Patents by Inventor Martin H. Hall
Martin H. Hall has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 8781870Abstract: A method is provided for prompting a user to perform PIM-related acts based on dynamic location data. The user's current location is received and a PIM item is selected from the user's PIM system. The user's current location is compared to the location of the selected PIM item. Based on the comparison, a suggested user fulfillment action for the PIM item is suggested to the user.Type: GrantFiled: May 11, 2009Date of Patent: July 15, 2014Assignee: Microsoft CorporationInventors: Bradley W. Ward, David Lee, Martin H. Hall, Mark McNulty
-
Patent number: 8522043Abstract: A hardware-based security module is used to protect an electronic device, especially a portable electronic device. The security module may determine either via timeout of a watchdog timer or via an explicit message to encrypt selected data on the electronic device. In addition, the electronic device may enter a limited function mode that only allows display of simplistic messages and supports network traffic with a recovery service. The recovery service may be able to use the network traffic to locate the electronic device. The security module may include a secure memory, a cryptographic function, a timer, and support for direct display of data on a monitor.Type: GrantFiled: June 21, 2007Date of Patent: August 27, 2013Assignee: Microsoft CorporationInventors: James S. Duffus, Curt Andrew Steeb, Thomas G. Phillips, Jeffrey Alan Herold, William Poole, William J. Westerinen, Martin H. Hall
-
Patent number: 8464348Abstract: A computer is adapted for pay-for-use operation by adding a isolated computing environment to a standard computer. The isolated computing environment may include a trusted non-volatile memory, a digital signature verification capability, a clock or timer and a logic circuit for triggering execution of a validation program responsive to the clock or timer. The isolated computing environment may be protected from tampering by physical or cryptographic mechanisms, or both. The validation program measures or monitors for non-compliant states of the computer and may enforce sanctions when non-compliant states of the computer are detected.Type: GrantFiled: December 22, 2004Date of Patent: June 11, 2013Assignee: Microsoft CorporationInventors: Alexander Frank, Martin H. Hall, Thomas G. Phillips
-
Patent number: 8311732Abstract: A navigation device includes a communication subsystem and a navigation subsystem. The communication subsystem communicates with a remote navigation database via a gateway using variable-size data payloads. Each variable-size data payload is accompanied by a content-identifier and a size-identifier. The navigation subsystem determines a current position of the navigation device and encodes the current position of the navigation device as one or more position payloads that are sent from the communication subsystem to the remote navigation database via the gateway. Each position payload is sent with an accompanying content-identifier and size-identifier.Type: GrantFiled: September 5, 2008Date of Patent: November 13, 2012Assignee: Microsoft CorporationInventors: Ali Khan, Zhangwei Xu, Alexander Bussmann, Dhiresh Kumar, Gaurav Singhal, Martin H. Hall, Jennifer Hilary Kays
-
Publication number: 20120005721Abstract: A processing unit for use in an electronic device includes standard instruction processing and communication interfaces and also includes functional capability in addition to or in place of those found in an operating system. A secure memory within the processing unit may contain a hardware identifier, policy data, and subsystem functions such as a secure clock, policy management, and policy enforcement. Data in functions within the secure memory are not accessible from outside the processing unit.Type: ApplicationFiled: June 29, 2011Publication date: January 5, 2012Inventors: Zhangwei Xu, Thomas G. Phillips, Alexander Frank, Curt A. Steeb, Isaac P. Ahdout, Martin H. Hall, James S. Duffus
-
Patent number: 8073442Abstract: A pay-per-use or pay-as-you-go computer uses a secure memory to store individual unique program identifiers. Each unique program identifier is associated with a particular hardware or software component, or service, or the entire computer available to a user. By combining the unique program identifier with a computer hardware identifier uniquely identified transactions may be tracked for both billing and reconciliation. Certificates associated with each unique program identifier, and coupled to the hardware identifier, provide a cryptographic basis for mutual verification of messages, requests, configuration instructions, and provisioning.Type: GrantFiled: October 5, 2005Date of Patent: December 6, 2011Assignee: Microsoft CorporationInventors: Alexander Frank, Bohdan Raciborski, James S. Duffus, Jeffrey A. Herold, Martin H. Hall, Paul C. Sutton, Thomas G. Phillips
-
Publication number: 20100287024Abstract: A method is provided for prompting a user to perform PIM-related acts based on dynamic location data. The user's current location is received and a PIM item is selected from the user's PIM system. The user's current location is compared to the location of the selected PIM item. Based on the comparison, a suggested user fulfillment action for the PIM item is suggested to the user.Type: ApplicationFiled: May 11, 2009Publication date: November 11, 2010Applicant: MICROSOFT CORPORATIONInventors: Bradley W. Ward, David Lee, Martin H. Hall, Mark McNulty
