Patents by Inventor Paul J. Leach

Paul J. Leach has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20070277231
    Abstract: A credential security support provider (Cred SSP) is provided that enables any application to securely delegate a user's credentials from the client, via client side Security Support Provider (SSP) software, to a target server, via server side SSP software in a networked computing environment. The Cred SSP of the invention provides a secure solution that is based in part upon a set of policies, including a default policy that is secure against a broad range of attacks, which are used to control and restrict the delegation of user credentials from a client to a server. The policies can be for any type of user credentials and the different policies are designed to mitigate a broad range of attacks so that appropriate delegation can occur for given delegation circumstances, network conditions, trust levels, etc. Additionally, only a trusted subsystem, e.g.
    Type: Application
    Filed: May 26, 2006
    Publication date: November 29, 2007
    Applicant: Microsoft Corporation
    Inventors: Gennady Medvinsky, Cristian Ilac, Costin Hagiu, John E. Parsons, Mohamed Emad El Din Fathalla, Paul J. Leach, Tarek Buhaa El-Din Mahmoud Kamel
  • Patent number: 7302634
    Abstract: A schema-based service for Internet access to per-user services data, wherein access to data is based on each user's identity. The service includes a schema that defines rules and a structure for each user's data, and also includes methods that provide access to the data in a defined way. The services schema thus corresponds to a logical document containing the data for each user. The user manipulates (e.g., reads or writes) data in the logical document by data access requests through defined methods. In one implementation, the services schemas are arranged as XML documents, and the services provide methods that control access to the data based on the requesting user's identification, defined role and scope for that role. In this way, data can be accessed by its owner, and shared to an extent determined by the owner.
    Type: Grant
    Filed: October 22, 2001
    Date of Patent: November 27, 2007
    Assignee: Microsoft Corporation
    Inventors: Mark H. Lucovsky, Shaun Douglas Pierce, Steven D. White, Ramu Movva, Jagadeesh Kalki, David Benjamin Auerbach, Peter Sewall Ford, Jay Christopher Jacobs, Paul Andrew Steckler, Walter C. Hsueh, Kendall D. Keil, Burra Gopal, Suresh Kannan, Yi-Wen Guu, Samuel John George, William Raymond Hoffman, Philip Michael Smoot, Lijiang Fang, Michael B. Taylor, Winnie C. Wu, Paul J. Leach, Richard B. Ward, Yun-Qi Yuan
  • Patent number: 7284271
    Abstract: Authorizing a requesting entity to have a service perform a particular action in a manner that is at least partially independent of the underlying target data structure. An authorization station maintains a number of role templates that each define basic access permissions with respect to a number of command methods. The authorization station also maintains a number of role definitions that each define access permissions for specific requesting entities by using one or more of the role templates. When the authorization station receives a request from the requesting entity, the authorization station then identifies the appropriate role definition. Using this role definition, the authorization station determines access permissions for the requesting entity with respect to the requested action.
    Type: Grant
    Filed: October 22, 2001
    Date of Patent: October 16, 2007
    Assignee: Microsoft Corporation
    Inventors: Mark Lucovsky, Shaun D. Pierce, Michael G. Burner, Richard B. Ward, Paul J. Leach, George M. Moore, Arthur Zwiegincew, Robert M. Hyman, Jonathan D. Pincus, Daniel R. Simon
  • Patent number: 7251822
    Abstract: The present invention relates to a system and methodology to facilitate security for data items residing within (or associated with) a hierarchical database or storage structure. A database security system is provided having a hierarchical data structure associated with one or more data items. The system includes a security component that applies a security policy to the data items from a global location or region associated with a database. Various components and processes are employed to enable explicit and/or inherited security properties to be received by and propagated to the data items depending on the type of data structure encountered or processed.
    Type: Grant
    Filed: October 23, 2003
    Date of Patent: July 31, 2007
    Assignee: Microsoft Corporation
    Inventors: Sameet H. Agarwal, Balan Sethu Raman, Sanjay Anand, Paul J. Leach, Richard B. Ward
  • Patent number: 7185359
    Abstract: An enterprise network architecture has a trust link established between two autonomous network systems that enables transitive resource access between network domains of the two network systems. The trust link is defined by data structures maintained by each of the respective network systems. The first network system maintains namespaces that correspond to the second network system and a domain controller in the first network system, or a first network system administrator, indicates whether to trust individual namespaces. An account managed by a domain in the second network system can request authentication via a domain controller in the first network system. The first network system determines from the trust link to communicate the authentication request to the second network system. The first network system also determines from the trust link where to communicate authorization requests when administrators manage group memberships and access control lists.
