Patents by Inventor Jay Parks
Jay Parks has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 7568096Abstract: A request to render encrypted content is received and a chain of licenses corresponding to the content is located. The chain includes a leaf license linked to the content at one end of the chain, a root license at the other end of the chain, and any intermediate licenses therebetween. The leaf license and any intermediate licenses in the chain are each bound to the adjoining license in the chain toward the root license, and the root license is bound to an owner of a private key (PR-U). For each license in the chain, the license is verified and it is confirmed that the license allows the content to be rendered. A decryption key is obtained from the leaf license based on application of (PR-U) to the root license, the obtained key is applied to decrypt the encrypted content, and the decrypted content is rendered.Type: GrantFiled: April 23, 2004Date of Patent: July 28, 2009Assignee: Microsoft CorporationInventors: Brian P. Evans, Clifford P. Strom, Michael Jay Parks
-
Publication number: 20090125988Abstract: A host securely transmits content to a peripheral thereof. The peripheral has a symmetric key (PK) and a copy of (PK) encrypted according to a public key (PU) of an entity ((PU(PK))). In the method, the host receives (PU(PK)) from the peripheral, and sends (PU(PK)) to the entity. The entity has a private key (PR) corresponding to (PU), applies (PR) to (PU(PK)) to obtain (PK), and sends (PK) back to the host. The host receives (PK) from the entity, encrypts at least a portion of the content according to (PK), and transmits the encrypted content to the peripheral. The peripheral may then decrypt the encrypted content based on (PK). A bind key (BK) encrypted by (PK) ((PK(BK))) may accompany (PU(PK)), where the content is to be encrypted according to (BK). Thus, (PK) is not revealed to the host.Type: ApplicationFiled: December 10, 2008Publication date: May 14, 2009Applicant: MICROSOFT CORPORATIONInventors: Brian Evans, Ajitesh Kishore, M. Jay Parks
-
Patent number: 7472270Abstract: A host securely transmits content to a peripheral thereof. The peripheral has a symmetric key (PK) and a copy of (PK) encrypted according to a public key (PU) of an entity ((PU(PK))). In the method, the host receives (PU(PK)) from the peripheral, and sends (PU(PK)) to the entity. The entity has a private key (PR) corresponding to (PU), applies (PR) to (PU(PK)) to obtain (PK), and sends (PK) back to the host. The host receives (PK) from the entity, encrypts at least a portion of the content according to (PK), and transmits the encrypted content to the peripheral. The peripheral may then decrypt the encrypted content based on (PK). A bind key (BK) encrypted by (PK) ((PK(BK))) may accompany (PU(PK)), where the content is to be encrypted according to (BK). Thus, (PK) is not revealed to the host.Type: GrantFiled: November 13, 2002Date of Patent: December 30, 2008Assignee: Microsoft CorporationInventors: Brian Evans, Ajitesh Kishore, M. Jay Parks
-
Patent number: 7395438Abstract: A device renders content on a medium by obtaining a table from the medium, obtaining a device key (DK) of the device and an index value of such (DK), indexing into an entry of the table based on the obtained index value, selecting an encrypted secret from the indexed-into entry, applying the obtained device key (DK) to the selected encrypted secret to expose the secret, and applying the exposed secret to render the content.Type: GrantFiled: April 16, 2002Date of Patent: July 1, 2008Assignee: Microsoft CorporationInventors: M. Jay Parks, Marcus Peinado, Jonas Fredrik Helin, Clifford P. Strom
-
Patent number: 7337390Abstract: A method of embedding voice data in a computing system includes detecting a record event and detecting if a software application currently running on the computing system is voice-aware. The method also includes embedding the voice data within associated data in the software application, if the software application is voice-aware. If the software application is not voice-aware, the method also includes triggering a voice note application to record and store the voice data. A method in a computing system for modifying a user interface displayed on a display device includes receiving an indication from the computing device to modify the user interface. The method further includes displaying an identification block, a record toolbar, a note pad, and a note tab.Type: GrantFiled: March 2, 2004Date of Patent: February 26, 2008Assignee: Microsoft CorporationInventors: Charlton E. Lui, Jeff Blum, Michael Jay Parks, Kevin Phillip Paulson
-
Patent number: 7305343Abstract: A method of embedding voice data in a computing system includes detecting a record event and detecting if a software application currently running on the computing system is voice-aware. The method also includes embedding the voice data within associated data in the software application, if the software application is voice-aware. If the software application is not voice-aware, the method also includes triggering a voice note application to record and store the voice data. A method in a computing system for modifying a user interface displayed on a display device includes receiving an indication from the computing device to modify the user interface. The method further includes displaying an identification block, a record toolbar, a note pad, and a note tab.Type: GrantFiled: March 2, 2004Date of Patent: December 4, 2007Assignee: Microsoft CorporationInventors: Charlton E. Lui, Jeff Blum, Michael Jay Parks, Kevin Phillip Paulson
-
Patent number: 7281273Abstract: Digital content is encrypted according to a content key (CK) to form (CK(content)) and such (CK(content)), a license generator, a start-up file, and license-generating information are placed on a digital storage medium. The license generator is for generating a digital license corresponding to the placed content, where the generated license has the content key (CK) therein. The start-up file is read and executed when the medium is mounted to a computing device, and the executed start-up file executes the license generator The license generating information includes the content key (CK) and any terms, conditions, rules, and/or requirements to be built into the license.Type: GrantFiled: June 28, 2002Date of Patent: October 9, 2007Assignee: Microsoft CorporationInventors: Clifford P. Strom, Sandeep Sahasrabudhe, M. Jay Parks, John Paddleford
