Patents by Inventor Josh D. Benaloh
Josh D. Benaloh has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 7788484Abstract: A hierarchical identity based cryptographic system (“HIBC”) is integrated with the domain name system (“DNS”). A private key is assigned to each of the top level domain name authorities responsible for assigning the top level domain names (e.g., .net, .com, etc.). The private key is generated according to an HIBC system, wherein the corresponding public key is based on the identity of the particular domain authority. When user requests a domain name from one of the top level domain name authorities, the user is issued a private key that is generated by the top level domain authority using its private key and the identity of the user according to the particular HIBC system implemented. The user's corresponding public key can be derived from the identity of the user and the public key of the top level domain name authority.Type: GrantFiled: November 30, 2005Date of Patent: August 31, 2010Assignee: Microsoft CorporationInventors: Cem Paya, Josh D. Benaloh
-
Patent number: 7770023Abstract: An exclusive encryption system is established using multiple computing devices. The exclusive encryption system allows for the exclusion of certain plaintext (e.g., by one of the computing devices) and ciphertext (e.g., by another of the computing devices) while at the same time maintaining the privacy created by the encryption (e.g., so the other computing device cannot see the plaintext). The exclusive encryption system may be implemented as part of a serverless distributed file system with directory entries (e.g., file names or folder names) being the plaintext, or alternatively as part of other systems.Type: GrantFiled: December 16, 2005Date of Patent: August 3, 2010Assignee: Microsoft CorporationInventors: John R. Douceur, Atul Adya, Josh D. Benaloh, Gideon A. Yuval
-
Patent number: 7685415Abstract: An exclusive encryption system is established using multiple computing devices. The exclusive encryption system allows for the exclusion of certain plaintext (e.g., by one of the computing devices) and ciphertext (e.g., by another of the computing devices) while at the same time maintaining the privacy created by the encryption (e.g., so the other computing device cannot see the plaintext). The exclusive encryption system may be implemented as part of a serverless distributed file system with directory entries (e.g., file names or folder names) being the plaintext, or alternatively as part of other systems.Type: GrantFiled: November 10, 2004Date of Patent: March 23, 2010Assignee: Microsoft CorporationInventors: John R. Douceur, Josh D. Benaloh, Gideon A. Yuval, Atul Adya
-
Patent number: 7676840Abstract: Machine instructions comprising a bootstrap code are buried within a critical component of an electronic game console where they cannot readily be accessed or modified. A preloader portion in a read only memory (ROM) is hashed by the bootstrap code and the result is compared to an expected hash value maintained in the bootstrap code. Further verification of the boot-up process is carried out by the preloader, which hashes the code in ROM to obtain a hash value for the code. The result is verified against a digital signature value that defines an expected value for this hash. Failure to obtain any expected result terminates the boot-up process. Since the bootstrap code confirms the preloader, and the preloader confirms the remainder of the code in ROM, this technique is useful for ensuring that the code used for booting up the device has not been modified or replaced.Type: GrantFiled: January 7, 2005Date of Patent: March 9, 2010Assignee: Microsoft CorporationInventors: Dinarte Morais, Jon Lange, Daniel R. Simon, Ling Tony Chen, Josh D. Benaloh
-
Patent number: 7634661Abstract: Manifest-based trusted agent management in a trusted operating system environment includes receiving a request to execute a process is received and setting up a virtual memory space for the process. Additionally, a manifest corresponding to the process is accessed, and which of a plurality of binaries can be executed in the virtual memory space is limited based on indicators, of the binaries, that are included in the manifest.Type: GrantFiled: August 18, 2005Date of Patent: December 15, 2009Assignee: Microsoft CorporationInventors: Paul England, Marcus Peinado, Daniel R. Simon, Josh D. Benaloh
-
Patent number: 7613302Abstract: Systems, methods and modulated data signals are described herein that provide an efficient way to derive a single key from which a user can extract virtually any number of data encryption keys. A database is logically divided into segments and a small prime number is associated with each segment. An encryption key is derived for each segment in the database and a key set is determined for distributing a data subset to a user. Each segment is encrypted with the corresponding encryption key. A single key is derived using the prime numbers associated with the data segments and the single key, the encrypted database, and a small amount of public information is provided to the user. The user utilizes this information to extract the encryption key set from the single key. One implementation utilizes a tree structure to significantly reduce the number of modular exponentiations that must be calculated when extracting the encryption keys.Type: GrantFiled: December 17, 2004Date of Patent: November 3, 2009Assignee: Microsoft CorporationInventor: Josh D. Benaloh
-
