Patents by Inventor Daniel R. Simon

Daniel R. Simon has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 7644275
    Abstract: This disclosure pertains generally to client authentication. One aspect of the disclosure relates to a first server for presenting evidence to a Domain Controller (DC) of a first authentication context being submitted from a client to the first server to obtain a delegable credential, wherein the credential can be used to request a second authentication context from that client to a second server. Another aspect relates to the first server providing a pass-thru with evidence to a DC. The evidence relates to a first authentication context being submitted from a client to the first server that it obtained a delegable credential. The pass-thru is used in combination with the credential to request a second authentication context from the client to a second server.
    Type: Grant
    Filed: April 15, 2003
    Date of Patent: January 5, 2010
    Assignee: Microsoft Corporation
    Inventors: David R. Mowers, John Banes, Daniel R. Simon, Paul J. Leach
  • Patent number: 7640215
    Abstract: A system and method is provided for evaluating the effectiveness of data encryption for hiding the identity of the source of Web traffic. A signature is constructed from encrypted Web traffic for a Web page sent by a target Web site, and the signature is compared with archived traffic signatures obtained by accessing various Web pages of interest in advance. If the signature of the detected encrypted Web traffic matches a stored traffic signature beyond a pre-set statistical threshold, a positive match is found, and the source of the traffic is identified. Countermeasures for reducing the reliability of source identification based on traffic signature matching are provided.
    Type: Grant
    Filed: February 24, 2005
    Date of Patent: December 29, 2009
    Assignee: Microsoft Corporation
    Inventors: Yi-Min Wang, Qixiang Sun, Daniel R. Simon, Wilfred Russell, Lili Qiu, Venkata N. Padmanabhan
  • Patent number: 7634661
    Abstract: Manifest-based trusted agent management in a trusted operating system environment includes receiving a request to execute a process is received and setting up a virtual memory space for the process. Additionally, a manifest corresponding to the process is accessed, and which of a plurality of binaries can be executed in the virtual memory space is limited based on indicators, of the binaries, that are included in the manifest.
    Type: Grant
    Filed: August 18, 2005
    Date of Patent: December 15, 2009
    Assignee: Microsoft Corporation
    Inventors: Paul England, Marcus Peinado, Daniel R. Simon, Josh D. Benaloh
  • Patent number: 7617322
    Abstract: A system, apparatus, method, and computer-readable medium are provided for secure P2P caching. In one method, a requesting peer obtains a hash of requested data from a server. The requesting peer then transmits a request for the data to other peers. The request proves that the requesting peer has the hash. If a caching peer has the data, it generates a reply to the request that proves that it has the requested data. If the requesting peer receives a reply from a caching peer, the requesting peer establishes a connection to the caching peer and retrieves the data from the caching peer. If the requesting peer does not receive a reply to the request from any other peer, the requesting peer establishes a connection to the server and retrieves the data from the server. The requesting peer stores the data for use in responding to requests from other peers.
    Type: Grant
    Filed: September 29, 2006
    Date of Patent: November 10, 2009
    Assignee: Microsoft Corporation
    Inventors: Khaja E. Ahmed, Daniel R. Simon
  • Publication number: 20090276828
    Abstract: A method for authenticating and negotiating security parameters among two or more network devices is disclosed. The method has a plurality of modes including a plurality of messages exchanged between the two or more network devices. In a main mode, the two or more network devices establish a secure channel and select security parameters to be used during a quick mode and a user mode. In the quick mode, the two or more computers derive a set of keys to secure data sent according to a security protocol. The optional user mode provides a means of authenticating one or more users associated with the two or more network devices. A portion of the quick mode is conducted during the main mode thereby minimizing the plurality of messages that need to be exchanged between the initiator and the responder.
