Patents by Inventor Brian D. Swander

Brian D. Swander has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 9742560
    Abstract: A hierarchical key generation and distribution mechanism for a computer system in which devices are organized into secure enclaves. The mechanism enables network access to be tailored to approximate minimum needed privileges for each device. At the lowest level of the hierarchy, keys are used to form security associations between devices. Keys at each level of the hierarchy are generated from keys at a higher level of the hierarchy and key derivation information. Key derivation information is readily ascertainable, either from identifiers for devices or from within messages, supporting hardware offload of cryptographic functions. Because keys may be generated based on the enclaves in which the hosts participating in a security association are located, the system includes a mechanism by which devices can discover the enclave in which they are located.
    Type: Grant
    Filed: June 11, 2009
    Date of Patent: August 22, 2017
    Assignee: Microsoft Technology Licensing, LLC
    Inventors: Daniel R. Simon, Brian D. Swander, Pascal Menezes, Gabriel E. Montenegro
  • Publication number: 20170180123
    Abstract: A hierarchical key generation and distribution mechanism for a computer system in which devices are organized into secure enclaves. The mechanism enables network access to be tailored to approximate minimum needed privileges for each device. At the lowest level of the hierarchy, keys are used to form security associations between devices. Keys at each level of the hierarchy are generated from keys at a higher level of the hierarchy and key derivation information. Key derivation information is readily ascertainable, either from identifiers for devices or from within messages, supporting hardware offload of cryptographic functions. Because keys may be generated based on the enclaves in which the hosts participating in a security association are located, the system includes a mechanism by which devices can discover the enclave in which they are located.
    Type: Application
    Filed: March 8, 2017
    Publication date: June 22, 2017
    Inventors: Daniel R. Simon, Brian D. Swander, Pascal Menezes, Gabriel E. Montenegro
  • Patent number: 9628276
    Abstract: A hierarchical key generation and distribution mechanism for a computer system in which devices are organized into secure enclaves. The mechanism enables network access to be tailored to approximate minimum needed privileges for each device. At the lowest level of the hierarchy, keys are used to form security associations between devices. Keys at each level of the hierarchy are generated from keys at a higher level of the hierarchy and key derivation information. Key derivation information is readily ascertainable, either from identifiers for devices or from within messages, supporting hardware offload of cryptographic functions. Because keys may be generated based on the enclaves in which the hosts participating in a security association are located, the system includes a mechanism by which devices can discover the enclave in which they are located.
    Type: Grant
    Filed: December 8, 2012
    Date of Patent: April 18, 2017
    Assignee: Microsoft Technology Licensing, LLC
    Inventors: Daniel R. Simon, Brian D. Swander, Pascal Menezes, Gabriel E. Montenegro
  • Patent number: 8689315
    Abstract: A method and system are provided for adding, removing, and managing a plurality of network policy filters in a network device. Filters are installed in a framework and designated as active or disabled. Each filter has a priority. When a new filter is to be installed into the framework, it is compared to installed filters to determine if a conflict exists. If no conflict exists, the new filter is added as an active filter. If a conflict exists, a higher priority conflicting filter is added as active and a lower priority filter is added as inactive.
    Type: Grant
    Filed: July 31, 2008
    Date of Patent: April 1, 2014
    Assignee: Microsoft Corporation
    Inventors: Brian D. Swander, Avnish Kumar Chhabra, Paul G. Mayfield
  • Patent number: 8572722
    Abstract: A system and method for failure recognition is disclosed. The technology initially establishes a security association (SA) between a client and a first server on a network. In addition, an active reference count of a number of connections in the SA between the client and the first server is maintained. The SA is evaluated when the active reference count returns less than two connections within the SA between the client and the first server.
    Type: Grant
    Filed: January 3, 2012
    Date of Patent: October 29, 2013
    Assignee: Microsoft Corporation
    Inventor: Brian D. Swander
  • Patent number: 8352741
    Abstract: A hierarchical key generation and distribution mechanism for a computer system in which devices are organized into secure enclaves. The mechanism enables network access to be tailored to approximate minimum needed privileges for each device. At the lowest level of the hierarchy, keys are used to form security associations between devices. Keys at each level of the hierarchy are generated from keys at a higher level of the hierarchy and key derivation information. Key derivation information is readily ascertainable, either from identifiers for devices or from within messages, supporting hardware offload of cryptographic functions. Because keys may be generated based on the enclaves in which the hosts participating in a security association are located, the system includes a mechanism by which devices can discover the enclave in which they are located.
    Type: Grant
    Filed: June 11, 2009
    Date of Patent: January 8, 2013
    Assignee: Microsoft Corporation
    Inventors: Daniel R. Simon, Brian D. Swander, Pascal Menezes, Gabriel E. Montenegro
  • Patent number: 8289970
    Abstract: Described are embodiments directed to negotiating an encapsulation mode between an initiator and a responder. As part of the negotiation of the security association, an encapsulation mode is negotiated that allows packets to be sent between the initiator and responder without encapsulation. The ability to send packets without encapsulation allows intermediaries, such as a firewall, at the responder to easily inspect the packets and implement additional features such as security filtering.
