Patents by Inventor Marcus Peinado

Marcus Peinado has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20050271208
    Abstract: Theft of decompressed digital content as the content is being rendered is prevented. A requested slow-down of the rendering of the content is detected. Transfers of relatively large amounts of data are detected. A re-compressor-based requested slow-down of the rendering of the content is detected. A re-compressor re-compressing the content is detected. In each situation, the detected activity is presumably initiated by a content thief attempting to steal the content. In each situation, the detected activity is responded to in a manner designed to frustrate the presumed attempt of the content thief to steal the content.
    Type: Application
    Filed: July 7, 2005
    Publication date: December 8, 2005
    Applicant: Microsoft Corporation
    Inventors: Paul England, Marcus Peinado, Mukund Sankaranarayan
  • Publication number: 20050244008
    Abstract: Theft of decompressed digital content as the content is being rendered is prevented. A requested slow-down of the rendering of the content is detected. Transfers of relatively large amounts of data are detected. A re-compressor-based requested slow-down of the rendering of the content is detected. A re-compressor re-compressing the content is detected. In each situation, the detected activity is presumably initiated by a content thief attempting to steal the content. In each situation, the detected activity is responded to in a manner designed to frustrate the presumed attempt of the content thief to steal the content.
    Type: Application
    Filed: July 7, 2005
    Publication date: November 3, 2005
    Applicant: Microsoft Corporation
    Inventors: Paul England, Marcus Peinado, Mukund Sankaranarayan
  • Publication number: 20050243999
    Abstract: Theft of decompressed digital content as the content is being rendered is prevented. A requested slow-down of the rendering of the content is detected. Transfers of relatively large amounts of data are detected. A re-compressor-based requested slow-down of the rendering of the content is detected. A re-compressor re-compressing the content is detected. In each situation, the detected activity is presumably initiated by a content thief attempting to steal the content. In each situation, the detected activity is responded to in a manner designed to frustrate the presumed attempt of the content thief to steal the content.
    Type: Application
    Filed: July 7, 2005
    Publication date: November 3, 2005
    Inventors: Paul England, Marcus Peinado, Mukund Sankaranarayan
  • Publication number: 20050216743
    Abstract: To render digital content encrypted according to a content key (KD) on a first device having a public key (PU1) and a corresponding private key (PR1), a digital license corresponding to the content is obtained, where the digital license includes the content key (KD) therein in an encrypted form. The encrypted content key (KD) from the digital license is decrypted to produce the content key (KD), and the public key (PU1) of the first device is obtained therefrom. The content key (KD) is then encrypted according to the public key (PU1) of the first device (PU1 (KD)), and a sub-license corresponding to and based on the obtained license is composed, where the sub-license includes (PU1 (KD)). The composed sub-license is then transferred to the first device.
    Type: Application
    Filed: May 19, 2005
    Publication date: September 29, 2005
    Applicant: Microsoft Corporation
    Inventor: Marcus Peinado
  • Patent number: 6948073
    Abstract: Theft of decompressed digital content as the content is being rendered is prevented. A requested slow-down of the rendering of the content is detected. Transfers of relatively large amounts of data are detected. A re-compressor-based requested slow-down of the rendering of the content is detected. A re-compressor re-compressing the content is detected. In each situation, the detected activity is presumably initiated by a content thief attempting to steal the content. In each situation, the detected activity is responded to in a manner designed to frustrate the presumed attempt of the content thief to steal the content.
    Type: Grant
    Filed: June 27, 2001
    Date of Patent: September 20, 2005
    Assignee: Microsoft Corporation
    Inventors: Paul England, Marcus Peinado, Mukund Sankaranarayan
  • Publication number: 20050204128
    Abstract: A method of controlling information exposure in a multiparty transaction includes an originating transaction participant cryptographically encoding all information for each of the transaction participants such that a unique data content and encryption are used for each of the messages destined to the other transaction participants. The cryptographically encoded messages are transmitted to the transaction participants such that each may decrypt their message and respond to a primary transaction participant with status concerning their portion of the transaction. After reception of affirmative status messages from the transaction participants, the primary transaction participant may transmit messages to the responding transaction participants to execute the multiparty transaction. The originating transaction participant may also be provided an indication that the multiparty transaction is executed.
    Type: Application
    Filed: January 28, 2004
    Publication date: September 15, 2005
    Inventors: Michael Aday, Bryan Willman, Marcus Peinado, Alan Geller
  • Publication number: 20050177694
    Abstract: A device for securely recording protected content to a portable memory, and for reading the protected content therefrom. The device includes a feature that makes it adapted to read or write specially-configured portable memories that are incompatible with standard read/write devices. For example, the device may be designed to work with memories having an unusual shape or size, or may manipulate the data in a non-standard way before storing it on the memory. The read/write devices are trusted components that will only handle the protected content in accordance with rules governing the content. The feature included in the device is preferably a proprietary and/or hardware feature, so that counterfeit devices incorporating the feature cannot be built without overcoming economic and/or legal hurdles.
