Patents by Inventor Jacob Rubin Lorch
Jacob Rubin Lorch has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 10977384Abstract: This document relates to hardware protection of differential privacy techniques. One example obtains multiple instances of encrypted telemetry data within a secure enclave and processes the encrypted telemetry data to obtain multiple instances of unencrypted telemetry data. The example also processes, within the secure enclave, the multiple instances of unencrypted telemetry data to obtain a perturbed aggregate. The example also releases the perturbed aggregate from the secure enclave.Type: GrantFiled: November 16, 2017Date of Patent: April 13, 2021Assignee: Microsoft Technoogy Licensing, LLCInventors: Josh D. Benaloh, Harsha P. Nori, Janardhan Dattatreya Kulkarni, Joshua Stanley Allen, Jacob Rubin Lorch, Melissa Erin Chase, Olga Ohrimenko, Sergey Yekhanin, Srinath T. V. Setty, Bolin Ding
-
Patent number: 10599520Abstract: A system includes determination of a plurality of meta-copysets of a plurality of storage devices, each of the meta-copysets including a first number of storage devices, determination of a first copyset of a second number of storage devices from a first one of the meta-copysets, where the second number is less than the first number, storage of first data in a fault-tolerant format using the first copyset, determination to migrate the first data from a first storage device of the first copyset, and, in response to the determination to migrate the first data, determine a second copyset of the second number of storage devices including a storage device from the first meta-copyset which is not in the first copyset, and the storage devices of the first copyset except for the first storage device of the first copyset and storage of the first data in a fault-tolerant format using the second copyset.Type: GrantFiled: May 25, 2018Date of Patent: March 24, 2020Assignee: MICROSOFT TECHNOLOGY LICENSING, LLCInventors: Jacob Rubin Lorch, Cheng Huang, Peng Huang, Aaron W. Ogus
-
Publication number: 20190361775Abstract: A system includes determination of a plurality of meta-copysets of a plurality of storage devices, each of the meta-copysets including a first number of storage devices, determination of a first copyset of a second number of storage devices from a first one of the meta-copysets, where the second number is less than the first number, storage of first data in a fault-tolerant format using the first copyset, determination to migrate the first data from a first storage device of the first copyset, and, in response to the determination to migrate the first data, determine a second copyset of the second number of storage devices including a storage device from the first meta-copyset which is not in the first copyset, and the storage devices of the first copyset except for the first storage device of the first copyset and storage of the first data in a fault-tolerant format using the second copyset.Type: ApplicationFiled: May 25, 2018Publication date: November 28, 2019Inventors: Jacob Rubin LORCH, Cheng HUANG, Peng HUANG, Aaron W. OGUS
-
Publication number: 20190147188Abstract: This document relates to hardware protection of differential privacy techniques. One example obtains multiple instances of encrypted telemetry data within a secure enclave and processes the encrypted telemetry data to obtain multiple instances of unencrypted telemetry data. The example also processes, within the secure enclave, the multiple instances of unencrypted telemetry data to obtain a perturbed aggregate. The example also releases the perturbed aggregate from the secure enclave.Type: ApplicationFiled: November 16, 2017Publication date: May 16, 2019Applicant: Microsoft Technology Licensing, LLCInventors: Josh D. BENALOH, Harsha P. NORI, Janardhan Dattatreya KULKARNI, Joshua Stanley ALLEN, Jacob Rubin LORCH, Melissa Erin CHASE, Olga OHRIMENKO, Sergey YEKHANIN, Srinath T.V. SETTY, Bolin DING
-
Patent number: 9544280Abstract: Various technologies pertaining to authenticating a password in a manner that prevents offline dictionary attacks are described. A protected module, which can be a hardware security module, a trusted platform module, or the like, is in communication with an authentication server. The protected module comprises a key that is restricted to the protected module. The key is employed in connection with authenticating the password on the protected module.Type: GrantFiled: February 19, 2016Date of Patent: January 10, 2017Assignee: Microsoft Technology Licensing, LLCInventors: Stuart Edward Schechter, David Alexander Molnar, Jacob Rubin Lorch, Barry Clayton Bond, Bryan Jeffrey Parno
