Patents by Inventor Jay Parks

Jay Parks has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 7568096
    Abstract: A request to render encrypted content is received and a chain of licenses corresponding to the content is located. The chain includes a leaf license linked to the content at one end of the chain, a root license at the other end of the chain, and any intermediate licenses therebetween. The leaf license and any intermediate licenses in the chain are each bound to the adjoining license in the chain toward the root license, and the root license is bound to an owner of a private key (PR-U). For each license in the chain, the license is verified and it is confirmed that the license allows the content to be rendered. A decryption key is obtained from the leaf license based on application of (PR-U) to the root license, the obtained key is applied to decrypt the encrypted content, and the decrypted content is rendered.
    Type: Grant
    Filed: April 23, 2004
    Date of Patent: July 28, 2009
    Assignee: Microsoft Corporation
    Inventors: Brian P. Evans, Clifford P. Strom, Michael Jay Parks
  • Publication number: 20090125988
    Abstract: A host securely transmits content to a peripheral thereof. The peripheral has a symmetric key (PK) and a copy of (PK) encrypted according to a public key (PU) of an entity ((PU(PK))). In the method, the host receives (PU(PK)) from the peripheral, and sends (PU(PK)) to the entity. The entity has a private key (PR) corresponding to (PU), applies (PR) to (PU(PK)) to obtain (PK), and sends (PK) back to the host. The host receives (PK) from the entity, encrypts at least a portion of the content according to (PK), and transmits the encrypted content to the peripheral. The peripheral may then decrypt the encrypted content based on (PK). A bind key (BK) encrypted by (PK) ((PK(BK))) may accompany (PU(PK)), where the content is to be encrypted according to (BK). Thus, (PK) is not revealed to the host.
    Type: Application
    Filed: December 10, 2008
    Publication date: May 14, 2009
    Applicant: MICROSOFT CORPORATION
    Inventors: Brian Evans, Ajitesh Kishore, M. Jay Parks
  • Patent number: 7472270
    Abstract: A host securely transmits content to a peripheral thereof. The peripheral has a symmetric key (PK) and a copy of (PK) encrypted according to a public key (PU) of an entity ((PU(PK))). In the method, the host receives (PU(PK)) from the peripheral, and sends (PU(PK)) to the entity. The entity has a private key (PR) corresponding to (PU), applies (PR) to (PU(PK)) to obtain (PK), and sends (PK) back to the host. The host receives (PK) from the entity, encrypts at least a portion of the content according to (PK), and transmits the encrypted content to the peripheral. The peripheral may then decrypt the encrypted content based on (PK). A bind key (BK) encrypted by (PK) ((PK(BK))) may accompany (PU(PK)), where the content is to be encrypted according to (BK). Thus, (PK) is not revealed to the host.
    Type: Grant
    Filed: November 13, 2002
    Date of Patent: December 30, 2008
    Assignee: Microsoft Corporation
    Inventors: Brian Evans, Ajitesh Kishore, M. Jay Parks
  • Patent number: 7395438
    Abstract: A device renders content on a medium by obtaining a table from the medium, obtaining a device key (DK) of the device and an index value of such (DK), indexing into an entry of the table based on the obtained index value, selecting an encrypted secret from the indexed-into entry, applying the obtained device key (DK) to the selected encrypted secret to expose the secret, and applying the exposed secret to render the content.
    Type: Grant
    Filed: April 16, 2002
    Date of Patent: July 1, 2008
    Assignee: Microsoft Corporation
    Inventors: M. Jay Parks, Marcus Peinado, Jonas Fredrik Helin, Clifford P. Strom
  • Patent number: 7337390
    Abstract: A method of embedding voice data in a computing system includes detecting a record event and detecting if a software application currently running on the computing system is voice-aware. The method also includes embedding the voice data within associated data in the software application, if the software application is voice-aware. If the software application is not voice-aware, the method also includes triggering a voice note application to record and store the voice data. A method in a computing system for modifying a user interface displayed on a display device includes receiving an indication from the computing device to modify the user interface. The method further includes displaying an identification block, a record toolbar, a note pad, and a note tab.
