Patents by Inventor Carl M. Ellison
Carl M. Ellison has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 9495190Abstract: In the host operating system of a computing device, entropy data is collected based at least in part on each of one or more hardware components of the computing device. An entropy pool is updated based at least in part on the collected entropy data, and data from the entropy pool is provided to a guest operating system running as a virtual machine of the computing device. The guest operating system maintains a guest operating system entropy pool based on the data from the entropy pool provided by the host operating system. The guest operating system accesses the guest operating system entropy pool and uses the guest operating system entropy pool as a basis for generating values including random numbers.Type: GrantFiled: August 24, 2009Date of Patent: November 15, 2016Assignee: Microsoft Technology Licensing, LLCInventors: Carl M. Ellison, Scott A. Field, Brandon S. Baker
-
Patent number: 9305156Abstract: Systems, methods, and technologies for configuring a conventional smart card and client machine, and for performing a smart card authorization using the configured smart card and client. Further, the combination of methods provides for mutual authentication—authentication of the client to the user, and authentication of the user to the client. The authentication methods include presenting a specified token to the user sufficient to authenticate the client to the user and thus protect the user-provided PIN. Security is strengthened by using an integrity key based on approved client system configurations. Security is further strengthened by calculating a PIN? value based on a user-specified PIN and a modifier and using the PIN? value for unlocking the smart card.Type: GrantFiled: February 2, 2015Date of Patent: April 5, 2016Assignee: MICROSOFT TECHNOLOGY LICENSING, LLCInventors: Stefan Thom, Erik Lee Holt, Shivaram H. Mysore, Valerie Kathleen Bays, Carl M. Ellison
-
Patent number: 9253195Abstract: The subject disclosure pertains to systems and methods that facilitate managing access control utilizing certificates. The systems and methods described herein are directed to mapping an access policy as expressed in an access control list to a set of certificates. The set of certificates can be used to grant access to resources in the manner described by the ACL. The certificates can be distributed to entities for use in obtaining access to resources. Entities can present certificates to resources as evidence of their right to access the resources. The access logic of the sequential ACL can be transformed or mapped to a set of order independent certificates. In particular, each entry, position of the entry in the list and any preceding entries can be analyzed. The analysis can be used to generate order independent certificates that provide access in accordance with the access policy communicated in the ACL.Type: GrantFiled: June 11, 2013Date of Patent: February 2, 2016Assignee: Microsoft Technology Licensing, LLCInventors: Carl M. Ellison, Paul J. Leach, Butler W. Lampson, Melissa W. Dunn, Ravindra Nath Pandya, Charles William Kaufman
-
Patent number: 9106629Abstract: Each member of a group contributes to and calculates a new shared value. A distributed shared value algorithm is used to reach unanimous agreement on a shared value, such that every group member can use the new shared value as soon as it is changed. The distributed shared value agreement methodology operates without the selection of a leader. Each group member performs the distributed shared value agreement methodology and computes the new shared value using one or more of the contributions from the group members in such a way that no one member coerces the resulting shared value.Type: GrantFiled: August 18, 2009Date of Patent: August 11, 2015Assignee: Microsoft Technology Licensing, LLCInventors: Carl M. Ellison, Larry Zhu, Tore L. Sundelin, Gleb Kholodov
-
Publication number: 20150207632Abstract: In accordance with one or more aspects, an initial output string is generated by a random number generator. The initial output string is sent to a random number service, and an indication of failure is received from the random number service if the initial output string is the same as a previous initial output string received by the random number service. Operation of the device is ceased in response to the indication of failure. Additionally, entropy estimates for hash values of an entropy source can be generated by an entropy estimation service based on hash values of various entropy source values received by the entropy estimation service. The hash values can be incorporated into an entropy pool of the device, and the entropy estimate of the pool being updated based on the estimated entropy of the entropy source.Type: ApplicationFiled: March 31, 2015Publication date: July 23, 2015Inventor: Carl M. Ellison
-
Patent number: 9075980Abstract: Systems, methods, and technologies for configuring a conventional smart card and client machine, and for performing a smart card authorization using the configured smart card and client. Further, the combination of methods provides for mutual authentication—authentication of the client to the user, and authentication of the user to the client. The authentication methods include presenting a specified token to the user sufficient to authenticate the client to the user and thus protect the user-provided PIN. Security is strengthened by using an integrity key based on approved client system configurations. Security is further strengthened by calculating a PIN? value based on a user-specified PIN and a modifier and using the PIN? value for unlocking the smart card.Type: GrantFiled: June 27, 2013Date of Patent: July 7, 2015Assignee: MICROSOFT TECHNOLOGY LICENSING, LLCInventors: Stefan Thom, Erik Lee Holt, Shivaram H. Mysore, Valerie Kathleen Bays, Carl M. Ellison
-
