Patents by Inventor Chad Verbowski

Chad Verbowski has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20070006283
    Abstract: A technique for identifying dependencies of an application upon a given security context includes monitoring security checks generated by the application. The security checks requiring elevated rights are identified and the state of execution of the application corresponding to the identified security checks may be logged. The security checks requiring elevated rights may be identified by monitoring access checks, monitoring privilege checks, checking user/group identifiers against a list of known identifiers associated with elevated rights, or the like.
    Type: Application
    Filed: August 29, 2005
    Publication date: January 4, 2007
    Applicant: Microsoft Corporation
    Inventors: Chad Verbowski, John Dunagan, Shuo Chen, Yi-Min Wang
  • Publication number: 20060117310
    Abstract: A method and system for analyzing the impact on software of an update to a software system is provided. The impact analysis system identifies resources that are affected by an update to the software system and identifies resources that are accessed by various software components during execution of the software components. To analyze the effects of an update, the impact analysis system identifies those accessed resources of the software components that are affected by the update as being impacted resources. The impact analysis system considers those software components that access the impacted resources to be impacted software components. The impact analysis system provides a user interface through which a user can view and analyze the impact of an update.
    Type: Application
    Filed: November 24, 2004
    Publication date: June 1, 2006
    Applicant: Microsoft Corporation
    Inventors: Bradford Daniels, John Dunagan, Roussi Roussev, Chad Verbowski, Yi-Min Wang
  • Publication number: 20060031673
    Abstract: A method and system for detecting that a software system has been infected by software that attempts to hide properties related to the software system is provided. A detection system identifies that a suspect operating system has been infected by malware by comparing properties related to the suspect operating system as reported by the suspect operating system to properties as reported by another operating system that is assumed to be clean. The detection system compares the reported properties to the actual properties to identify any significant differences. A significant difference, such as the presence of an actual file not reported by the suspect operating system, may indicate that the suspect storage device is infected.
    Type: Application
    Filed: November 23, 2004
    Publication date: February 9, 2006
    Applicant: Microsoft Corporation
    Inventors: Douglas Beck, Aaron Johnson, Roussi Roussev, Chad Verbowski, Binh Vo, Yi-Min Wang
  • Publication number: 20050268112
    Abstract: A monitoring service is provided that detects spyware or other unwanted software at the time it is installed and/or allows for the spyware's removal. The service monitors “Auto-Start Extensibility Points” (“ASEPs”) to detect spyware installations. ASEPs refer to the configuration points that can be “hooked” to allow programs to be auto-started without explicit user invocation. Such a service is particularly effective because an overwhelming majority of spyware programs infect systems in such a way that they are automatically started upon reboot and the launch of many commonly used applications. The monitoring service can thus lead to the subsequent complete removal of the spyware installation, and does not require a frequent signature-based cleaning. Spyware that is bundled with other software such as freeware or shareware can also be removed.
    Type: Application
    Filed: September 28, 2004
    Publication date: December 1, 2005
    Applicant: Microsoft Corporation
    Inventors: Yi-Min Wang, Chad Verbowski, Aaron Johnson, Roussi Roussev
  • Publication number: 20050188268
    Abstract: A method and system for identifying a configuration parameter of a “sick” computer system that is at fault for causing an undesired behavior based on analysis of configuration parameters from other computer systems is provided. In one embodiment, a troubleshooting system collects “suspect” values for “suspect” configuration parameters used by a “sick” application when the undesired behavior was exhibited by the sick computer system. The troubleshooting system then compares the suspect values to sample values of the suspect configuration parameters retrieved from sample computer systems. The troubleshooting system uses that comparison to identify one or more suspect configuration parameters that are likely at fault for causing the application to exhibit the undesired behavior.
    Type: Application
    Filed: August 13, 2004
    Publication date: August 25, 2005
    Applicant: Microsoft Corporation
    Inventors: Chad Verbowski, Jiahe Wang, John Platt, Ruyun Zhang, Yu Chen
  • Publication number: 20050155031
    Abstract: As computer programs grow more complex, extensible, and connected, it becomes increasingly difficult for users to understand what has changed on their machines and what impact those changes have. An embodiment of the invention is described via a software tool, called AskStrider, that answers those questions by correlating volatile process information with persistent-state context information and change history. AskStrider scans a system for active components, matches them against a change log to identify recently updated and hence more interesting state, and searches for context information to help users understand the changes. Several real-world cases are provided to demonstrate the effectiveness of using AskStrider to quickly identify the presence of unwanted software, to determine if a software patch is potentially breaking an application, and to detect lingering components left over from an unclean uninstallation.
    Type: Application
    Filed: April 22, 2004
    Publication date: July 14, 2005
    Applicant: Microsoft Corporation
    Inventors: Yi-Min Wang, Aaron Johnson, David Ladd, Roussi Roussev, Chad Verbowski
  • Patent number: 6901449
    Abstract: A system and method are provided for encoding data in accordance with the present invention. The system includes a first subsystem for encoding a second data protocol within a formatted data protocol without disrupting display operations associated with the first data protocol. An encapsulation sequence is provided to isolate the second data protocol from the formatted data protocol, wherein a monitoring subsystem receives status from the first subsystem via the second data protocol.
    Type: Grant
    Filed: December 22, 2000
    Date of Patent: May 31, 2005
    Assignee: Microsoft Corporation
    Inventors: Sean Selitrennikoff, Chad Verbowski, Bryan Mark Willman, Adam D. Barr, Sadagopan Rajaram
  • Publication number: 20040260678
    Abstract: A system and method for determining configuration failure root cause of an application uses persistent-state checkpoints. Checkpoints are periodic snapshots of configuration data saved at different points in a machine's history. One component in the system compares checkpoints, records configuration file accesses, and tracks change frequencies of configuration file values. Another component is configured to record actions of a user interface and configuration file modifications and to search one or more databases for information related to the configuration failure. The components determine a deviation from known operation of the application without the application specifying configuration settings that control the deviation.
    Type: Application
    Filed: June 18, 2003
    Publication date: December 23, 2004
    Applicant: Microsoft Corporation
    Inventors: Chad Verbowski, Yi-Min Wang
  • Publication number: 20040210666
    Abstract: A system and method are provided for encoding data in accordance with the present invention. The system includes a first subsystem for encoding a second data protocol within a formatted data protocol without disrupting display operations associated with the first data protocol. An encapsulation sequence is provided to isolate the second data protocol from the formatted data protocol, wherein a monitoring subsystem receives status from the first subsystem via the second data protocol.
    Type: Application
    Filed: May 7, 2004
    Publication date: October 21, 2004
    Applicant: Microsoft Corporation
    Inventors: Sean Selitrennikoff, Chad Verbowski, Bryan Mark Willman, Adam D. Barr, Sadagopan Rajaram