Patents by Inventor Daniel R. Simons

Daniel R. Simons has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20070269040
    Abstract: This document describes tools that enable secure communication between devices that are within a user's common control. These commonly controlled devices may follow a protocol, for example, where each commits to its own public key and receives a commitment of the other's public key, publishes its own public key and receives the other's public key, and authenticates the other's public key based on the received commitment of the other's public key. If authentic, each device computes an identifier based on the other's public key and its own private key associated with its own public key. A user may interact with the devices to confirm that the identifiers are the same. If they are the same, the devices may communicate securely.
    Type: Application
    Filed: May 16, 2006
    Publication date: November 22, 2007
    Applicant: Microsoft Corporation
    Inventors: Gideon A. Yuval, Peter E.H. Hauser, Yacov Yacobi, Daniel R. Simon, Joby S. Lafky
  • Patent number: 7299349
    Abstract: Providing secure end-to-end notifications from a notification source to a notification sink despite the notification mechanism including one or more message transit points between the notification source and the notification sink. Initially, security information (e.g., the master security, the cryptographic algorithm, and the like) is negotiated out-of-band from the one or more message transit points so that the message transit points are not apprised of the security information. When a designated event occurs, the notification source generates a push message that includes the notification encrypted using the pre-negotiated security information. When the notification sink receives the push message, the notification sink decrypts the notification using the pre-negotiated security information, as well as supplemental information provided in the push message. Thus, the message transit points only have access to the encrypted form of the notification.
    Type: Grant
    Filed: January 31, 2002
    Date of Patent: November 20, 2007
    Assignee: Microsoft Corporation
    Inventors: Josh R. Cohen, Michael Kramer, Bradley M. Hammond, Paul Roberts, Daniel R. Simon, Lee M. Butler, Yuhang Zhu
  • Patent number: 7299352
    Abstract: In a cryptographic system, a certificate is used to provide information regarding a client device. The certificate is blindly signed by a certifying authority to preserve the anonymity of the client device. However, information is encoded into the signature so that a content server can readily verify security attributes of the client device and make decisions regarding the delivery of electronic content to the client device based on those security attributes.
    Type: Grant
    Filed: October 12, 2004
    Date of Patent: November 20, 2007
    Assignee: Microsoft Corporation
    Inventor: Daniel R. Simon
  • Patent number: 7284271
    Abstract: Authorizing a requesting entity to have a service perform a particular action in a manner that is at least partially independent of the underlying target data structure. An authorization station maintains a number of role templates that each define basic access permissions with respect to a number of command methods. The authorization station also maintains a number of role definitions that each define access permissions for specific requesting entities by using one or more of the role templates. When the authorization station receives a request from the requesting entity, the authorization station then identifies the appropriate role definition. Using this role definition, the authorization station determines access permissions for the requesting entity with respect to the requested action.
    Type: Grant
    Filed: October 22, 2001
    Date of Patent: October 16, 2007
    Assignee: Microsoft Corporation
    Inventors: Mark Lucovsky, Shaun D. Pierce, Michael G. Burner, Richard B. Ward, Paul J. Leach, George M. Moore, Arthur Zwiegincew, Robert M. Hyman, Jonathan D. Pincus, Daniel R. Simon
  • Patent number: 7257707
    Abstract: Manifest-based trusted agent management in a trusted operating system environment includes receiving a request to execute a process is received and setting up a virtual memory space for the process. Additionally, a manifest corresponding to the process is accessed, and which of a plurality of binaries can be executed in the virtual memory space is limited based on indicators, of the binaries, that are included in the manifest.
    Type: Grant
    Filed: August 18, 2005
    Date of Patent: August 14, 2007
    Assignee: Microsoft Corporation
    Inventors: Paul England, Marcus Peinado, Daniel R. Simon, Josh D. Benaloh
  • Patent number: 7246374
    Abstract: Users can create multiple different desktops for themselves and easily switch between these desktops. These multiple desktops are “walled off” from one another, limiting the ability of processes and other subjects in one desktop from accessing objects, such as data files or other processes, in another desktop. According to one aspect, each time a process is launched it is associated with the desktop that it is launched in. Similarly, objects, such as data files or resources, are associated with the same desktop as the process that created them. The operating system allows a process to access only those objects that are either associated with the same desktop as the process or associated with no desktop.
    Type: Grant
    Filed: March 13, 2000
    Date of Patent: July 17, 2007
    Assignee: Microsoft Corporation
    Inventors: Daniel R. Simon, Dirk Balfanz
  • Patent number: 7243230
    Abstract: Transferring application secrets in a trusted operating system environment involves receiving a request to transfer application data from a source computing device to a destination computing device. A check is made as to whether the application data can be transferred to the destination computing device, and if so, whether the application data can be transferred under control of the user or a third party. If these checks succeed, a check is also made as to whether the destination computing device is a trustworthy device running known trustworthy software. Input is also received from the appropriate one of the user or third party to control transferring of the application data to the destination computing device. Furthermore, application data is stored on the source computing device in a manner that facilitates determining whether the application data can be transferred, and that facilitates transferring the application data if it can be transferred.
