Patents by Inventor Laura Benofsky

Laura Benofsky has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20060253706
    Abstract: Access to an authentication image may be protected so that only authenticated processes have access to the image. The image can be displayed to authenticate a User Interface (UI) to a computer user. The image indicates the UI can be trusted. If the image is not displayed, it may be that an application UI is “spoofed” to trick a user into providing sensitive information. Additionally, a large variety of different images can be used as authentication images, so spoofing one image be recognized by most users. A set of original images may be provided, along with image modification processes which can generate a large number of variations. Techniques for authenticating UI's in a virtual machine context are provided. A secure attention sequence is also provided, which allows users to test whether processes running on a computer are authenticated.
    Type: Application
    Filed: May 6, 2005
    Publication date: November 9, 2006
    Applicant: Microsoft Corporation
    Inventors: Paul Roberts, Laura Benofsky, William Holt, Leslie Johnson, Madeline Bryant, Nicholas Nussbaum
  • Publication number: 20060253705
    Abstract: Access to an authentication image may be protected so that only authenticated processes have access to the image. The image can be displayed to authenticate a User Interface (UI) to a computer user. The image indicates the UI can be trusted. If the image is not displayed, it may be that an application UI is “spoofed” to trick a user into providing sensitive information. Additionally, a large variety of different images can be used as authentication images, so spoofing one image be recognized by most users. A set of original images may be provided, along with image modification processes which can generate a large number of variations. Techniques for authenticating UIs in a virtual machine context are provided. A secure attention sequence is also provided, which allows users to test whether processes running on a computer are authenticated.
    Type: Application
    Filed: May 6, 2005
    Publication date: November 9, 2006
    Applicant: Microsoft Corporation
    Inventors: Paul Roberts, Laura Benofsky, William Holt, Leslie Johnson, Bryan Willman, Madeline Bryant
  • Publication number: 20060225127
    Abstract: Access to an authentication image may be protected so that only authenticated processes have access to the image. The image can be displayed to authenticate a User Interface (UI) to a computer user. The image indicates the UI can be trusted. If the image is not displayed, it may be that an application UI is “spoofed” to trick a user into providing sensitive information. Additionally, a large variety of different images can be used as authentication images, so spoofing one image be recognized by most users. A set of original images may be provided, along with image modification processes which can generate a large number of variations. Techniques for authenticating UIs in a virtual machine context are provided. A secure attention sequence is also provided, which allows users to test whether processes running on a computer are authenticated.
    Type: Application
    Filed: April 1, 2005
    Publication date: October 5, 2006
    Applicant: Microsoft Corporation
    Inventors: Paul Roberts, Laura Benofsky, William Holt, Leslie Johnson, Madeline Bryant, Nicholas Nussbaum