Patents by Inventor Cedric Fournet
Cedric Fournet has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 7567523Abstract: A system and method for discovering network topology by various switch training and probing methods. Segments are discovered by having computers enter a promiscuous mode and determining from packets sent to a selected computer which computers see which other computers in the network. From the segments, various switch interconnections are determined, by having different computers train switches as to a training address and seeing which computers receive probe packets sent to that training address from another computer. Various training and probing methods are described that locate intermediate segments, deep switches, switch interconnections, and edge and singleton cases. In one implementation, a master computer coordinates the other computers (and devices) in the network to send the training and probing packets, and report on received packets, in order to determine the network topology.Type: GrantFiled: January 29, 2004Date of Patent: July 28, 2009Assignee: Microsoft CorporationInventors: Richard Black, Austin Donnelly, Cédric Fournet
-
Patent number: 7559080Abstract: Systems and methods for automatically generating security policy for a web service are described. In one aspect, one or more links between one or more endpoints are described with an abstract link description. The abstract link description describes, for each link of the one or more links, one or more security goals associated with exchange of message(s) between the one or more endpoints associated with the link. The one or more endpoints host respective principals networked in a distributed operating environment. Detailed security policies for enforcement during exchange of messages between the one or more endpoints are automatically generated from the abstract link description.Type: GrantFiled: December 29, 2004Date of Patent: July 7, 2009Assignee: Microsoft CorporationInventors: Karthikeyan Bhargavan, Cedric Fournet, Andrew Donald Gordon, Christopher G. Kaler
-
Publication number: 20090138937Abstract: A client-side enforcement mechanism may allow application security policies to be specified at a server in a programmatic manner. Servers may specify security policies as JavaScript functions included in a page returned by the server and run before other scripts. At runtime, and during initial loading, the functions are invoked by the client on each page modification to ensure the page conforms to the security policy. As such, before a mutation takes effect, the policy may transform that mutation and the code and data of the page. Replicated code execution may take place at both the client and the server where the server runs its own shadow copy of a client-side application in a trusted execution environment so that the server may check that the method calls coming from the client correspond to a correct execution of the client-side application The redundant execution at the client can be untrusted, but serves to improve the responsiveness and performance of the Web application.Type: ApplicationFiled: November 23, 2007Publication date: May 28, 2009Applicant: MICROSOFT CORPORATIONInventors: Ulfar Erlingsson, Yinglian Xie, Ben Livshits, Cedric Fournet
-
Patent number: 7437718Abstract: An analysis tool provides a call path set for reviewing the security of trusted software components during development. By examining the usage of permissions in programs and libraries within a managed execution environment, potential gaps in the security of trusted components may be identified. A call graph generator creates a permission-sensitive call graph. A call graph analyzer evaluates the permission-sensitive call graph to highlight call paths that may present security risks.Type: GrantFiled: September 5, 2003Date of Patent: October 14, 2008Assignee: Microsoft CorporationInventors: Cedric Fournet, Andrew Donald Gordon, Tomasz Pierre Blanc
-
Publication number: 20080066160Abstract: A security language expresses assertions and authorization queries in a manner that facilitates logic resolution. In an example implementation, assertion syntax and authorization query syntax are described. In another example implementation, checks on the safety of assertions and authorization queries are described. In yet another example implementation, semantics rules are described.Type: ApplicationFiled: September 11, 2006Publication date: March 13, 2008Applicant: Microsoft CorporationInventors: Moritz Y. Becker, Blair B. Dillaway, Cedric Fournet, Andrew D. Gordon
-
Publication number: 20080066159Abstract: The delegation of rights may be controlled in a number of manners. In an example implementation, a delegation authority assertion is formulated with a delegator principle, a delegatee principal, a verb phrase, a resource, and a delagation-directive verb. In another example implementation, a delegation mechanism involving an assertor, a first principal, and a second principal enables a delegation to be specifically controlled. In yet another example implementation, a chained delegation mechanism enables explicit control of a permitted transitive chaining depth.Type: ApplicationFiled: September 8, 2006Publication date: March 13, 2008Applicant: Microsoft CorporationInventors: Blair B. Dillaway, Moritz Y. Becker, Andrew D. Gordon, Cedric Fournet
-
