Patents by Inventor David Thaler
David Thaler has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 11792013Abstract: A system manages access to an asset using a separate physical cryptographically-secure key device. A memory stores a public key as an unalterable record. An access configuration controller reads the public key from the memory to control the access to the asset. The public key is cryptographically paired with a private key securely recorded in the separate physical cryptographically-secure key device. The access configuration controller receives an access control change instruction signed by the private key and verifies a valid signing of the access control change instruction by the private key using the public key read from the memory. A storage system secured by the access configuration controller stores access authorization records managing access to the asset. The access configuration controller alters access authorization records according to the access control change instruction, responsive to verification of the valid signing of the access control change instruction.Type: GrantFiled: May 25, 2022Date of Patent: October 17, 2023Assignee: Microsoft Technology Licensing, LLCInventors: Stefan Thom, David Thaler, Torsten Stein
-
Publication number: 20220407711Abstract: A system manages access to an asset using a separate physical cryptographically-secure key device. A memory stores a public key as an unalterable record. An access configuration controller reads the public key from the memory to control the access to the asset. The public key is cryptographically paired with a private key securely recorded in the separate physical cryptographically-secure key device. The access configuration controller receives an access control change instruction signed by the private key and verifies a valid signing of the access control change instruction by the private key using the public key read from the memory. A storage system secured by the access configuration controller stores access authorization records managing access to the asset. The access configuration controller alters access authorization records according to the access control change instruction, responsive to verification of the valid signing of the access control change instruction.Type: ApplicationFiled: May 25, 2022Publication date: December 22, 2022Applicant: Microsoft Technology Licensing, LLCInventors: Stefan THOM, David THALER, Torsten STEIN
-
Patent number: 11374760Abstract: A system manages access to an asset using a separate physical cryptographically-secure key device. A memory stores a public key as an unalterable record. An access configuration controller reads the public key from the memory to control the access to the asset. The public key is cryptographically paired with a private key securely recorded in the separate physical cryptographically-secure key device. The access configuration controller receives an access control change instruction signed by the private key and verifies a valid signing of the access control change instruction by the private key using the public key read from the memory. A storage system secured by the access configuration controller stores access authorization records managing access to the asset. The access configuration controller alters access authorization records according to the access control change instruction, responsive to verification of the valid signing of the access control change instruction.Type: GrantFiled: September 13, 2017Date of Patent: June 28, 2022Assignee: Microsoft Technology Licensing, LLCInventors: Stefan Thom, David Thaler, Torsten Stein
-
Patent number: 10546276Abstract: The cyber owner of the asset can transfer cyber ownership to a second entity based on a transaction and using an escrow entity. An escrow service in association with an escrow entity is utilized to secure transfer of ownership to the second entity in accordance with the conditions of the transaction. The cyber owner initiates an escrow process by transmitting an escrow instruction to the access configuration controller. A new cryptographic key is generated responsive to the escrow instruction and is managed by a generated escrow policy indicating an escrow period. Different components of the cryptographic key are transmitted to the second entity and the escrow service. When the conditions of the transaction are satisfied during the escrow period, the escrow service transmits the component of the cryptographic key to the second entity. The second entity may use the recomposed cryptographic key to assert ownership of the asset.Type: GrantFiled: September 13, 2017Date of Patent: January 28, 2020Assignee: Microsoft Technology Licensing, LLCInventors: Stefan Thom, David Thaler, Torsten Stein
-
