Patents by Inventor Jeffrey Ide
Jeffrey Ide has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 11841936Abstract: Aspects of the present disclosure include systems and methods for generating and managing user authentication rules of a computing device. In an example, a computing device may include a memory storing instructions and a processor communicatively coupled with the memory and configured to execute the instructions. The processor may determine a state of the computing device, wherein the state of the computing device is one of a locked state or an unlocked state. The processor may determine a user authentication rule corresponding to the state of the computing device. The processor may also identify whether a combination of signals associated with the user authentication rule of the computing device are received by the computing device. The processor may also change or maintain the state of the computing device based on the combination of signals being received.Type: GrantFiled: January 7, 2022Date of Patent: December 12, 2023Assignee: Microsoft Technology Licensing, LLCInventors: Jing Zhang, Anshul Rawat, Craig Thomas McIntyre, Guillermo Enrique Rueda, Peter Gregory Davis, Nathan Jeffrey Ide, Ibrahim Mohammad Ismail, Pranav Kukreja
-
Publication number: 20230006880Abstract: Systems and methods providing a local edge authority platform that enables localized control of managed devices with selective cloud and occasional cloud connectivity are provided. The method includes receiving first configuration instructions from a first configuration authority for configuring a managed device; receiving second configuration instructions from a second configuration authority for configuring the managed device, wherein the first configuration authority is different than the second configuration authority; determining a conflict exists between the first configuration instructions and the second configuration instructions; resolving the conflict; and configuring the managed device based on the resolved conflict.Type: ApplicationFiled: June 30, 2021Publication date: January 5, 2023Inventors: Peter J. KAUFMAN, Feng YUE, Shayak LAHIRI, Sarah Eleni COOLEY, Shrivaths Rajagopalan IYENGAR, Matthew Wayman REYNOLDS, Anshul AGRAWAL, Joannier Pinales HEVIA, Nathan Jeffrey IDE, Peter John RICHARDS, Jeffrey Scott PINKSTON
-
Publication number: 20220318363Abstract: Aspects of the present disclosure include systems and methods for generating and managing user authentication rules of a computing device. In an example, a computing device may include a memory storing instructions and a processor communicatively coupled with the memory and configured to execute the instructions. The processor may determine a state of the computing device, wherein the state of the computing device is one of a locked state or an unlocked state. The processor may determine a user authentication rule corresponding to the state of the computing device. The processor may also identify whether a combination of signals associated with the user authentication rule of the computing device are received by the computing device. The processor may also change or maintain the state of the computing device based on the combination of signals being received.Type: ApplicationFiled: January 7, 2022Publication date: October 6, 2022Applicant: Microsoft Technology Licensing, LLCInventors: Jing ZHANG, Anshul RAWAT, Craig Thomas MCINTYRE, Guillermo Enrique RUEDA, Peter Gregory DAVIS, Nathan Jeffrey IDE, Ibrahim Mohammad ISMAIL, Pranav KUKREJA
-
Patent number: 11227044Abstract: Aspects of the present disclosure include systems and methods for generating and managing user authentication rules of a computing device. In an example, a computing device may include a memory storing instructions and a processor communicatively coupled with the memory and configured to execute the instructions. The processor may determine a state of the computing device, wherein the state of the computing device is one of a locked state or an unlocked state. The processor may determine a user authentication rule corresponding to the state of the computing device. The processor may also identify whether a combination of signals associated with the user authentication rule of the computing device are received by the computing device. The processor may also change or maintain the state of the computing device based on the combination of signals being received.Type: GrantFiled: August 22, 2019Date of Patent: January 18, 2022Assignee: MICROSOFT TECHNOLOGY LICENSING, LLCInventors: Jing Zhang, Anshul Rawat, Craig Thomas McIntyre, Guillermo Enrique Rueda, Peter Gregory Davis, Nathan Jeffrey Ide, Ibrahim Mohammad Ismail, Pranav Kukreja