Publication number: 20080066175Abstract: In an example implementation, a bifurcated security scheme has a first level that does not allow usage of negations and a second level that does permit usage of negations. In another example implementation, an authorization query table maps respective resource-specific operations to respective associated authorization queries. In yet another example implementation, authorization queries are permitted to have negations, but individual assertions are not.Type: ApplicationFiled: September 8, 2006Publication date: March 13, 2008Applicant: Microsoft CorporationInventors: Blair B. Dillaway, Moritz Y. Becker, Andrew D. Gordon, Cedric Fournet
-
Publication number: 20080065899Abstract: A security scheme enables control over variables that are expressed in security assertions. In an example implementation, a security type is implicitly assigned to variables based on their syntactic position within a given assertion. In another example implementation, a security scheme enforces strong variable typing such that each variable in an assertion binds to only a single security type. In yet another example implementation, a security scheme constrains the binding behavior of two variables with respect to each other.Type: ApplicationFiled: September 8, 2006Publication date: March 13, 2008Applicant: Microsoft CorporationInventors: Blair B. Dillaway, Brian A. LaMacchia, Moritz Y. Becker, Andrew D. Gordon, Cedric Fournet
-
Publication number: 20080066170Abstract: Security assertion revocation enables a revocation granularity in a security scheme down to the level of individual assertions. In an example implemenation, a security token includes multiple respective assertions that are associated with multiple respective assertion identifiers. More specifically, each individual assertion is associated with at least one individual assertion identifier.Type: ApplicationFiled: September 8, 2006Publication date: March 13, 2008Applicant: Microsoft CorporationInventors: Blair B. Dillaway, Moritz Y. Becker, Andrew D. Gordon, Cedric Fournet, Brian A. LaMacchia
-
Publication number: 20080066171Abstract: Security language constructs may be translated into logic language constructs and vise versa. Logic resolution may be effected using, for example, the logic language constructs. In an example implementation, translation of a security language assertion into at least one logic language rule is described. In another example implementation, translation of a proof graph reflecting a logic language into a proof graph reflecting a security language is described. In yet another example implementation, evaluation of a logic language program using a deterministic algorithm is described.Type: ApplicationFiled: September 11, 2006Publication date: March 13, 2008Applicant: Microsoft CorporationInventors: Moritz Y. Becker, Blair B. Dillaway, Cedric Fournet, Andrew D. Gordon, Jason F. MacKay
-
Publication number: 20050268326Abstract: Systems and methods for checking security goals of a distributed system are described. In one aspect, detailed security policies are converted into a model. The detailed security policies are enforced during exchange of messages between one or more endpoints. The one or more endpoints host respective principals networked in a distributed operating environment. The model is evaluated to determine if the detailed security policies enforce one or more security goals of at least one of the one or more endpoints.Type: ApplicationFiled: December 29, 2004Publication date: December 1, 2005Applicant: Microsoft CorporationInventors: Karthikeyan Bhargavan, Cedric Fournet, Andrew Gordon, Christopher Kaler, Riccardo Pucella
-
Publication number: 20050169193Abstract: A system and method for discovering network topology by various switch training and probing methods. Segments are discovered by having computers enter a promiscuous mode and determining from packets sent to a selected computer which computers see which other computers in the network. From the segments, various switch interconnections are determined, by having different computers train switches as to a training address and seeing which computers receive probe packets sent to that training address from another computer. Various training and probing methods are described that locate intermediate segments, deep switches, switch interconnections, and edge and singleton cases. In one implementation, a master computer coordinates the other computers (and devices) in the network to send the training and probing packets, and report on received packets, in order to determine the network topology.Type: ApplicationFiled: January 29, 2004Publication date: August 4, 2005Applicant: MICROSOFT CORPORATIONInventors: Richard Black, Austin Donnelly, Cedric Fournet
-
Publication number: 20050055565Abstract: An analysis tool provides a call path set for reviewing the security of trusted software components during development. By examining the usage of permissions in programs and libraries within a managed execution environment, potential gaps in the security of trusted components may be identified. A call graph generator creates a permission-sensitive call graph. A call graph analyzer evaluates the permission-sensitive call graph to highlight call paths that may present security risks.Type: ApplicationFiled: September 5, 2003Publication date: March 10, 2005Inventors: Cedric Fournet, Andrew Gordon, Tomasz Blanc