Patents by Inventor Kristofer N. Iverson

Kristofer N. Iverson has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 7966553
    Abstract: Implementations of accessible content reputation lookup are described. In one implementation, before a user activates a link in a document, such as a hyperlink on a webpage, the user can designate the link. For example, the user can float a cursor over the link or interact with an icon placed proximate to the link. By designating the link, the user can request reputation information associated with the link, including information as to whether or not content associated with the link, an application used to access the content, and/or source(s) on which the content resides, are known to be dangerous or risky. If the reputation information indicates that the link is safe to activate, the user can activate the link and access the content. Alternately, if the reputation information indicates that the link is unsafe to access, the user can choose to forego activation of the link.
    Type: Grant
    Filed: June 7, 2007
    Date of Patent: June 21, 2011
    Assignee: Microsoft Corporation
    Inventor: Kristofer N. Iverson
  • Publication number: 20110145435
    Abstract: A reputation based redirection service is usable to build URL wrappers for un-trusted and unknown URLs. Such URL wrappers can be used to protect Web users by, for example, redirecting traffic to interstitial Web pages. Additionally, reputation decisions can be made by the service to further protect users from malicious URLs.
    Type: Application
    Filed: December 14, 2009
    Publication date: June 16, 2011
    Applicant: Microsoft Corporation
    Inventors: Ameya S. Bhatawdekar, Kristofer N. Iverson, Elliott J. Haber, John L. Scarrow, Chad W. Mills
  • Publication number: 20110078796
    Abstract: Described herein are techniques and apparatuses for scanning a computing device for malware and/or viruses. In various embodiments, a trusted operating environment, which may include a trusted operating system and/or a trusted antivirus tool, may be utilized with respect to a computing device. More particularly, the trusted operating system may be used to boot the computing device. Moreover, the trusted antivirus tool may search the computing device for malware definition updates (e.g., virus signature updates) and use the trusted operating system to scan the computing device for malware. In other embodiments, the trusted antivirus tool may scan the computing device and remove any viruses detected by the trusted antivirus tool. The trusted operating system may then reboot the computing device into a clean environment once any detected viruses are removed.
    Type: Application
    Filed: December 10, 2010
    Publication date: March 31, 2011
    Applicant: MICROSOFT CORPORATION
    Inventors: Reshma Khilnani, Kristofer N. Iverson
  • Patent number: 7853999
    Abstract: Techniques and apparatuses for scanning a computing device for malware are described. In one implementation, a trusted operating environment, which includes a trusted operating system and a trusted antivirus tool, is embodied on a removable data storage medium. A computing device is then booted from the removable data storage medium using the trusted operating system. The trusted antivirus tool searches the computing device for malware definition updates (e.g., virus signature updates) and uses the trusted operating system to scan the computing device for malware. In another implementation, a computing device is booting from a trusted operating system on a removable device and a trusted antivirus tool on the removable device scans the computing device for malware. The removable device can update its own internal components (e.g., virus signatures and antivirus tool) by searching the computing device or a remote resource for updates and authenticating any updates that are located.
    Type: Grant
    Filed: May 11, 2007
    Date of Patent: December 14, 2010
    Assignee: Microsoft Corporation
    Inventors: Reshma Khilnani, Kristofer N. Iverson
  • Publication number: 20100162357
    Abstract: This document describes image-based human interactive proofs (HIPs). In some cases these proofs may be used when a browser at a client is used to access resources from a web server. Before access to the resources is enabled, the client can be challenged by the web server with an image-based puzzle. The image-based puzzle is configured to enable distinctions to be made between human input and non-human input. Input to answer the image-based puzzle can be formed via the client and communicated to the web server. The web server receives the input from the client and selectively enables client access to the resources based upon the input. In at least some embodiments, the web server can make use of a community database that stores client answers to image-based puzzles to assist in distinguishing between human input and non-human input.
    Type: Application
    Filed: December 19, 2008
    Publication date: June 24, 2010
    Applicant: MICROSOFT CORPORATION
    Inventors: David M. Chickering, Kristofer N. Iverson
  • Patent number: 7636783
    Abstract: A game or other software program is made accessible for execution by clients on a peer-peer network only after a plurality of verifications are made to ensure that control of the software is maintained. With a request sent to a server to access the software, a client includes a nonce and an ID of the user. The server digitally signs a portion of a ticket that is returned to the client, which includes the nonce, a time stamp, and the ID. The ticket is required to access the software. The clients are required to exchange the tickets, verify the digital signature on the portion of each ticket, and use the information therein to confirm that the tickets are current, issued by the correct server, issued to the proper users, and received from the users who are intended to execute the software.
    Type: Grant
    Filed: December 6, 2004
    Date of Patent: December 22, 2009
    Assignee: Microsoft Corporation
    Inventors: Eric D. Heutchy, Kristofer N. Iverson, Stephen P. Miller
  • Publication number: 20090217370
    Abstract: Safe file transmission and reputation lookup. As a part of the safe file transmission and reputation lookup methodology, a data file that is to be made available to a data file receiver is accessed and it is determined whether the data file needs to be provided a protective file. The data file is wrapped in a protective file to create a non-executing package file. Access is provided to the non-executing package file where the associated data file is prevented from being executed until data file reputation information is received.