-
Patent number: 11030298Abstract: Methods and devices for using candidate accounts on a computer device may include creating on the computer device, a candidate account representing a blank user profile for use on the computer device. The methods and devices may include automatically logging in the candidate account and locking the computer device. The methods and devices may include creating a user specific isolated environment on the computer device for the candidate account.Type: GrantFiled: April 8, 2019Date of Patent: June 8, 2021Assignee: Microsoft Technology Licensing, LLCInventors: Nathan Jeffrey Ide, Ibrahim Mohammad Ismail, Robert Bradley Gilbert, Haitao Wang, Matthew Jonathan Joplin
-
Publication number: 20210056190Abstract: Aspects of the present disclosure include systems and methods for generating and managing user authentication rules of a computing device. In an example, a computing device may include a memory storing instructions and a processor communicatively coupled with the memory and configured to execute the instructions. The processor may determine a state of the computing device, wherein the state of the computing device is one of a locked state or an unlocked state. The processor may determine a user authentication rule corresponding to the state of the computing device. The processor may also identify whether a combination of signals associated with the user authentication rule of the computing device are received by the computing device. The processor may also change or maintain the state of the computing device based on the combination of signals being received.Type: ApplicationFiled: August 22, 2019Publication date: February 25, 2021Inventors: Jing ZHANG, Anshul RAWAT, Craig Thomas MCINTYRE, Guillermo Enrique RUEDA, Peter Gregory DAVIS, Nathan Jeffrey IDE, Ibrahim Mohammad ISMAIL, Pranav KUKREJA
-
Publication number: 20200320187Abstract: Methods and devices for using candidate accounts on a computer device may include creating on the computer device, a candidate account representing a blank user profile for use on the computer device. The methods and devices may include automatically logging in the candidate account and locking the computer device. The methods and devices may include creating a user specific isolated environment on the computer device for the candidate account.Type: ApplicationFiled: April 8, 2019Publication date: October 8, 2020Inventors: Nathan Jeffrey Ide, Ibrahim Mohammad Ismail, Robert Bradley Gilbert, Haitao Wang, Matthew Jonathan Joplin
-
Publication number: 20160080293Abstract: The techniques discussed herein may facilitate user account management while also protecting a user's personally identifiable information (PII). The user's PII is stored in a protected area, such as a secure operating system area. The techniques may also implement a broker process to access a user's PII. The techniques display a user's accounts that are available for use with an application. The techniques further provide for passing a hint to the application upon receiving selection of an account, wherein the hint indicates which user account is selected, without divulging to the application any of the user's PII.Type: ApplicationFiled: September 12, 2014Publication date: March 17, 2016Inventors: Karanbir Singh, Saurav Sinha, Sanjay N. Mahida, Andy Liu, Gopinathan Kannan, Nathan Jeffrey Ide, Tony Ureche, Sainath Narendranath Thadkal, Alex Radutskiy, Eric M. Jia, Kanna Ramasubramanian, Yifan Wang
-
Patent number: 8522015Abstract: Presented is an anti-tampering method that validates and protects specific sections of a binary file. In one embodiment, this method permits a proxy engine to execute (via emulation by a virtual machine) the protected code on behalf of the binary in kernel mode upon successful completion of an integrity check. The integrity check can optionally check only the specific parts of code that the developer wishes to validate. The integrity check can cross binary boundaries. Moreover, the integrity check can be done on a hard drive or in memory. Furthermore, since the encrypted code is executed by the proxy engine in kernel mode, hackers are further deterred from modifying the code. Additionally, a method of creating a protected binary file is described herein.Type: GrantFiled: June 27, 2008Date of Patent: August 27, 2013Assignee: Microsoft CorporationInventors: Aaron Goldsmid, Ping Xie, Scott Miller, Nir Ben Zvi, Nathan Jeffrey Ide, Manoj R. Mehta
-