Patent number: 9058497Abstract: Cryptographic key management techniques are described. In one or more implementations, an access control rule is read that includes a Boolean expression having a plurality of atoms. The cryptographic keys that corresponds each of the plurality of atoms in the access control rule are requested. One or more cryptographic operations are then performed on data using one or more of the cryptographic keys.Type: GrantFiled: December 23, 2010Date of Patent: June 16, 2015Assignee: Microsoft Technology Licensing, LLCInventors: Vijay G. Bharadwaj, Niels T Ferguson, Carl M. Ellison, Magnus Bo Gustaf Nyström, Dayi Zhou, Denis Issoupov, Octavian T. Ureche, Peter J. Novotney, Cristian M. Ilac
-
Publication number: 20150149782Abstract: Systems, methods, and technologies for configuring a conventional smart card and client machine, and for performing a smart card authorization using the configured smart card and client. Further, the combination of methods provides for mutual authentication—authentication of the client to the user, and authentication of the user to the client. The authentication methods include presenting a specified token to the user sufficient to authenticate the client to the user and thus protect the user-provided PIN. Security is strengthened by using an integrity key based on approved client system configurations. Security is further strengthened by calculating a PIN? value based on a user-specified PIN and a modifier and using the PIN? value for unlocking the smart card.Type: ApplicationFiled: February 2, 2015Publication date: May 28, 2015Inventors: Stefan Thom, Erik Lee Holt, Shivaram H. Mysore, Valerie Kathleen Bays, Carl M. Ellison
-
Patent number: 9026571Abstract: In accordance with one or more aspects, an initial output string is generated by a random number generator. The initial output string is sent to a random number service, and an indication of failure is received from the random number service if the initial output string is the same as a previous initial output string received by the random number service. Operation of the device is ceased in response to the indication of failure. Additionally, entropy estimates for hash values of an entropy source can be generated by an entropy estimation service based on hash values of various entropy source values received by the entropy estimation service. The hash values can be incorporated into an entropy pool of the device, and the entropy estimate of the pool being updated based on the estimated entropy of the entropy source.Type: GrantFiled: October 27, 2008Date of Patent: May 5, 2015Assignee: Microsoft Technology Licensing, LLCInventor: Carl M. Ellison
-
Patent number: 8966269Abstract: Systems, methods, and technologies for configuring a conventional smart card and client machine, and for performing a smart card authorization using the configured smart card and client. Further, the combination of methods provides for mutual authentication—authentication of the client to the user, and authentication of the user to the client. The authentication methods include presenting a specified token to the user sufficient to authenticate the client to the user and thus protect the user-provided PIN. Security is strengthened by using an integrity key based on approved client system configurations. Security is further strengthened by calculating a PIN? value based on a user-specified PIN and a modifier and using the PIN? value for unlocking the smart card.Type: GrantFiled: June 27, 2013Date of Patent: February 24, 2015Assignee: Microsoft CorporationInventors: Stefan Thom, Erik Lee Holt, Shivaram H. Mysore, Valerie Kathleen Bays, Carl M. Ellison
-
Patent number: 8914874Abstract: A set of security claims for a communication channel are obtained, the set of security claims including one or more security claims each identifying a security characteristic of the communication channel. The security claims are stored, as is a digital signature generated over the set of security claims by an entity. The security claims and digital signature are subsequently accessed when a computing device is to transfer data to and/or from the communication channel. The set of security claims is compared to a security policy of the computing device, and the entity that digitally signed the set of security claims is identified. One or more security precautions that the computing device is to use in transferring data to and/or from the communication channel are determined based at least in part on the comparing and the entity that has digitally signed the set of security claims.Type: GrantFiled: July 21, 2009Date of Patent: December 16, 2014Assignee: Microsoft CorporationInventors: Octavian T. Ureche, Alex M. Semenko, Sai Vinayak, Carl M. Ellison
-
Patent number: 8904509Abstract: A collection of multiple user credentials each associated with one of multiple different users is obtained at a device, and one or more of the multiple user credentials are verified. A determination is made as to whether access to a resource is permitted, by at least comparing the collection of multiple user credentials to a threshold combination of user credentials to be satisfied to access the resource. An indication of whether access to the resource by a requesting user is permitted is returned or provided to another device.Type: GrantFiled: March 15, 2013Date of Patent: December 2, 2014Assignee: Microsoft CorporationInventors: Marc R. Barbour, Carl M. Ellison, Kristjan E. Hatlelid, Janet L. Schneider, Pieter R. Kasselman
-
Patent number: 8875258Abstract: This document describes tools that constrain a login to a subset of access rights. In one embodiment, the tools generate a constrained password by executing a cryptographic algorithm on a user ID, general password, and one or more desired constraints. The constrained password is used in place of the general password to gain access rights that are a subset of the access rights that would be granted if the general password were used instead.Type: GrantFiled: February 18, 2013Date of Patent: October 28, 2014Assignee: Microsoft CorporationInventors: John R. Michener, Niels T. Ferguson, Carl M. Ellison, Josh D. Benaloh, Brian A. LaMacchia
-
