Patents by Inventor Josh D. Benaloh

Josh D. Benaloh has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 7257707
    Abstract: Manifest-based trusted agent management in a trusted operating system environment includes receiving a request to execute a process is received and setting up a virtual memory space for the process. Additionally, a manifest corresponding to the process is accessed, and which of a plurality of binaries can be executed in the virtual memory space is limited based on indicators, of the binaries, that are included in the manifest.
    Type: Grant
    Filed: August 18, 2005
    Date of Patent: August 14, 2007
    Assignee: Microsoft Corporation
    Inventors: Paul England, Marcus Peinado, Daniel R. Simon, Josh D. Benaloh
  • Patent number: 7243230
    Abstract: Transferring application secrets in a trusted operating system environment involves receiving a request to transfer application data from a source computing device to a destination computing device. A check is made as to whether the application data can be transferred to the destination computing device, and if so, whether the application data can be transferred under control of the user or a third party. If these checks succeed, a check is also made as to whether the destination computing device is a trustworthy device running known trustworthy software. Input is also received from the appropriate one of the user or third party to control transferring of the application data to the destination computing device. Furthermore, application data is stored on the source computing device in a manner that facilitates determining whether the application data can be transferred, and that facilitates transferring the application data if it can be transferred.
    Type: Grant
    Filed: November 16, 2001
    Date of Patent: July 10, 2007
    Assignee: Microsoft Corporation
    Inventors: Paul England, Marcus Peinado, Daniel R. Simon, Josh D. Benaloh
  • Patent number: 7181016
    Abstract: One aspect relates to a process and associated device that provides a private key of an asymmetric key pair in a key device. A symmetric master key is derived from the private key of the asymmetric key pair. The symmetric master key is stored in a computer memory location. The symmetric master key is used to encrypt or decrypt a file encryption key. The file encryption key can encrypt or decrypt files. In another aspect, the user can still access the files even if a user deactivates the key device by encrypting or decrypting the file encryption key directly from the symmetric master key.
    Type: Grant
    Filed: January 27, 2003
    Date of Patent: February 20, 2007
    Assignee: Microsoft Corporation
    Inventors: David B. Cross, Jianrong Gu, Josh D. Benaloh, Thomas C. Jones, Paul J. Leach, Glenn D. Pittaway
  • Patent number: 7159240
    Abstract: Operating system upgrades in a trusted operating system environment allow a current trusted core of an operating system installed on a computing device to be upgraded to a new trusted core. The new trusted core is allowed to access application data previously securely stored by the current trusted core only if it can be verified that the new trusted core is the new trusted core expected by the current trusted core. In accordance with one implementation, the new trusted core is allowed to access only selected application data previously securely stored by the current trusted core.
    Type: Grant
    Filed: November 16, 2001
    Date of Patent: January 2, 2007
    Assignee: Microsoft Corporation
    Inventors: Paul England, Marcus Peinado, Daniel R. Simon, Josh D. Benaloh
  • Patent number: 7158639
    Abstract: Described herein is one or more implementations that generate a single key from a set of encrypted keys, which set is associated with a unique data subset of a database.
    Type: Grant
    Filed: November 5, 2004
    Date of Patent: January 2, 2007
    Assignee: Microsoft Corporation
    Inventor: Josh D. Benaloh
  • Patent number: 7137004
    Abstract: Manifest-based trusted agent management in a trusted operating system environment includes receiving a request to execute a process is received and setting up a virtual memory space for the process. Additionally, a manifest corresponding to the process is accessed, and which of a plurality of binaries can be executed in the virtual memory space is limited based on indicators, of the binaries, that are included in the manifest.
    Type: Grant
    Filed: November 16, 2001
    Date of Patent: November 14, 2006
    Assignee: Microsoft Corporation
    Inventors: Paul England, Marcus Peinado, Daniel R. Simon, Josh D. Benaloh
  • Patent number: 7107463
    Abstract: Manifest-based trusted agent management in a trusted operating system environment includes receiving a request to execute a process is received and setting up a virtual memory space for the process. Additionally, a manifest corresponding to the process is accessed, and which of a plurality of binaries can be executed in the virtual memory space is limited based on indicators, of the binaries, that are included in the manifest.