    Type: Grant
    Filed: March 2, 2004
    Date of Patent: February 26, 2008
    Assignee: Microsoft Corporation
    Inventors: Charlton E. Lui, Jeff Blum, Michael Jay Parks, Kevin Phillip Paulson
  • Patent number: 7305343
    Abstract: A method of embedding voice data in a computing system includes detecting a record event and detecting if a software application currently running on the computing system is voice-aware. The method also includes embedding the voice data within associated data in the software application, if the software application is voice-aware. If the software application is not voice-aware, the method also includes triggering a voice note application to record and store the voice data. A method in a computing system for modifying a user interface displayed on a display device includes receiving an indication from the computing device to modify the user interface. The method further includes displaying an identification block, a record toolbar, a note pad, and a note tab.
    Type: Grant
    Filed: March 2, 2004
    Date of Patent: December 4, 2007
    Assignee: Microsoft Corporation
    Inventors: Charlton E. Lui, Jeff Blum, Michael Jay Parks, Kevin Phillip Paulson
  • Patent number: 7281273
    Abstract: Digital content is encrypted according to a content key (CK) to form (CK(content)) and such (CK(content)), a license generator, a start-up file, and license-generating information are placed on a digital storage medium. The license generator is for generating a digital license corresponding to the placed content, where the generated license has the content key (CK) therein. The start-up file is read and executed when the medium is mounted to a computing device, and the executed start-up file executes the license generator The license generating information includes the content key (CK) and any terms, conditions, rules, and/or requirements to be built into the license.
    Type: Grant
    Filed: June 28, 2002
    Date of Patent: October 9, 2007
    Assignee: Microsoft Corporation
    Inventors: Clifford P. Strom, Sandeep Sahasrabudhe, M. Jay Parks, John Paddleford
  • Patent number: 7272858
    Abstract: A device has a symmetric device key (DK) and a copy of (DK) encrypted according to a public key (PU) of an entity (PU(DK)). The device receives an object from a host computer, at least a portion of which is encrypted according to (DK). The device sends (PU(DK)) to the host computer, and the host computer sends (PU(DK)) to the entity. The entity applies a corresponding private key (PR) to (PU(DK)) to obtain (DK) and sends (DK) to the host computer. The host computer may then encrypt the object according to (DK) and download same to the device, and the device may decrypt the encrypted object based on (DK).
    Type: Grant
    Filed: April 16, 2002
    Date of Patent: September 18, 2007
    Assignee: Microsoft Corporation
    Inventors: M. Jay Parks, Jonas Fredrik Helin
  • Patent number: 7266569
    Abstract: Metered data is accumulated and is indexed within a metering database of a client according to a metering ID (MID) and a content-associated ID (KID). The client selects a particular MID and metered data in the metering database having the selected MID, and constructs a challenge based on the selected metered data and sends same to a metering service. The metering service obtains the metered data from the challenge, stores same, and constructs a response. The client receives the response including a list of KIDs of the selected metered data in the challenge, and processes the list of KIDs by, for each KID in the list, deleting the metered data from the metering database having the selected MID and the KID.
    Type: Grant
    Filed: April 23, 2004
    Date of Patent: September 4, 2007
    Assignee: Microsoft Corporation
    Inventors: Benjamin Brooks Cutter, Brian P. Evans, Clifford P. Strom, Michael Jay Parks
  • Patent number: 7146504
    Abstract: A computing device has a running real-time secure clock adjustable only according to trusted time as received from an external trusted time authority, a time offset within which is stored a time value adjustable by at least one of the user and the trusted time authority, and a time display for displaying a running real-time display time calculated as the trusted time from the secure clock plus the stored time value in the time offset. Reference thus may be made to the secure clock to evaluate a temporal requirement without concern that the user has adjusted the secure clock to subvert the temporal requirement. The computing device sends a request for secure time and the trusted time authority sends same. The computing device receives the secure time, sets the secure clock according to same, and sends confirmation to the trusted time authority that the secure time has been received.