    Type: Application
    Filed: February 27, 2008
    Publication date: August 27, 2009
    Applicant: MICROSOFT CORPORATION
    Inventors: Geoff Hulten, John Scarrow, Ivan Osipkov, Kristofer N. Iverson
  • Patent number: 7549924
    Abstract: Instant messaging systems and methods are disclosed. The systems and methods allow users to play competitive and collaborative games using an instant messaging client application. The client application may create a user interface screen that includes an instant messaging region or window for exchanging instant messages and a game region or window for playing games.
    Type: Grant
    Filed: May 9, 2003
    Date of Patent: June 23, 2009
    Assignee: Microsoft Corporation
    Inventors: Gregory J. Canessa, Jonathan T. David, Kristofer N. Iverson, Donald R. Ryan, Bryan G. Trussel
  • Publication number: 20080303689
    Abstract: Implementations of accessible content reputation lookup are described. In one implementation, before a user activates a link in a document, such as a hyperlink on a webpage, the user can designate the link. For example, the user can float a cursor over the link or interact with an icon placed proximate to the link. By designating the link, the user can request reputation information associated with the link, including information as to whether or not content associated with the link, an application used to access the content, and/or source(s) on which the content resides, are known to be dangerous or risky. If the reputation information indicates that the link is safe to activate, the user can activate the link and access the content. Alternately, if the reputation information indicates that the link is unsafe to access, the user can choose to forego activation of the link.
    Type: Application
    Filed: June 7, 2007
    Publication date: December 11, 2008
    Applicant: Microsoft Corporation
    Inventor: Kristofer N. Iverson
  • Publication number: 20080282351
    Abstract: Techniques and apparatuses for scanning a computing device for malware are described. In one implementation, a trusted operating environment, which includes a trusted operating system and a trusted antivirus tool, is embodied on a removable data storage medium. A computing device is then booted from the removable data storage medium using the trusted operating system. The trusted antivirus tool searches the computing device for malware definition updates (e.g., virus signature updates) and uses the trusted operating system to scan the computing device for malware. In another implementation, a computing device is booting from a trusted operating system on a removable device and a trusted antivirus tool on the removable device scans the computing device for malware. The removable device can update its own internal components (e.g., virus signatures and antivirus tool) by searching the computing device or a remote resource for updates and authenticating any updates that are located.
    Type: Application
    Filed: May 11, 2007
    Publication date: November 13, 2008
    Applicant: Microsoft Corporation
    Inventors: Reshma Khilnani, Kristofer N. Iverson
  • Publication number: 20080282350
    Abstract: Techniques and apparatuses for scanning a computing device for malware are described. In one implementation, a trusted operating environment, which includes a trusted operating system and a trusted antivirus tool, is embodied on a removable data storage medium. A computing device is then booted from the removable data storage medium using the trusted operating system. The trusted antivirus tool searches the computing device for malware definition updates (e.g., virus signature updates) and uses the trusted operating system to scan the computing device for malware. In another implementation, a computing device is booting from a trusted operating system on a removable device and a trusted antivirus tool on the removable device scans the computing device for malware. The removable device can update its own internal components (e.g., virus signatures and antivirus tool) by searching the computing device or a remote resource for updates and authenticating any updates that are located.
    Type: Application
    Filed: May 11, 2007
    Publication date: November 13, 2008
    Applicant: Microsoft Corporation
    Inventors: Reshma Khilnani, Kristofer N. Iverson
  • Publication number: 20040224772
    Abstract: Instant messaging systems and methods are disclosed. The systems and methods allow users to play competitive and collaborative games using an instant messaging client application. The client application may create a user interface screen that includes an instant messaging region or window for exchanging instant messages and a game region or window for playing games.
    Type: Application
    Filed: May 9, 2003
    Publication date: November 11, 2004
    Applicant: Microsoft Corporation
    Inventors: Gregory J. Canessa, Jonathan T. David, Kristofer N. Iverson, Donald R. Ryan, Bryan G. Trussel
  • Patent number: 6760711
    Abstract: An online commerce architecture enables merchants to setup online stores that are hosted by third party Internet service providers (ISPs). The architecture provides secure storage of the merchant's commerce information at the ISP-hosted store, based upon a private/public key pair owned by the merchant. When a purchase request is received from a customer, the ISP encrypts all or part of the request using a newly generated session key, and then encrypts that session key with the merchant's public key. The purchase request is stored at the ISP in its encrypted form. The merchant routinely accesses the ISP and retrieves the purchase requests in their encrypted form. The merchant decrypts the session key using the merchant's private key and then decrypts the purchase request using the recovered session key. Since only the merchant knows its private key, no one else (including the ISP) can decrypt the session key to decrypt the purchase requests for the merchant.
    Type: Grant
    Filed: January 11, 1999
    Date of Patent: July 6, 2004
    Assignee: Microsoft Corporation
    Inventors: Don M. Gillett, Eric S. Askilsrud, Kristofer N. Iverson