    Type: Grant
    Filed: August 18, 2005
    Date of Patent: September 12, 2006
    Assignee: Microsoft Corporation
    Inventors: Paul England, Marcus Peinado, Daniel R. Simon, Josh D. Benaloh
  • Patent number: 7080262
    Abstract: Described herein is one or more implementations for compressing one or more keys.
    Type: Grant
    Filed: November 5, 2004
    Date of Patent: July 18, 2006
    Assignee: Microsoft Corporation
    Inventor: Josh D. Benaloh
  • Patent number: 7069450
    Abstract: Systems, methods and modulated data signals are described herein that provide an efficient way to derive a single key from which a user can extract virtually any number of data encryption keys. A database is logically divided into segments and a small prime number is associated with each segment. An encryption key is derived for each segment in the database and a key set is determined for distributing a data subset to a user. Each segment is encrypted with the corresponding encryption key. A single key is derived using the prime numbers associated with the data segments and the single key, the encrypted database, and a small amount of public information is provided to the user. The user utilizes this information to extract the encryption key set from the single key. One implementation utilizes a tree structure to significantly reduce the number of modular exponentiations that must be calculated when extracting the encryption keys.
    Type: Grant
    Filed: December 17, 2004
    Date of Patent: June 27, 2006
    Inventor: Josh D. Benaloh
  • Patent number: 7065216
    Abstract: Methods and systems are described that enable protection of digital content, such as movies and the like, by making pirated copies traceable back to a unique decryption key that was utilized to decrypt the originally encrypted content. Various embodiments can intrinsically link any unauthorized copies back to a unique cryptographic key or key collection that was used when the genuine copy was reproduced.
    Type: Grant
    Filed: August 11, 2000
    Date of Patent: June 20, 2006
    Assignee: Microsoft Corporation
    Inventors: Josh D. Benaloh, Andrew D. Rosen, Gideon A. Yuval
  • Patent number: 7047420
    Abstract: An exclusive encryption system is established using multiple computing devices. The exclusive encryption system allows for the exclusion of certain plaintext (e.g., by one of the computing devices) and ciphertext (e.g., by another of the computing devices) while at the same time maintaining the privacy created by the encryption (e.g., so the other computing device cannot see the plaintext). The exclusive encryption system may be implemented as part of a serverless distributed file system with directory entries (e.g., file names or folder names) being the plaintext, or alternatively as part of other systems.
    Type: Grant
    Filed: January 17, 2001
    Date of Patent: May 16, 2006
    Assignee: Microsoft Corporation
    Inventors: John R. Douceur, Josh D. Benaloh, Gideon A. Yuval, Atul Adya
  • Patent number: 7047421
    Abstract: Described herein are one or more data signal implementations having at least a database and a compressed key.
    Type: Grant
    Filed: November 5, 2004
    Date of Patent: May 16, 2006
    Assignee: Microsoft Corporation
    Inventor: Josh D. Benaloh
  • Patent number: 7047422
    Abstract: Described herein is one or more implementations for allowing a user access to a unique data subset of a database.
    Type: Grant
    Filed: November 5, 2004
    Date of Patent: May 16, 2006
    Assignee: Microsoft Corporation
    Inventor: Josh D. Benaloh
  • Patent number: 7003675
    Abstract: Described herein are one or more implementations that generate and encrypted content data structure package and/or data tree.
    Type: Grant
    Filed: November 5, 2004
    Date of Patent: February 21, 2006
    Assignee: Microsoft Corporation
    Inventor: Josh D. Benaloh
  • Patent number: 6956947
    Abstract: Described herein are one or more implementations for extracting multiple single keys from a compressed key, each single key corresponding to a segment in a unique data subset of a database.