-
Publication number: 20160173461Abstract: Various technologies pertaining to authenticating a password in a manner that prevents offline dictionary attacks are described. A protected module, which can be a hardware security module, a trusted platform module, or the like, is in communication with an authentication server. The protected module comprises a key that is restricted to the protected module. The key is employed in connection with authenticating the password on the protected module.Type: ApplicationFiled: February 19, 2016Publication date: June 16, 2016Inventors: Stuart Edward Schechter, David Alexander Molnar, Jacob Rubin Lorch, Barry Clayton Bond, Bryan Jeffrey Parno
-
Patent number: 9294281Abstract: Various technologies pertaining to authenticating a password in a manner that prevents offline dictionary attacks are described. A protected module, which can be a hardware security module, a trusted platform module, or the like, is in communication with an authentication server. The protected module comprises a key that is restricted to the protected module. The key is employed in connection with authenticating the password on the protected module.Type: GrantFiled: February 10, 2012Date of Patent: March 22, 2016Assignee: Microsoft Technology Licensing, LLCInventors: Stuart Edward Schechter, David Alexander Molnar, Jacob Rubin Lorch, Barry Clayton Bond, Bryan Jeffrey Parno
-
Publication number: 20160026782Abstract: Described is a technology by which the identity of a person (e.g., a customer in a commercial transaction) is determinable without active identification effort, via biometric data is obtained without action by the person. Machine processing of the biometric data over a set of possible persons, determined from secondary proximity sensing, is used to determine or assist in determining the identity of the person.Type: ApplicationFiled: September 4, 2015Publication date: January 28, 2016Applicant: MICROSOFT TECHNOLOGY LICENSING, LLCInventors: Christopher Stephen Frederick Smowton, Ronnie Chaiken, Weidong Cui, Oliver H. Foehr, Jacob Rubin Lorch, David Molnar, Bryan Jeffrey Parno, Stefan Saroiu, Alastair Wolman
-
Patent number: 9152868Abstract: Described is a technology by which the identity of a person (e.g., a customer in a commercial transaction) is determinable without active identification effort, via biometric data is obtained without action by the person. Machine processing of the biometric data over a set of possible persons, determined from secondary proximity sensing, is used to determine or assist in determining the identity of the person.Type: GrantFiled: March 23, 2012Date of Patent: October 6, 2015Assignee: Microsoft Technology Licensing, LLCInventors: Christopher Stephen Frederick Smowton, Ronnie Chaiken, Weidong Cui, Oliver H. Foehr, Jacob Rubin Lorch, David Molnar, Bryan Jeffrey Parno, Stefan Saroiu, Alastair Wolman
-
Publication number: 20130251216Abstract: Described is a technology by which the identity of a person (e.g., a customer in a commercial transaction) is determinable without active identification effort, via biometric data is obtained without action by the person. Machine processing of the biometric data over a set of possible persons, determined from secondary proximity sensing, is used to determine or assist in determining the identity of the person.Type: ApplicationFiled: March 23, 2012Publication date: September 26, 2013Applicant: MICROSOFT CORPORATIONInventors: Christopher Stephen Frederick Smowton, Ronnie Chaiken, Weidong Cui, Oliver H. Foehr, Jacob Rubin Lorch, David Molnar, Bryan Jeffrey Parno, Stefan Saroiu, Alastair Wolman
-
Publication number: 20130212385Abstract: Various technologies pertaining to authenticating a password in a manner that prevents offline dictionary attacks are described. A protected module, which can be a hardware security module, a trusted platform module, or the like, is in communication with an authentication server. The protected module comprises a key that is restricted to the protected module. The key is employed in connection with authenticating the password on the protected module.Type: ApplicationFiled: February 10, 2012Publication date: August 15, 2013Applicant: MICROSOFT CORPORATIONInventors: Stuart Edward Schechter, David Alexander Molnar, Jacob Rubin Lorch, Barry Clayton Bond, Bryan Jeffrey Parno