Patents by Inventor Lonny McMichael

Lonny McMichael has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20080182659
    Abstract: An online service provides detection of tampering of game data. During game play, the service provides challenges to inspect select data in memory of a game device. A challenge includes an executable program that is configured to locate select data and analyze the select data for tampering. Upon locating the select data, the challenge computes cryptographic hash values from the located select data and returns those hash values to the online game service, where they are compared against expected hash values to determine whether data tampering has occurred on the game device. If the cryptographic hash values match, the service allows online gaming to continue. If the cryptographic hash values do not match, the service discontinues online gaming by terminating the game session for example.
    Type: Application
    Filed: January 30, 2007
    Publication date: July 31, 2008
    Applicant: Microsoft Corporation
    Inventors: Vito Sabella, Aaron Khoo, Oliver Saal, Chao Gu, Lonny McMichael, Robert Fitzgerald
  • Publication number: 20070118743
    Abstract: Communication of information via an in-band channel using a trusted configuration space is provided. The introduction of using a trusted configuration space associated with a computer bus system, such as PCI Express® (PCIe™), for example, enables the design of trusted computing platforms capable of providing compliant devices with assurance that their trusted configuration registers can only be accessed by software running in the trusted software environment. Establishing device trust in the software that initiates trusted configuration requests makes it possible to secure and control access to certain secret, sensitive, or personally-identifiable information these devices may contain (e.g., a uniquely-identifying public key, as described above or certificate which the device provides for revocation purposes).
    Type: Application
    Filed: November 23, 2005
    Publication date: May 24, 2007
    Applicant: Microsoft Corporation
    Inventors: Andrew Thornton, John Paff, John Wiederhirn, Lonny McMichael
  • Publication number: 20060069950
    Abstract: An automated system for improving the testing of computer devices designed for coupling with docking devices. A plurality of networked computing devices that are individually connected to a compatible docking device through a slave switch. Each slave switch independently connects or disconnects individual computing devices from an attached docking device based on commands obtained from a server. By controlling the electrical connection between the individual computing devices and attached docking devices, the slave switch can simulate the action of docking or undocking one or more selected computers without human intervention. As a result, the present invention provides a system and method that automates the action of docking or undocking a computer. For example, the present invention is suited for use in computer device testing systems wherein a shut down command is sent to a selected computer, after which the selected computer is disconnected from an attached docking device.
    Type: Application
    Filed: November 8, 2005
    Publication date: March 30, 2006
    Applicant: Microsoft Corporation
    Inventors: Scott Stephens, James Stephens, Brandon Allsop, Adrien Oney, Lonny McMichael
  • Publication number: 20060005034
    Abstract: A mechanism for protected operating system boot that prevents rogue components from being loaded with the operating system, and thus prevents divulgence of the system key under inappropriate circumstances. After a portion of the machine startup procedure has occurred, the operating system loader is run, the loader is validated, and a correct machine state is either verified to exist and/or created. Once the loader has been verified to be a legitimate loader, and the machine state under which it is running is verified to be correct, the loader's future behavior is known to protect against the loading of rogue components that could cause divulgence of the system key. With the loader's behavior being known to be safe for the system key, the validator may unseal the system key and provides it to the loader.
    Type: Application
    Filed: June 30, 2004
    Publication date: January 5, 2006
    Applicant: Microsoft Corporation
    Inventors: Bryan Willman, Paul England, Kenneth Ray, Jamie Hunter, Lonny McMichael, Derek LaSalle, Pierre Jacomet, Mark Paley, Thekkthalackal Kurien, David Cross
  • Publication number: 20050197996
    Abstract: A method and system for avoiding the overwriting of drivers by subsequent versions or other commonly named drivers includes generating a unique identity for every eligible driver package. Driver files from the driver package, or the entire driver package itself, are then installed in a subdirectory location in a common storage based on the unique identity. The driver files may be loaded to a memory from the subdirectory location. Thus, multiple driver packages and driver files having the same name may be installed and loaded side-by-side.
    Type: Application
    Filed: March 2, 2004
    Publication date: September 8, 2005
    Inventors: Jason Cobb, James Cavalaris, Santosh Jodh, Jamie Hunter, Lonny McMichael