    Type: Application
    Filed: February 22, 2005
    Publication date: August 11, 2005
    Applicant: Microsoft Corporation
    Inventor: Marcus Peinado
  • Publication number: 20050172134
    Abstract: A method is provided for a processor of a computing device to obtain a trusted identification of a hardware peripheral of the computing device, for the computing device and the peripheral to derive a set of shared keys, and for the processor to send trusted data to the peripheral.
    Type: Application
    Filed: February 4, 2004
    Publication date: August 4, 2005
    Inventors: Andrew Thornton, John Paff, Marcus Peinado, Thekkthalackal Kurien
  • Publication number: 20050160244
    Abstract: A device for securely recording protected content to a portable memory, and for reading the protected content therefrom. The device includes a feature that makes it adapted to read or write specially-configured portable memories that are incompatible with standard read/write devices. For example, the device may be designed to work with memories having an unusual shape or size, or may manipulate the data in a non-standard way before storing it on the memory. The read/write devices are trusted components that will only handle the protected content in accordance with rules governing the content. The feature included in the device is preferably a proprietary and/or hardware feature, so that counterfeit devices incorporating the feature cannot be built without overcoming economic and/or legal hurdles.
    Type: Application
    Filed: February 22, 2005
    Publication date: July 21, 2005
    Applicant: Microsoft Corporation
    Inventor: Marcus Peinado
  • Publication number: 20050144448
    Abstract: Transferring application secrets in a trusted operating system environment involves receiving a request to transfer application data from a source computing device to a destination computing device. A check is made as to whether the application data can be transferred to the destination computing device, and if so, whether the application data can be transferred under control of the user or a third party. If these checks succeed, a check is also made as to whether the destination computing device is a trustworthy device running known trustworthy software. Input is also received from the appropriate one of the user or third party to control transferring of the application data to the destination computing device. Furthermore, application data is stored on the source computing device in a manner that facilitates determining whether the application data can be transferred, and that facilitates transferring the application data if it can be transferred.
    Type: Application
    Filed: February 28, 2005
    Publication date: June 30, 2005
    Applicant: Microsoft Corporation
    Inventors: Paul England, Marcus Peinado, Daniel Simon, Josh Benaloh
  • Publication number: 20050144447
    Abstract: Transferring application secrets in a trusted operating system environment involves receiving a request to transfer application data from a source computing device to a destination computing device. A check is made as to whether the application data can be transferred to the destination computing device, and if so, whether the application data can be transferred under control of the user or a third party. If these checks succeed, a check is also made as to whether the destination computing device is a trustworthy device running known trustworthy software. Input is also received from the appropriate one of the user or third party to control transferring of the application data to the destination computing device. Furthermore, application data is stored on the source computing device in a manner that facilitates determining whether the application data can be transferred, and that facilitates transferring the application data if it can be transferred.
    Type: Application
    Filed: February 28, 2005
    Publication date: June 30, 2005
    Applicant: Microsoft Corporation
    Inventors: Paul England, Marcus Peinado, Daniel Simon, Josh Benaloh
  • Publication number: 20050132202
    Abstract: To establish trust between first and second entities, the first entity sends an attestation message to the second entity, including a code ID, relevant data, a digital signature based on the code ID and data, and a certificate chain. The second entity verifies the signature and decides whether to in fact enter into a trust-based relationship with the first entity based on the code ID and the data in the attestation message. Upon so deciding, the second entity sends a trust message to the first entity, including a secret to be shared between the first and second entities. The first entity obtains the shared secret in the trust message and employs the shared secret to exchange information with the second entity.
    Type: Application
    Filed: December 11, 2003
    Publication date: June 16, 2005
    Inventors: Blair Dillaway, Paul England, Marcus Peinado
  • Publication number: 20050097368
    Abstract: To determine whether digital content can be released to an element such as a computer application or module, a scaled value representative of the relative security of the element is associated therewith, and the digital content has a corresponding digital license setting forth a security requirement. The security requirement is obtained from the digital license and the scaled value is obtained from the element, and the scaled value of the element is compared to the security requirement of the digital license to determine whether the scaled value satisfies the security requirement. The digital content is not released to the element if the scaled value does not satisfy the security requirement.