-
Patent number: 7694153Abstract: A computer or other electronic device uses a cryptographic capability and hardware identifier to verify a provisioning packet for changing the mode of operation of the device or a licensed component. A secure memory stores the provisioning packet for future reference. A sequence number may be used to limit replay attacks. An exemplary use is conversion of a computer from metered use during a subscription period to unlimited use when the subscription terms have been satisfied.Type: GrantFiled: August 24, 2005Date of Patent: April 6, 2010Assignee: Microsoft CorporationInventors: Isaac Ahdout, Martin H. Hall, Zhangwei Xu
-
Publication number: 20100063732Abstract: A navigation device includes a communication subsystem and a navigation subsystem. The communication subsystem communicates with a remote navigation database via a gateway using variable-size data payloads. Each variable-size data payload is accompanied by a content-identifier and a size-identifier. The navigation subsystem determines a current position of the navigation device and encodes the current position of the navigation device as one or more position payloads that are sent from the communication subsystem to the remote navigation database via the gateway. Each position payload is sent with an accompanying content-identifier and size-identifier.Type: ApplicationFiled: September 5, 2008Publication date: March 11, 2010Applicant: Microsoft CorporationInventors: Ali Khan, Zhangwei Xu, Alexander Bussmann, Dhiresh Kumar, Gaurav Singhal, Martin H. Hall, Jennifer Hilary Kays
-
Patent number: 7539647Abstract: A pay-per-use or metered-use computer uses directives from an operating system or other software component to determine whether to meter or not. Because such directives may not be trustworthy, a metering system may determine a state of the computer to verify that the metering state complies with a policy. If the metering system determines that the power state is not in keeping with the metering state, the metering system may invoke a sanction, such as restarting metering or placing some or all of the computer in a standby power mode.Type: GrantFiled: August 25, 2005Date of Patent: May 26, 2009Assignee: Microsoft CorporationInventors: Zhangwei Xu, Martin H. Hall, Isaac Ahdout
-
Publication number: 20080320312Abstract: A hardware-based security module is used to protect an electronic device, especially a portable electronic device. The security module may determine either via timeout of a watchdog timer or via an explicit message to encrypt selected data on the electronic device. In addition, the electronic device may enter a limited function mode that only allows display of simplistic messages and supports network traffic with a recovery service. The recovery service may be able to use the network traffic to locate the electronic device. The security module may include a secure memory, a cryptographic function, a timer, and support for direct display of data on a monitor.Type: ApplicationFiled: June 21, 2007Publication date: December 25, 2008Applicant: MICROSOFT CORPORATIONInventors: James S. Duffus, Curt Andrew Steeb, Thomas G. Phillips, Jeffrey Alan Herold, William Poole, William J. Westerinen, Martin H. Hall
-
Publication number: 20080319925Abstract: A computer or other electronic device may be used in one of several selectable modes of operation. Computer resources, such as a processor, memory, or a graphics controller, are individually settable for operation at different levels of performance. A mode of operation or performance level is determined by the combination of individual settings for the various resources. Pay-per-use operation is charged at a rate determined by the mode of operation or performance level. Operation in a gaming mode may be charged at a higher rate than operation in web-browsing mode. A metering agent may be associated with each scalable use resource to securely set the performance level and to securely report on metered operation of the resource.Type: ApplicationFiled: June 21, 2007Publication date: December 25, 2008Applicant: MICROSOFT CORPORATIONInventors: Jeffrey Alan Herold, James S. Duffus, Curt Andrew Steeb, Thomas G. Phillips, William J. Westerinen, Martin H. Hall, Todd L. Carpenter, Daniel Makoski, Shon Schmidt
-
Publication number: 20080319910Abstract: A computer with scalable performance level components and selectable software and service options has a user interface that allows individual performance levels to be selected. The scalable performance level components may include a processor, memory, graphics controller, etc. Software and services may include word processing, email, browsing, database access, etc. To support a pay-per-use business model, each selectable item may have a cost associated with it, allowing a user to pay for the services actually selected and that presumably correspond to the task or tasks being performed. An administrator may use a similar user interface to set performance levels for each computer in a network, allowing performance and cost to be set according to a user's requirements.Type: ApplicationFiled: June 21, 2007Publication date: December 25, 2008Applicant: MICROSOFT CORPORATIONInventors: James S. Duffus, Curt Andrew Steeb, Thomas G. Phillips, Todd L. Carpenter, Martin H. Hall, Ricardo Lopez-Barquilla, Judy Tandog, Katie Ann Aldrich, Daniel Makoski, David James Foster, Krista L. Johnson
