Patents by Inventor Kenneth D. Ray

Kenneth D. Ray has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 9305161
    Abstract: A password hardening system is arranged between one or more clients and a domain controller or other authentication entity. The password hardening system comprises a plurality of servers configured to store in a distributed manner respective shares of at least one of a hardened surrogate password and a corresponding user password. The password hardening system is configured to intercept a first set of one or more communications based at least in part on the user password and directed to an authentication entity external to the password hardening system, and to provide to the authentication entity in place of at least a portion of the intercepted first set of one or more communications a second set of one or more communications based at least in part on the hardened surrogate password. The password hardening system may be configured to serve as a proxy between an authenticating client and the authentication entity.
    Type: Grant
    Filed: June 24, 2013
    Date of Patent: April 5, 2016
    Assignee: EMC Corporation
    Inventors: Ari Juels, Kenneth D. Ray, Gareth Richards
  • Publication number: 20160080399
    Abstract: Threat detection instrumentation is simplified by providing and updating labels for computing objects in a context-sensitive manner. This may include simple labeling schemes to distinguish between objects, e.g., trusted/untrusted processes or corporate/private data. This may also include more granular labeling schemes such as a three-tiered scheme that identifies a category (e.g., financial, e-mail, game), static threat detection attributes (e.g., signatures, hashes, API calls), and explicit identification (e.g., what a file or process calls itself). By tracking such data for various computing objects and correlating these labels to malware occurrences, rules can be written for distribution to endpoints to facilitate threat detection based on, e.g., interactions of labeled objects, changes to object labels, and so forth.
    Type: Application
    Filed: September 14, 2014
    Publication date: March 17, 2016
    Inventors: Mark D. Harris, Simon Neil Reed, Kenneth D. Ray, Neil Robert Tyndale Watkiss, Andrew J. Thomas, Robert W. Cook
  • Publication number: 20160080420
    Abstract: Threat detection instrumentation is simplified by providing and updating labels for computing objects in a context-sensitive manner. This may include simple labeling schemes to distinguish between objects, e.g., trusted/untrusted processes or corporate/private data. This may also include more granular labeling schemes such as a three-tiered scheme that identifies a category (e.g., financial, e-mail, game), static threat detection attributes (e.g., signatures, hashes, API calls), and explicit identification (e.g., what a file or process calls itself). By tracking such data for various computing objects and correlating these labels to malware occurrences, rules can be written for distribution to endpoints to facilitate threat detection based on, e.g., interactions of labeled objects, changes to object labels, and so forth.
    Type: Application
    Filed: September 14, 2014
    Publication date: March 17, 2016
    Inventors: Kenneth D. Ray, Simon Neil Reed, Mark D. Harris, Neil Robert Tyndale Watkiss, Andrew J. Thomas, Robert W. Cook, Dmitri Samosseiko
  • Publication number: 20160080419
    Abstract: Threat detection instrumentation is simplified by providing and updating labels for computing objects in a context-sensitive manner. This may include simple labeling schemes to distinguish between objects, e.g., trusted/untrusted processes or corporate/private data. This may also include more granular labeling schemes such as a three-tiered scheme that identifies a category (e.g., financial, e-mail, game), static threat detection attributes (e.g., signatures, hashes, API calls), and explicit identification (e.g., what a file or process calls itself). By tracking such data for various computing objects and correlating these labels to malware occurrences, rules can be written for distribution to endpoints to facilitate threat detection based on, e.g., interactions of labeled objects, changes to object labels, and so forth.
    Type: Application
    Filed: September 14, 2014
    Publication date: March 17, 2016
    Inventors: Dan Schiappa, Kenneth D. Ray
  • Publication number: 20160078225
    Abstract: Threat detection instrumentation is simplified by providing and updating labels for computing objects in a context-sensitive manner. This may include simple labeling schemes to distinguish between objects, e.g., trusted/untrusted processes or corporate/private data. This may also include more granular labeling schemes such as a three-tiered scheme that identifies a category (e.g., financial, e-mail, game), static threat detection attributes (e.g., signatures, hashes, API calls), and explicit identification (e.g., what a file or process calls itself). By tracking such data for various computing objects and correlating these labels to malware occurrences, rules can be written for distribution to endpoints to facilitate threat detection based on, e.g., interactions of labeled objects, changes to object labels, and so forth.