    Type: Application
    Filed: November 5, 2004
    Publication date: May 5, 2005
    Applicant: Microsoft Corporation
    Inventors: Marcus Peinado, Rajasekhar Abburi, Jeffrey Bell
  • Publication number: 20050091661
    Abstract: Application factoring or partitioning is used to integrate secure features into a conventional application. An application's functionality is partitioned into two sets according to whether a given action does, or does not, involve the handling of sensitive data. Separate software objects (processors) are created to perform these two sets of actions. A trusted processor handles secure data and runs in a high-assurance environment. When another processor encounters secure data, that data is sent to the trusted processor. The data is wrapped in such a way that allows it to be routed to the trusted processor, and prevents the data from being deciphered by any entity other than the trusted processor. An infrastructure is provided that wraps objects, routes them to the correct processor, and allows their integrity to be attested through a chain of trust leading back to base component that is known to be trustworthy.
    Type: Application
    Filed: October 24, 2003
    Publication date: April 28, 2005
    Inventors: Thekkthalackal Kurien, Kenneth Ray, Marcus Peinado, Paul England
  • Publication number: 20050091169
    Abstract: To determine whether digital content can be released to an element such as a computer application or module, a scaled value representative of the relative security of the element is associated therewith, and the digital content has a corresponding digital license setting forth a security requirement. The security requirement is obtained from the digital license and the scaled value is obtained from the element, and the scaled value of the element is compared to the security requirement of the digital license to determine whether the scaled value satisfies the security requirement. The digital content is not released to the element if the scaled value does not satisfy the security requirement.
    Type: Application
    Filed: November 5, 2004
    Publication date: April 28, 2005
    Applicant: Microsoft Corporation
    Inventors: Marcus Peinado, Rajasekhar Abburi, Jeffrey Bell
  • Publication number: 20050091541
    Abstract: To determine whether digital content can be released to an element such as a computer application or module, a scaled value representative of the relative security of the element is associated therewith, and the digital content has a corresponding digital license setting forth a security requirement. The security requirement is obtained from the digital license and the scaled value is obtained from the element, and the scaled value of the element is compared to the security requirement of the digital license to determine whether the scaled value satisfies the security requirement. The digital content is not released to the element if the scaled value does not satisfy the security requirement.
    Type: Application
    Filed: November 3, 2004
    Publication date: April 28, 2005
    Applicant: Microsoft Corporation
    Inventors: Marcus Peinado, Rajasekhar Abburi, Jeffrey Bell
  • Publication number: 20050086478
    Abstract: To encrypt a digital object, a key ID is selected for the digital object, and a function ƒ( ) having an input and an output is selected. The selected key ID is then employed as the input to the function ƒ( ), and the output of such function ƒ( ) is employed as the key (KD) for the digital object: ƒ(key ID)=< key (KD). The digital object is then according to such key (KD), and the encrypted digital object is distributed.
    Type: Application
    Filed: November 5, 2004
    Publication date: April 21, 2005
    Applicant: Microsoft Corporation
    Inventors: Marcus Peinado, Ramarathnam Venkatesan
  • Publication number: 20050066187
    Abstract: To encrypt a digital object, a key ID is selected for the digital object, and a function f( ) having an input and an output is selected. The selected key ID is then employed as the input to the function f( ), and the output of such function f( ) is employed as the key (KD) for the digital object: f(key ID)key (KD). The digital object is then according to such key (KD), and the encrypted digital object is distributed.
    Type: Application
    Filed: November 5, 2004
    Publication date: March 24, 2005
    Applicant: Microsoft Corporation
    Inventors: Marcus Peinado, Ramarathnam Venkatesan
  • Publication number: 20050010818
    Abstract: The present invention provides for trusted side-band communications between components in a computer system, so that use of the system bus may be avoided. Two components may be connected by means other than a bus (e.g., an infrared port, a wire, an unused pin, etc.), whereby these components may communicate without the use of the system bus. The non-bus communication channel may be referred to as “side-band.” The side-band channel may be used to communicate information that might identify the user's hardware (e.g., a public key) or other information that the user may not want to be easily intercepted by the public at large. Communication over the side-band channel may also be used to verify that the participants in a communication are within a defined positional relationship to each other.
    Type: Application
    Filed: January 16, 2004
    Publication date: January 13, 2005
    Inventors: John Paff, Marcus Peinado, Thekkthalackal Kurien, Bryan Willman, Paul England, Andrew Thornton
  • Publication number: 20040250036
    Abstract: A trusted data store is provided for use with a trusted element of a trusted operating system on a computing machine. In the trusted data store, a storage medium stores data in a pre-determined arrangement, where the data includes trusted data from the trusted element of the trusted operating system on the computing machine. An access controller writes data to and reads data from the storage medium, and a trust controller is interposed between the computing machine and the access controller. The trust controller allows only the trusted element to perform operations on the trusted data thereof on the storage medium.
    Type: Application
    Filed: June 6, 2003
    Publication date: December 9, 2004
    Inventors: Bryan Mark Willman, Paul England, Keith Kaplan, Alan Stuart Geller, Brian A. LaMacchia, Blair Brewster Dillaway, Marcus Peinado, Michael Alfred Aday, Selena Wilson