Publication number: 20190081792Abstract: A system manages access to an asset using a separate physical cryptographically-secure key device. A memory stores a public key as an unalterable record. An access configuration controller reads the public key from the memory to control the access to the asset. The public key is cryptographically paired with a private key securely recorded in the separate physical cryptographically-secure key device. The access configuration controller receives an access control change instruction signed by the private key and verifies a valid signing of the access control change instruction by the private key using the public key read from the memory. A storage system secured by the access configuration controller stores access authorization records managing access to the asset. The access configuration controller alters access authorization records according to the access control change instruction, responsive to verification of the valid signing of the access control change instruction.Type: ApplicationFiled: September 13, 2017Publication date: March 14, 2019Inventors: Stefan THOM, David THALER, Torsten STEIN
-
Publication number: 20190080299Abstract: The cyber owner of the asset can transfer cyber ownership to a second entity based on a transaction and using an escrow entity. An escrow service in association with an escrow entity is utilized to secure transfer of ownership to the second entity in accordance with the conditions of the transaction. The cyber owner initiates an escrow process by transmitting an escrow instruction to the access configuration controller. A new cryptographic key is generated responsive to the escrow instruction and is managed by a generated escrow policy indicating an escrow period. Different components of the cryptographic key are transmitted to the second entity and the escrow service. When the conditions of the transaction are satisfied during the escrow period, the escrow service transmits the component of the cryptographic key to the second entity. The second entity may use the recomposed cryptographic key to assert ownership of the asset.Type: ApplicationFiled: September 13, 2017Publication date: March 14, 2019Inventors: Stefan THOM, David THALER, Torsten STEIN
-
Patent number: 8608834Abstract: According to an exemplary embodiment of the present disclosure, a system for removing matter from a filtering device of a work machine includes a gas pressurization assembly. An element of the gas pressurization assembly is removably attachable to a first orifice of the filtering device without removing the filtering device from a work machine to which the filtering device is connected. The system also includes a heat source fluidly connected to the gas pressurization assembly.Type: GrantFiled: August 27, 2012Date of Patent: December 17, 2013Assignee: Caterpillar Inc.Inventors: Cheryl Lynn Sellers, David Thaler, Mark T. Grimm, Jeremy Trethewey, Natalie Noel Vanderspiegel, Richard A. Crandell, Dong Fei, Roger A. Hudson, Mark Alan Gasper, Herbert DaCosta, Eric Charles Fluga, Hemant Prasad Mallampalli, Bruce Frazier, Matthew Fletcher
-
Publication number: 20120318134Abstract: According to an exemplary embodiment of the present disclosure, a system for removing matter from a filtering device of a work machine includes a gas pressurization assembly. An element of the gas pressurization assembly is removably attachable to a first orifice of the filtering device without removing the filtering device from a work machine to which the filtering device is connected. The system also includes a heat source fluidly connected to the gas pressurization assembly.Type: ApplicationFiled: August 27, 2012Publication date: December 20, 2012Inventors: Cheryl Lynn Sellers, David Thaler, Mark T. Grimm, Jeremy Trethewey, Natalie Noel Vanderspiegel, Richard A. Crandell, Dong Fei, Roger A. Hudson, Mark Alan Gasper, Herbert DaCosta, Eric Charles Fluga, Hemant Prasad Mallampalli, Bruce Frazier, Matthew Fletcher
-
Patent number: 8274893Abstract: A computer may be capable of communicating with devices via network through multiple interfaces. When a new connection is to be established, the computer may select an interface to use for the connection. In some embodiments, the interface may be selected based on historical connection information representing the performance of previous network connections that the computer has established through the interfaces.Type: GrantFiled: June 15, 2007Date of Patent: September 25, 2012Assignee: Microsoft CorporationInventors: Deepak Bansal, Sumit Garg, Murari Sridharan, David Thaler
-
Patent number: 8252093Abstract: According to an exemplary embodiment of the present disclosure, a system for removing matter from a filtering device of a work machine includes a gas pressurization assembly. An element of the gas pressurization assembly is removably attachable to a first orifice of the filtering device without removing the filtering device from a work machine to which the filtering device is connected. The system also includes a heat source fluidly connected to the gas pressurization assembly.Type: GrantFiled: July 29, 2008Date of Patent: August 28, 2012Inventors: Cheryl Lynn Sellers, David Thaler, Mark T. Grimm, Jeremy Trethewey, Natalie Noel Vanderspiegel, Richard A. Crandell, Dong Fei, Roger A. Hudson, Mark Alan Gasper, Herbert DaCosta, Eric Charles Fluga, Hemant Prasad Mallampalli, Bruce Frazier, Matthew Fletcher