    Type: Grant
    Filed: November 16, 2001
    Date of Patent: July 10, 2007
    Assignee: Microsoft Corporation
    Inventors: Paul England, Marcus Peinado, Daniel R. Simon, Josh D. Benaloh
  • Patent number: 7200599
    Abstract: An implementation of a technology, described herein, for facilitating the automated generation of input-validation software filters. The implementation of the invention provides an easy graphical user interface (GUI). With this GUI, a user (such as a system administrator) is able to quickly enter a set of parameters defining what valid inputs constitute—in particular, when such inputs come from a computing component. Consequently, the user does not have to manually generate filtering instructions on how to filter input from a computing component. This abstract itself is not intended to limit the scope of this patent. The scope of the present invention is pointed out in the appending claims.
    Type: Grant
    Filed: June 21, 2001
    Date of Patent: April 3, 2007
    Assignee: Microsoft Corporation
    Inventors: Daniel R. Simon, Valentin N. Razmov, Jonathan D. Pincus
  • Patent number: 7159240
    Abstract: Operating system upgrades in a trusted operating system environment allow a current trusted core of an operating system installed on a computing device to be upgraded to a new trusted core. The new trusted core is allowed to access application data previously securely stored by the current trusted core only if it can be verified that the new trusted core is the new trusted core expected by the current trusted core. In accordance with one implementation, the new trusted core is allowed to access only selected application data previously securely stored by the current trusted core.
    Type: Grant
    Filed: November 16, 2001
    Date of Patent: January 2, 2007
    Assignee: Microsoft Corporation
    Inventors: Paul England, Marcus Peinado, Daniel R. Simon, Josh D. Benaloh
  • Patent number: 7137004
    Abstract: Manifest-based trusted agent management in a trusted operating system environment includes receiving a request to execute a process is received and setting up a virtual memory space for the process. Additionally, a manifest corresponding to the process is accessed, and which of a plurality of binaries can be executed in the virtual memory space is limited based on indicators, of the binaries, that are included in the manifest.
    Type: Grant
    Filed: November 16, 2001
    Date of Patent: November 14, 2006
    Assignee: Microsoft Corporation
    Inventors: Paul England, Marcus Peinado, Daniel R. Simon, Josh D. Benaloh
  • Patent number: 7136859
    Abstract: Directly operating on data structures in a generic manner regardless of the type of data structure being operated upon and without requiring dedicated executable code for manipulating data structures of the particular data type. A common set of commands (e.g., insert, delete, replace, update, query) are recognized that may be used to operate on data structures of a number of different data types. A navigation module accesses a request to execute one of the common command methods on at least an identified portion of an identified data structure. Then, the navigation module accesses a navigation assistance module to access a set of rules associated with the particular data type, the set of rules allowing the navigation module to find the portion of the data structure that is to be operated on. If appropriate, the command operation is then executed on the identified portion of the data structure.
    Type: Grant
    Filed: October 22, 2001
    Date of Patent: November 14, 2006
    Assignee: Microsoft Corporation
    Inventors: Mark Lucovsky, Shaun D. Pierce, Alexander T. Weinert, Michael G. Burner, Richard B. Ward, Paul J. Leach, George M. Moore, Arthur Zwiegincew, Robert M. Hyman, Jonathan D. Pincus, Daniel R. Simon
  • Patent number: 7107463
    Abstract: Manifest-based trusted agent management in a trusted operating system environment includes receiving a request to execute a process is received and setting up a virtual memory space for the process. Additionally, a manifest corresponding to the process is accessed, and which of a plurality of binaries can be executed in the virtual memory space is limited based on indicators, of the binaries, that are included in the manifest.
    Type: Grant
    Filed: August 18, 2005
    Date of Patent: September 12, 2006
    Assignee: Microsoft Corporation
    Inventors: Paul England, Marcus Peinado, Daniel R. Simon, Josh D. Benaloh
  • Patent number: 7096200
    Abstract: A system and method is provided for evaluating the effectiveness of data encryption for hiding the identity of the source of Web traffic. A signature is constructed from encrypted Web traffic for a Web page sent by a target Web site, and the signature is compared with archived traffic signatures obtained by accessing various Web pages of interest in advance. If the signature of the detected encrypted Web traffic matches a stored traffic signature beyond a pre-set statistical threshold, a positive match is found, and the source of the traffic is identified. Countermeasures for reducing the reliability of source identification based on traffic signature matching are provided.
    Type: Grant
    Filed: April 23, 2002
    Date of Patent: August 22, 2006
    Assignee: Microsoft Corporation
    Inventors: Yi-Min Wang, Qixiang Sun, Daniel R. Simon, Wilfred Russell, Lili Qiu, Venkata N. Padmanabhan
  • Patent number: 6986036
    Abstract: A system and method is provided for handling network communications between a client and a target server on the Internet to protect the privacy and anonymity of the client. For a session between the client and the target server, a routing control server sets up a routing chain using a plurality of Web servers randomly selected from a pool of participating Web servers as routers for routing messages between the client and the target server. To prevent traffic analysis, an “onion encryption” scheme is applied to the messages as they are forwarded along the routing chain. A payment service cooperating with the routing control server allows a user to pay for the privacy protection service without revealing her real identity.