Patent number: 8010773Abstract: Restricting execution by a computing device of instructions within an application program. The application program is modified such that execution of the selected instructions is dependent upon a corresponding expected state of one or more hardware components in the computing device. In an embodiment, the application program is modified to place the hardware components in the expected states prior to execution of the corresponding selected instructions. Creating the dependency on the hardware components prevents the unintended or malicious execution of the selected instructions.Type: GrantFiled: June 24, 2008Date of Patent: August 30, 2011Assignee: Microsoft CorporationInventors: Hakki Tunc Bostanci, Nathan Jeffrey Ide, Matthias Hermann Wollnik, John Richard McDowell, Karan Singh Dhillon, Aaron Payne Goldsmid
-
Publication number: 20090327711Abstract: Presented is an anti-tampering method that validates and protects specific sections of a binary file. In one embodiment, this method permits a proxy engine to execute (via emulation by a virtual machine) the protected code on behalf of the binary in kernel mode upon successful completion of an integrity check. The integrity check can optionally check only the specific parts of code that the developer wishes to validate. The integrity check can cross binary boundaries. Moreover, the integrity check can be done on a hard drive or in memory. Furthermore, since the encrypted code is executed by the proxy engine in kernel mode, hackers are further deterred from modifying the code. Additionally, a method of creating a protected binary file is described herein.Type: ApplicationFiled: June 27, 2008Publication date: December 31, 2009Applicant: Microsoft CorporationInventors: Aaron Goldsmid, Ping Xie, Scott Miller, Nir Ben Zvi, Nathan Jeffrey Ide, Manoj R. Mehta
-
Publication number: 20090319761Abstract: Restricting execution by a computing device of instructions within an application program. The application program is modified such that execution of the selected instructions is dependent upon a corresponding expected state of one or more hardware components in the computing device. In an embodiment, the application program is modified to place the hardware components in the expected states prior to execution of the corresponding selected instructions. Creating the dependency on the hardware components prevents the unintended or malicious execution of the selected instructions.Type: ApplicationFiled: June 24, 2008Publication date: December 24, 2009Applicant: MICROSOFT CORPORATIONInventors: Hakki Tunc Bostanci, Nathan Jeffrey Ide, Matthias Hermann Wollnik, John Richard McDowell, Karan Singh Dhillon, Aaron Payne Goldsmid
-
Publication number: 20080229115Abstract: In an example embodiment, executable files are individually encrypted utilizing a symmetric cryptographic key. For each user to be given access to the obfuscated file, the symmetric cryptographic key is encrypted utilizing a public key of a respective public/private key pair. A different public key/private key pair is utilized for each user. Obfuscated files are formed comprising the encrypted executable files and a respective encrypted symmetric cryptographic key. The private keys of the public/private key pairs are stored on respective smart cards. The smart cards are distributed to the users. When a user wants to invoke the functionality of an obfuscated file, the user provides the private key via his/her smart card. The private key is retrieved and is utilized to decrypt the appropriate portion of the obfuscated file. The symmetric cryptographic key obtained therefrom is utilized to decrypt the encrypted executable file.Type: ApplicationFiled: March 16, 2007Publication date: September 18, 2008Applicant: Microsoft CorporationInventors: Matthias Hermann Wollnik, Nir Ben-Zvi, Aaron Goldsmid, Hakki Tunc Bostanci, Karan Singh Dhillon, Nathan Jeffrey Ide, John Richard McDowell, David John Linsley
-
Publication number: 20070015120Abstract: An apparatus for recording theme-based travel related events includes a set of display pieces, each configured to depict a scaled, specific geographic area and, when arranged in a predetermined orientation, collectively depict a larger, substantially contiguous geographic region. A display tray forms a flat display surface dimensioned to hold the entire set, or selective subsets of display pieces. A storage tray holds the unused display pieces. Magnets, adhesive and/or mechanical interlocks retain the individual display pieces on either the display or storage tray. A mounting frame holds the display tray for wall mounted viewing of the changing mosaic of display pieces and simultaneously stores the unused pieces. A partially pre-formatted travel ledger carried with the frame records key dates, locations and events.Type: ApplicationFiled: July 14, 2005Publication date: January 18, 2007Inventor: Jeffrey Ide