    Type: Application
    Filed: July 9, 2009
    Publication date: November 5, 2009
    Applicant: Microsoft Corporation
    Inventors: Brian D. Swander, Sara Bitan, Christian Huitema, Paul G. Mayfield, Daniel R. Simon
  • Patent number: 7577839
    Abstract: Transferring application secrets in a trusted operating system environment involves receiving a request to transfer application data from a source computing device to a destination computing device. A check is made as to whether the application data can be transferred to the destination computing device, and if so, whether the application data can be transferred under control of the user or a third party. If these checks succeed, a check is also made as to whether the destination computing device is a trustworthy device running known trustworthy software. Input is also received from the appropriate one of the user or third party to control transferring of the application data to the destination computing device. Furthermore, application data is stored on the source computing device in a manner that facilitates determining whether the application data can be transferred, and that facilitates transferring the application data if it can be transferred.
    Type: Grant
    Filed: February 28, 2005
    Date of Patent: August 18, 2009
    Assignee: Microsoft Corporation
    Inventors: Paul England, Marcus Peinado, Daniel R. Simon, Josh D. Benaloh
  • Patent number: 7577840
    Abstract: Transferring application secrets in a trusted operating system environment involves receiving a request to transfer application data from a source computing device to a destination computing device. A check is made as to whether the application data can be transferred to the destination computing device, and if so, whether the application data can be transferred under control of the user or a third party. If these checks succeed, a check is also made as to whether the destination computing device is a trustworthy device running known trustworthy software. Input is also received from the appropriate one of the user or third party to control transferring of the application data to the destination computing device. Furthermore, application data is stored on the source computing device in a manner that facilitates determining whether the application data can be transferred, and that facilitates transferring the application data if it can be transferred.
    Type: Grant
    Filed: February 28, 2005
    Date of Patent: August 18, 2009
    Assignee: Microsoft Corporation
    Inventors: Paul England, Marcus Peinado, Daniel R. Simon, Josh D. Benaloh
  • Patent number: 7574603
    Abstract: A method for authenticating and negotiating security parameters among two or more network devices is disclosed. The method has a plurality of modes including a plurality of messages exchanged between the two or more network devices. In a main mode, the two or more network devices establish a secure channel and select security parameters to be used during a quick mode and a user mode. In the quick mode, the two or more computers derive a set of keys to secure data sent according to a security protocol. The optional user mode provides a means of authenticating one or more users associated with the two or more network devices. A portion of the quick mode is conducted during the main mode thereby minimizing the plurality of messages that need to be exchanged between the initiator and the responder.
    Type: Grant
    Filed: November 14, 2003
    Date of Patent: August 11, 2009
    Assignee: Microsoft Corporation
    Inventors: Brian D. Swander, Sara Bitan, Christian Huitema, Paul G. Mayfield, Daniel R. Simon
  • Publication number: 20090164795
    Abstract: A system for providing a client's credentials to a computer program comprises a database remote from the client and a single signon server module. The single signon server module can receive a request for the client's credentials from the computer program, determine whether the client's credentials are stored in the database, and send the client's credentials from the database to the computer program in response to a determination that the client's credentials are stored in the database. The single signon server module can store the client's credentials in the database in response to a determination that the client's credentials are not stored in the database. The single signon server module can encrypt the client's credentials prior to storing the client's credentials in the database and can decrypt the client's credentials prior to sending the client's credentials to the computer program.
    Type: Application
    Filed: June 27, 2008
    Publication date: June 25, 2009
    Applicant: Microsoft Corporation
    Inventors: Dean Jason Justus, Josh D. Benaloh, Nathan James Fink, Michael Howard, Daniel R. Simon, Matthew William Thomlinson
  • Patent number: 7549048
    Abstract: The principles of the present invention relate to systems, methods, and computer program products for more efficiently and securely authenticating computing systems. In some embodiments, a limited use credential is used to provision more permanent credentials. A client receives a limited-use (e.g., a single-use) credential and submits the limited-use credential over a secure link to a server. The server provisions an additional credential (for subsequent authentication) and sends the additional credential to the client over the secure link. In other embodiments, computing systems automatically negotiate authentication methods using an extensible protocol. A mutually deployed authentication method is selected and secure authentication is facilitated with a tunnel key that is used encrypt (and subsequently decrypt) authentication content transferred between a client and a server. The tunnel key is derived from a shared secret (e.g., a session key) and nonces.