    Type: Grant
    Filed: July 17, 2009
    Date of Patent: October 16, 2012
    Assignee: Microsoft Corporation
    Inventors: Brian D. Swander, Daniel R. Simon
  • Patent number: 8275989
    Abstract: A method for authenticating and negotiating security parameters among two or more network devices is disclosed. The method has a plurality of modes including a plurality of messages exchanged between the two or more network devices. In a main mode, the two or more network devices establish a secure channel and select security parameters to be used during a quick mode and a user mode. In the quick mode, the two or more computers derive a set of keys to secure data sent according to a security protocol. The optional user mode provides a means of authenticating one or more users associated with the two or more network devices. A portion of the quick mode is conducted during the main mode thereby minimizing the plurality of messages that need to be exchanged between the initiator and the responder.
    Type: Grant
    Filed: July 9, 2009
    Date of Patent: September 25, 2012
    Assignee: Microsoft Corporation
    Inventors: Christian Huitema, Paul G. Mayfield, Brian D. Swander, Sara Bitan, Daniel R. Simon
  • Publication number: 20120110319
    Abstract: A system and method for failure recognition is disclosed. The technology initially establishes a security association (SA) between a client and a first server on a network. In addition, an active reference count of a number of connections in the SA between the client and the first server is maintained. The SA is evaluated when the active reference count returns less than two connections within the SA between the client and the first server.
    Type: Application
    Filed: January 3, 2012
    Publication date: May 3, 2012
    Applicant: MICROSOFT CORPORATION
    Inventor: Brian D. Swander
  • Patent number: 8091126
    Abstract: A system and method for failure recognition is disclosed. The technology initially establishes a security association (SA) between a client and a first server on a network. In addition, an active reference count of a number of connections in the SA between the client and the first server is maintained. The SA is evaluated when the active reference count returns less than two connections within the SA between the client and the first server.
    Type: Grant
    Filed: August 18, 2006
    Date of Patent: January 3, 2012
    Assignee: Microsoft Corporation
    Inventor: Brian D. Swander
  • Publication number: 20110013634
    Abstract: Described are embodiments directed to negotiating an encapsulation mode between an initiator and a responder. As part of the negotiation of the security association, an encapsulation mode is negotiated that allows packets to be sent between the initiator and responder without encapsulation. The ability to send packets without encapsulation allows intermediaries, such as a firewall, at the responder to easily inspect the packets and implement additional features such as security filtering.
    Type: Application
    Filed: July 17, 2009
    Publication date: January 20, 2011
    Applicant: Microsoft Corporation
    Inventors: Brian D. Swander, Daniel R. Simon
  • Patent number: 7856655
    Abstract: A system is provided for establishing a secure link among multiple users on a single machine with a remote machine. The system includes a subsystem to filter traffic so that traffic from each user is separate. The subsystem generates and associates a Security Association (SA) with at least one filter corresponding to the user and the traffic, and employs the SA to establish the secure link. An Internet Key Exchange module and a policy module may be included to generate and associate the security association, wherein the policy module is configured via Internet Protocol Security (IPSEC).
    Type: Grant
    Filed: June 30, 2004
    Date of Patent: December 21, 2010
    Assignee: Microsoft Corporation
    Inventors: Brian D. Swander, Bernard D. Aboba
  • Publication number: 20100318800
    Abstract: A hierarchical key generation and distribution mechanism for a computer system in which devices are organized into secure enclaves. The mechanism enables network access to be tailored to approximate minimum needed privileges for each device. At the lowest level of the hierarchy, keys are used to form security associations between devices. Keys at each level of the hierarchy are generated from keys at a higher level of the hierarchy and key derivation information. Key derivation information is readily ascertainable, either from identifiers for devices or from within messages, supporting hardware offload of cryptographic functions. Because keys may be generated based on the enclaves in which the hosts participating in a security association are located, the system includes a mechanism by which devices can discover the enclave in which they are located.
    Type: Application
    Filed: June 11, 2009
    Publication date: December 16, 2010
    Applicant: Microsoft Corporation
    Inventors: Daniel R. Simon, Brian D. Swander, Pascal Menezes, Gabriel E. Montenegro
  • Publication number: 20100318799
    Abstract: A hierarchical key generation and distribution mechanism for a computer system in which devices are organized into secure enclaves. The mechanism enables network access to be tailored to approximate minimum needed privileges for each device. At the lowest level of the hierarchy, keys are used to form security associations between devices. Keys at each level of the hierarchy are generated from keys at a higher level of the hierarchy and key derivation information. Key derivation information is readily ascertainable, either from identifiers for devices or from within messages, supporting hardware offload of cryptographic functions. Because keys may be generated based on the enclaves in which the hosts participating in a security association are located, the system includes a mechanism by which devices can discover the enclave in which they are located.