-
Publication number: 20110125897Abstract: A diagnostic tool for identifying a configuration of a private network that may disrupt operations involving communication between two devices on the network. The tool, when run on a device in the network, can identify a “double NAT” configuration in which the device may be separated from other devices on the private network by a NAT device. The tool, when run on a computing device, identifies a NAT device, such as a router, to which the device is connected. The tool then identifies a list containing one or more other devices that may be connected to the NAT device. The tool tests whether these other devices also perform NAT functions and are on the private network. Both the NAT device and the devices that may be connected to the NAT device are identified and a determination is made of whether those devices are on the private network by sending requests using one or more protocols that devices on a private network conventionally use but are not conventionally used by devices on other networks.Type: ApplicationFiled: January 31, 2011Publication date: May 26, 2011Applicant: Microsoft CorporationInventors: Tin Qian, David Thaler, Ari Pekka Niikkonen
-
Patent number: 7881231Abstract: A diagnostic tool for identifying a configuration of a private network that may disrupt operations involving communication between two devices on the network. The tool, when run on a device in the network, can identify a “double NAT” configuration in which the device may be separated from other devices on the private network by a NAT device. The tool, when run on a computing device, identifies a NAT device, such as a router, to which the device is connected. The tool then identifies a list containing one or more other devices that may be connected to the NAT device. The tool tests whether these other devices also perform NAT functions and are on the private network. Both the NAT device and the devices that may be connected to the NAT device are identified and a determination is made of whether those devices are on the private network by sending requests using one or more protocols that devices on a private network conventionally use but are not conventionally used by devices on other networks.Type: GrantFiled: February 13, 2009Date of Patent: February 1, 2011Assignee: Microsoft CorporationInventors: Tin Qian, David Thaler, Ari Pekka Niikkonen
-
Publication number: 20100208620Abstract: A diagnostic tool for identifying a configuration of a private network that may disrupt operations involving communication between two devices on the network. The tool, when run on a device in the network, can identify a “double NAT” configuration in which the device may be separated from other devices on the private network by a NAT device. The tool, when run on a computing device, identifies a NAT device, such as a router, to which the device is connected. The tool then identifies a list containing one or more other devices that may be connected to the NAT device. The tool tests whether these other devices also perform NAT functions and are on the private network. Both the NAT device and the devices that may be connected to the NAT device are identified and a determination is made of whether those devices are on the private network by sending requests using one or more protocols that devices on a private network conventionally use but are not conventionally used by devices on other networks.Type: ApplicationFiled: February 13, 2009Publication date: August 19, 2010Applicant: Microsoft CorporationInventors: Tin Qian, David Thaler, Ari Pekka Niikkonen
-
Publication number: 20100107240Abstract: A client computer that supports different behaviors when connected to a private network behind a network firewall than when outside the network firewall and connected indirectly through an access device. The client computer is configured to attempt communication with a device on the network. Based on the response, the client computer can determine that it is behind the network firewall, and therefore can operate with less restrictive security or settings for other parameters appropriate for when the client is directly connected to the network. Alternatively, the client computer may determine that it is indirectly connected to the network through the Internet or other outside network, and therefore, because it is outside the private network firewall, should operate with more restrictive security or settings of other parameters more appropriate for use in that network location.Type: ApplicationFiled: January 22, 2009Publication date: April 29, 2010Applicant: Microsoft CorporationInventors: David Thaler, Rob M. Trace, Deon C. Brewis, Arun K. Buduri, Bill Begorre, Scott Roberts, Srinivas Raghu Gatta, Gerardo Diaz Cuellar
