Patents by Inventor Kristofer N. Iverson
Kristofer N. Iverson has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 7966553Abstract: Implementations of accessible content reputation lookup are described. In one implementation, before a user activates a link in a document, such as a hyperlink on a webpage, the user can designate the link. For example, the user can float a cursor over the link or interact with an icon placed proximate to the link. By designating the link, the user can request reputation information associated with the link, including information as to whether or not content associated with the link, an application used to access the content, and/or source(s) on which the content resides, are known to be dangerous or risky. If the reputation information indicates that the link is safe to activate, the user can activate the link and access the content. Alternately, if the reputation information indicates that the link is unsafe to access, the user can choose to forego activation of the link.Type: GrantFiled: June 7, 2007Date of Patent: June 21, 2011Assignee: Microsoft CorporationInventor: Kristofer N. Iverson
-
Publication number: 20110145435Abstract: A reputation based redirection service is usable to build URL wrappers for un-trusted and unknown URLs. Such URL wrappers can be used to protect Web users by, for example, redirecting traffic to interstitial Web pages. Additionally, reputation decisions can be made by the service to further protect users from malicious URLs.Type: ApplicationFiled: December 14, 2009Publication date: June 16, 2011Applicant: Microsoft CorporationInventors: Ameya S. Bhatawdekar, Kristofer N. Iverson, Elliott J. Haber, John L. Scarrow, Chad W. Mills
-
Publication number: 20110078796Abstract: Described herein are techniques and apparatuses for scanning a computing device for malware and/or viruses. In various embodiments, a trusted operating environment, which may include a trusted operating system and/or a trusted antivirus tool, may be utilized with respect to a computing device. More particularly, the trusted operating system may be used to boot the computing device. Moreover, the trusted antivirus tool may search the computing device for malware definition updates (e.g., virus signature updates) and use the trusted operating system to scan the computing device for malware. In other embodiments, the trusted antivirus tool may scan the computing device and remove any viruses detected by the trusted antivirus tool. The trusted operating system may then reboot the computing device into a clean environment once any detected viruses are removed.Type: ApplicationFiled: December 10, 2010Publication date: March 31, 2011Applicant: MICROSOFT CORPORATIONInventors: Reshma Khilnani, Kristofer N. Iverson
-
Patent number: 7853999Abstract: Techniques and apparatuses for scanning a computing device for malware are described. In one implementation, a trusted operating environment, which includes a trusted operating system and a trusted antivirus tool, is embodied on a removable data storage medium. A computing device is then booted from the removable data storage medium using the trusted operating system. The trusted antivirus tool searches the computing device for malware definition updates (e.g., virus signature updates) and uses the trusted operating system to scan the computing device for malware. In another implementation, a computing device is booting from a trusted operating system on a removable device and a trusted antivirus tool on the removable device scans the computing device for malware. The removable device can update its own internal components (e.g., virus signatures and antivirus tool) by searching the computing device or a remote resource for updates and authenticating any updates that are located.Type: GrantFiled: May 11, 2007Date of Patent: December 14, 2010Assignee: Microsoft CorporationInventors: Reshma Khilnani, Kristofer N. Iverson
-
Publication number: 20100162357Abstract: This document describes image-based human interactive proofs (HIPs). In some cases these proofs may be used when a browser at a client is used to access resources from a web server. Before access to the resources is enabled, the client can be challenged by the web server with an image-based puzzle. The image-based puzzle is configured to enable distinctions to be made between human input and non-human input. Input to answer the image-based puzzle can be formed via the client and communicated to the web server. The web server receives the input from the client and selectively enables client access to the resources based upon the input. In at least some embodiments, the web server can make use of a community database that stores client answers to image-based puzzles to assist in distinguishing between human input and non-human input.Type: ApplicationFiled: December 19, 2008Publication date: June 24, 2010Applicant: MICROSOFT CORPORATIONInventors: David M. Chickering, Kristofer N. Iverson
-
Patent number: 7636783Abstract: A game or other software program is made accessible for execution by clients on a peer-peer network only after a plurality of verifications are made to ensure that control of the software is maintained. With a request sent to a server to access the software, a client includes a nonce and an ID of the user. The server digitally signs a portion of a ticket that is returned to the client, which includes the nonce, a time stamp, and the ID. The ticket is required to access the software. The clients are required to exchange the tickets, verify the digital signature on the portion of each ticket, and use the information therein to confirm that the tickets are current, issued by the correct server, issued to the proper users, and received from the users who are intended to execute the software.Type: GrantFiled: December 6, 2004Date of Patent: December 22, 2009Assignee: Microsoft CorporationInventors: Eric D. Heutchy, Kristofer N. Iverson, Stephen P. Miller
-