    Type: Grant
    Filed: June 13, 2002
    Date of Patent: December 5, 2006
    Assignee: Microsoft Corporation
    Inventors: M. Jay Parks, Jonas Fredrik Helin
  • Publication number: 20060146617
    Abstract: A PMOS transistor includes a gate, drain, and source in a substrate and is isolated from adjacent transistors in the substrate by shallow trench isolation. The transistor is programmed by applying a gate voltage to the gate and generating a drain-to-source voltage across the transistor that is of sufficient magnitude such that electrons are injected into the shallow trench isolation. This degrades the transistor so that it cannot be turned off. In one embodiment, the magnitude of the source-to-drain voltage depends on the gate voltage.
    Type: Application
    Filed: March 1, 2006
    Publication date: July 6, 2006
    Inventor: Jay Parks
  • Publication number: 20060028878
    Abstract: A PMOS transistor includes a gate, drain, and source in a substrate and is isolated from adjacent transistors in the substrate by shallow trench isolation. The transistor is programmed by applying a gate voltage to the gate and generating a drain-to-source voltage across the transistor that is of sufficient magnitude such that electrons are injected into the shallow trench isolation. This degrades the transistor so that it cannot be turned off. In one embodiment, the magnitude of the source-to-drain voltage depends on the gate voltage.
    Type: Application
    Filed: June 13, 2005
    Publication date: February 9, 2006
    Inventor: Jay Parks
  • Patent number: 6850228
    Abstract: A universal file format for providing digital rich ink data documents. Digital rich ink data is hidden among the ink image data otherwise stored in a widely-accepted image file format. For example, depending on the type of file, data can be concealed in the least significant bit or bits of pixel information, or stored in-different color indexes of a palette that result in the same color output. In other file types, digital rich ink data may be appended after the end of file marker, or placed in a comment area. When such a file is accessed, computing devices capable of handling rich ink data recognize and extract the rich ink data from the file, while devices incapable of recognizing the format are still able to display the ordinary ink data. Two file formats for describing the arrangement of rich ink data are also provided.
    Type: Grant
    Filed: October 29, 1999
    Date of Patent: February 1, 2005
    Assignee: Microsoft Corporation
    Inventors: Michael Jay Parks, Charlton E. Lui
  • Publication number: 20040185911
    Abstract: A method of embedding voice data in a computing system includes detecting a record event and detecting if a software application currently running on the computing system is voice-aware. The method also includes embedding the voice data within associated data in the software application, if the software application is voice-aware. If the software application is not voice-aware, the method also includes triggering a voice note application to record and store the voice data. A method in a computing system for modifying a user interface displayed on a display device includes receiving an indication from the computing device to modify the user interface. The method further includes displaying an identification block, a record toolbar, a note pad, and a note tab.
    Type: Application
    Filed: March 2, 2004
    Publication date: September 23, 2004
    Applicant: Microsoft Corporation
    Inventors: Charlton E. Lui, Jeff Blum, Michael Jay Parks, Kevin Phillip Paulson
  • Publication number: 20040181413
    Abstract: A method of embedding voice data in a computing system includes detecting a record event and detecting if a software application currently running on the computing system is voice-aware. The method also includes embedding the voice data within associated data in the software application, if the software application is voice-aware. If the software application is not voice-aware, the method also includes triggering a voice note application to record and store the voice data. A method in a computing system for modifying a user interface displayed on a display device includes receiving an indication from the computing device to modify the user interface. The method further includes displaying an identification block, a record toolbar, a note pad, and a note tab.