    Type: Grant
    Filed: March 19, 2004
    Date of Patent: June 16, 2009
    Assignee: Microsoft Corporation
    Inventors: Trevor William Freeman, Timothy M. Moore, Bernard D. Aboba, Daniel R. Simon
  • Patent number: 7549170
    Abstract: A system and method that uses authentication inkblots to help computer system users first select and later recall authentication information from high entropy information spaces. An inkblot authentication module generates authentication inkblots from authentication inkblot seeds. On request, a security authority generates, stores and supplies an authentication inkblot seed set for a user. In response to an authentication inkblot, a user inputs one or more alphanumeric characters. The responses to one or more authentication inkblots serve as authentication information. A user-computable hash of the natural language description of the authentication inkblot is utilized to speed authentication information entry and provide for compatibility with conventional password-based authentication. Authentication with an authentication information match ratio of less than 100% is possible.
    Type: Grant
    Filed: April 30, 2003
    Date of Patent: June 16, 2009
    Assignee: Microsoft Corporation
    Inventors: Adam Stubblefield, Daniel R. Simon
  • Patent number: 7529933
    Abstract: An authentication protocol can be used to establish a secure method of communication between two devices on a network. Once established, the secure communication can be used to authenticate a client through various authentication methods, providing security in environments where intermediate devices cannot be trusted, such as wireless networks, or foreign network access points. Additionally, the caching of session keys and other relevant information can enable the two securely communicating endpoints to quickly resume their communication despite interruptions, such as when one endpoint changes the access point through which it is connected to the network. Also, the secure communication between the two devices can enable users to roam off of their home network, providing a mechanism by which access through foreign networks can be granted, while allowing the foreign network to monitor and control the use of its bandwidth.
    Type: Grant
    Filed: May 30, 2002
    Date of Patent: May 5, 2009
    Assignee: Microsoft Corporation
    Inventors: Ashwin Palekar, Arun Ayyagari, Daniel R. Simon
  • Patent number: 7489645
    Abstract: An exemplary router performs actions including: receiving at least one certificate from an end device, the at least one certificate issued by another router; ascertaining if the other router is a member of a predetermined neighborhood; determining if the at least one certificate is valid; and if the other router is ascertained to be a member of the predetermined neighborhood and the at least one certificate is determined to be valid, recognizing the end device as privileged. An exemplary mesh router is capable of establishing a wireless mesh network with other mesh routers, the mesh router is further capable of designating a neighborhood administrator mesh router; and the mesh router is adapted to grant privileged status to a particular end device associated with a particular certificate issued by a particular mesh router when the particular mesh router is a member of a neighborhood of the designated neighborhood administrator mesh router.
    Type: Grant
    Filed: December 17, 2003
    Date of Patent: February 10, 2009
    Assignee: Microsoft Corporation
    Inventors: Daniel R. Simon, Paramvir Bahl, Helen Jiahe Wang
  • Publication number: 20080320152
    Abstract: A computer in a network runs a verification procedure in which it sends data packets to another computer in the network. Some or all of the data packets contain, either individually or collectively, a secret piece of information, such as a secret code. The computer then makes a determination regarding the network links between it and the other computer. If, for example, the other computer is able to respond by providing the secret piece of information back, then the computer sending the data packets concludes that the devices along the network links en route to the other computer are properly forwarding data packets.
    Type: Application
    Filed: August 18, 2008
    Publication date: December 25, 2008
    Applicant: Microsoft Corporation
    Inventors: Venkata N. Padmanabhan, Daniel R. Simon
  • Patent number: 7464265
    Abstract: Disclosed are methods for a client, having established one set of security keys, to establish a new set without having to communicate with an authentication server. When the client joins a group, master session security keys are derived and made known to the client and to the group's access server. From the master session security keys, the access server and client each derive transient session security keys, used for authentication and encryption. To change the transient session security keys, the access server creates “liveness” information and sends it to the client. New master session security keys are derived from the liveness information and the current set of transient session security keys. From these new master session security keys are derived new transient session security keys. This process limits the amount of data sent using one set of transient session security keys and thus limits the effectiveness of any statistical attacker.