Patent number: 7603343Abstract: A system combines individual estimates of the subjective appeal of web pages into a combined rating for each web page that can be used to rank web pages during a web search. In a gaming implementation, a web page recipient estimates the combined rating that other recipients of the web page have formulated. The recipient can be rewarded for accurately estimating the combined rating by receiving a subsequent web page that possesses a high rating.Type: GrantFiled: February 4, 2005Date of Patent: October 13, 2009Assignee: Microsoft CorporationInventors: Luis von Ahn Arellano, Josh D. Benaloh
-
Patent number: 7602910Abstract: Systems and methods for password protection are described. In one aspect, an asymmetric key pair is deterministically formed by combining a password and other data. The public key of the asymmetric key pair is exported to an external device. The private key of the asymmetric key pair is used to effect subsequent authentications to the external device.Type: GrantFiled: November 17, 2004Date of Patent: October 13, 2009Assignee: Microsoft CorporationInventors: Jesper M Johansson, Josh D. Benaloh
-
Publication number: 20090222900Abstract: Computer-readable media, systems, and methods for validating an authentication ticket to ensure authenticated communications between a client and an online service provider. In embodiments an authentication request is received from a user agent associated with the client and the authentication request includes a set of identification information and a set of authentication information. Additionally, it is determined that the set of identification information and the set of authentication information are associated with a user and an authentication ticket is created including a user identification and an authentication, indicating to the online service provider that the user is authenticated to access one or more online services. Further, a validation token is embedded into the authentication ticket that provides enhanced verification that the access provided by the online service provider is authenticated.Type: ApplicationFiled: February 29, 2008Publication date: September 3, 2009Applicant: MICROSOFT CORPORATIONInventors: JOSH D. BENALOH, ISMAIL CEM PAYA
-
Patent number: 7577839Abstract: Transferring application secrets in a trusted operating system environment involves receiving a request to transfer application data from a source computing device to a destination computing device. A check is made as to whether the application data can be transferred to the destination computing device, and if so, whether the application data can be transferred under control of the user or a third party. If these checks succeed, a check is also made as to whether the destination computing device is a trustworthy device running known trustworthy software. Input is also received from the appropriate one of the user or third party to control transferring of the application data to the destination computing device. Furthermore, application data is stored on the source computing device in a manner that facilitates determining whether the application data can be transferred, and that facilitates transferring the application data if it can be transferred.Type: GrantFiled: February 28, 2005Date of Patent: August 18, 2009Assignee: Microsoft CorporationInventors: Paul England, Marcus Peinado, Daniel R. Simon, Josh D. Benaloh
-
Patent number: 7577840Abstract: Transferring application secrets in a trusted operating system environment involves receiving a request to transfer application data from a source computing device to a destination computing device. A check is made as to whether the application data can be transferred to the destination computing device, and if so, whether the application data can be transferred under control of the user or a third party. If these checks succeed, a check is also made as to whether the destination computing device is a trustworthy device running known trustworthy software. Input is also received from the appropriate one of the user or third party to control transferring of the application data to the destination computing device. Furthermore, application data is stored on the source computing device in a manner that facilitates determining whether the application data can be transferred, and that facilitates transferring the application data if it can be transferred.Type: GrantFiled: February 28, 2005Date of Patent: August 18, 2009Assignee: Microsoft CorporationInventors: Paul England, Marcus Peinado, Daniel R. Simon, Josh D. Benaloh
-
Patent number: 7571327Abstract: An exclusive encryption system is established using multiple computing devices. The exclusive encryption system allows for the exclusion of certain plaintext (e.g., by one of the computing devices) and ciphertext (e.g., by another of the computing devices) while at the same time maintaining the privacy created by the encryption (e.g., so the other computing device cannot see the plaintext). The exclusive encryption system may be implemented as part of a serverless distributed file system with directory entries (e.g., file names or folder names) being the plaintext, or alternatively as part of other systems.Type: GrantFiled: November 10, 2004Date of Patent: August 4, 2009Assignee: Microsoft CorporationInventors: John R. Douceur, Josh D. Benaloh, Gideon A. Yuval, Atul Adya
-
Patent number: 7555656Abstract: An exclusive encryption system is established using multiple computing devices. The exclusive encryption system allows for the exclusion of certain plaintext (e.g., by one of the computing devices) and ciphertext (e.g., by another of the computing devices) while at the same time maintaining the privacy created by the encryption (e.g., so the other computing device cannot see the plaintext). The exclusive encryption system may be implemented as part of a serverless distributed file system with directory entries (e.g., file names or folder names) being the plaintext, or alternatively as part of other systems.Type: GrantFiled: November 10, 2004Date of Patent: June 30, 2009Assignee: Microsoft CorporationInventors: John R. Douceur, Josh D. Benaloh, Gideon A. Yuval, Atul Adya
