Patents by Inventor Nathan D. Muggli

Nathan D. Muggli has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20150222614
    Abstract: Sharing resources on a network include, for example, a domain controller hierarchy scheme, which is used in some implementations to organize and share both secure and non-secure resources in an efficient manner. Using authentication information can be used to architect a trustworthy system to divulging sensitive client data (such as user/computer passwords) to a host system. The sensitive client data can be released to the host system when a client establishes a relationship having a degree of trust with the host.
    Type: Application
    Filed: April 17, 2015
    Publication date: August 6, 2015
    Applicant: Microsoft Technology Licensing, LLC
    Inventors: Gregory C. Johnson, William S. Jack, Nathan D. Muggli, Tarek B. Kamel
  • Patent number: 8316455
    Abstract: Accessing a data set with secret and non-secret data. A method includes accessing a data set image. The data set image comprises secret data. The data set image is derived from an authorized data set associated with a master key that authorizes access to the secret data. The master key is not provided with the data set image. The method further comprises restoring the data set image to a computing system to create a degraded data set. Data in the degraded data set other than the secret data is accessed without restoring the master key.
    Type: Grant
    Filed: January 27, 2011
    Date of Patent: November 20, 2012
    Assignee: Microsoft Corporation
    Inventors: Collin H. Brace, Nathan D. Muggli, William B. Lees, William J. Whalen
  • Patent number: 8074264
    Abstract: A server may bridge between a wide area network, such as the Internet, and a local area network and may process authentication requests from clients on the wide area network. The server may filter the requests to enable specific types of requests to pass, and may forward the requests to a credential server within the local area network and pass any responses back to the client. The server may be configured with some or all of a set of domain services objects, but such objects may be stored in a read only format. The server may further contain a minimum of or no sensitive data such that, if compromised, an attacker may gain little advantage. The client may request evidence of authentication available to devices within the local area network and may use the evidence of authentication to access services made available to the wide area network.
    Type: Grant
    Filed: April 16, 2008
    Date of Patent: December 6, 2011
    Assignee: Microsoft Corporation
    Inventors: Daniel W. Hitchcock, Siddharth Bhai, Nathan D. Muggli, Brian W. Puhl, Lee F. Walker
  • Publication number: 20110126027
    Abstract: Accessing a data set with secret and non-secret data. A method includes accessing a data set image. The data set image comprises secret data. The data set image is derived from an authorized data set associated with a master key that authorizes access to the secret data. The master key is not provided with the data set image. The method further comprises restoring the data set image to a computing system to create a degraded data set. Data in the degraded data set other than the secret data is accessed without restoring the master key.
    Type: Application
    Filed: January 27, 2011
    Publication date: May 26, 2011
    Applicant: MICROSOFT CORPORATION
    Inventors: Colin H. Brace, Nathan D. Muggli, William B. Lees, William J. Whalen
  • Patent number: 7921304
    Abstract: Accessing a data set with secret and non-secret data. A method includes accessing a data set image. The data set image comprises secret data. The data set image is derived from an authorized data set associated with a master key that authorizes access to the secret data. The master key is not provided with the data set image. The method further comprises restoring the data set image to a computing system to create a degraded data set. Data in the degraded data set other than the secret data is accessed without restoring the master key.
    Type: Grant
    Filed: December 6, 2005
    Date of Patent: April 5, 2011
    Assignee: Microsoft Corporation
    Inventors: Colin H. Brace, Nathan D. Muggli, William B. Lees, William J. Whalen
  • Publication number: 20090265772
    Abstract: A server may bridge between a wide area network, such as the Internet, and a local area network and may process authentication requests from clients on the wide area network. The server may filter the requests to enable specific types of requests to pass, and may forward the requests to a credential server within the local area network and pass any responses back to the client. The server may be configured with some or all of a set of domain services objects, but such objects may be stored in a read only format. The server may further contain a minimum of or no sensitive data such that, if compromised, an attacker may gain little advantage. The client may request evidence of authentication available to devices within the local area network and may use the evidence of authentication to access services made available to the wide area network.
    Type: Application
    Filed: April 16, 2008
    Publication date: October 22, 2009
    Applicant: MICROSOFT CORPORATION
    Inventors: Daniel W. Hitchcock, Siddarth Bhai, Nathan D. Muggli, Brian W. Puhl, Lee F. Walker
  • Patent number: 7606937
    Abstract: Registering a client with a distributed service. A method may be practiced, for example, in a network computing environment including a client at a local site and a number of distributed services at a number of remote sites. The method includes pinging one or more distributed services at one or more remote sites. A message is received from a distributed service from among the one or more distributed services. The message specifies an optimal remote site. The method further includes registering with a distributed service at the optimal remote site.
    Type: Grant
    Filed: December 2, 2005
    Date of Patent: October 20, 2009
    Assignee: Microsoft Corporation
    Inventors: Weiqing Tu, William B. Lees, Billy J. Fuller, Nathan D. Muggli
  • Publication number: 20080098120
    Abstract: Sharing resources on a network include, for example, a domain controller hierarchy scheme, which is used in some implementations to organize and share both secure and non-secure resources in an efficient manner. Using authentication information can be used to architect a trustworthy system to divulging sensitive client data (such as user/computer passwords) to a host system. The sensitive client data can be released to the host system when a client establishes a relationship having a degree of trust with the host.
    Type: Application
    Filed: October 23, 2006
    Publication date: April 24, 2008
    Applicant: Microsoft Corporation
    Inventors: Gregory C. Johnson, William S. Jack, Nathan D. Muggli, Tarek B. Kamel