    Type: Grant
    Filed: December 21, 2001
    Date of Patent: February 27, 2007
    Assignee: Microsoft Corporation
    Inventors: Donald E. Schmidt, Clifford P. Van Dyke, Paul J. Leach, Praerit Garg, Murli D. Satagopan
  • Patent number: 7181016
    Abstract: One aspect relates to a process and associated device that provides a private key of an asymmetric key pair in a key device. A symmetric master key is derived from the private key of the asymmetric key pair. The symmetric master key is stored in a computer memory location. The symmetric master key is used to encrypt or decrypt a file encryption key. The file encryption key can encrypt or decrypt files. In another aspect, the user can still access the files even if a user deactivates the key device by encrypting or decrypting the file encryption key directly from the symmetric master key.
    Type: Grant
    Filed: January 27, 2003
    Date of Patent: February 20, 2007
    Assignee: Microsoft Corporation
    Inventors: David B. Cross, Jianrong Gu, Josh D. Benaloh, Thomas C. Jones, Paul J. Leach, Glenn D. Pittaway
  • Patent number: 7136859
    Abstract: Directly operating on data structures in a generic manner regardless of the type of data structure being operated upon and without requiring dedicated executable code for manipulating data structures of the particular data type. A common set of commands (e.g., insert, delete, replace, update, query) are recognized that may be used to operate on data structures of a number of different data types. A navigation module accesses a request to execute one of the common command methods on at least an identified portion of an identified data structure. Then, the navigation module accesses a navigation assistance module to access a set of rules associated with the particular data type, the set of rules allowing the navigation module to find the portion of the data structure that is to be operated on. If appropriate, the command operation is then executed on the identified portion of the data structure.
    Type: Grant
    Filed: October 22, 2001
    Date of Patent: November 14, 2006
    Assignee: Microsoft Corporation
    Inventors: Mark Lucovsky, Shaun D. Pierce, Alexander T. Weinert, Michael G. Burner, Richard B. Ward, Paul J. Leach, George M. Moore, Arthur Zwiegincew, Robert M. Hyman, Jonathan D. Pincus, Daniel R. Simon
  • Patent number: 7130895
    Abstract: A device control model provides an integrated set of addressing, naming, discovery and description processes that enables automatic, dynamic and ad-hoc self-setup by devices to interoperate with other devices on a network. This permits a computing device when introduced into a network to automatically configure so as to connect and interact with other computing devices available on the network, without a user installation experience and without downloading driver software or persisting a configuration setup for connecting and interacting with such other computing devices. Upon completing interaction with such other devices, the computing device automatically releases the setup for such other devices so as to avoid persistent device configurations that might create a configuration maintenance and management burden.
    Type: Grant
    Filed: March 16, 2001
    Date of Patent: October 31, 2006
    Assignee: Microsoft Corporation
    Inventors: William Michael Zintel, Amar S. Gandhi, Ye Gu, Paul J. Leach, Ting Cai, Holly N. Knight, Peter S. Ford
  • Patent number: 7062539
    Abstract: Processing a response to a network request using information that was transplanted into the response from a specific portion of the request. A requesting computer system generates an electronic request that includes the specific portion. The requesting computer system then submits the request to a responding computer system, which processes the request to form a response to the request. During processing of the request, the responding system transplants the specific portion of the request to the response. The responding computer system then transmits the response to the request to a processing computer system that processes the request. The processing computer system receives the response and extracts the information from the specific portion of the response. The processing computer system then uses the extracted information to process the request.
    Type: Grant
    Filed: October 19, 2004
    Date of Patent: June 13, 2006
    Assignee: Microsoft Corporation
    Inventors: Paul J. Leach, Chris Kaler, Ferhan Elvanoglu, Mark H. Lucovsky, Shaun D. Pierce
  • Patent number: 7046689
    Abstract: A network system includes a content provider connected to local service providers via an interactive distribution network, such as the Internet. The local service providers facilitate delivery of the content from the content provider to multiple subscribers. The local service providers schedule delivery of frequently requested content from the content provider prior to a peak time when the subscribers are likely to request the content. The content is downloaded from the content provider during the off-peak hours and cached at the local service providers for serving to the subscribers during the ensuing peak time. In this manner, the frequently requested content is already present at the local service providers and ready to be served to the subscribers before they actually request it. When the content is finally requested, the data is streamed continuously in real-time for just-in-time rendering at the subscriber computer.
    Type: Grant
    Filed: April 2, 2001
    Date of Patent: May 16, 2006
    Assignee: Microsoft Corporation
    Inventors: Gregory Burns, Paul J. Leach
  • Patent number: 6985958
    Abstract: A messaging data structure for accessing data in an identity-centric manner. An identity may be a user, a group of users, or an organization. Instead of data being maintained on an application-by-application basis, the data associated with a particular identity is stored by one or more data services accessible by many applications. The data is stored in accordance with a schema that is recognized by a number of different applications and the data service. The messaging data structure includes fields that identify the target data object to be operated upon using an identity field, a schema field, and an instance identifier field. In addition, the desired operation is specified. Thus, the target data object is operated on in an identity-centric manner.
