Patents by Inventor Joerg-Thomas Pfenning
Joerg-Thomas Pfenning has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 11962694Abstract: A computing device, such as a personal computing device (e.g., laptop, smartphone, etc.) or server, is configured to utilize environmental factors in generating public/private key pairs to access restricted data or operations. The environmental factors can include location, time, barometric pressure, acceleration, temperature, humidity, and the like. An initial key pair may be used to encrypt data and enable other conventional security features. A key pair can be subsequently generated based on the same environmental factors as with the initial key pair generation and used to access the data or operations which have been restricted using the initial key pair.Type: GrantFiled: November 29, 2021Date of Patent: April 16, 2024Assignee: MICROSOFT TECHNOLOGY LICENSING, LLCInventors: David Garfield Thaler, III, Joerg-Thomas Pfenning, Gerardo Diaz-Cuellar
-
Patent number: 11695650Abstract: Inducements are provided to customers to regularly connect back to a service provider and report usage that is expressed using a count of requests from a local computing device for cloud-based operations such as packet routing, container instantiation, virtual machine (VM) utilization, calls to a service or application, and the like. The count information is reported within a secure context, such as a trusted execution environment (TEE), using public-private key pair cryptography by which key derivation is dependent on some form of counting. For example, a customer computing device that is subject to a usage license encrypts an operation count and reports it to the service provider.Type: GrantFiled: February 21, 2021Date of Patent: July 4, 2023Assignee: Microsoft Technology Licensing, LLCInventors: Gerardo Diaz-Cuellar, Stefan Thom, Joerg-Thomas Pfenning
-
Publication number: 20220085995Abstract: A computing device, such as a personal computing device (e.g., laptop, smartphone, etc.) or server, is configured to utilize environmental factors in generating public/private key pairs to access restricted data or operations. The environmental factors can include location, time, barometric pressure, acceleration, temperature, humidity, and the like. An initial key pair may be used to encrypt data and enable other conventional security features. A key pair can be subsequently generated based on the same environmental factors as with the initial key pair generation and used to access the data or operations which have been restricted using the initial key pair.Type: ApplicationFiled: November 29, 2021Publication date: March 17, 2022Inventors: David Garfield THALER, III, Joerg-Thomas PFENNING, Gerardo DIAZ-CUELLAR
-
Patent number: 11190352Abstract: A computing device, such as a personal computing device (e.g., laptop, smartphone, etc.) or server, is configured to utilize environmental factors in generating public/private key pairs to access restricted data or operations. The environmental factors can include location, time, barometric pressure, acceleration, temperature, humidity, and the like. An initial key pair may be used to encrypt data and enable other conventional security features. A key pair can be subsequently generated based on the same environmental factors as with the initial key pair generation and used to access the data or operations which have been restricted using the initial key pair.Type: GrantFiled: November 27, 2018Date of Patent: November 30, 2021Assignee: Microsoft Technology Licensing, LLCInventors: David Garfield Thaler, III, Joerg-Thomas Pfenning, Gerardo Diaz-Cuellar
-
Publication number: 20210176141Abstract: Inducements are provided to customers to regularly connect back to a service provider and report usage that is expressed using a count of requests from a local computing device for cloud-based operations such as packet routing, container instantiation, virtual machine (VM) utilization, calls to a service or application, and the like. The count information is reported within a secure context, such as a trusted execution environment (TEE), using public-private key pair cryptography by which key derivation is dependent on some form of counting. For example, a customer computing device that is subject to a usage license encrypts an operation count and reports it to the service provider.Type: ApplicationFiled: February 21, 2021Publication date: June 10, 2021Inventors: Gerardo DIAZ-CUELLAR, Stefan THOM, Joerg-Thomas PFENNING
-
Patent number: 10965551Abstract: Inducements are provided to customers to regularly connect back to a service provider and report usage that is expressed using a count of requests from a local computing device for cloud-based operations such as packet routing, container instantiation, virtual machine (VM) utilization, calls to a service or application, and the like. The count information is reported within a secure context, such as a trusted execution environment (TEE), using public-private key pair cryptography by which key derivation is dependent on some form of counting. For example, a customer computing device that is subject to a usage license encrypts an operation count and reports it to the service provider.Type: GrantFiled: November 21, 2018Date of Patent: March 30, 2021Assignee: Microsoft Technology Licensing, LLCInventors: Gerardo Diaz-Cuellar, Stefan Thom, Joerg-Thomas Pfenning
-
Publication number: 20200169400Abstract: A computing device, such as a personal computing device (e.g., laptop, smartphone, etc.) or server, is configured to utilize environmental factors in generating public/private key pairs to access restricted data or operations. The environmental factors can include location, time, barometric pressure, acceleration, temperature, humidity, and the like. An initial key pair may be used to encrypt data and enable other conventional security features. A key pair can be subsequently generated based on the same environmental factors as with the initial key pair generation and used to access the data or operations which have been restricted using the initial key pair.Type: ApplicationFiled: November 27, 2018Publication date: May 28, 2020Inventors: David Garfield THALER, III, Joerg-Thomas PFENNING, Gerardo DIAZ-CUELLAR