Patent number: 8838981Abstract: A communication channel has an associated channel authenticator that includes a channel identifier, a use policy identifying how an owner of the communication channel indicates the communication channel is used, and a digital signature over the channel identifier and use policy. The identifier of the communication channel and the use policy can be verified by a computing device, and a check made as to whether a current security policy of the computing device is satisfied by the use policy. An access that the computing device is allowed to have to the communication channel is determined based at least in part on both whether the current security policy is satisfied by the use policy and whether the identifier of the communication channel and the use policy are verified.Type: GrantFiled: September 13, 2012Date of Patent: September 16, 2014Assignee: Microsoft CorporationInventors: Octavian T. Ureche, Alex M. Semenko, Sai Vinayak, Carl M. Ellison
-
Publication number: 20140108814Abstract: Cryptographic key management techniques are described. In one or more implementations, an access control rule is read that includes a Boolean expression having a plurality of atoms. The cryptographic keys that corresponds each of the plurality of atoms in the access control rule are requested. One or more cryptographic operations are then performed on data using one or more of the cryptographic keys.Type: ApplicationFiled: December 23, 2010Publication date: April 17, 2014Applicant: MICROSOFT CORPORATIONInventors: Vijay G. Bharadwaj, Niels T. Ferguson, Carl M. Ellison, Magnus Bo Gustaf Nyström, Dayi Zhou, Denis Issoupov, Octavian T. Ureche, Peter J. Novotney, Cristian M. Ilac
-
Patent number: 8689015Abstract: A portable secure data file includes an encrypted data portion and a metadata portion. When a request associated with a current user of a device to access a portable secure data file is received, one or more records in the metadata portion are accessed to determine whether the current user is permitted to access the file data in the encrypted data portion. If a record indicates the user is permitted to access the file data, a content encryption key in that record is used to decrypt the encrypted data portion.Type: GrantFiled: January 16, 2013Date of Patent: April 1, 2014Assignee: Microsoft CorporationInventors: Charles G. Jeffries, Vijay G. Bharadwaj, Michael J. Grass, Matthew C. Setzer, Gaurav Sinha, Carl M. Ellison
-
Patent number: 8588421Abstract: A Universal Serial Bus (USB) compatible storage device is utilized as a security token for storage of cryptographic keys. A cryptographic subsystem of a processor accesses cryptographic keys in containers on the USB compatible storage device. Accessing includes storing and/or retrieving. The processor does not include an infrastructure dedicated to the USB compatible storage device. Cryptographic key storage is redirected from an in-processor container to the USB compatible storage device. No password or PIN is required to access the cryptographic keys, yet enhanced security is provided. Utilizing a USB compatible storage device for a cryptographic key container provides a convenient, portable, mechanism for carrying the cryptographic key, and additional security is provided via physical possession of the device.Type: GrantFiled: January 26, 2007Date of Patent: November 19, 2013Assignee: Microsoft CorporationInventors: Tolga Acar, Carl M. Ellison
-
Publication number: 20130290724Abstract: Systems, methods, and technologies for configuring a conventional smart card and client machine, and for performing a smart card authorization using the configured smart card and client. Further, the combination of methods provides for mutual authentication—authentication of the client to the user, and authentication of the user to the client. The authentication methods include presenting a specified token to the user sufficient to authenticate the client to the user and thus protect the user-provided PIN. Security is strengthened by using an integrity key based on approved client system configurations. Security is further strengthened by calculating a PIN? value based on a user-specified PIN and a modifier and using the PIN? value for unlocking the smart card.Type: ApplicationFiled: June 27, 2013Publication date: October 31, 2013Inventors: Stefan Thom, Erik Lee Holt, Shivaram H. Mysore, Valerie Kathleen Bays, Carl M. Ellison
-
Publication number: 20130283342Abstract: The subject disclosure pertains to systems and methods that facilitate managing access control utilizing certificates. The systems and methods described herein are directed to mapping an access policy as expressed in an access control list to a set of certificates. The set of certificates can be used to grant access to resources in the manner described by the ACL. The certificates can be distributed to entities for use in obtaining access to resources. Entities can present certificates to resources as evidence of their right to access the resources. The access logic of the sequential ACL can be transformed or mapped to a set of order independent certificates. In particular, each entry, position of the entry in the list and any preceding entries can be analyzed. The analysis can be used to generate order independent certificates that provide access in accordance with the access policy communicated in the ACL.Type: ApplicationFiled: June 11, 2013Publication date: October 24, 2013Inventors: Carl M. Ellison, Paul J. Leach, Butler W. Lampson, Melissa W. Dunn, Ravindra M. Pandya, Charles William Kaufman
-
Patent number: 8504838Abstract: Systems, methods, and technologies for configuring a conventional smart card and a client machine, and for performing a smart card authorization using the configured smart card and client. Further, the combination of methods provides for mutual authentication—authentication of the client to the user, and authentication of the user to the client. The authentication methods include presenting a specified token to the user sufficient to authenticate the client to the user and thus protect the user-provided PIN. Security is strengthened by using an integrity key based on approved client system configurations. Security is further strengthened by calculating a PIN? value based on a user-specified PIN and a modifier and using the PIN? value for unlocking the smart card.Type: GrantFiled: March 26, 2011Date of Patent: August 6, 2013Assignee: Microsoft CorporationInventors: Stefan Thom, Erik Lee Holt, Shivaram H. Mysore, Valerie Kathleen Bays, Carl M. Ellison