-
Patent number: 7272858Abstract: A device has a symmetric device key (DK) and a copy of (DK) encrypted according to a public key (PU) of an entity (PU(DK)). The device receives an object from a host computer, at least a portion of which is encrypted according to (DK). The device sends (PU(DK)) to the host computer, and the host computer sends (PU(DK)) to the entity. The entity applies a corresponding private key (PR) to (PU(DK)) to obtain (DK) and sends (DK) to the host computer. The host computer may then encrypt the object according to (DK) and download same to the device, and the device may decrypt the encrypted object based on (DK).Type: GrantFiled: April 16, 2002Date of Patent: September 18, 2007Assignee: Microsoft CorporationInventors: M. Jay Parks, Jonas Fredrik Helin
-
Patent number: 7266569Abstract: Metered data is accumulated and is indexed within a metering database of a client according to a metering ID (MID) and a content-associated ID (KID). The client selects a particular MID and metered data in the metering database having the selected MID, and constructs a challenge based on the selected metered data and sends same to a metering service. The metering service obtains the metered data from the challenge, stores same, and constructs a response. The client receives the response including a list of KIDs of the selected metered data in the challenge, and processes the list of KIDs by, for each KID in the list, deleting the metered data from the metering database having the selected MID and the KID.Type: GrantFiled: April 23, 2004Date of Patent: September 4, 2007Assignee: Microsoft CorporationInventors: Benjamin Brooks Cutter, Brian P. Evans, Clifford P. Strom, Michael Jay Parks
-
Patent number: 7146504Abstract: A computing device has a running real-time secure clock adjustable only according to trusted time as received from an external trusted time authority, a time offset within which is stored a time value adjustable by at least one of the user and the trusted time authority, and a time display for displaying a running real-time display time calculated as the trusted time from the secure clock plus the stored time value in the time offset. Reference thus may be made to the secure clock to evaluate a temporal requirement without concern that the user has adjusted the secure clock to subvert the temporal requirement. The computing device sends a request for secure time and the trusted time authority sends same. The computing device receives the secure time, sets the secure clock according to same, and sends confirmation to the trusted time authority that the secure time has been received.Type: GrantFiled: June 13, 2002Date of Patent: December 5, 2006Assignee: Microsoft CorporationInventors: M. Jay Parks, Jonas Fredrik Helin
-
Publication number: 20060146617Abstract: A PMOS transistor includes a gate, drain, and source in a substrate and is isolated from adjacent transistors in the substrate by shallow trench isolation. The transistor is programmed by applying a gate voltage to the gate and generating a drain-to-source voltage across the transistor that is of sufficient magnitude such that electrons are injected into the shallow trench isolation. This degrades the transistor so that it cannot be turned off. In one embodiment, the magnitude of the source-to-drain voltage depends on the gate voltage.Type: ApplicationFiled: March 1, 2006Publication date: July 6, 2006Inventor: Jay Parks
-
Publication number: 20060028878Abstract: A PMOS transistor includes a gate, drain, and source in a substrate and is isolated from adjacent transistors in the substrate by shallow trench isolation. The transistor is programmed by applying a gate voltage to the gate and generating a drain-to-source voltage across the transistor that is of sufficient magnitude such that electrons are injected into the shallow trench isolation. This degrades the transistor so that it cannot be turned off. In one embodiment, the magnitude of the source-to-drain voltage depends on the gate voltage.Type: ApplicationFiled: June 13, 2005Publication date: February 9, 2006Inventor: Jay Parks
-
Patent number: 6850228Abstract: A universal file format for providing digital rich ink data documents. Digital rich ink data is hidden among the ink image data otherwise stored in a widely-accepted image file format. For example, depending on the type of file, data can be concealed in the least significant bit or bits of pixel information, or stored in-different color indexes of a palette that result in the same color output. In other file types, digital rich ink data may be appended after the end of file marker, or placed in a comment area. When such a file is accessed, computing devices capable of handling rich ink data recognize and extract the rich ink data from the file, while devices incapable of recognizing the format are still able to display the ordinary ink data. Two file formats for describing the arrangement of rich ink data are also provided.Type: GrantFiled: October 29, 1999Date of Patent: February 1, 2005Assignee: Microsoft CorporationInventors: Michael Jay Parks, Charlton E. Lui
-
Publication number: 20040185911Abstract: A method of embedding voice data in a computing system includes detecting a record event and detecting if a software application currently running on the computing system is voice-aware. The method also includes embedding the voice data within associated data in the software application, if the software application is voice-aware. If the software application is not voice-aware, the method also includes triggering a voice note application to record and store the voice data. A method in a computing system for modifying a user interface displayed on a display device includes receiving an indication from the computing device to modify the user interface. The method further includes displaying an identification block, a record toolbar, a note pad, and a note tab.Type: ApplicationFiled: March 2, 2004Publication date: September 23, 2004Applicant: Microsoft CorporationInventors: Charlton E. Lui, Jeff Blum, Michael Jay Parks, Kevin Phillip Paulson
