Patents by Inventor Brian Perlman

Brian Perlman has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20190026442
    Abstract: Embodiments described herein enable a device to be activated/re-activated offline using device-bound activation/licensing information stored in that device's firmware. By storing the necessary licensing data in the device's firmware, the loss of data when the operating system software is reinstalled is avoided. The foregoing may be accomplished by “binding” data into the licensing data. This is done in order to make the license unusable on a different device, even on the exact same model of the device. Right-of-use information indicating which software components, versions, editions, configurations, etc. are licensed for use may also be included. The licensing data may also be provisioned to the device's firmware during device manufacturing to avoid the need for the user to contact the licensor company when the device reaches the end user. The process of issuing the device-bound license can also be delegated to another party by means of an issuance license.
    Type: Application
    Filed: November 1, 2017
    Publication date: January 24, 2019
    Inventors: Brian Perlman, Hakki T. Bostanci, Olaf Alexander Miller, Siddharth Mantri, Valentin Sliouniaev, Aaron J. Smith, Sudeep Kumar Ghosh
  • Patent number: 9847880
    Abstract: Techniques are described for ensuring data integrity and authentication of received messages. One technique includes sending a request from a first module to a second module in which the request includes a first portion that is a shared secret encrypted with a public key, obtaining by the second module a private key from a secure and trusted information store, such as a license information store, including license information or other application specific information for the first module, using the private key to decrypt the first portion and obtain the shared secret, sending a response from the second module to the first module in which the response includes authentication data and at least one data item used with the shared secret to determine the authentication data, and performing by the first module verification processing to verify the authentication data included in the response.
    Type: Grant
    Filed: January 12, 2015
    Date of Patent: December 19, 2017
    Assignee: Microsoft Technology Licensing, LLC
    Inventors: Wen-Pin Scott Hsu, Tarik Soulami, Mark Zagorski, Ning Zhang, Brian Perlman
  • Publication number: 20160014136
    Abstract: A system grants “provisional privileges” to a user request for the purpose of provisionally performing a requested transaction. If the provisionally-performed transaction does not put the system in a degraded state, the transaction is authorized despite the user request having inadequate privileges originally.
    Type: Application
    Filed: September 21, 2015
    Publication date: January 14, 2016
    Inventors: Brian Perlman, Richard S. Eizenhoefer, Wen-Pin Scott Hsu
  • Patent number: 9152778
    Abstract: A system grants “provisional privileges” to a user request for the purpose of provisionally performing a requested transaction. If the provisionally-performed transaction does not put the system in a degraded state, the transaction is authorized despite the user request having inadequate privileges originally.
    Type: Grant
    Filed: December 16, 2013
    Date of Patent: October 6, 2015
    Assignee: MICROSOFT TECHNOLOGY LICENSING, LLC
    Inventors: Brian Perlman, Richard S. Eizenhoefer, Wen-Pin Scott Hsu
  • Publication number: 20150261957
    Abstract: A system grants “provisional privileges” to a user request for the purpose of provisionally performing a requested transaction. If the provisionally-performed transaction does not put the system in a degraded state, the transaction is authorized despite the user request having inadequate privileges originally.
    Type: Application
    Filed: May 28, 2015
    Publication date: September 17, 2015
    Inventors: Brian Perlman, Richard S. Eizenhoefer, Wen-Pin Scott Hsu
  • Publication number: 20150163058
    Abstract: Techniques are described for ensuring data integrity and authentication of received messages. One technique includes sending a request from a first module to a second module in which the request includes a first portion that is a shared secret encrypted with a public key, obtaining by the second module a private key from a secure and trusted information store, such as a license information store, including license information or other application specific information for the first module, using the private key to decrypt the first portion and obtain the shared secret, sending a response from the second module to the first module in which the response includes authentication data and at least one data item used with the shared secret to determine the authentication data, and performing by the first module verification processing to verify the authentication data included in the response.
    Type: Application
    Filed: January 12, 2015
    Publication date: June 11, 2015
    Inventors: Wen-Pin Scott Hsu, Tarik Soulami, Mark Zagorski, Ning Zhang, Brian Perlman
  • Patent number: 8935528
    Abstract: Techniques are described for ensuring data integrity and authentication of received messages. One technique includes sending a request from a first module to a second module in which the request includes a first portion that is a shared secret encrypted with a public key, obtaining by the second module a private key from a secure and trusted information store, such as a license information store, including license information or other application specific information for the first module, using the private key to decrypt the first portion and obtain the shared secret, sending a response from the second module to the first module in which the response includes authentication data and at least one data item used with the shared secret to determine the authentication data, and performing by the first module verification processing to verify the authentication data included in the response.
    Type: Grant
    Filed: June 26, 2008
    Date of Patent: January 13, 2015
    Assignee: Microsoft Corporation
    Inventors: Wen-Pin Scott Hsu, Tarik Soulami, Mark Zagorski, Ning Zhang, Brian Perlman
  • Publication number: 20140279550
    Abstract: An upgrade to a computer program is associated with a token which is in turn associated with the original key for the computer program. In particular, given the original key, a publisher provides a token for the upgrade which is digitally signed and associated with the original key. The token also can result in a license state for the upgrade that is different from the license state for the original computer program. The original key can be used in various business rules by the publisher to determine whether to issue the token and/or what license state to associate with the token. When the upgrade is run on the computer, the verification process authenticates the token, the original license and the original key and authorizes execution of the upgrade based on the token for upgrade. Multiple upgrades can use multiple tokens and the original key.