-
Publication number: 20090000471Abstract: According to an exemplary embodiment of the present disclosure, a system for removing matter from a filtering device of a work machine includes a gas pressurization assembly. An element of the gas pressurization assembly is removably attachable to a first orifice of the filtering device without removing the filtering device from a work machine to which the filtering device is connected. The system also includes a heat source fluidly connected to the gas pressurization assembly.Type: ApplicationFiled: July 29, 2008Publication date: January 1, 2009Inventors: Cheryl Lynn Sellers, David Thaler, Mark T. Grimm, Jeremy Trethewey, Natalie Noel Vanderspiegel, Richard A. Crandell, Dong Fel, Roger A. Hudson, Mark Alan Gasper, Herbert DaCosta, Eric Charles Fluga, Hemant Prasad Malhampatti, Bruce Frazier, Matthew Fletcher
-
Publication number: 20080310419Abstract: A computer may be capable of communicating with devices via network through multiple interfaces. When a new connection is to be established, the computer may select an interface to use for the connection. In some embodiments, the interface may be selected based on historical connection information representing the performance of previous network connections that the computer has established through the interfaces.Type: ApplicationFiled: June 15, 2007Publication date: December 18, 2008Applicant: Microsoft CorporationInventors: Deepak Bansal, Sumit Garg, Murari Sridharan, David Thaler
-
Patent number: 7410529Abstract: According to an exemplary embodiment of the present disclosure, a system for removing matter from a filtering device of a work machine includes a gas pressurization assembly. An element of the gas pressurization assembly is removably attachable to a first orifice of the filtering device without removing the filtering device from a work machine to which the filtering device is connected. The system also includes a heat source fluidly connected to the gas pressurization assembly.Type: GrantFiled: May 27, 2005Date of Patent: August 12, 2008Assignee: Caterpillar Inc.Inventors: Cheryl Lynn Sellers, David Thaler, Mark T. Grimm, Jeremy Trethewey, Natalie Noel Vanderspiegel, Richard A. Crandell, Dong Fei, Roger A. Hudson, Mark Alan Gasper, Herbert DaCosta, Eric Charles Fluga, Hemant Prasad Mallampalli, Bruce Frazier, Matthew Fletcher
-
Publication number: 20070242601Abstract: A networked computer system in which a gateway is selected for efficient transmission over a network using a layered protocol. When a transmission over the network fails, information at multiple protocol layers indicates the usability of the gateway through which the failed transmission was made. In a layered protocol with an application or connection layer, a path layer and a link layer, information at the link layer is used to determine whether retransmission through the same gateway should be attempted. Information at the path layer is used to determine whether the gateway is faulty. Information from the application or connection layer is used to determine whether responses are received to transmissions. These determinations are used in setting the status of the gateway, which in turn is used to prioritize gateways when selecting a gateway for future transmissions.Type: ApplicationFiled: April 14, 2006Publication date: October 18, 2007Applicant: Microsoft CorporationInventors: Abolade Gbadegesin, Amit Aggarwal, David Thaler
-
Publication number: 20070158941Abstract: A joint is provided permitting relative radial and axial movement between a first wall thermally expanding at a first amount and a second wall thermally expanding at a second amount. The joint includes a first fixed connection between a first edge of the second wall and the first wall. The joint also includes an endplate including a first edge and a second fixed connection between a second edge of the second wall and the first edge of the endplate. The joint also includes a clip and a third fixed connection between the clip and the first wall. The joint further includes a fourth fixed connection between the clip and the endplate, the clip permitting the relative radial and axial movement.Type: ApplicationFiled: January 6, 2006Publication date: July 12, 2007Inventors: David Thaler, Richard Crandell, Kevin Daly
-
Publication number: 20070130468Abstract: Discovery of a network to which a device is in communication and classifying the network is disclosed. The network may be classified as a network already known or a new network signature may be created where the network signature is made up of a network id, a link id and a hop id.Type: ApplicationFiled: December 7, 2005Publication date: June 7, 2007Applicant: MICROSOFT CORPORATIONInventors: Aaron Cunningham, Alok Sinha, Bill Begorre, David Thaler, David Jones, Marieke Watson, Patrice Miner