    Type: Application
    Filed: September 14, 2014
    Publication date: March 17, 2016
    Inventors: Kenneth D. Ray, Dan Schiappa, Simon Neil Reed, Mark D. Harris, Neil Robert Tyndale Watkiss, Andrew J. Thomas, Robert W. Cook, Harald Schütz, John Edward Tyrone Shaw, Anthony John Merry
  • Publication number: 20160080417
    Abstract: Threat detection instrumentation is simplified by providing and updating labels for computing objects in a context-sensitive manner. This may include simple labeling schemes to distinguish between objects, e.g., trusted/untrusted processes or corporate/private data. This may also include more granular labeling schemes such as a three-tiered scheme that identifies a category (e.g., financial, e-mail, game), static threat detection attributes (e.g., signatures, hashes, API calls), and explicit identification (e.g., what a file or process calls itself). By tracking such data for various computing objects and correlating these labels to malware occurrences, rules can be written for distribution to endpoints to facilitate threat detection based on, e.g., interactions of labeled objects, changes to object labels, and so forth.
    Type: Application
    Filed: September 14, 2014
    Publication date: March 17, 2016
    Inventors: Andrew J. Thomas, Mark D. Harris, Simon Neil Reed, Neil Robert Tyndale Watkiss, Kenneth D. Ray
  • Publication number: 20160080418
    Abstract: Threat detection instrumentation is simplified by providing and updating labels for computing objects in a context-sensitive manner. This may include simple labeling schemes to distinguish between objects, e.g., trusted/untrusted processes or corporate/private data. This may also include more granular labeling schemes such as a three-tiered scheme that identifies a category (e.g., financial, e-mail, game), static threat detection attributes (e.g., signatures, hashes, API calls), and explicit identification (e.g., what a file or process calls itself). By tracking such data for various computing objects and correlating these labels to malware occurrences, rules can be written for distribution to endpoints to facilitate threat detection based on, e.g., interactions of labeled objects, changes to object labels, and so forth.
    Type: Application
    Filed: September 14, 2014
    Publication date: March 17, 2016
    Inventors: Kenneth D. Ray, Robert W. Cook, Andrew J. Thomas, Dmitri Samosseiko, Mark D. Harris
  • Publication number: 20150379270
    Abstract: The subject disclosure is directed towards providing a computing device with access to key that depends on the current software version, e.g., the software version of a security processor. If the software is compromised, another key becomes available with release of each new (non-compromised) software version. Keys for future versions cannot be derived, while keys for earlier versions can be derived from the current key. A secure boot process uses a secret to generate a first key, after which access to the secret is turned off. The first key is used with key blob data to compute a second key used for data decryption (and encryption) as needed. The key blob data may be global for all devices, and/or device specific; a hash stick comprising a set of derivable keys may be used at manufacturing time to generate the device-specific key blob data.
    Type: Application
    Filed: June 30, 2014
    Publication date: December 31, 2015
    Inventors: Ling Tony Chen, Felix Stefan Domke, Kenneth D. Ray
  • Publication number: 20150312268
    Abstract: A variety of techniques are disclosed for detection of advanced persistent threats and similar malware. In one aspect, the detection of certain network traffic at a gateway is used to trigger a query of an originating endpoint, which can use internal logs to identify a local process that is sourcing the network traffic. In another aspect, an endpoint is configured to periodically generate and transmit a secure heartbeat, so that an interruption of the heartbeat can be used to signal the possible presence of malware. In another aspect, other information such as local and global reputation information is used to provide context for more accurate malware detection.
    Type: Application
    Filed: April 28, 2014
    Publication date: October 29, 2015
    Applicant: Sophos Limited
    Inventor: Kenneth D. Ray
  • Patent number: 8918844
    Abstract: An improved technique involves authenticating a user based on ability of devices in the user's possession to corroborate environmental information between each other. As part of an authentication process, at least a primary device and a secondary device belonging to a user take readings of a particular set of environmental conditions, such as wireless networks that are active in a room in which they are contained. An authentication server can then verify that the primary and secondary devices are in the same room by corroborating the readings of the environmental conditions read from the primary and secondary devices, and base an authentication result on the corroboration.