    Type: Application
    Filed: March 14, 2013
    Publication date: September 18, 2014
    Applicant: MICROSOFT CORPORATION
    Inventors: Ning Zhang, Mikael Horal, Brian Perlman, Hakki Bostanci, Hariharan Jayaraman, Rama Krishnan Venkatachalam
  • Publication number: 20140109218
    Abstract: A system grants “provisional privileges” to a user request for the purpose of provisionally performing a requested transaction. If the provisionally-performed transaction does not put the system in a degraded state, the transaction is authorized despite the user request having inadequate privileges originally.
    Type: Application
    Filed: December 16, 2013
    Publication date: April 17, 2014
    Applicant: Microsoft Corporation
    Inventors: Brian Perlman, Richard S. Eizenhoefer, Wen-Pin Scott Hsu
  • Patent number: 8613077
    Abstract: A system grants “provisional privileges” to a user request for the purpose of provisionally performing a requested transaction. If the provisionally-performed transaction does not put the system in a degraded state, the transaction is authorized despite the user request having inadequate privileges originally.
    Type: Grant
    Filed: May 23, 2012
    Date of Patent: December 17, 2013
    Assignee: Microsoft Corporation
    Inventors: Brian Perlman, Richard S. Eizenhoefer, Wen-Pin Scott Hsu
  • Publication number: 20120240221
    Abstract: A system grants “provisional privileges” to a user request for the purpose of provisionally performing a requested transaction. If the provisionally-performed transaction does not put the system in a degraded state, the transaction is authorized despite the user request having inadequate privileges originally.
    Type: Application
    Filed: May 23, 2012
    Publication date: September 20, 2012
    Applicant: Microsoft Corporation
    Inventors: Brian Perlman, Richard S. Eizenhoefer, Wen-Pin Scott Hsu
  • Patent number: 8196196
    Abstract: A system grants “provisional privileges” to a user request for the purpose of provisionally performing a requested transaction. If the provisionally-performed transaction does not put the system in a degraded state, the transaction is authorized despite the user request having inadequate privileges originally.
    Type: Grant
    Filed: December 1, 2010
    Date of Patent: June 5, 2012
    Assignee: Microsoft Corporation
    Inventors: Brian Perlman, Richard S. Eizenhoefer, Wen-Pin Scott Hsu
  • Publication number: 20110072513
    Abstract: A system grants “provisional privileges” to a user request for the purpose of provisionally performing a requested transaction. If the provisionally-performed transaction does not put the system in a degraded state, the transaction is authorized despite the user request having inadequate privileges originally.
    Type: Application
    Filed: December 1, 2010
    Publication date: March 24, 2011
    Applicant: Microsoft Corporation
    Inventors: Brian Perlman, Richard S. Eizenhoefer, Wen-Pin Scott Hsu
  • Patent number: 7865949
    Abstract: A system grants “provisional privileges” to a user request for the purpose of provisionally performing a requested transaction. If the provisionally-performed transaction does not put the system in a degraded state, the transaction is authorized despite the user request having inadequate privileges originally.
    Type: Grant
    Filed: January 18, 2007
    Date of Patent: January 4, 2011
    Assignee: Microsoft Corporation
    Inventors: Brian Perlman, Richard S. Eizenhoefer, Wen-Pin Scott Hsu
  • Publication number: 20090327737
    Abstract: Techniques are described for ensuring data integrity and authentication of received messages. One technique includes sending a request from a first module to a second module in which the request includes a first portion that is a shared secret encrypted with a public key, obtaining by the second module a private key from a secure and trusted information store, such as a license information store, including license information or other application specific information for the first module, using the private key to decrypt the first portion and obtain the shared secret, sending a response from the second module to the first module in which the response includes authentication data and at least one data item used with the shared secret to determine the authentication data, and performing by the first module verification processing to verify the authentication data included in the response.
    Type: Application
    Filed: June 26, 2008
    Publication date: December 31, 2009
    Applicant: Microsoft Corporation
    Inventors: Wen-Pin Scott Hsu, Tarik Soulami, Mark Zagorski, Ning Zhang, Brian Perlman
  • Publication number: 20080178285
    Abstract: A system grants “provisional privileges” to a user request for the purpose of provisionally performing a requested transaction. If the provisionally-performed transaction does not put the system in a degraded state, the transaction is authorized despite the user request having inadequate privileges originally.
    Type: Application
    Filed: January 18, 2007
    Publication date: July 24, 2008
    Applicant: Microsoft Corporation
    Inventors: Brian Perlman, Richard S. Eizenhoefer, Wen-Pin Scott Hsu
  • Publication number: 20070016773
    Abstract: A centralized process is provided for elevating portions of an application running under a user account to administrator privilege. A service security identifier is temporarily associated with the user and the portions of the application to be elevated to administrator privileges. The service security identifier is registered in the access control list to be accessed by the operating system. The centralized process may be used in the activation of software products.
    Type: Application
    Filed: July 15, 2005
    Publication date: January 18, 2007
    Applicant: Microsoft Corporation
    Inventors: Brian Perlman, Jay Girotto, Caglar Gunyakti, Kalin Toshev