Patents by Inventor Crispin Cowan
Crispin Cowan has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 10176331Abstract: Aspects of the technology described herein can provide enhanced metadata to authentically report the provenance of a file. An exemplary computing device may have a file broker to receive an indication from a first security principal to write a file to a file system. The file broker can use one file utility to write the file, but use another file utility to write an identification of the first security principal and its opinion about the file into metadata associated with the file. Subsequently, the identification of the first security principal and its opinion may be used to authentically report the provenance of the file and applied in other security applications.Type: GrantFiled: June 10, 2016Date of Patent: January 8, 2019Assignee: Microsoft Technology Licensing, LLCInventors: John M. Sheehan, Vishal Agarwal, Crispin Cowan, Juan-Lee Pang, Greg Domzalski, David C. LeBlanc
-
Publication number: 20170357818Abstract: Aspects of the technology described herein can provide enhanced metadata to authentically report the provenance of a file. An exemplary computing device may have a file broker to receive an indication from a first security principal to write a file to a file system. The file broker can use one file utility to write the file, but use another file utility to write an identification of the first security principal and its opinion about the file into metadata associated with the file. Subsequently, the identification of the first security principal and its opinion may be used to authentically report the provenance of the file and applied in other security applications.Type: ApplicationFiled: June 10, 2016Publication date: December 14, 2017Inventors: John M. Sheehan, Vishal Agarwal, Crispin Cowan, Juan-Lee Pang, Greg Domzalski, David C. LeBlanc
-
Patent number: 8996866Abstract: Computer-executable instructions that are directed to the performance of consequential actions and automatically elevate to execute at a higher privilege level to do so can perform such consequential actions only after user notification. Doing so can enable monitoring processes to avoid presenting duplicative user notification upon detection of such auto-elevation. In addition, prior to presenting user notification, input from the execution environment can be ignored and access to DLLs for performing consequential actions can be avoided. A static analyzer can identify non-conforming computer-executable instructions. A wrapper can be utilized to provide compliance by otherwise unknown or non-conforming computer-executable instructions.Type: GrantFiled: December 22, 2009Date of Patent: March 31, 2015Assignee: Microsoft Technology Licensing, LLCInventors: Crispin Cowan, Matthew Z. Tamayo-Rios, Tanmoy Dutta, John Lambert, Paul J. Leach, Scott A. Field, Thomas C. Jones
-
Patent number: 8863291Abstract: The reputation of an executable computer program is checked when a user input to a computing device initiates a program launch, thus triggering a check of a local cache of reputation information. If the local cache confirms that the program is safe, it is permitted to launch, typically without notifying the user that a reputation check has been made. If the local cache cannot confirm the safety of the program, a reputation check is made by accessing a reputation service in the cloud. If the reputation service identifies the program as safe, it returns an indication to the computing device and the program is permitted to be launched, again without notifying the user that a reputation check has been made. If the reputation service identifies the program as unsafe or potentially unsafe, or does not recognize it at all, a warning is displayed to the user.Type: GrantFiled: January 20, 2011Date of Patent: October 14, 2014Assignee: Microsoft CorporationInventors: Daniel Oliver, Anshul Rawat, Xiang Tu, Ryan Colvin, James Dooley, Elliott Jeb Haber, Ameya Bhatawdekar, Andy Davidson, Jay Dave, Paul Leach, Karanbir Singh, Chris Guzak, Crispin Cowan
-
Patent number: 8631248Abstract: To protect computer programs against security attacks that attempt to corrupt pointers within the address space of the program, the value of a pointer is encrypted each time the pointer is initialized or modified, and then the value is decrypted before use, i.e., each time the pointer is read. Preferably, the encrypting and decrypting steps are effected by instructions generated by a compiler during compilation of the program. One convenient method of implementing the encrypting and decrypting steps is by XOR'ing the pointer with a predetermined encryption key value, which could be specially selected or selected at random.Type: GrantFiled: October 31, 2007Date of Patent: January 14, 2014Assignee: Apple Inc.Inventors: Stanley Crispin Cowan, Seth Richard Arnold, Steven Michael Beattie, Perry Michael Wagle
-
Publication number: 20120192275Abstract: The reputation of an executable computer program is checked when a user input to a computing device initiates a program launch, thus triggering a check of a local cache of reputation information. If the local cache confirms that the program is safe, it is permitted to launch, typically without notifying the user that a reputation check has been made. If the local cache cannot confirm the safety of the program, a reputation check is made by accessing a reputation service in the cloud. If the reputation service identifies the program as safe, it returns an indication to the computing device and the program is permitted to be launched, again without notifying the user that a reputation check has been made. If the reputation service identifies the program as unsafe or potentially unsafe, or does not recognize it at all, a warning is displayed to the user.Type: ApplicationFiled: January 20, 2011Publication date: July 26, 2012Applicant: MICROSOFT CORPORATIONInventors: Daniel Oliver, Anshul Rawat, Xiang Tu, Ryan Colvin, James Dooley, Elliott Jeb Haber, Ameya Bhatawdekar, Andy Davidson, Jay Dave, Paul Leach, Karanbir Singh, Chris Guzak, Crispin Cowan
