Patents by Inventor Nathan D. Muggli
Nathan D. Muggli has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Publication number: 20150222614Abstract: Sharing resources on a network include, for example, a domain controller hierarchy scheme, which is used in some implementations to organize and share both secure and non-secure resources in an efficient manner. Using authentication information can be used to architect a trustworthy system to divulging sensitive client data (such as user/computer passwords) to a host system. The sensitive client data can be released to the host system when a client establishes a relationship having a degree of trust with the host.Type: ApplicationFiled: April 17, 2015Publication date: August 6, 2015Applicant: Microsoft Technology Licensing, LLCInventors: Gregory C. Johnson, William S. Jack, Nathan D. Muggli, Tarek B. Kamel
-
Patent number: 8316455Abstract: Accessing a data set with secret and non-secret data. A method includes accessing a data set image. The data set image comprises secret data. The data set image is derived from an authorized data set associated with a master key that authorizes access to the secret data. The master key is not provided with the data set image. The method further comprises restoring the data set image to a computing system to create a degraded data set. Data in the degraded data set other than the secret data is accessed without restoring the master key.Type: GrantFiled: January 27, 2011Date of Patent: November 20, 2012Assignee: Microsoft CorporationInventors: Collin H. Brace, Nathan D. Muggli, William B. Lees, William J. Whalen
-
Patent number: 8074264Abstract: A server may bridge between a wide area network, such as the Internet, and a local area network and may process authentication requests from clients on the wide area network. The server may filter the requests to enable specific types of requests to pass, and may forward the requests to a credential server within the local area network and pass any responses back to the client. The server may be configured with some or all of a set of domain services objects, but such objects may be stored in a read only format. The server may further contain a minimum of or no sensitive data such that, if compromised, an attacker may gain little advantage. The client may request evidence of authentication available to devices within the local area network and may use the evidence of authentication to access services made available to the wide area network.Type: GrantFiled: April 16, 2008Date of Patent: December 6, 2011Assignee: Microsoft CorporationInventors: Daniel W. Hitchcock, Siddharth Bhai, Nathan D. Muggli, Brian W. Puhl, Lee F. Walker
-
Publication number: 20110126027Abstract: Accessing a data set with secret and non-secret data. A method includes accessing a data set image. The data set image comprises secret data. The data set image is derived from an authorized data set associated with a master key that authorizes access to the secret data. The master key is not provided with the data set image. The method further comprises restoring the data set image to a computing system to create a degraded data set. Data in the degraded data set other than the secret data is accessed without restoring the master key.Type: ApplicationFiled: January 27, 2011Publication date: May 26, 2011Applicant: MICROSOFT CORPORATIONInventors: Colin H. Brace, Nathan D. Muggli, William B. Lees, William J. Whalen
-
Patent number: 7921304Abstract: Accessing a data set with secret and non-secret data. A method includes accessing a data set image. The data set image comprises secret data. The data set image is derived from an authorized data set associated with a master key that authorizes access to the secret data. The master key is not provided with the data set image. The method further comprises restoring the data set image to a computing system to create a degraded data set. Data in the degraded data set other than the secret data is accessed without restoring the master key.Type: GrantFiled: December 6, 2005Date of Patent: April 5, 2011Assignee: Microsoft CorporationInventors: Colin H. Brace, Nathan D. Muggli, William B. Lees, William J. Whalen
-
Publication number: 20090265772Abstract: A server may bridge between a wide area network, such as the Internet, and a local area network and may process authentication requests from clients on the wide area network. The server may filter the requests to enable specific types of requests to pass, and may forward the requests to a credential server within the local area network and pass any responses back to the client. The server may be configured with some or all of a set of domain services objects, but such objects may be stored in a read only format. The server may further contain a minimum of or no sensitive data such that, if compromised, an attacker may gain little advantage. The client may request evidence of authentication available to devices within the local area network and may use the evidence of authentication to access services made available to the wide area network.Type: ApplicationFiled: April 16, 2008Publication date: October 22, 2009Applicant: MICROSOFT CORPORATIONInventors: Daniel W. Hitchcock, Siddarth Bhai, Nathan D. Muggli, Brian W. Puhl, Lee F. Walker
-
Patent number: 7606937Abstract: Registering a client with a distributed service. A method may be practiced, for example, in a network computing environment including a client at a local site and a number of distributed services at a number of remote sites. The method includes pinging one or more distributed services at one or more remote sites. A message is received from a distributed service from among the one or more distributed services. The message specifies an optimal remote site. The method further includes registering with a distributed service at the optimal remote site.Type: GrantFiled: December 2, 2005Date of Patent: October 20, 2009Assignee: Microsoft CorporationInventors: Weiqing Tu, William B. Lees, Billy J. Fuller, Nathan D. Muggli
-
Publication number: 20080098120Abstract: Sharing resources on a network include, for example, a domain controller hierarchy scheme, which is used in some implementations to organize and share both secure and non-secure resources in an efficient manner. Using authentication information can be used to architect a trustworthy system to divulging sensitive client data (such as user/computer passwords) to a host system. The sensitive client data can be released to the host system when a client establishes a relationship having a degree of trust with the host.Type: ApplicationFiled: October 23, 2006Publication date: April 24, 2008Applicant: Microsoft CorporationInventors: Gregory C. Johnson, William S. Jack, Nathan D. Muggli, Tarek B. Kamel