Patents by Inventor Clifford P. Van Dyke

Clifford P. Van Dyke has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 9507919
    Abstract: To communicate requirements for a digital license from a receiver of corresponding digital content to a computing device upon which the digital content is to be rendered, the receiver tunes the content and locates within the content information relating to the requirements for the license, constructs the requirements from the located information, and sends such constructed requirements to the computing device. The computing device upon receiving the sent requirements constructs the license based on such received requirements, stores such constructed license in a license store of such computing device, and thereafter renders the content only in accordance with the license. Thus, the receiver need not communicate the license itself to the computing device.
    Type: Grant
    Filed: April 22, 2005
    Date of Patent: November 29, 2016
    Assignee: Microsoft Technology Licensing, LLC
    Inventors: Clifford P. Van Dyke, David J. Cheng, Siva Mohan
  • Patent number: 8781969
    Abstract: A DRM System. A DRM system comprising a service provider, a CE device coupled to the service provider, and an XMR license disposed upon the CE device.
    Type: Grant
    Filed: July 13, 2010
    Date of Patent: July 15, 2014
    Assignee: Microsoft Corporation
    Inventors: Vikas Khandelwal, Eduardo P. Oliveira, Clifford P. Van Dyke, Mark D. VanAntwerp, Clifford P. Storm, James M. Alkove
  • Publication number: 20100280954
    Abstract: A DRM System. A DRM system comprising a service provider, a CE device coupled to the service provider, and an XMR license disposed upon the CE device.
    Type: Application
    Filed: July 13, 2010
    Publication date: November 4, 2010
    Applicant: Microsoft Corporation
    Inventors: Vikas Khandelwal, Eduardo P. Oliveira, Clifford P. Van Dyke, Mark D. VanAntwerp, Clifford Paul Storm, James M. Alkove
  • Patent number: 7650492
    Abstract: The present automatic update mechanism provides a method for determining whether computer-readable components loaded within a memory device are at a level of protection specified for protected content that a media application is attempting to process. If a current level of protection provides lower protection that the level specified, a file is updated to achieve at least the level of protection specified by the protected content. Updating the file to achieve the level of protection is performed in a manner that minimizes rebooting of a computing device.
    Type: Grant
    Filed: July 19, 2005
    Date of Patent: January 19, 2010
    Assignee: Microsoft Corporation
    Inventors: Adil A. Sherwani, Pranavakumar Punniamoorthy, Rajesh A Deshpande, Sumedh N. Barde, Geoffrey T. Dunbar, Reid J. Kuhn, Clifford P. Van Dyke
  • Patent number: 7617522
    Abstract: An enterprise network architecture has a trust link established between two autonomous network systems that enables transitive resource access between network domains of the two network systems. The trust link is defined by data structures maintained by each of the respective network systems. The first network system maintains namespaces that correspond to the second network system and a domain controller in the first network system, or a first network system administrator, indicates whether to trust individual namespaces. An account managed by a domain in the second network system can request authentication via a domain controller in the first network system. The first network system determines from the trust link to communicate the authentication request to the second network system. The first network system also determines from the trust link where to communicate authorization requests when administrators manage group memberships and access control lists.
    Type: Grant
    Filed: April 24, 2006
    Date of Patent: November 10, 2009
    Assignee: Microsoft Corporation
    Inventors: Donald E. Schmidt, Clifford P. Van Dyke, Paul J. Leach, Praerit Garg, Murli D. Satagopan
  • Patent number: 7590841
    Abstract: The present automatic update mechanism provides a method for periodically checking for updates to support a trusted environment. During the periodic check, an indication from an update service is received if there is a recommended update. Upon receiving the indication, a new revocation list is downloaded from the update service and saved as a pending revocation list. The pending revocation list is then available for on-demand update when protected content requests a higher level of protection on a computing device than the protection provided by a current level of protection on the computing device.
    Type: Grant
    Filed: July 19, 2005
    Date of Patent: September 15, 2009
    Assignee: Microsoft Corporation
    Inventors: Adil A. Sherwani, Pranavakumar Punniamoorthy, Rajesh A Deshpande, Avni H. Rambhia, Reid J. Kuhn, Clifford P. Van Dyke
  • Patent number: 7437771
    Abstract: Transmitter and receiver computing device are interconnected by a network. The transmitter transmits protected digital content to the receiver in a manner so that the receiver can access the content even though the content is directly licensed to the transmitter and not the receiver.
    Type: Grant
    Filed: April 19, 2004
    Date of Patent: October 14, 2008
    Assignee: Woodcock Washburn LLP
    Inventors: James M. Alkove, Clifford P. Van Dyke, Eduardo Oliveira, Josh Benaloh, Troy Batterberry
  • Patent number: 7210167
    Abstract: Described herein is an implementation of a technology for managing credentials. With an implementation, a credential manager is domain-authentication aware and concurrent authentications with multiple independent networks (e.g., domains) may be established and maintained. Moreover, a credential manager provides a credential model retrofit for legacy applications that only understand the password model. The manager provides a mechanism where the application is only a “blind courier” of credentials between the trusted part of the OS to the network and/or network resource. The manager fully insulates the application from “read” access to the credentials. This abstract itself is not intended to limit the scope of this patent. The scope of the present invention is pointed out in the appending claims.