    Type: Application
    Filed: June 11, 2009
    Publication date: December 16, 2010
    Applicant: Microsoft Corporation
    Inventors: Daniel R. Simon, Brian D. Swander, Pascal Menezes, Gabriel E. Montenegro
  • Publication number: 20100228962
    Abstract: Some embodiments are directed to processing packet data sent according to a security protocol between a first computer and a second computer via a forwarding device. The forwarding device performs a portion of the processing, and forwards the packet data to a third computer, connected to the forwarding device, for other processing. The third computer may support non-standard extensions to the security protocol, such as extensions used in authorizing and establishing a connection over the secure protocol. The packet data may be subject to policies, such as firewall policies or security policies, that may be detected by the third computer. The third computer sends the results of its processing, such as a cryptographic key, or a detected access control policy, to the forwarding device.
    Type: Application
    Filed: March 9, 2009
    Publication date: September 9, 2010
    Applicant: Microsoft Corporation
    Inventors: Daniel R. Simon, Pascal Menezes, Brian D. Swander
  • Patent number: 7761708
    Abstract: A method and system is disclosed for managing and implementing a plurality of network policies in a network device. Each of the plurality of policies are defined by one or more filters. The filters are installed in a policy engine. A layer identifies the network policy to be applied to a packet by sending a request to the policy engine. The policy engine then returns the policy to the requesting layer. The method and system may be used to implement a programmable, host-based, distributed, authenticating firewall that enables security and other policies to be applied at several protocol layers.
    Type: Grant
    Filed: February 1, 2007
    Date of Patent: July 20, 2010
    Assignee: Microsoft Corporation
    Inventors: Brian D. Swander, William H. Dixon
  • Publication number: 20090276828
    Abstract: A method for authenticating and negotiating security parameters among two or more network devices is disclosed. The method has a plurality of modes including a plurality of messages exchanged between the two or more network devices. In a main mode, the two or more network devices establish a secure channel and select security parameters to be used during a quick mode and a user mode. In the quick mode, the two or more computers derive a set of keys to secure data sent according to a security protocol. The optional user mode provides a means of authenticating one or more users associated with the two or more network devices. A portion of the quick mode is conducted during the main mode thereby minimizing the plurality of messages that need to be exchanged between the initiator and the responder.
    Type: Application
    Filed: July 9, 2009
    Publication date: November 5, 2009
    Applicant: Microsoft Corporation
    Inventors: Brian D. Swander, Sara Bitan, Christian Huitema, Paul G. Mayfield, Daniel R. Simon
  • Patent number: 7574603
    Abstract: A method for authenticating and negotiating security parameters among two or more network devices is disclosed. The method has a plurality of modes including a plurality of messages exchanged between the two or more network devices. In a main mode, the two or more network devices establish a secure channel and select security parameters to be used during a quick mode and a user mode. In the quick mode, the two or more computers derive a set of keys to secure data sent according to a security protocol. The optional user mode provides a means of authenticating one or more users associated with the two or more network devices. A portion of the quick mode is conducted during the main mode thereby minimizing the plurality of messages that need to be exchanged between the initiator and the responder.
    Type: Grant
    Filed: November 14, 2003
    Date of Patent: August 11, 2009
    Assignee: Microsoft Corporation
    Inventors: Brian D. Swander, Sara Bitan, Christian Huitema, Paul G. Mayfield, Daniel R. Simon
  • Patent number: 7536719
    Abstract: The invention provides a method for preventing a denial-of-service attack on a responder during a security protocol key negotiation. The responder receives key negotiation requests designating a source port and source IP address. The responder only maintains state when a key negotiation request is received from an initiating computer with a valid, non-spoofed, source IP address. The responder further limits the number of in-process key negotiations for which the responder maintains state. If a key negotiation request is received from a valid source IP address and the responder has at least one established security association for that source IP address, the responder limits the number of ongoing key negotiations to a maximum number on a per port address basis for that source IP address.
    Type: Grant
    Filed: January 7, 2003
    Date of Patent: May 19, 2009
    Assignee: Microsoft Corporation
    Inventor: Brian D. Swander
  • Patent number: 7509673
    Abstract: A method and system are provided for implementing a firewall architecture in a network device. The firewall architecture includes a plurality of network layers, a first firewall engine, and one or more callout modules. The layers send packets and packet information to the first firewall engine, maintain and pass packet context to subsequent layers, and process the packets. The first firewall engine compares the packet information to one or more installed filters and returns an action to the layers indicating how to treat the packet. The callouts provide additional functionality such as intrusion detection, logging, and parental control features.
    Type: Grant
    Filed: June 6, 2003
    Date of Patent: March 24, 2009
    Assignee: Microsoft Corporation
    Inventors: Brian D. Swander, Paul G. Mayfield