Publication number: 20090217370Abstract: Safe file transmission and reputation lookup. As a part of the safe file transmission and reputation lookup methodology, a data file that is to be made available to a data file receiver is accessed and it is determined whether the data file needs to be provided a protective file. The data file is wrapped in a protective file to create a non-executing package file. Access is provided to the non-executing package file where the associated data file is prevented from being executed until data file reputation information is received.Type: ApplicationFiled: February 27, 2008Publication date: August 27, 2009Applicant: MICROSOFT CORPORATIONInventors: Geoff Hulten, John Scarrow, Ivan Osipkov, Kristofer N. Iverson
-
Patent number: 7549924Abstract: Instant messaging systems and methods are disclosed. The systems and methods allow users to play competitive and collaborative games using an instant messaging client application. The client application may create a user interface screen that includes an instant messaging region or window for exchanging instant messages and a game region or window for playing games.Type: GrantFiled: May 9, 2003Date of Patent: June 23, 2009Assignee: Microsoft CorporationInventors: Gregory J. Canessa, Jonathan T. David, Kristofer N. Iverson, Donald R. Ryan, Bryan G. Trussel
-
Publication number: 20080303689Abstract: Implementations of accessible content reputation lookup are described. In one implementation, before a user activates a link in a document, such as a hyperlink on a webpage, the user can designate the link. For example, the user can float a cursor over the link or interact with an icon placed proximate to the link. By designating the link, the user can request reputation information associated with the link, including information as to whether or not content associated with the link, an application used to access the content, and/or source(s) on which the content resides, are known to be dangerous or risky. If the reputation information indicates that the link is safe to activate, the user can activate the link and access the content. Alternately, if the reputation information indicates that the link is unsafe to access, the user can choose to forego activation of the link.Type: ApplicationFiled: June 7, 2007Publication date: December 11, 2008Applicant: Microsoft CorporationInventor: Kristofer N. Iverson
-
Publication number: 20080282351Abstract: Techniques and apparatuses for scanning a computing device for malware are described. In one implementation, a trusted operating environment, which includes a trusted operating system and a trusted antivirus tool, is embodied on a removable data storage medium. A computing device is then booted from the removable data storage medium using the trusted operating system. The trusted antivirus tool searches the computing device for malware definition updates (e.g., virus signature updates) and uses the trusted operating system to scan the computing device for malware. In another implementation, a computing device is booting from a trusted operating system on a removable device and a trusted antivirus tool on the removable device scans the computing device for malware. The removable device can update its own internal components (e.g., virus signatures and antivirus tool) by searching the computing device or a remote resource for updates and authenticating any updates that are located.Type: ApplicationFiled: May 11, 2007Publication date: November 13, 2008Applicant: Microsoft CorporationInventors: Reshma Khilnani, Kristofer N. Iverson
-
Publication number: 20080282350Abstract: Techniques and apparatuses for scanning a computing device for malware are described. In one implementation, a trusted operating environment, which includes a trusted operating system and a trusted antivirus tool, is embodied on a removable data storage medium. A computing device is then booted from the removable data storage medium using the trusted operating system. The trusted antivirus tool searches the computing device for malware definition updates (e.g., virus signature updates) and uses the trusted operating system to scan the computing device for malware. In another implementation, a computing device is booting from a trusted operating system on a removable device and a trusted antivirus tool on the removable device scans the computing device for malware. The removable device can update its own internal components (e.g., virus signatures and antivirus tool) by searching the computing device or a remote resource for updates and authenticating any updates that are located.Type: ApplicationFiled: May 11, 2007Publication date: November 13, 2008Applicant: Microsoft CorporationInventors: Reshma Khilnani, Kristofer N. Iverson
-
Publication number: 20040224772Abstract: Instant messaging systems and methods are disclosed. The systems and methods allow users to play competitive and collaborative games using an instant messaging client application. The client application may create a user interface screen that includes an instant messaging region or window for exchanging instant messages and a game region or window for playing games.Type: ApplicationFiled: May 9, 2003Publication date: November 11, 2004Applicant: Microsoft CorporationInventors: Gregory J. Canessa, Jonathan T. David, Kristofer N. Iverson, Donald R. Ryan, Bryan G. Trussel
-
Patent number: 6760711Abstract: An online commerce architecture enables merchants to setup online stores that are hosted by third party Internet service providers (ISPs). The architecture provides secure storage of the merchant's commerce information at the ISP-hosted store, based upon a private/public key pair owned by the merchant. When a purchase request is received from a customer, the ISP encrypts all or part of the request using a newly generated session key, and then encrypts that session key with the merchant's public key. The purchase request is stored at the ISP in its encrypted form. The merchant routinely accesses the ISP and retrieves the purchase requests in their encrypted form. The merchant decrypts the session key using the merchant's private key and then decrypts the purchase request using the recovered session key. Since only the merchant knows its private key, no one else (including the ISP) can decrypt the session key to decrypt the purchase requests for the merchant.Type: GrantFiled: January 11, 1999Date of Patent: July 6, 2004Assignee: Microsoft CorporationInventors: Don M. Gillett, Eric S. Askilsrud, Kristofer N. Iverson