    Type: Grant
    Filed: November 5, 2004
    Date of Patent: October 18, 2005
    Assignee: Microsoft Corporation
    Inventor: Josh D. Benaloh
  • Patent number: 6907522
    Abstract: Machine instructions comprising a bootstrap code are buried within a critical component of an electronic game console where they cannot readily be accessed or modified. A preloader portion in a read only memory (ROM) is hashed by the bootstrap code and the result is compared to an expected hash value maintained in the bootstrap code. Further verification of the boot-up process is carried out by the preloader, which hashes the code in ROM to obtain a hash value for the code. The result is verified against a digital signature value that defines an expected value for this hash. Failure to obtain any expected result terminates the boot-up process. Since the bootstrap code confirms the preloader, and the preloader confirms the remainder of the code in ROM, this technique is useful for ensuring that the code used for booting up the device has not been modified or replaced.
    Type: Grant
    Filed: June 7, 2002
    Date of Patent: June 14, 2005
    Assignee: Microsoft Corporation
    Inventors: Dinarte Morais, Jon Lange, Daniel R. Simon, Ling Tony Chen, Josh D. Benaloh
  • Patent number: 6886098
    Abstract: Systems, methods and a modulated data signal are described herein that provide an efficient way to derive a single key from which a user can extract virtually any number of data encryption keys. A database is logically divided into segments and a small prime number is associated with each segment. An encryption key is derived for each segment in the database and a key set is determined for distributing a data subset to a user. Each segment is encrypted with the corresponding encryption key. A single key is derived using the prime numbers associated with the data segments and the single key, the encrypted database, and a small amount of public information is provided to the user. The user utilizes this information to extract the encryption key set from the single key. One implementation utilizes a tree structure to significantly reduce the number of modular exponentiations that must be calculated when extracting the encryption keys.
    Type: Grant
    Filed: August 12, 2000
    Date of Patent: April 26, 2005
    Assignee: Microsoft Corporation
    Inventor: Josh D. Benaloh
  • Publication number: 20040146015
    Abstract: One aspect relates to a process and associated device that provides a private key of an asymmetric key pair in a key device. A symmetric master key is derived from the private key of the asymmetric key pair. The symmetric master key is stored in a computer memory location. The symmetric master key is used to encrypt or decrypt a file encryption key. The file encryption key can encrypt or decrypt files. In another aspect, the user can still access the files even if a user deactivates the key device by encrypting or decrypting the file encryption key directly from the symmetric master key.
    Type: Application
    Filed: January 27, 2003
    Publication date: July 29, 2004
    Inventors: David B. Cross, Jianrong Gu, Josh D. Benaloh, Thomas C. Jones, Paul J. Leach, Glenn D. Pittaway
  • Publication number: 20040003081
    Abstract: A system for providing a client's credentials to a computer program comprises a database remote from the client and a single signon server module. The single signon server module can receive a request for the client's credentials from the computer program, determine whether the client's credentials are stored in the database, and send the client's credentials from the database to the computer program in response to a determination that the client's credentials are stored in the database. The single signon server module can store the client's credentials in the database in response to a determination that the client's credentials are not stored in the database. The single signon server module can encrypt the client's credentials prior to storing the client's credentials in the database and can decrypt the client's credentials prior to sending the client's credentials to the computer program.
    Type: Application
    Filed: June 26, 2002
    Publication date: January 1, 2004
    Applicant: Microsoft Corporation
    Inventors: Dean Jason Justus, Josh D. Benaloh, Nathan James Fink, Michael Howard, Daniel R. Simon, Matthew William Thomlinson
  • Publication number: 20030233542
    Abstract: An authentication mechanism uses a selectively disclosable digital certificate that gives the user strong control over what authenticated data is released to whom without allowing even a third-party certifying authority to determine precisely what data is being disclosed. In one implementation, the selectively disclosable digital certificate has multiple data fields to hold associated data items pertaining to the user. The certifying authority obfuscates the data items prior to storage in the fields. The data items are obfuscated in such a manner that data items in corresponding fields can be selectively exposed without exposing other non-selected data items in other fields of the certificate. When the user enters a transaction that involves authentication, the user submits the digital certificate together with the capabilities to expose selected data items in selected fields.
    Type: Application
    Filed: June 18, 2002
    Publication date: December 18, 2003
    Inventor: Josh D. Benaloh