-
Publication number: 20090164795Abstract: A system for providing a client's credentials to a computer program comprises a database remote from the client and a single signon server module. The single signon server module can receive a request for the client's credentials from the computer program, determine whether the client's credentials are stored in the database, and send the client's credentials from the database to the computer program in response to a determination that the client's credentials are stored in the database. The single signon server module can store the client's credentials in the database in response to a determination that the client's credentials are not stored in the database. The single signon server module can encrypt the client's credentials prior to storing the client's credentials in the database and can decrypt the client's credentials prior to sending the client's credentials to the computer program.Type: ApplicationFiled: June 27, 2008Publication date: June 25, 2009Applicant: Microsoft CorporationInventors: Dean Jason Justus, Josh D. Benaloh, Nathan James Fink, Michael Howard, Daniel R. Simon, Matthew William Thomlinson
-
Patent number: 7549063Abstract: Methods and systems are described that enable protection of digital content, such as movies and the like, by making pirated copies traceable back to a unique decryption key that was utilized to decrypt the originally encrypted content. The innovative advancements do not rely on post-distribution watermarking or fingerprinting techniques, and yet intrinsically link any unauthorized copies back to a unique cryptographic key or key collection that was used when the genuine copy was reproduced. In an example, when a content player decrypts its associated key collection and uses the key collection to decrypt the digital content, the version of the digital content that is decrypted points directly to the specific content-player that was authorized to decrypt it with that key collection.Type: GrantFiled: July 28, 2005Date of Patent: June 16, 2009Assignee: Microsoft CorporationInventors: Josh D. Benaloh, Andrew D. Rosen, Gideon A. Yuval
-
Patent number: 7536016Abstract: Described herein are one or more implementations that generate and encrypted content data structure package and/or data tree.Type: GrantFiled: September 28, 2005Date of Patent: May 19, 2009Assignee: Microsoft CorporationInventor: Josh D. Benaloh
-
Patent number: 7533419Abstract: A human interactive proof (HIP) service is described. In response to a request from a web server, the HIP service generates a HIP challenge and an associated attestation. The web server can then embed the generated HIP challenge in a requested web page. The attestation is used to determine whether or not a user response to the HIP challenge is correct.Type: GrantFiled: October 29, 2004Date of Patent: May 12, 2009Assignee: Microsoft CorporationInventors: Ismail Cem Paya, Josh D. Benaloh, Raja P. Perumal, Trevin M Chow, Erren Dusan Lester, Jeffrey Steinbok, Julien D. Couvreur
-
Patent number: 7475258Abstract: An exclusive encryption system is established using multiple computing devices. The exclusive encryption system allows for the exclusion of certain plaintext (e.g., by one of the computing devices) and ciphertext (e.g., by another of the computing devices) while at the same time maintaining the privacy created by the encryption (e.g., so the other computing device cannot see the plaintext). The exclusive encryption system may be implemented as part of a serverless distributed file system with directory entries (e.g., file names or folder names) being the plaintext, or alternatively as part of other systems.Type: GrantFiled: December 19, 2005Date of Patent: January 6, 2009Assignee: Microsoft CorporationInventors: John R. Douceur, Josh D. Benaloh, Gideon A. Yuval, Atul Adya
-
Patent number: 7382883Abstract: One aspect relates to a process and associated device that provides a private key of an asymmetric key pair in a key device. A symmetric master key is derived from the private key of the asymmetric key pair. The symmetric master key is stored in a computer memory location. The symmetric master key is used to encrypt or decrypt a file encryption key. The file encryption key can encrypt or decrypt files. In another aspect, the user can still access the files even if a user deactivates the key device by encrypting or decrypting the file encryption key directly from the symmetric master key.Type: GrantFiled: December 14, 2006Date of Patent: June 3, 2008Assignee: Microsoft CorporationInventors: David B. Cross, Jianrong Gu, Josh D. Benaloh, Thomas C. Jones, Paul J. Leach, Glenn D. Pittaway
-
Patent number: 7305553Abstract: Manifest-based trusted agent management in a trusted operating system environment includes receiving a request to execute a process is received and setting up a virtual memory space for the process. Additionally, a manifest corresponding to the process is accessed, and which of a plurality of binaries can be executed in the virtual memory space is limited based on indicators, of the binaries, that are included in the manifest.Type: GrantFiled: August 18, 2005Date of Patent: December 4, 2007Assignee: Microsoft CorporationInventors: Paul England, Marcus Peinado, Daniel R. Simon, Josh D. Benaloh