    Type: Grant
    Filed: January 8, 2001
    Date of Patent: April 24, 2007
    Assignee: Microsoft Corporation
    Inventors: John E. Brezak, Clifford P. Van Dyke, John M. Hawkins, Klaus U. Schutz
  • Patent number: 7185359
    Abstract: An enterprise network architecture has a trust link established between two autonomous network systems that enables transitive resource access between network domains of the two network systems. The trust link is defined by data structures maintained by each of the respective network systems. The first network system maintains namespaces that correspond to the second network system and a domain controller in the first network system, or a first network system administrator, indicates whether to trust individual namespaces. An account managed by a domain in the second network system can request authentication via a domain controller in the first network system. The first network system determines from the trust link to communicate the authentication request to the second network system. The first network system also determines from the trust link where to communicate authorization requests when administrators manage group memberships and access control lists.
    Type: Grant
    Filed: December 21, 2001
    Date of Patent: February 27, 2007
    Assignee: Microsoft Corporation
    Inventors: Donald E. Schmidt, Clifford P. Van Dyke, Paul J. Leach, Praerit Garg, Murli D. Satagopan
  • Patent number: 7124251
    Abstract: A stack allocation system and method is described. In one implementation, an attempt is made to allocate N bytes of data to a stack having a fixed depth. A probe size for the stack is determined. Verification is then made to ascertain whether the probe size and the N bytes of data exceed the fixed depth of the stack, prior to allocating the N bytes of data to the stack. In another implementation, the N bytes of data are allocated to a heap; if the probe size and the N bytes of data exceed the fixed depth of the stack.
    Type: Grant
    Filed: June 24, 2002
    Date of Patent: October 17, 2006
    Assignee: Microsoft Corporation
    Inventors: Jason Clark, Scott A. Field, Jonathan David Schwartz, Clifford P. Van Dyke
  • Patent number: 6751674
    Abstract: Method and system for networking multiple-master servers, including multiple-master servers, with single-master servers are described. A checkpoint-flag is used to identify a state when the same changes are present in the change-log of a first multiple-master server, which is emulating a primary server for the single master servers in the network, and a second multiple master server in the network. This done by identifying a replication cycle in which no changes are made to either the first multiple-master server or the second multiple master serve. The change-log of the first multiple master server is adopted by the second multiple master server, thus ensuring that the multiple master server in the network have their change-logs converge to reflect the order in the change-log of the multiple master server emulating a primary server.
    Type: Grant
    Filed: July 26, 1999
    Date of Patent: June 15, 2004
    Assignee: Microsoft Corporation
    Inventors: Murli D. Satagopan, Clifford P. Van Dyke
  • Publication number: 20040034742
    Abstract: A stack allocation system and method is described. In one implementation, an attempt is made to allocate N bytes of data to a stack having a fixed depth. A probe size for the stack is determined. Verification is then made to ascertain whether the probe size and the N bytes of data exceed the fixed depth of the stack, prior to allocating the N bytes of data to the stack. In another implementation, the N bytes of data are allocated to a heap; if the probe size and the N bytes of data exceed the fixed depth of the stack.
    Type: Application
    Filed: June 24, 2002
    Publication date: February 19, 2004
    Inventors: Scott A. Field, Jonathan David Schwartz, Clifford P. Van Dyke
  • Patent number: 6625603
    Abstract: Providing object type specific access control to an object is described. In one embodiment, a computer system comprises an operating system operative to control an application and a service running on a computer. The service maintains a service object having a link to an access control entry. The access control entry contains an access right to perform an operation on an object type. The system further includes an access control module within the operating system. The access control module includes an access control interface and operates to grant or deny the access right to perform the operation on the object.
    Type: Grant
    Filed: September 21, 1998
    Date of Patent: September 23, 2003
    Assignee: Microsoft Corporation
    Inventors: Praerit Garg, Michael M. Swift, Clifford P. Van Dyke, Richard B. Ward, Peter T. Brundrett
  • Publication number: 20030120948
    Abstract: An enterprise network architecture has a trust link established between two autonomous network systems that enables transitive resource access between network domains of the two network systems. The trust link is defined by data structures maintained by each of the respective network systems. The first network system maintains namespaces that correspond to the second network system and a domain controller in the first network system, or a first network system administrator, indicates whether to trust individual namespaces. An account managed by a domain in the second network system can request authentication via a domain controller in the first network system. The first network system determines from the trust link to communicate the authentication request to the second network system. The first network system also determines from the trust link where to communicate authorization requests when administrators manage group memberships and access control lists.
