Patents by Inventor Jeffrey Cooperstein
Jeffrey Cooperstein has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 10621357Abstract: Security risks associated with scanning a computer are at least mitigated by performing the scanning off node. State data of a target node, or computer, can be acquired in various ways. The acquired state data can be subsequently employed to generate a virtual replica of the target computer or portion thereof on a second computer isolated from the target computer. The virtual replica of the target computer provides a scanner access to the data needed to perform a scan on the second computer without accessing or being able to impact the target computer.Type: GrantFiled: August 31, 2017Date of Patent: April 14, 2020Assignee: Microsoft Technology Licensing, LLCInventors: Rebecca Jean Ochs, Ramesh Chinta, Amrita Satapathy, Jeffrey Cooperstein, Harini Parthasarathy, Scott Antony Field, Mohamed Rouatbi, Julian Federico Gonzalez
-
Publication number: 20190065754Abstract: Security risks associated with scanning a computer are at least mitigated by performing the scanning off node. State data of a target node, or computer, can be acquired in various ways. The acquired state data can be subsequently employed to generate a virtual replica of the target computer or portion thereof on a second computer isolated from the target computer. The virtual replica of the target computer provides a scanner access to the data needed to perform a scan on the second computer without accessing or being able to impact the target computer.Type: ApplicationFiled: August 31, 2017Publication date: February 28, 2019Inventors: Rebecca Jean Ochs, Ramesh Chinta, Amrita Satapathy, Jeffrey Cooperstein, Harini Parthasarathy, Scott Antony Field, Mohamed Rouatbi, Julian Federico Gonzalez
-
Patent number: 9002812Abstract: A resilient hashing system leverages a fast, non-cryptographic hash/checksum function that has good diffusion properties while remaining reasonably efficient on modern central processing units (CPUs). The hash function uses random secret data so that hash keys for particular data are difficult to predict. Due to its internal structure, well-chosen random secret data is difficult for an attacker to counter without having access to the direct output of the hash function. At every stage of the block function, there are at least two operations that can be performed in parallel, increasing performance on modern superscalar CPUs. Thus, the resilient hashing system provides a hash table and checksum that can be used in Internet-facing or other vulnerable sources of input data to manage performance in the face of malicious attacks.Type: GrantFiled: November 19, 2012Date of Patent: April 7, 2015Assignee: Microsoft Technology Licensing, LLCInventors: Niels Ferguson, Reid Borsuk, Jeffrey Cooperstein, Matthew Ellis
-
Publication number: 20130262421Abstract: A resilient hashing system leverages a fast, non-cryptographic hash/checksum function that has good diffusion properties while remaining reasonably efficient on modern central processing units (CPUs). The hash function uses random secret data so that hash keys for particular data are difficult to predict. Due to its internal structure, well-chosen random secret data is difficult for an attacker to counter without having access to the direct output of the hash function. At every stage of the block function, there are at least two operations that can be performed in parallel, increasing performance on modern superscalar CPUs. Thus, the resilient hashing system provides a hash table and checksum that can be used in Internet-facing or other vulnerable sources of input data to manage performance in the face of malicious attacks.Type: ApplicationFiled: November 19, 2012Publication date: October 3, 2013Applicant: MICROSOFT CORPORATIONInventors: Niels Ferguson, Reid Borsuk, Jeffrey Cooperstein, Matthew Ellis
-
Publication number: 20070050854Abstract: Access to a resource by sandboxed code is dynamically authorized by a client security system based on a resource based policy. A sandboxed application running on a client is granted access to a resource based on a resource based policy despite denial of the access based on a static policy associated with the client security system. The granting of access coincides with the determination that the threat to a user or the user's information is not increased should the access be granted.Type: ApplicationFiled: September 1, 2005Publication date: March 1, 2007Applicant: Microsoft CorporationInventors: Jeffrey Cooperstein, Aaron Goldfeder, Gregory Fee, John Hawkins, Venkatraman Kudallur
-
Publication number: 20060259763Abstract: Assertions for elevated privilege associated with transparent code may be ignored, prohibited, or modified.Type: ApplicationFiled: May 13, 2005Publication date: November 16, 2006Applicant: Microsoft CorporationInventors: Jeffrey Cooperstein, Charles Kaufman, Raja Krishnaswamy
-
