Patents by Inventor Cedric Fournet

Cedric Fournet has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 7567523
    Abstract: A system and method for discovering network topology by various switch training and probing methods. Segments are discovered by having computers enter a promiscuous mode and determining from packets sent to a selected computer which computers see which other computers in the network. From the segments, various switch interconnections are determined, by having different computers train switches as to a training address and seeing which computers receive probe packets sent to that training address from another computer. Various training and probing methods are described that locate intermediate segments, deep switches, switch interconnections, and edge and singleton cases. In one implementation, a master computer coordinates the other computers (and devices) in the network to send the training and probing packets, and report on received packets, in order to determine the network topology.
    Type: Grant
    Filed: January 29, 2004
    Date of Patent: July 28, 2009
    Assignee: Microsoft Corporation
    Inventors: Richard Black, Austin Donnelly, Cédric Fournet
  • Patent number: 7559080
    Abstract: Systems and methods for automatically generating security policy for a web service are described. In one aspect, one or more links between one or more endpoints are described with an abstract link description. The abstract link description describes, for each link of the one or more links, one or more security goals associated with exchange of message(s) between the one or more endpoints associated with the link. The one or more endpoints host respective principals networked in a distributed operating environment. Detailed security policies for enforcement during exchange of messages between the one or more endpoints are automatically generated from the abstract link description.
    Type: Grant
    Filed: December 29, 2004
    Date of Patent: July 7, 2009
    Assignee: Microsoft Corporation
    Inventors: Karthikeyan Bhargavan, Cedric Fournet, Andrew Donald Gordon, Christopher G. Kaler
  • Publication number: 20090138937
    Abstract: A client-side enforcement mechanism may allow application security policies to be specified at a server in a programmatic manner. Servers may specify security policies as JavaScript functions included in a page returned by the server and run before other scripts. At runtime, and during initial loading, the functions are invoked by the client on each page modification to ensure the page conforms to the security policy. As such, before a mutation takes effect, the policy may transform that mutation and the code and data of the page. Replicated code execution may take place at both the client and the server where the server runs its own shadow copy of a client-side application in a trusted execution environment so that the server may check that the method calls coming from the client correspond to a correct execution of the client-side application The redundant execution at the client can be untrusted, but serves to improve the responsiveness and performance of the Web application.
    Type: Application
    Filed: November 23, 2007
    Publication date: May 28, 2009
    Applicant: MICROSOFT CORPORATION
    Inventors: Ulfar Erlingsson, Yinglian Xie, Ben Livshits, Cedric Fournet
  • Patent number: 7437718
    Abstract: An analysis tool provides a call path set for reviewing the security of trusted software components during development. By examining the usage of permissions in programs and libraries within a managed execution environment, potential gaps in the security of trusted components may be identified. A call graph generator creates a permission-sensitive call graph. A call graph analyzer evaluates the permission-sensitive call graph to highlight call paths that may present security risks.
    Type: Grant
    Filed: September 5, 2003
    Date of Patent: October 14, 2008
    Assignee: Microsoft Corporation
    Inventors: Cedric Fournet, Andrew Donald Gordon, Tomasz Pierre Blanc
  • Publication number: 20080066160
    Abstract: A security language expresses assertions and authorization queries in a manner that facilitates logic resolution. In an example implementation, assertion syntax and authorization query syntax are described. In another example implementation, checks on the safety of assertions and authorization queries are described. In yet another example implementation, semantics rules are described.
    Type: Application
    Filed: September 11, 2006
    Publication date: March 13, 2008
    Applicant: Microsoft Corporation
    Inventors: Moritz Y. Becker, Blair B. Dillaway, Cedric Fournet, Andrew D. Gordon
  • Publication number: 20080066159
    Abstract: The delegation of rights may be controlled in a number of manners. In an example implementation, a delegation authority assertion is formulated with a delegator principle, a delegatee principal, a verb phrase, a resource, and a delagation-directive verb. In another example implementation, a delegation mechanism involving an assertor, a first principal, and a second principal enables a delegation to be specifically controlled. In yet another example implementation, a chained delegation mechanism enables explicit control of a permitted transitive chaining depth.
    Type: Application
    Filed: September 8, 2006
    Publication date: March 13, 2008
    Applicant: Microsoft Corporation
    Inventors: Blair B. Dillaway, Moritz Y. Becker, Andrew D. Gordon, Cedric Fournet
  • Publication number: 20080066175
    Abstract: In an example implementation, a bifurcated security scheme has a first level that does not allow usage of negations and a second level that does permit usage of negations. In another example implementation, an authorization query table maps respective resource-specific operations to respective associated authorization queries. In yet another example implementation, authorization queries are permitted to have negations, but individual assertions are not.