    Type: Grant
    Filed: September 28, 2012
    Date of Patent: December 23, 2014
    Assignee: EMC Corporation
    Inventors: Lawrence N. Friedman, Karl Ackerman, Kenneth D. Ray, Yedidya Dotan
  • Patent number: 8902043
    Abstract: An authentication method and system to combat confirmation bias provides for an authentication system that upon matching an access request to a record for a given user in an authentication system further interrogates a set of secondary sources to determine that the individual requesting access is in fact the correct user.
    Type: Grant
    Filed: September 28, 2012
    Date of Patent: December 2, 2014
    Assignee: EMC Corporation
    Inventors: Karl Ackerman, Kenneth D. Ray, Lawrence N. Friedman, Roy Dagan, Alex Vaystikh, Roy Hodgman
  • Patent number: 8646027
    Abstract: The present invention extends to methods, systems, and computer program products for workflow based authorization for content access. A workflow can be triggered when a protection policy does not fully express an intended recipient's rights in protected content. A workflow processes relevant inputs to more fully express the intended recipient's rights in protected content. Workflows can provide policy item updates and authorizations decisions with respect to protected content. Through the use of workflows to make an authorization decision, access to information can become more flexible, allowing it to follow the desired flow of information throughout its lifecycle. This flexibility allows organizations to protect their information without worrying about the protection stopping the natural flow of business.
    Type: Grant
    Filed: June 27, 2008
    Date of Patent: February 4, 2014
    Assignee: Microsoft Corporation
    Inventors: Rushmi U. Malaviarachchi, Kenneth D. Ray, Scott C. Cottrille, Frederic Delombaerde, Conrad G. Bayer
  • Patent number: 8612363
    Abstract: An avatar generator for a virtual environment reflects a physiological characteristic of the user, injecting a degree of reality into the capabilities or appearance. Thereby, many of the incentives of the real world are replicated in a virtual environment. Physiological data that reflect a degree of health of the real person can be linked to rewards of capabilities of a gaming avatar, an amount of time budgeted to play, or a visible indication. Thereby, people are encouraged to exercise. Physiological data that reflect the health and perhaps also mood also improve social interaction in virtual environments. People seeking to meet and become acquainted with particular types of people are not thwarted by the artificiality of avatars. The physiological data can be gleaned from a third party health data collection repository, a healthcare smart card, a real-time physiological sensor (e.g., blood pressure, heart rate, blood glucose, peak flow, pedometer, etc.).
    Type: Grant
    Filed: June 12, 2008
    Date of Patent: December 17, 2013
    Assignee: Microsoft Corporation
    Inventors: Chris Demetrios Karkanias, Hubert Van Hoof, Kenneth D. Ray, Alexander G. Gounares, Eric J. Horvitz, Hong L. Choing
  • Publication number: 20130282934
    Abstract: The various embodiments described below are directed to providing authenticated and confidential messaging from software executing on a host (e.g. a secure software application or security kernel) to and from I/O devices operating on a USB bus. The embodiments can protect against attacks that are levied by software executing on a host computer. In some embodiments, a secure functional component or module is provided and can use encryption techniques to provide protection against observation and manipulation of USB data. In other embodiments, USB data can be protected through techniques that do not utilized (or are not required to utilize) encryption techniques. In accordance with these embodiments, USB devices can be designated as “secure” and, hence, data sent over the USB to and from such designated devices can be provided into protected memory. Memory indirection techniques can be utilized to ensure that data to and from secure devices is protected.
    Type: Application
    Filed: June 20, 2013
    Publication date: October 24, 2013
    Inventors: Paul England, Bryan Willman, John C. Dunn, Kenneth D. Ray, Glen Slick, Marcus Peinado
  • Patent number: 8533811
    Abstract: A technique allows software developers to develop applications for a smart phone or other terminal by unlocking the terminal so that it can run unsigned applications. A developer registers with a web-based service, agrees to registration terms, and provides authentication credentials. Data which verifies the authentication credentials is provided back to the developer's computer. The terminal is connected to the developer's computer, and via a user interface, the developer requests registration of the terminal. In response, the terminal receives the data from the developer's computer, and provides the data and a unique terminal identifier to the service. If authorized, the service returns a persistent token or license which is stored at, and used to unlock, the terminal. The service can also provide a command which enforces an expiration date. The terminal checks in with the service to determine if the account is in good standing, and is re-locked if warranted.