    Type: Grant
    Filed: March 20, 2002
    Date of Patent: January 10, 2006
    Assignee: Microsoft Corporation
    Inventors: Yi-Min Wang, Qixiang Sun, Daniel R. Simon, Wilfred Russell
  • Patent number: 6985958
    Abstract: A messaging data structure for accessing data in an identity-centric manner. An identity may be a user, a group of users, or an organization. Instead of data being maintained on an application-by-application basis, the data associated with a particular identity is stored by one or more data services accessible by many applications. The data is stored in accordance with a schema that is recognized by a number of different applications and the data service. The messaging data structure includes fields that identify the target data object to be operated upon using an identity field, a schema field, and an instance identifier field. In addition, the desired operation is specified. Thus, the target data object is operated on in an identity-centric manner.
    Type: Grant
    Filed: October 22, 2001
    Date of Patent: January 10, 2006
    Assignee: Microsoft Corporation
    Inventors: Mark Lucovsky, Shaun D. Pierce, Alexander T. Weinert, Michael G. Burner, Richard B. Ward, Paul J. Leach, George M. Moore, Arthur Zwiegincew, Vivek Gundotra, Robert M. Hyman, Jonathan D. Pincus, Daniel R. Simon
  • Patent number: 6907522
    Abstract: Machine instructions comprising a bootstrap code are buried within a critical component of an electronic game console where they cannot readily be accessed or modified. A preloader portion in a read only memory (ROM) is hashed by the bootstrap code and the result is compared to an expected hash value maintained in the bootstrap code. Further verification of the boot-up process is carried out by the preloader, which hashes the code in ROM to obtain a hash value for the code. The result is verified against a digital signature value that defines an expected value for this hash. Failure to obtain any expected result terminates the boot-up process. Since the bootstrap code confirms the preloader, and the preloader confirms the remainder of the code in ROM, this technique is useful for ensuring that the code used for booting up the device has not been modified or replaced.
    Type: Grant
    Filed: June 7, 2002
    Date of Patent: June 14, 2005
    Assignee: Microsoft Corporation
    Inventors: Dinarte Morais, Jon Lange, Daniel R. Simon, Ling Tony Chen, Josh D. Benaloh
  • Patent number: 6871276
    Abstract: In a cryptographic system, a certificate is used to provide information regarding a client device. The certificate is blindly signed by a certifying authority to preserve the anonymity of the client device. However, information is encoded into the signature so that a content server can readily verify security attributes of the client device and make decisions regarding the delivery of electronic content to the client device based on those security attributes.
    Type: Grant
    Filed: April 5, 2000
    Date of Patent: March 22, 2005
    Assignee: Microsoft Corporation
    Inventor: Daniel R. Simon
  • Publication number: 20040210756
    Abstract: This disclosure pertains generally to client authentication. One aspect of the disclosure relates to a first server for presenting evidence to a Domain Controller (DC) of a first authentication context being submitted from a client to the first server to obtain a delegable credential, wherein the credential can be used to request a second authentication context from that client to a second server. Another aspect relates to the first server providing a pass-thru with evidence to a DC. The evidence relates to a first authentication context being submitted from a client to the first server that it obtained a delegable credential. The pass-thru is used in combination with the credential to request a second authentication context from the client to a second server.
    Type: Application
    Filed: April 15, 2003
    Publication date: October 21, 2004
    Applicant: MICROSOFT CORPORATION
    Inventors: David R. Mowers, John Banes, Daniel R. Simon, Paul J. Leach
  • Publication number: 20040064725
    Abstract: A computer in a network runs a verification procedure in which it sends data packets to another computer in the network. Some or all of the data packets contain, either individually or collectively, a secret piece of information, such as a secret code. The computer then makes a determination regarding the network links between it and the other computer. If, for example, the other computer is able to respond by providing the secret piece of information back, then the computer sending the data packets concludes that the devices along the network links en route to the other computer are properly forwarding data packets.
    Type: Application
    Filed: September 18, 2002
    Publication date: April 1, 2004
    Applicant: Microsoft Corporation
    Inventors: Venkata N. Padmanabhan, Daniel R. Simon
  • Publication number: 20040003081
    Abstract: A system for providing a client's credentials to a computer program comprises a database remote from the client and a single signon server module. The single signon server module can receive a request for the client's credentials from the computer program, determine whether the client's credentials are stored in the database, and send the client's credentials from the database to the computer program in response to a determination that the client's credentials are stored in the database. The single signon server module can store the client's credentials in the database in response to a determination that the client's credentials are not stored in the database. The single signon server module can encrypt the client's credentials prior to storing the client's credentials in the database and can decrypt the client's credentials prior to sending the client's credentials to the computer program.
    Type: Application
    Filed: June 26, 2002
    Publication date: January 1, 2004
    Applicant: Microsoft Corporation
    Inventors: Dean Jason Justus, Josh D. Benaloh, Nathan James Fink, Michael Howard, Daniel R. Simon, Matthew William Thomlinson