    Type: Application
    Filed: September 8, 2006
    Publication date: March 13, 2008
    Applicant: Microsoft Corporation
    Inventors: Blair B. Dillaway, Moritz Y. Becker, Andrew D. Gordon, Cedric Fournet
  • Publication number: 20080065899
    Abstract: A security scheme enables control over variables that are expressed in security assertions. In an example implementation, a security type is implicitly assigned to variables based on their syntactic position within a given assertion. In another example implementation, a security scheme enforces strong variable typing such that each variable in an assertion binds to only a single security type. In yet another example implementation, a security scheme constrains the binding behavior of two variables with respect to each other.
    Type: Application
    Filed: September 8, 2006
    Publication date: March 13, 2008
    Applicant: Microsoft Corporation
    Inventors: Blair B. Dillaway, Brian A. LaMacchia, Moritz Y. Becker, Andrew D. Gordon, Cedric Fournet
  • Publication number: 20080066170
    Abstract: Security assertion revocation enables a revocation granularity in a security scheme down to the level of individual assertions. In an example implemenation, a security token includes multiple respective assertions that are associated with multiple respective assertion identifiers. More specifically, each individual assertion is associated with at least one individual assertion identifier.
    Type: Application
    Filed: September 8, 2006
    Publication date: March 13, 2008
    Applicant: Microsoft Corporation
    Inventors: Blair B. Dillaway, Moritz Y. Becker, Andrew D. Gordon, Cedric Fournet, Brian A. LaMacchia
  • Publication number: 20080066171
    Abstract: Security language constructs may be translated into logic language constructs and vise versa. Logic resolution may be effected using, for example, the logic language constructs. In an example implementation, translation of a security language assertion into at least one logic language rule is described. In another example implementation, translation of a proof graph reflecting a logic language into a proof graph reflecting a security language is described. In yet another example implementation, evaluation of a logic language program using a deterministic algorithm is described.
    Type: Application
    Filed: September 11, 2006
    Publication date: March 13, 2008
    Applicant: Microsoft Corporation
    Inventors: Moritz Y. Becker, Blair B. Dillaway, Cedric Fournet, Andrew D. Gordon, Jason F. MacKay
  • Publication number: 20050268326
    Abstract: Systems and methods for checking security goals of a distributed system are described. In one aspect, detailed security policies are converted into a model. The detailed security policies are enforced during exchange of messages between one or more endpoints. The one or more endpoints host respective principals networked in a distributed operating environment. The model is evaluated to determine if the detailed security policies enforce one or more security goals of at least one of the one or more endpoints.
    Type: Application
    Filed: December 29, 2004
    Publication date: December 1, 2005
    Applicant: Microsoft Corporation
    Inventors: Karthikeyan Bhargavan, Cedric Fournet, Andrew Gordon, Christopher Kaler, Riccardo Pucella
  • Publication number: 20050169193
    Abstract: A system and method for discovering network topology by various switch training and probing methods. Segments are discovered by having computers enter a promiscuous mode and determining from packets sent to a selected computer which computers see which other computers in the network. From the segments, various switch interconnections are determined, by having different computers train switches as to a training address and seeing which computers receive probe packets sent to that training address from another computer. Various training and probing methods are described that locate intermediate segments, deep switches, switch interconnections, and edge and singleton cases. In one implementation, a master computer coordinates the other computers (and devices) in the network to send the training and probing packets, and report on received packets, in order to determine the network topology.
    Type: Application
    Filed: January 29, 2004
    Publication date: August 4, 2005
    Applicant: MICROSOFT CORPORATION
    Inventors: Richard Black, Austin Donnelly, Cedric Fournet
  • Publication number: 20050055565
    Abstract: An analysis tool provides a call path set for reviewing the security of trusted software components during development. By examining the usage of permissions in programs and libraries within a managed execution environment, potential gaps in the security of trusted components may be identified. A call graph generator creates a permission-sensitive call graph. A call graph analyzer evaluates the permission-sensitive call graph to highlight call paths that may present security risks.
    Type: Application
    Filed: September 5, 2003
    Publication date: March 10, 2005
    Inventors: Cedric Fournet, Andrew Gordon, Tomasz Blanc