Patents by Inventor Brian Perlman
Brian Perlman has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Publication number: 20190026442Abstract: Embodiments described herein enable a device to be activated/re-activated offline using device-bound activation/licensing information stored in that device's firmware. By storing the necessary licensing data in the device's firmware, the loss of data when the operating system software is reinstalled is avoided. The foregoing may be accomplished by “binding” data into the licensing data. This is done in order to make the license unusable on a different device, even on the exact same model of the device. Right-of-use information indicating which software components, versions, editions, configurations, etc. are licensed for use may also be included. The licensing data may also be provisioned to the device's firmware during device manufacturing to avoid the need for the user to contact the licensor company when the device reaches the end user. The process of issuing the device-bound license can also be delegated to another party by means of an issuance license.Type: ApplicationFiled: November 1, 2017Publication date: January 24, 2019Inventors: Brian Perlman, Hakki T. Bostanci, Olaf Alexander Miller, Siddharth Mantri, Valentin Sliouniaev, Aaron J. Smith, Sudeep Kumar Ghosh
-
Patent number: 9847880Abstract: Techniques are described for ensuring data integrity and authentication of received messages. One technique includes sending a request from a first module to a second module in which the request includes a first portion that is a shared secret encrypted with a public key, obtaining by the second module a private key from a secure and trusted information store, such as a license information store, including license information or other application specific information for the first module, using the private key to decrypt the first portion and obtain the shared secret, sending a response from the second module to the first module in which the response includes authentication data and at least one data item used with the shared secret to determine the authentication data, and performing by the first module verification processing to verify the authentication data included in the response.Type: GrantFiled: January 12, 2015Date of Patent: December 19, 2017Assignee: Microsoft Technology Licensing, LLCInventors: Wen-Pin Scott Hsu, Tarik Soulami, Mark Zagorski, Ning Zhang, Brian Perlman
-
Publication number: 20160014136Abstract: A system grants “provisional privileges” to a user request for the purpose of provisionally performing a requested transaction. If the provisionally-performed transaction does not put the system in a degraded state, the transaction is authorized despite the user request having inadequate privileges originally.Type: ApplicationFiled: September 21, 2015Publication date: January 14, 2016Inventors: Brian Perlman, Richard S. Eizenhoefer, Wen-Pin Scott Hsu
-
Patent number: 9152778Abstract: A system grants “provisional privileges” to a user request for the purpose of provisionally performing a requested transaction. If the provisionally-performed transaction does not put the system in a degraded state, the transaction is authorized despite the user request having inadequate privileges originally.Type: GrantFiled: December 16, 2013Date of Patent: October 6, 2015Assignee: MICROSOFT TECHNOLOGY LICENSING, LLCInventors: Brian Perlman, Richard S. Eizenhoefer, Wen-Pin Scott Hsu
-
Publication number: 20150261957Abstract: A system grants “provisional privileges” to a user request for the purpose of provisionally performing a requested transaction. If the provisionally-performed transaction does not put the system in a degraded state, the transaction is authorized despite the user request having inadequate privileges originally.Type: ApplicationFiled: May 28, 2015Publication date: September 17, 2015Inventors: Brian Perlman, Richard S. Eizenhoefer, Wen-Pin Scott Hsu
-
Publication number: 20150163058Abstract: Techniques are described for ensuring data integrity and authentication of received messages. One technique includes sending a request from a first module to a second module in which the request includes a first portion that is a shared secret encrypted with a public key, obtaining by the second module a private key from a secure and trusted information store, such as a license information store, including license information or other application specific information for the first module, using the private key to decrypt the first portion and obtain the shared secret, sending a response from the second module to the first module in which the response includes authentication data and at least one data item used with the shared secret to determine the authentication data, and performing by the first module verification processing to verify the authentication data included in the response.Type: ApplicationFiled: January 12, 2015Publication date: June 11, 2015Inventors: Wen-Pin Scott Hsu, Tarik Soulami, Mark Zagorski, Ning Zhang, Brian Perlman
-
Patent number: 8935528Abstract: Techniques are described for ensuring data integrity and authentication of received messages. One technique includes sending a request from a first module to a second module in which the request includes a first portion that is a shared secret encrypted with a public key, obtaining by the second module a private key from a secure and trusted information store, such as a license information store, including license information or other application specific information for the first module, using the private key to decrypt the first portion and obtain the shared secret, sending a response from the second module to the first module in which the response includes authentication data and at least one data item used with the shared secret to determine the authentication data, and performing by the first module verification processing to verify the authentication data included in the response.Type: GrantFiled: June 26, 2008Date of Patent: January 13, 2015Assignee: Microsoft CorporationInventors: Wen-Pin Scott Hsu, Tarik Soulami, Mark Zagorski, Ning Zhang, Brian Perlman
-