-
Publication number: 20080184026Abstract: A metered-use computer is operable in a number of states or modes to accommodate manufacture, test, operation and end-of-life. During manufacturing, a security module may be set to a non-metered mode, where no measurements are taken. At the end of the manufacturing process, the security module may be set to an active mode where metering and measurement of the computer are enforced. When terms of a purchase contract or other user agreement are satisfied, the computer may be set to a non-enforcement state where all metering and metering-related security are disabled. A one-time reset of the active mode is supported to allow end-of-line quality assurance testing.Type: ApplicationFiled: January 29, 2007Publication date: July 31, 2008Inventors: Martin H. Hall, Zhangwei Xu, Jeffrey Alan Herold, Curt Andrew Steeb, Rajagopal Venkatachalam, Douglas Reed Beck, David James Foster
-
Publication number: 20080183712Abstract: A security module manages authorization of additional computing resources, either additional processing power in a server, or additional servers in a server enclosure responsive to an authorized message. The authorized message may be generated at a management node and may include a provisioning license for use by the security module to set a duration for use of the additional computing resources. A baseboard management controller may be house the security module or each controllable resource may house an associated security module. The baseboard management controller may store the authorized message when the security module is not active and forward the message after the security module has been activated.Type: ApplicationFiled: January 29, 2007Publication date: July 31, 2008Inventors: William J. Westerinen, Jeffrey Alan Herold, Thomas G. Phillips, Martin H. Hall
-
Publication number: 20080184283Abstract: A management console may be used to monitor available usage on a pay-per-use electronic device, such as a pay-per-use computer. When the management console determines that any of tie monitored electronic devices has reached a trigger level the management console may re-charge the electronic device with value. The value may be taken from a local pool of value stored at the management console or the an add-value transaction may be generated at the management console on behalf of the pay-per-use electronic device. In an Internet cafe or similar environment, the use of the management console shields individual users from usage purchase transactions for individual pay-per-use electronic devices.Type: ApplicationFiled: April 6, 2007Publication date: July 31, 2008Applicant: MICROSOFT CORPORATIONInventors: Michelle Maislen, Garrett R. Vargas, Curt Andrew Steeb, Jeffrey Alan Herold, Martin H. Hall, Isaac P. Ahdout
-
Publication number: 20080183623Abstract: A pay-per-use business model relies on an accurate, or at least, un-tampered, time reference for the administration of prepaid usage time, e.g. hours, or subscription expiration dates. A protocol for provisioning usage requires that any electronic device request for provisioning includes current time at the device. A server responding to the request may evaluate the time at the device and send an updated time when the current time at the device is outside a variance limit. If the electronic device repeatedly sends requests with inaccurate time, the server may cease sending time updates and block the electronic device from further updates for suspected tampering.Type: ApplicationFiled: January 29, 2007Publication date: July 31, 2008Inventors: Zhangwei Xu, Josh Benaloh, Martin H. Hall, David Jaroslav Sebesta, Jeffrey Alan Herold, Zeyong Xu, Douglas Reed Beck, Curt Andrew Steeb
-
Patent number: 7359807Abstract: A method and apparatus for saving, retrieving, and adjusting metering data uses information about the period between saves of the metering data to non-volatile memory and other information, for example, a number of recovery events experienced by the computer. The retrieved metering data may be adjusted according to the number of recovery events so that more frequent power interruptions cause metering data adjustments to favor a service provider. The time between data saves may be altered to increase the difficulty of timing attacks. Information about the time between saves, or the period of the save cycle, may also be stored with the metering data for use in the metering data restoration process.Type: GrantFiled: February 14, 2005Date of Patent: April 15, 2008Assignee: Microsoft CorporationInventors: Alexander Frank, Mark C. Light, Martin H. Hall
-
Publication number: 20070150959Abstract: To put developers or other user or administrative personnel on notice that IP rights exist corresponding to an interprocess message, a trademarked or copyrighted value may be included in an interprocess message and validated by a receiving process before acceptance of the message.Type: ApplicationFiled: December 14, 2005Publication date: June 28, 2007Applicant: MICROSOFT CORPORATIONInventors: Isaac P. Ahdout, Martin H. Hall