    Type: Grant
    Filed: May 3, 2002
    Date of Patent: December 9, 2008
    Assignee: Microsoft Corporation
    Inventors: Arun Ayyagari, Daniel R. Simon, Bernard D. Aboba, Krishna Ganugapati, Timothy M. Moore, Pradeep Bahl
  • Publication number: 20080141377
    Abstract: A strategy is described for assessing and mitigating vulnerabilities within a data processing environment. The strategy collects access data that reflects actual log-in behavior exhibited by users in the environment. The strategy also collects rights data that reflects the rights possessed by one or more administrators within the environment. Based on the access data and rights data, the strategy identifies how a user or other entity that gains access to one part of the environment can potentially compromise additional parts of the environment. The strategy can recommend and implement steps aimed at reducing any identified vulnerabilities.
    Type: Application
    Filed: December 7, 2006
    Publication date: June 12, 2008
    Applicant: Microsoft Corporation
    Inventors: John Dunagan, Gregory D. Hartrell, Daniel R. Simon
  • Patent number: 7370196
    Abstract: In a cryptographic system, a certificate is used to provide information regarding a client device. The certificate is blindly signed by a certifying authority to preserve the anonymity of the client device. However, information is encoded into the signature so that a content server can readily verify security attributes of the client device and make decisions regarding the delivery of electronic content to the client device based on those security attributes.
    Type: Grant
    Filed: October 12, 2004
    Date of Patent: May 6, 2008
    Assignee: Microsoft Corporation
    Inventor: Daniel R. Simon
  • Publication number: 20080082648
    Abstract: A system, apparatus, method, and computer-readable medium are provided for secure P2P caching. In one method, a requesting peer obtains a hash of requested data from a server. The requesting peer then transmits a request for the data to other peers. The request proves that the requesting peer has the hash. If a caching peer has the data, it generates a reply to the request that proves that it has the requested data. If the requesting peer receives a reply from a caching peer, the requesting peer establishes a connection to the caching peer and retrieves the data from the caching peer. If the requesting peer does not receive a reply to the request from any other peer, the requesting peer establishes a connection to the server and retrieves the data from the server. The requesting peer stores the data for use in responding to requests from other peers.
    Type: Application
    Filed: September 29, 2006
    Publication date: April 3, 2008
    Applicant: Microsoft Corporation
    Inventors: Khaja E. Ahmed, Daniel R. Simon
  • Publication number: 20080027942
    Abstract: Accountability among Autonomous Systems (ASs) in a network ensures reliable identification of various customers within the ASs and provides defensibility against malicious customers within the ASs. In one implementation, reliable identification is achieved by implementing ingress filtering on data packets originating within individual ASs and defensibility is provided by filtering data packets on request. To facilitate on-request filtering, individual ASs are equipped with a Filter Request Server (FRS) to filter data packets from certain customers identified in a filter request. Thus, when a requesting customer makes a filter request against an offending customer, the FRS within the AS to which the offending customer belongs conducts on-request filtering and installs an on-request filter on a first-hop network infrastructure device for the offending customer. Consequently, the first-hop network infrastructure device filters any data packet sent from the offending customer to the requesting customer.
    Type: Application
    Filed: July 28, 2006
    Publication date: January 31, 2008
    Applicant: Microsoft Corporation
    Inventors: Daniel R. Simon, Sharad Agarwal, David A. Maltz
  • Patent number: 7305553
    Abstract: Manifest-based trusted agent management in a trusted operating system environment includes receiving a request to execute a process is received and setting up a virtual memory space for the process. Additionally, a manifest corresponding to the process is accessed, and which of a plurality of binaries can be executed in the virtual memory space is limited based on indicators, of the binaries, that are included in the manifest.
    Type: Grant
    Filed: August 18, 2005
    Date of Patent: December 4, 2007
    Assignee: Microsoft Corporation
    Inventors: Paul England, Marcus Peinado, Daniel R. Simon, Josh D. Benaloh