    Type: Grant
    Filed: August 10, 2010
    Date of Patent: September 10, 2013
    Assignee: Microsoft Corporation
    Inventors: John Bruno, Michael Saffitz, Kenneth D. Ray, Geir Olsen
  • Patent number: 8387152
    Abstract: Computer systems and environments implemented herein permit a local machine increased participation in authorizing access to protected content. An operating system attests to a computing environment at a corresponding computer system. If the computing environment is one permitted to access protected content, the operating system is permitted to regulate further (e.g., application) access to protected content in accordance with a procreation policy. As such, authorization decisions are partially distributed, easing the resource burden on a content protection server. Accordingly, this computing environment can facilitate more robust and efficient authorization decisions when access to protected content is requested.
    Type: Grant
    Filed: June 27, 2008
    Date of Patent: February 26, 2013
    Assignee: Microsoft Corporation
    Inventors: Kenneth D. Ray, Nathan T. Lewis, Matthew C. Setzer, David R. Wooten
  • Patent number: 8375440
    Abstract: Procedures for resumption from a low activity condition are discussed. In implementations, a persistent state file, or a portion thereof, is secured via an encryption algorithm, with the decryption key secured via the operating system (OS) login user credentials. Once a user is authenticated via the OS login, the persistent state file may be decrypted and inserted in the OS boot path with resumption occurring through the persistent state file.
    Type: Grant
    Filed: October 15, 2007
    Date of Patent: February 12, 2013
    Assignee: Microsoft Corporation
    Inventors: Kenneth D. Ray, Kevin M. Litwack, David R. Wooten
  • Patent number: 8271516
    Abstract: A social network service provides trusted, timely and managed communications between a querying individual and an informed individual by optimizing distribution of queries to reflect a requisite amount of expertise necessary (i.e., interest, background, education, demographic attribute, etc.). Those candidate recipients with a rare level of expertise or specialization can specify a desired level of participation, which is respected. In order not to exhaust their availability, those who are less qualified or part of a larger demographic category appropriate for the query are selected to handle queries of lesser difficulty or less specialization. Anonymity if desired by the recipient party can be supported by increasing the pool of candidate recipients so that the querying party cannot reasonably ascertain who is responding. Timeliness of response, as well as satisfaction in the response, is tracked in order to affect redirection of a query.
    Type: Grant
    Filed: June 12, 2008
    Date of Patent: September 18, 2012
    Assignee: Microsoft Corporation
    Inventors: Alexander G. Gounares, Eric J. Horvitz, Kenneth D. Ray, Oren Rosenbloom, Hubert Van Hoof, Chris Demetrios Karkanias
  • Patent number: 8225390
    Abstract: The present invention extends to methods, systems, and computer program products for licensing protected content to application sets. Embodiments of the invention permit a local machine to increase its participation in authorizing access to protected content. For example, an operating system within an appropriate computing environment is permitted to determine if an application is authorized to access protected content. Thus, the application is relieved from having to store a publishing license. Further, authorization decisions are partially distributed, easing the resource burden on a protection server. Accordingly, embodiments of the invention can facilitate more robust and efficient authorization decisions when access to protected content is requested.
    Type: Grant
    Filed: June 27, 2008
    Date of Patent: July 17, 2012
    Assignee: Microsoft Corporation
    Inventors: Kenneth D. Ray, Pankaj M. Kamat, Charles W. Kaufman, Paul J. Leach, William R. Tipton, Andrew Herron, Krassimir E. Karamfilov, Duncan G. Bryce, Jonathan D. Schwartz, Matthew C. Setzer, John McDowell
  • Patent number: 8176485
    Abstract: The launching of a hypervisor after there is already a running operating system. The operating system itself may launch the hypervisor. The running operating system may be used instead of the hypervisor to discover the physical resources running on the computing system. Other operating systems or operating system instances may be launched after the hypervisor is operational.
    Type: Grant
    Filed: May 15, 2006
    Date of Patent: May 8, 2012
    Assignee: Microsoft Corporation
    Inventors: Shuvabrata Ganguly, Andrew J. Thornton, John F. Wiederhirn, Kenneth D. Ray