-
Publication number: 20040181413Abstract: A method of embedding voice data in a computing system includes detecting a record event and detecting if a software application currently running on the computing system is voice-aware. The method also includes embedding the voice data within associated data in the software application, if the software application is voice-aware. If the software application is not voice-aware, the method also includes triggering a voice note application to record and store the voice data. A method in a computing system for modifying a user interface displayed on a display device includes receiving an indication from the computing device to modify the user interface. The method further includes displaying an identification block, a record toolbar, a note pad, and a note tab.Type: ApplicationFiled: March 2, 2004Publication date: September 16, 2004Applicant: Microsoft CorporationInventors: Charlton E. Lui, Jeff Blum, Michael Jay Parks, Kevin Phillip Paulson
-
Patent number: 6720980Abstract: A method of embedding voice data in a computing system includes detecting a record event and detecting if a software application currently running on the computing system is voice-aware. The method also includes embedding the voice data within associated data in the software application, if the software application is voice-aware. If the software application is not voice-aware, the method also includes triggering a voice note application to record and store the voice data. A method in a computing system for modifying a user interface displayed on a display device includes receiving an indication from the computing device to modify the user interface. The method further includes displaying an identification block, a record toolbar, a note pad, and a note tab.Type: GrantFiled: March 1, 2000Date of Patent: April 13, 2004Assignee: Microsoft CorporationInventors: Charlton E. Lui, Jeff Blum, Michael Jay Parks, Kevin Phillip Paulson
-
Publication number: 20040003274Abstract: Digital content is encrypted according to a content key (CK) to form (CK(content)) and such (CK(content)), a license generator, a start-up file, and license-generating information are placed on a digital storage medium. The license generator is for generating a digital license corresponding to the placed content, where the generated license has the content key (CK) therein. The start-up file is read and executed when the medium is mounted to a computing device, and the executed start-up file executes the license generator The license generating information includes the content key (CK) and any terms, conditions, rules, and/or requirements to be built into the license.Type: ApplicationFiled: June 28, 2002Publication date: January 1, 2004Inventors: Clifford P. Strom, Sandeep Sahasrabudhe, M. Jay Parks, John Paddleford
-
Publication number: 20030233553Abstract: A computing device has a running real-time secure clock adjustable only according to trusted time as received from an external trusted time authority, a time offset within which is stored a time value adjustable by at least one of the user and the trusted time authority, and a time display for displaying a running real-time display time calculated as the trusted time from the secure clock plus the stored time value in the time offset. Reference thus may be made to the secure clock to evaluate a temporal requirement without concern that the user has adjusted the secure clock to subvert the temporal requirement. The computing device sends a request for secure time and the trusted time authority sends same. The computing device receives the secure time, sets the secure clock according to same, and sends confirmation to the trusted time authority that the secure time has been received.Type: ApplicationFiled: June 13, 2002Publication date: December 18, 2003Applicant: Microsoft CorporationInventors: M. Jay Parks, Jonas Fredrik Helin
-
Publication number: 20030194092Abstract: A device has a symmetric device key (DK) and a copy of (DK) encrypted according to a public key (PU) of an entity (PU(DK)). The device receives an object from a host computer, at least a portion of which is encrypted according to (DK). The device sends (PU(DK)) to the host computer, and the host computer sends (PU(DK)) to the entity. The entity applies a corresponding private key (PR) to (PU(DK)) to obtain (DK) and sends (DK) to the host computer. The host computer may then encrypt the object according to (DK) and download same to the device, and the device may decrypt the encrypted object based on (DK).Type: ApplicationFiled: April 16, 2002Publication date: October 16, 2003Applicant: Microsoft Corporation.Inventors: M. Jay Parks, Jonas Fredrik Helin
-
Publication number: 20030194093Abstract: A host securely transmits content to a peripheral thereof. The peripheral has a symmetric key (PK) and a copy of (PK) encrypted according to a public key (PU) of an entity ((PU(PK))). In the method, the host receives (PU(PK)) from the peripheral, and sends (PU(PK)) to the entity. The entity has a private key (PR) corresponding to (PU), applies (PR) to (PU(PK)) to obtain (PK), and sends (PK) back to the host. The host receives (PK) from the entity, encrypts at least a portion of the content according to (PK), and transmits the encrypted content to the peripheral. The peripheral may then decrypt the encrypted content based on (PK). A bind key (BK) encrypted by (PK) ((PK(BK))) may accompany (PU(PK)), where the content is to be encrypted according to (BK). Thus, (PK) is not revealed to the host.Type: ApplicationFiled: November 13, 2002Publication date: October 16, 2003Applicant: Microsoft CorporationInventors: Brian Evans, Ajitesh Kishore, M. Jay Parks