Publication number: 20060242709Abstract: In accordance with the present invention, a system, method, and computer-readable medium for identifying malware in a request to a Web service is provided. One aspect of the present invention is a computer-implemented method for protecting a computer that provides a Web service from malware made in a Web request. When a request is received, an on-demand compilation system compiles high-level code associated with the request into binary code that may be executed. However, before the code is executed, antivirus software designed to identify malware scans the binary code for malware. If malware is identified, the antivirus software prevents the binary code associated with the request from being executed.Type: ApplicationFiled: April 21, 2005Publication date: October 26, 2006Applicant: Microsoft CorporationInventors: Marc Seinfeld, Adrian Marinescu, Charles Kaufman, Jeffrey Cooperstein, Michael Kramer
-
Publication number: 20060225053Abstract: Multiple software facilities are described. A property mapping facility enables a programming language compiler to map properties defined according to one property accessor style to another property accessor style. A reference mapping facility enables a programming language compiler to emit instructions that cause a parameter to a method to be provided by reference even when the programming language does not support providing parameters by reference. A type extension facility enables a programming language compiler to extend the number of declarative type modifiers that the compiler supports. A partial class facility enables a programming language compiler to postpone compiling a class marked as partial until the compiler can compile the entire class. A value type facility enables a programming language compiler to recognize “value data types” that offer advantages of both reference data types and primitive data types.Type: ApplicationFiled: October 21, 2005Publication date: October 5, 2006Applicant: Microsoft CorporationInventors: Pratap Lakshman, Jayteerth Katti, Sadagopan Rajaram, Gopi Madabhushi, Jeffrey Cooperstein
-
Publication number: 20060015854Abstract: A computer-implemented method for exposing instrumentation data available from within a managed code environment to an instrumentation data source executing outside of said managed code environment is presented. The method comprises each of the following. An indication is received that said instrumentation data should be exposed to said instrumentation data source. In response to receiving said indication, a decoupled provider is loaded. The decoupled provider facilitates communication between said managed code environment and said instrumentation data source. A determination is made as to whether schema describing said instrumentation data has been previously registered with said instrumentation data source. In response to determining that said schema has not been previously registered with said instrumentation data source, said schema is registered with said instrumentation data source through said decoupled provider.Type: ApplicationFiled: August 31, 2005Publication date: January 19, 2006Applicant: Microsoft CorporationInventors: Travis Muhlestein, Corina Feuerstein, Jeffrey Cooperstein
-
Publication number: 20050246716Abstract: An application program interface (API) provides a set of functions, including a set of base classes and types that are used in substantially all applications accessing the API, for application developers who build Web applications on Microsoft Corporation's .NET™ platform.Type: ApplicationFiled: June 23, 2005Publication date: November 3, 2005Applicant: Microsoft CorporationInventors: Adam Smith, Anthony Moore, Brian LaMacchia, Anders Hejlsberg, Brian Grunkemeyer, Caleb Doise, Christopher Brumme, Christopher Anderson, Corina Feuerstein, Craig Sinclair, Daniel Takacs, David Ebbo, David Driver, David Mortenson, Erik Christensen, Erik Olson, Fabio Yeon, Gopala Kakivaya, Gregory Fee, Hany Ramadan, Henry Sanders, Jayanth Rajan, Jeffrey Cooperstein, Jonathan Hawkins, James Hogg, Joe Long, John McConnell, Jesus Ruiz-Scougall, James Miller, Julie Bennett, Krzysztof Cwalina, Lance Olson, Loren Kohnfelder, Michael Magruder, Manish Prabhu, Radu Palanca, Raja Krishnaswamy, Shawn Burke, Sean Trowbridge, Seth Demsey, Shajan Dasan, Stefan Pharies, Suzanne Cook, Tarun Anand, Travis Muhlestein, Yann Christensen, Yung-shin Lin, Ramasamy Krishnaswamy, Joseph Roxe, Alan Boshier, David Bau
-
Publication number: 20050240943Abstract: An application program interface (API) provides a set of functions, including a set of base classes and types that are used in substantially all applications accessing the API, for application developers who build Web applications on Microsoft Corporation's .NET™ platform.Type: ApplicationFiled: June 23, 2005Publication date: October 27, 2005Applicant: Microsoft CorporationInventors: Adam Smith, Anthony Moore, Brian LaMacchia, Anders Hejlsberg, Biran Grunkemeyer, Caleb Doise, Christopher Brumme, Christopher Anderson, Corina Feuerstein, Craig Sinclair, Daniel Takacs, David Ebbo, David Driver, David Mortenson, Erik Christensen, Erik Olson, Fabio Yeon, Gopala Kakivaya, George Fee, Hany Ramadan, Henry Sanders, Jayanth Rajan, Jeffrey Cooperstein, Jonathan Hawkins, James Hogg, Joe Long, John McConnell, Jesus Ruiz-Scougall, James Miller, Julie Bennett, Krzysztof Cwalina, Lance Olson, Loren Kohnfelder, Michael Magruder, Manish Prabhu, Radu Palanca, Raja Krishnaswamy, Shawn Burke, Sean Trowbridge, Seth Demsey, Shajan Dasan, Stefan Pharies, Suzanne Cook, Tarun Anand, Travis Muhlestein, Yann Christensen, Yung-shin Lin, Ramasamy Krishnaswamy, Joseph Roxe, Alan Boshier, David Bau