Patents by Inventor Giovanni Moises Della-Libera

Giovanni Moises Della-Libera has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 8086849
    Abstract: A method and system are provided for delivering event messages in a secure scalable manner. A network includes an event distribution device serving as an event generation device for generating and disseminating an event message through the network to event distribution devices serving as edge event delivery devices having recipient devices connected thereto. Event messages may be encrypted at the event generation device for each of the destination recipient devices or event messages may be encrypted at each of the edge event delivery devices for delivery to respective recipient devices connected thereto. A signing key may also be included with the encrypted message such that the respective recipient devices may authenticate a sender of the encrypted message based on the signing key. Encryption keys may be established based on policies of the network of event distribution devices or based on policies of the respective recipient devices.
    Type: Grant
    Filed: August 2, 2002
    Date of Patent: December 27, 2011
    Assignee: Microsoft Corporation
    Inventors: Christopher G. Kaler, John P. Shewchuk, Giovanni Moises Della-Libera, Luis Felipe Cabrera
  • Patent number: 7707637
    Abstract: A method and system are provided for managing a security threat in a distributed system. A distributed element of the system detects and reports suspicious activity to a threat management agent. The threat management agent determines whether an attack is taking place and deploys a countermeasure to the attack when the attack is determined to be taking place. Another method and system are also provided for managing a security threat in a distributed system. A threat management agent reviews reported suspicious activity including suspicious activity reported from at least one distributed element of the system, determines, based on the reports, whether a pattern characteristic of an attack occurred, and predicts when a next attack is likely to occur. Deployment of a countermeasure to the predicted next attack is directed in a time window based on when the next attack is predicted to occur.
    Type: Grant
    Filed: March 28, 2008
    Date of Patent: April 27, 2010
    Assignee: Microsoft Corporation
    Inventors: Christopher G. Kaler, Giovanni Moises Della-Libera, John P. Shewchuk
  • Publication number: 20100088674
    Abstract: A method, system, and computer product for processing information embedded in a text file with a grammar programming language is provided. A text file is parsed according to a set of rules and candidate textual shapes corresponding to potential interpretations of the text file are provided by compiling a script. An output is provided, which may include either a processed value corresponding to a particular textual shape, or a textual representation of the text file that includes generic data structures that facilitate providing any of the candidate textual shapes, where the generic data structures are a function of the set of rules.
    Type: Application
    Filed: March 31, 2009
    Publication date: April 8, 2010
    Applicant: MICROSOFT CORPORATION
    Inventors: Giovanni Moises Della-Libera, Clemens Alden Szyperski, Steven Edward Lucco, Douglas Allen Walter, John Braden Keiser
  • Patent number: 7512782
    Abstract: A method and system are provided such that a universal license may be used for authentication and authorization purposes and may include one or more cryptographic keys as well as assertions and related indications of authenticity. In an aspect of the invention, a license may be presented that includes access information, such that authentication and authorization decisions may be made based only on the access information. In other aspects of the invention, rights may be delegated and a trusted party may assert that another party can be trusted.
    Type: Grant
    Filed: August 15, 2002
    Date of Patent: March 31, 2009
    Assignee: Microsoft Corporation
    Inventors: Christopher G. Kaler, John P. Shewchuk, Giovanni Moises Della-Libera, Robert George Atkinson
  • Publication number: 20090013410
    Abstract: A method and system are provided for managing a security threat in a distributed system. A distributed element of the system detects and reports suspicious activity to a threat management agent. The threat management agent determines whether an attack is taking place and deploys a countermeasure to the attack when the attack is determined to be taking place. Another method and system are also provided for managing a security threat in a distributed system. A threat management agent reviews reported suspicious activity including suspicious activity reported from at least one distributed element of the system, determines, based on the reports, whether a pattern characteristic of an attack occurred, and predicts when a next attack is likely to occur. Deployment of a countermeasure to the predicted next attack is directed in a time window based on when the next attack is predicted to occur.
    Type: Application
    Filed: March 28, 2008
    Publication date: January 8, 2009
    Inventors: Christopher Kaler, Giovanni Moises Della-Libera, John P. Shewchuk
  • Patent number: 7373666
    Abstract: A method and system are provided for managing a security threat in a distributed system. A distributed element of the system detects and reports suspicious activity to a threat management agent. The threat management agent determines whether an attack is taking place and deploys a countermeasure to the attack when the attack is determined to be taking place. Another method and system are also provided for managing a security threat in a distributed system. A threat management agent reviews reported suspicious activity including suspicious activity reported from at least one distributed element of the system, determines, based on the reports, whether a pattern characteristic of an attack occurred, and predicts when a next attack is likely to occur. Deployment of a countermeasure to the predicted next attack is directed in a time window based on when the next attack is predicted to occur.
    Type: Grant
    Filed: July 1, 2002
    Date of Patent: May 13, 2008
    Assignee: Microsoft Corporation
    Inventors: Christopher G. Kaler, Giovanni Moises Della-Libera, John P. Shewchuk
  • Publication number: 20040034770
    Abstract: A method and system are provided such that a universal license may be used for authentication and authorization purposes and may include one or more cryptographic keys as well as assertions and related indications of authenticity. In an aspect of the invention, a license may be presented that includes access information, such that authentication and authorization decisions may be made based only on the access information. In other aspects of the invention, rights may be delegated and a trusted party may assert that another party can be trusted.
    Type: Application
    Filed: August 15, 2002
    Publication date: February 19, 2004
    Applicant: Microsoft Corporation
    Inventors: Christopher G. Kaler, John P. Shewchuk, Giovanni Moises Della-Libera, Robert George Atkinson
  • Publication number: 20040025014
    Abstract: A method and system are provided for delivering event messages in a secure scalable manner. A network includes an event distribution device serving as an event generation device for generating and disseminating an event message through the network to event distribution devices serving as edge event delivery devices having recipient devices connected thereto. Event messages may be encrypted at the event generation device for each of the destination recipient devices or event messages may be encrypted at each of the edge event delivery devices for delivery to respective recipient devices connected thereto. A signing key may also be included with the encrypted message such that the respective recipient devices may authenticate a sender of the encrypted message based on the signing key. Encryption keys may be established based on policies of the network of event distribution devices or based on policies of the respective recipient devices.
    Type: Application
    Filed: August 2, 2002
    Publication date: February 5, 2004
    Applicant: Microsoft Corporation
    Inventors: Christopher G. Kaler, John P. Shewchuk, Giovanni Moises Della-Libera, Luis Felipe Cabrera
  • Publication number: 20040003286
    Abstract: A method and system are provided for managing a security threat in a distributed system. A distributed element of the system detects and reports suspicious activity to a threat management agent. The threat management agent determines whether an attack is taking place and deploys a countermeasure to the attack when the attack is determined to be taking place. Another method and system are also provided for managing a security threat in a distributed system. A threat management agent reviews reported suspicious activity including suspicious activity reported from at least one distributed element of the system, determines, based on the reports, whether a pattern characteristic of an attack occurred, and predicts when a next attack is likely to occur. Deployment of a countermeasure to the predicted next attack is directed in a time window based on when the next attack is predicted to occur.
    Type: Application
    Filed: July 1, 2002
    Publication date: January 1, 2004
    Applicant: Microsoft Corporation
    Inventors: Christopher G. Kaler, Giovanni Moises Della-Libera, John P. Shewchuk