one or more claims providers, each of which can assert one or more claims about logical objects. The claims providers may be purpose built or may be third party applications which expose data or business rules for use. Claims may be augmented by additional claims providers after the original claim is asserted. The applicability of claims may be scope limited either at the time the claims provider is registered or when the user requests that a security token be issued.Type: ApplicationFiled: February 17, 2015Publication date: June 25, 2015Applicant: Microsoft Technology Licensing, LLCInventors: Venkatesh Veeraraghavan, Javier Dalzell, Benoit Schmitlin, Ambrose T. Treacy, Bryant Fong, Christian Roy
-
Patent number: 8990896Abstract: An extensible mechanism for providing access control for logical objects in a network environment. A security broker is able to dynamically register one or more claims providers, each of which can assert one or more claims about logical objects. The claims providers may be purpose built or may be third party applications which expose data or business rules for use. Claims may be augmented by additional claims providers after the original claim is asserted. The applicability of claims may be scope limited either at the time the claims provider is registered or when the user requests that a security token be issued.Type: GrantFiled: June 24, 2008Date of Patent: March 24, 2015Assignee: Microsoft Technology Licensing, LLCInventors: Venkatesh Veeraraghavan, Javier Dalzell, Benoit Schmitlin, Ambrose T. Treacy, Bryant Fong, Christian Roy
-
Patent number: 7797742Abstract: Embodiments are described for blocking the opening of a file. Some embodiments include receiving a request to open a file. In response, a portion of the file's data is examined to determine a true file format for the file. A determination is then made as to whether the true file format of the file has been set as blocked. Based on the determination that the file format is blocked from opening, the file is prevented from being loaded into memory and from being accessed. A message is then displayed to a user indicating that the file has been blocked from opening.Type: GrantFiled: February 26, 2007Date of Patent: September 14, 2010Assignee: Microsoft CorporationInventors: Elizabeth Jeanne Sheldon, Ambrose T. Treacy, Maithili V. Dandige, Walter D. Pullen, Bikramjit S. Kalra, Jonathan B. Bailor
-
Patent number: 7797743Abstract: Embodiments are described for removing malicious code from a file in a first file format by converting the file into a converted file of a second file format. In embodiments, converting the file eliminates malicious code embedded within the file from being stored in the converted file. The conversion is performed within a restricted computer process that has restricted privileges limiting its access to an operating system and an underlying computer system. As a result, even if malicious code embedded within the file executes while the file is being converted into the converted file, the damage to a computer system is mitigated because of the limited privileges provided to the restricted process.Type: GrantFiled: February 26, 2007Date of Patent: September 14, 2010Assignee: Microsoft CorporationInventors: Ambrose T. Treacy, Maithili V. Dandige, Eric Fox, Robert A. Little, Christopher C. White, David LeBlanc, Benjamin J. Bunker, Aaron E. Erlandson
-
Publication number: 20090320103Abstract: An extensible mechanism for providing access control for logical objects in a network environment. A security broker is able to dynamically register one or more claims providers, each of which can assert one or more claims about logical objects. The claims providers may be purpose built or may be third party applications which expose data or business rules for use. Claims may be augmented by additional claims providers after the original claim is asserted. The applicability of claims may be scope limited either at the time the claims provider is registered or when the user requests that a security token be issued.Type: ApplicationFiled: June 24, 2008Publication date: December 24, 2009Applicant: Microsoft CorporationInventors: Venkatesh Veeraraghavan, Javier Dalzell, Benoit Schmitlin, Ambrose T. Treacy, Bryant Fong, Christian Roy
-
Publication number: 20080209551Abstract: Embodiments are described for removing malicious code from a file in a first file format by converting the file into a converted file of a second file format. In embodiments, converting the file eliminates malicious code embedded within the file from being stored in the converted file. The conversion is performed within a restricted computer process that has restricted privileges limiting its access to an operating system and an underlying computer system. As a result, even if malicious code embedded within the file executes while the file is being converted into the converted file, the damage to a computer system is mitigated because of the limited privileges provided to the restricted process.Type: ApplicationFiled: February 26, 2007Publication date: August 28, 2008Applicant: Microsoft CorporationInventors: Ambrose T. Treacy, Maithili V. Dandige, Eric Fox, Robert A. Little, Christopher C. White, David LeBlanc, Benjamin J. Bunker, Aaron E. Erlandson
-
Publication number: 20080209138Abstract: Embodiments are described for blocking the opening of a file. Some embodiments include receiving a request to open a file. In response, a portion of the file's data is examined to determine a true file format for the file. A determination is then made as to whether the true file format of the file has been set as blocked. Based on the determination that the file format is blocked from opening, the file is prevented from being loaded into memory and from being accessed. A message is then displayed to a user indicating that the file has been blocked from opening.Type: ApplicationFiled: February 26, 2007Publication date: August 28, 2008Applicant: Microsoft CorporationInventors: Elizabeth Jeanne Sheldon, Ambrose T. Treacy, Maithili V. Dandige, Walter D. Pullen, Bikramjit S. Kalra, Jonathan B. Bailor