Publication number: 20140279550Abstract: An upgrade to a computer program is associated with a token which is in turn associated with the original key for the computer program. In particular, given the original key, a publisher provides a token for the upgrade which is digitally signed and associated with the original key. The token also can result in a license state for the upgrade that is different from the license state for the original computer program. The original key can be used in various business rules by the publisher to determine whether to issue the token and/or what license state to associate with the token. When the upgrade is run on the computer, the verification process authenticates the token, the original license and the original key and authorizes execution of the upgrade based on the token for upgrade. Multiple upgrades can use multiple tokens and the original key.Type: ApplicationFiled: March 14, 2013Publication date: September 18, 2014Applicant: MICROSOFT CORPORATIONInventors: Ning Zhang, Mikael Horal, Brian Perlman, Hakki Bostanci, Hariharan Jayaraman, Rama Krishnan Venkatachalam
-
Publication number: 20140109218Abstract: A system grants “provisional privileges” to a user request for the purpose of provisionally performing a requested transaction. If the provisionally-performed transaction does not put the system in a degraded state, the transaction is authorized despite the user request having inadequate privileges originally.Type: ApplicationFiled: December 16, 2013Publication date: April 17, 2014Applicant: Microsoft CorporationInventors: Brian Perlman, Richard S. Eizenhoefer, Wen-Pin Scott Hsu
-
Patent number: 8613077Abstract: A system grants “provisional privileges” to a user request for the purpose of provisionally performing a requested transaction. If the provisionally-performed transaction does not put the system in a degraded state, the transaction is authorized despite the user request having inadequate privileges originally.Type: GrantFiled: May 23, 2012Date of Patent: December 17, 2013Assignee: Microsoft CorporationInventors: Brian Perlman, Richard S. Eizenhoefer, Wen-Pin Scott Hsu
-
Publication number: 20120240221Abstract: A system grants “provisional privileges” to a user request for the purpose of provisionally performing a requested transaction. If the provisionally-performed transaction does not put the system in a degraded state, the transaction is authorized despite the user request having inadequate privileges originally.Type: ApplicationFiled: May 23, 2012Publication date: September 20, 2012Applicant: Microsoft CorporationInventors: Brian Perlman, Richard S. Eizenhoefer, Wen-Pin Scott Hsu
-
Patent number: 8196196Abstract: A system grants “provisional privileges” to a user request for the purpose of provisionally performing a requested transaction. If the provisionally-performed transaction does not put the system in a degraded state, the transaction is authorized despite the user request having inadequate privileges originally.Type: GrantFiled: December 1, 2010Date of Patent: June 5, 2012Assignee: Microsoft CorporationInventors: Brian Perlman, Richard S. Eizenhoefer, Wen-Pin Scott Hsu
-
Publication number: 20110072513Abstract: A system grants “provisional privileges” to a user request for the purpose of provisionally performing a requested transaction. If the provisionally-performed transaction does not put the system in a degraded state, the transaction is authorized despite the user request having inadequate privileges originally.Type: ApplicationFiled: December 1, 2010Publication date: March 24, 2011Applicant: Microsoft CorporationInventors: Brian Perlman, Richard S. Eizenhoefer, Wen-Pin Scott Hsu
-
Patent number: 7865949Abstract: A system grants “provisional privileges” to a user request for the purpose of provisionally performing a requested transaction. If the provisionally-performed transaction does not put the system in a degraded state, the transaction is authorized despite the user request having inadequate privileges originally.Type: GrantFiled: January 18, 2007Date of Patent: January 4, 2011Assignee: Microsoft CorporationInventors: Brian Perlman, Richard S. Eizenhoefer, Wen-Pin Scott Hsu
-
Publication number: 20090327737Abstract: Techniques are described for ensuring data integrity and authentication of received messages. One technique includes sending a request from a first module to a second module in which the request includes a first portion that is a shared secret encrypted with a public key, obtaining by the second module a private key from a secure and trusted information store, such as a license information store, including license information or other application specific information for the first module, using the private key to decrypt the first portion and obtain the shared secret, sending a response from the second module to the first module in which the response includes authentication data and at least one data item used with the shared secret to determine the authentication data, and performing by the first module verification processing to verify the authentication data included in the response.Type: ApplicationFiled: June 26, 2008Publication date: December 31, 2009Applicant: Microsoft CorporationInventors: Wen-Pin Scott Hsu, Tarik Soulami, Mark Zagorski, Ning Zhang, Brian Perlman
-
Publication number: 20080178285Abstract: A system grants “provisional privileges” to a user request for the purpose of provisionally performing a requested transaction. If the provisionally-performed transaction does not put the system in a degraded state, the transaction is authorized despite the user request having inadequate privileges originally.Type: ApplicationFiled: January 18, 2007Publication date: July 24, 2008Applicant: Microsoft CorporationInventors: Brian Perlman, Richard S. Eizenhoefer, Wen-Pin Scott Hsu
-
Publication number: 20070016773Abstract: A centralized process is provided for elevating portions of an application running under a user account to administrator privilege. A service security identifier is temporarily associated with the user and the portions of the application to be elevated to administrator privileges. The service security identifier is registered in the access control list to be accessed by the operating system. The centralized process may be used in the activation of software products.Type: ApplicationFiled: July 15, 2005Publication date: January 18, 2007Applicant: Microsoft CorporationInventors: Brian Perlman, Jay Girotto, Caglar Gunyakti, Kalin Toshev