-
Publication number: 20200162346Abstract: Inducements are provided to customers to regularly connect back to a service provider and report usage that is expressed using a count of requests from a local computing device for cloud-based operations such as packet routing, container instantiation, virtual machine (VM) utilization, calls to a service or application, and the like. The count information is reported within a secure context, such as a trusted execution environment (TEE), using public-private key pair cryptography by which key derivation is dependent on some form of counting. For example, a customer computing device that is subject to a usage license encrypts an operation count and reports it to the service provider.Type: ApplicationFiled: November 21, 2018Publication date: May 21, 2020Inventors: Gerardo DIAZ-CUELLAR, Stefan THOM, Joerg-Thomas PFENNING
-
Patent number: 8645335Abstract: The subject disclosure is directed towards changing a file from a fully deduplicated state to a partially deduplicated state in which some of the file data is deduplicated in a chunk store, and some is recalled into the file, that is, in the file's storage volume. A partial recall mechanism such as in a file system filter tracks (e.g., via a bitmap in a file reparse point) whether file data is maintained in the chunk store or has been recalled to the file. Data is recalled from the chunk store as needed, and committed (e.g., flushed) to the file. Also described is efficiently returning the file to a fully deduplicated state by using the tracking information to determine which parts of the file are already deduplicated into the chunk store so as to avoid their further deduplication processing.Type: GrantFiled: December 16, 2010Date of Patent: February 4, 2014Assignee: Microsoft CorporationInventors: Abhishek Gupta, Ran Kalach, Chun Ho Cheung, James Robert Benton, Joerg-Thomas Pfenning
-
Publication number: 20120158675Abstract: The subject disclosure is directed towards changing a file from a fully deduplicated state to a partially deduplicated state in which some of the file data is deduplicated in a chunk store, and some is recalled into the file, that is, in the file's storage volume. A partial recall mechanism such as in a file system filter tracks (e.g., via a bitmap in a file reparse point) whether file data is maintained in the chunk store or has been recalled to the file. Data is recalled from the chunk store as needed, and committed (e.g., flushed) to the file. Also described is efficiently returning the file to a fully deduplicated state by using the tracking information to determine which parts of the file are already deduplicated into the chunk store so as to avoid their further deduplication processing.Type: ApplicationFiled: December 16, 2010Publication date: June 21, 2012Applicant: MICROSOFT CORPORATIONInventors: Abhishek Gupta, Ran Kalach, Chun Ho Cheung, James Robert Benton, Joerg-Thomas Pfenning
-
Publication number: 20110314070Abstract: The present invention extends to methods, systems, and computer program products for end-to-end optimization of data storage and transmission of data. Details of how data is stored within a data store are exposed to clients and applications. Clients and applications are enabled to makes requests to data stores to obtain data as it is actually stored upon within the data store to eliminate redundant processing of the requested data. Compression and de-duplication of data within a data store are leveraged to increase the efficiency and reduce latency of data transmitted over a LAN or WAN.Type: ApplicationFiled: June 18, 2010Publication date: December 22, 2011Applicant: Microsoft CorporationInventors: Eileen C. Brown, Thomas E. Jolly, Joerg-Thomas Pfenning
-
Patent number: 7778282Abstract: A sync community may include a group of synchronization endpoints. When two synchronization endpoints of the sync community synchronize with one another, a synchronization data conflict may be detected when the two synchronization endpoints make a change to a same particular data item and the two synchronization endpoints were unaware of the changes to the same particular data item made by the other respective synchronization endpoint at the time the changes were made. Resolution of the detected synchronization data conflict may be delayed and data indicative of the detected synchronization data conflict may be propagated to other synchronization endpoints during a synchronization operation.Type: GrantFiled: December 18, 2006Date of Patent: August 17, 2010Assignee: Microsoft CorporationInventors: Oliver Lee, Michael Scott Beckerman, Michael Ray Clark, Moe Khosravy, Lev Novik, Jörg-Thomas Pfenning
-
Patent number: 7620659Abstract: A variety of flexible conflict resolution policies are provided for loosely coupled devices to implement according to a variety of different synchronization scenarios. Choosing a conflict resolution policy, such as “Most Frequent Updater,” “Priority,” “PerCent Change,” “Arbiter Deadlock Resolution,” etc., enables devices to select how and when to resolve such synchronization conflicts. In addition, with reference to a conflict log, a user or synchronizing application can roll back synchronization state to a time before a conflict may have arisen, so that the user or application can undo a resolution of a conflict and/or the user or application can apply an alternative conflict resolution policy moving forward from that time.Type: GrantFiled: February 9, 2007Date of Patent: November 17, 2009Assignee: Microsoft CorporationInventors: Lev Novik, Michael Scott Beckerman, Michael Ray Clark, Moe Khosravy, Sean Michael Kelley, Jörg-Thomas Pfenning