    Type: Application
    Filed: December 21, 2001
    Publication date: June 26, 2003
    Inventors: Donald E. Schmidt, Clifford P. Van Dyke, Paul J. Leach, Praerit Garg, Murli D. Satagopan
  • Publication number: 20030065940
    Abstract: Described herein is an implementation of a technology for managing credentials. With an implementation, a credential manager is domain-authentication aware and concurrent authentications with multiple independent networks (e.g., domains) may be established and maintained. Moreover, a credential manager provides a credential model retrofit for legacy applications that only understand the password model. The manager provides a mechanism where the application is only a “blind courier” of credentials between the trusted part of the OS to the network and/or network resource. The manager filly insulates the application from “read” access to the credentials. This abstract itself is not intended to limit the scope of this patent. The scope of the present invention is pointed out in the appending claims.
    Type: Application
    Filed: January 8, 2001
    Publication date: April 3, 2003
    Inventors: John E. Brezak, Clifford P. Van Dyke, John M. Hawkins, Klaus U. Schutz
  • Patent number: 6449615
    Abstract: A method and system for maintaining the integrity of links in a computer network. The method and system is realized in a link tracking service including a local link tracking service, preferably running on all of the computers within the network, and a centralized link tracking server, preferably running on a network server. The local link tracking service manages the link tracking activities for the machine on which it resides. These activities include searching for link sources and tracking link source moves. The centralized link tracking service is provided to cooperate with the local link tracking services and, more particularly, for recording link source file movements as reported to it by the local link tracking services. The recorded information is available to be used by the local link tracking services should the local link tracking services need assistance in finding a link source that has been moved.
    Type: Grant
    Filed: September 21, 1998
    Date of Patent: September 10, 2002
    Assignee: Microsoft Corporation
    Inventors: Chao-Chia Liu, Michael J. Hillberg, William P. Morel, James W. Kelly, Clifford P. Van Dyke
  • Patent number: 6412070
    Abstract: A method and computing system for extending access control of system objects in a computing environment beyond traditional rights such as read, write, create and delete. According to the invention, a system administrator or user application is able to create control rights that are unique to the type of object. Rights can be created that do not relate to any specific property of the object, but rather define how a user may control the object. A novel object, referred to as a control access data structure, is defined for each unique control right and associates the control right with one or more objects of the computing environment. In order to grant the right to a trusted user, an improved access control entry (ACE) is defined which holds a unique identifier of the trusted user and a unique identifier of the control access data structure.
    Type: Grant
    Filed: September 21, 1998
    Date of Patent: June 25, 2002
    Assignee: Microsoft Corporation
    Inventors: Clifford P. Van Dyke, Peter T. Brundrett, Michael M. Swift, Praerit Garg, Richard B. Ward
  • Patent number: 6289458
    Abstract: Providing access control to individual properties of an object is described. In one embodiment, a computer system comprises an operating system operative to control applications and services running on the system. The service maintains a service object having at least one property. Also included in the system is an access control module within the operating system. The access control module includes an access control interface operative to control access to a property of the object.
    Type: Grant
    Filed: September 21, 1998
    Date of Patent: September 11, 2001
    Assignee: Microsoft Corporation
    Inventors: Praerit Garg, Michael M. Swift, Clifford P. Van Dyke, Richard B. Ward, Peter T. Brundrett
  • Patent number: 5968121
    Abstract: A network directory and naming service include fields for identifying instances of network resources and other objects by both logical and topological grouping. This combination of information facilitates automated efficient decision making with regard to replication of resources and updating the replicas in response to changes. The combination of logical and topological identification for resources also facilitates selection of a close replica in instances where a client requests access to a resource, such as a server, for which communicatively local and remote instances exist.
    Type: Grant
    Filed: August 13, 1997
    Date of Patent: October 19, 1999
    Assignee: Microsoft Corporation
    Inventors: Keith W. Logan, Pradyumna K. Misra, Paul J. Leach, Clifford P. Van Dyke, Dave D. Straube, Arnold S. Miller
  • Patent number: 5719941
    Abstract: A method for changing an account password stored at a physically remote location is provided. After initiating a password change sequence, a user submits both an old and a new password to its client machine. Thereafter, the client computes two message values to be transmitted to the server. The first message is computed by encrypting at least the new password using a one-way hash of the old password as an encryption key. The second message is computed by encrypting the one-way hash of the old password using a one-way hash of the new clear text password as the encryption key. The server receives both messages and computes a first decrypted value by decrypting the first message using the one-way hash of the old password, previously stored at the server, as the decryption key. The server computes a second decrypted value by decrypting the second message using a one-way hash of the first decrypted value as the decryption key.
    Type: Grant
    Filed: January 12, 1996
    Date of Patent: February 17, 1998
    Assignee: Microsoft Corporation
    Inventors: Michael M. Swift, Clifford P. Van Dyke, Pradyumna Kumar Misra