    Type: Application
    Filed: March 2, 2004
    Publication date: September 16, 2004
    Applicant: Microsoft Corporation
    Inventors: Charlton E. Lui, Jeff Blum, Michael Jay Parks, Kevin Phillip Paulson
  • Patent number: 6720980
    Abstract: A method of embedding voice data in a computing system includes detecting a record event and detecting if a software application currently running on the computing system is voice-aware. The method also includes embedding the voice data within associated data in the software application, if the software application is voice-aware. If the software application is not voice-aware, the method also includes triggering a voice note application to record and store the voice data. A method in a computing system for modifying a user interface displayed on a display device includes receiving an indication from the computing device to modify the user interface. The method further includes displaying an identification block, a record toolbar, a note pad, and a note tab.
    Type: Grant
    Filed: March 1, 2000
    Date of Patent: April 13, 2004
    Assignee: Microsoft Corporation
    Inventors: Charlton E. Lui, Jeff Blum, Michael Jay Parks, Kevin Phillip Paulson
  • Publication number: 20040003274
    Abstract: Digital content is encrypted according to a content key (CK) to form (CK(content)) and such (CK(content)), a license generator, a start-up file, and license-generating information are placed on a digital storage medium. The license generator is for generating a digital license corresponding to the placed content, where the generated license has the content key (CK) therein. The start-up file is read and executed when the medium is mounted to a computing device, and the executed start-up file executes the license generator The license generating information includes the content key (CK) and any terms, conditions, rules, and/or requirements to be built into the license.
    Type: Application
    Filed: June 28, 2002
    Publication date: January 1, 2004
    Inventors: Clifford P. Strom, Sandeep Sahasrabudhe, M. Jay Parks, John Paddleford
  • Publication number: 20030233553
    Abstract: A computing device has a running real-time secure clock adjustable only according to trusted time as received from an external trusted time authority, a time offset within which is stored a time value adjustable by at least one of the user and the trusted time authority, and a time display for displaying a running real-time display time calculated as the trusted time from the secure clock plus the stored time value in the time offset. Reference thus may be made to the secure clock to evaluate a temporal requirement without concern that the user has adjusted the secure clock to subvert the temporal requirement. The computing device sends a request for secure time and the trusted time authority sends same. The computing device receives the secure time, sets the secure clock according to same, and sends confirmation to the trusted time authority that the secure time has been received.
    Type: Application
    Filed: June 13, 2002
    Publication date: December 18, 2003
    Applicant: Microsoft Corporation
    Inventors: M. Jay Parks, Jonas Fredrik Helin
  • Publication number: 20030194092
    Abstract: A device has a symmetric device key (DK) and a copy of (DK) encrypted according to a public key (PU) of an entity (PU(DK)). The device receives an object from a host computer, at least a portion of which is encrypted according to (DK). The device sends (PU(DK)) to the host computer, and the host computer sends (PU(DK)) to the entity. The entity applies a corresponding private key (PR) to (PU(DK)) to obtain (DK) and sends (DK) to the host computer. The host computer may then encrypt the object according to (DK) and download same to the device, and the device may decrypt the encrypted object based on (DK).
    Type: Application
    Filed: April 16, 2002
    Publication date: October 16, 2003
    Applicant: Microsoft Corporation.
    Inventors: M. Jay Parks, Jonas Fredrik Helin
  • Publication number: 20030194093
    Abstract: A host securely transmits content to a peripheral thereof. The peripheral has a symmetric key (PK) and a copy of (PK) encrypted according to a public key (PU) of an entity ((PU(PK))). In the method, the host receives (PU(PK)) from the peripheral, and sends (PU(PK)) to the entity. The entity has a private key (PR) corresponding to (PU), applies (PR) to (PU(PK)) to obtain (PK), and sends (PK) back to the host. The host receives (PK) from the entity, encrypts at least a portion of the content according to (PK), and transmits the encrypted content to the peripheral. The peripheral may then decrypt the encrypted content based on (PK). A bind key (BK) encrypted by (PK) ((PK(BK))) may accompany (PU(PK)), where the content is to be encrypted according to (BK). Thus, (PK) is not revealed to the host.
    Type: Application
    Filed: November 13, 2002
    Publication date: October 16, 2003
    Applicant: Microsoft Corporation
    Inventors: Brian Evans, Ajitesh Kishore, M. Jay Parks