-
Patent number: 8214398Abstract: Role-based access controls improve user access in a computer system. A profile associated with a role is generated. The profile is enforced with respect to one or more users associated with the role. Optionally, the profile is generated based at least in part on a user interaction.Type: GrantFiled: February 15, 2006Date of Patent: July 3, 2012Assignee: EMC CorporationInventors: S. Crispin Cowan, Seth R. Arnold, Steven M. Beattie, John R. Johansen, Jesse D. Michael, Anthony N. Jones
-
Publication number: 20110307831Abstract: A host application on a computing device displays an icon or other visual representation of a resource of the computing device, and receives a request from one of one or more applications hosted by the host application. The request is a request to access the resource represented by the icon or other visual representation of the resource, and in response to the request the appearance of the icon or other visual representation of the resource is altered. The requesting application is allowed to access the resource only if a user selection of the displayed icon or other visual representation is received.Type: ApplicationFiled: June 10, 2010Publication date: December 15, 2011Applicant: Microsoft CorporationInventors: Crispin Cowan, Christopher John Clark
-
Publication number: 20110154505Abstract: Computer-executable instructions that are directed to the performance of consequential actions and automatically elevate to execute at a higher privilege level to do so can perform such consequential actions only after user notification. Doing so can enable monitoring processes to avoid presenting duplicative user notification upon detection of such auto-elevation. In addition, prior to presenting user notification, input from the execution environment can be ignored and access to DLLs for performing consequential actions can be avoided. A static analyzer can identify non-conforming computer-executable instructions. A wrapper can be utilized to provide compliance by otherwise unknown or non-conforming computer-executable instructions.Type: ApplicationFiled: December 22, 2009Publication date: June 23, 2011Applicant: MICROSOFT CORPORATIONInventors: Crispin Cowan, Matthew Z. Tamayo-Rios, Tanmoy Dutta, John Lambert, Paul J. Leach, Scott A. Field, Thomas C. Jones
-
Patent number: 7752459Abstract: To protect computer programs against security attacks that attempt to corrupt pointers within the address space of the program, the value of a pointer is encrypted each time the pointer is initialized or modified, and then the value is decrypted before use, i.e., each time the pointer is read. Preferably, the encrypting and decrypting steps are effected by instructions generated by a compiler during compilation of the program. One convenient method of implementing the encrypting and decrypting steps is by XOR'ing the pointer with a predetermined encryption key value, which could be specially selected or selected at random.Type: GrantFiled: December 6, 2002Date of Patent: July 6, 2010Assignee: Novell, Inc.Inventors: Stanley Crispin Cowan, Seth Richard Arnold, Steven Michael Beattie, Perry Michael Wagle
-
Publication number: 20090300532Abstract: Techniques, systems, and apparatuses for conveying privilege escalation to a user are disclosed. In some aspects, a privilege escalation request is initiated in a first operating environment. The first operating environment may foreshorten to reveal a second operating environment associated with the privilege escalation. The second operating environment includes a continuous visual presentation to alert the user of the privilege escalation. A user may complete one or more privileged activities in the second operating environment before returning to the first operating environment.Type: ApplicationFiled: May 30, 2008Publication date: December 3, 2009Applicant: MICROSOFT CORPORATIONInventor: Crispin Cowan
-
Patent number: 7490072Abstract: Providing access control for an application is disclosed. An application is monitored. An application profile is generated for the application. The application profile is based at least in part on behavior of the application as observed through the monitoring of the application. The application profile defines one or more access controls associated with the application.Type: GrantFiled: February 15, 2006Date of Patent: February 10, 2009Assignee: Novell, Inc.Inventors: S. Crispin Cowan, Seth R. Arnold, Steven M. Beattie, John R. Johansen, Jesse D. Michael, Anthony D. Jones
-
Publication number: 20030182572Abstract: To protect computer programs against security attacks that attempt to corrupt pointers within the address space of the program, the value of a pointer is encrypted each time the pointer is initialized or modified, and then the value is decrypted before use, i.e., each time the pointer is read. Preferably, the encrypting and decrypting steps are effected by instructions generated by a compiler during compilation of the program. One convenient method of implementing the encrypting and decrypting steps is by XOR'ing the pointer with a predetermined encryption key value, which could be specially selected or selected at random.Type: ApplicationFiled: December 6, 2002Publication date: September 25, 2003Inventors: Stanley Crispin Cowan, Seth Richard Arnold, Steven Michael Beattie, Perry Michael Wagle