    Type: Grant
    Filed: October 22, 2001
    Date of Patent: January 10, 2006
    Assignee: Microsoft Corporation
    Inventors: Mark Lucovsky, Shaun D. Pierce, Alexander T. Weinert, Michael G. Burner, Richard B. Ward, Paul J. Leach, George M. Moore, Arthur Zwiegincew, Vivek Gundotra, Robert M. Hyman, Jonathan D. Pincus, Daniel R. Simon
  • Patent number: 6910068
    Abstract: A universal plug and play (UPnP) device makes itself known through a set of processes-discovery, description, control, eventing, and presentation. Following discovery of a UPnP device, an entity can learn more about the device and its capabilities by retrieving the device's description. The description includes vendor-specific manufacturer information like the model name and number, serial number, manufacturer name, URLs to vendor-specific Web sites, etc. The description also includes a list of any embedded devices or services, as well as URLs for control, eventing, and presentation. The description is written by a vendor, and is usually based on a device template produced by a UPnP forum working committee. The template is derived from a template language that is used to define elements to describe the device and any services supported by the device. The template language is written using an XML-based syntax that organizes and structures the elements.
    Type: Grant
    Filed: March 16, 2001
    Date of Patent: June 21, 2005
    Assignee: Microsoft Corporation
    Inventors: William M. Zintel, Amar S. Gandhi, Ye Gu, Shyamalan Pather, Jeffrey C. Schlimmer, Christopher M. Rude, Daniel R. Weisman, Donald R. Ryan, Paul J. Leach, Ting Cai, Holly N. Knight, Peter S. Ford
  • Patent number: 6892230
    Abstract: A device control model provides an integrated set of addressing, naming, discovery and description processes that enables automatic, dynamic and ad-hoc self-setup by devices to interoperate with other devices on a network. This permits a computing device when introduced into a network to automatically configure so as to connect and interact with other computing devices available on the network, without a user installation experience and without downloading driver software or persisting a configuration setup for connecting and interacting with such other computing devices. Upon completing interaction with such other devices, the computing device automatically releases the setup for such other devices so as to avoid persistent device configurations that might create a configuration maintenance and management burden.
    Type: Grant
    Filed: February 1, 2000
    Date of Patent: May 10, 2005
    Assignee: Microsoft Corporation
    Inventors: Ye Gu, Peter S. Ford, Holly Knight, Yaron Y. Goland, Paul J. Leach
  • Publication number: 20040260800
    Abstract: A device control model provides an integrated set of addressing, naming, discovery and description processes that enables automatic, dynamic and ad-hoc self-setup by devices to interoperate with other devices on a network. This permits a computing device when introduced into a network to automatically configure so as to connect and interact with other computing devices available on the network, without a user installation experience and without downloading driver software or persisting a configuration setup for connecting and interacting with such other computing devices. Upon completing interaction with such other devices, the computing device automatically releases the setup for such other devices so as to avoid persistent device configurations that might create a configuration maintenance and management burden.
    Type: Application
    Filed: May 3, 2004
    Publication date: December 23, 2004
    Applicant: Microsoft Corporation
    Inventors: Ye Gu, Peter S. Ford, Holly Knight, Yaron Y. Goland, Paul J. Leach
  • Patent number: 6823369
    Abstract: Processing a response to a network request using information that was transplanted into the response from a specific portion of the request. A requesting computer system generates an electronic request that includes the specific portion. The requesting computer system then submits the request to a responding computer system, which processes the request to form a response to the request. During processing of the request, the responding system transplants the specific portion of the request to the response. The responding computer system then transmits the response to the request to a processing computer system that processes the request. The processing computer system receives the response and extracts the information from the specific portion of the response. The processing computer system then uses the extracted information to process the request.
    Type: Grant
    Filed: March 14, 2002
    Date of Patent: November 23, 2004
    Assignee: Microsoft Corporation
    Inventors: Paul J. Leach, Chris Kaler, Ferhan Elvanoglu, Mark H. Lucovsky, Shaun D Pierce
  • Publication number: 20040210756
    Abstract: This disclosure pertains generally to client authentication. One aspect of the disclosure relates to a first server for presenting evidence to a Domain Controller (DC) of a first authentication context being submitted from a client to the first server to obtain a delegable credential, wherein the credential can be used to request a second authentication context from that client to a second server. Another aspect relates to the first server providing a pass-thru with evidence to a DC. The evidence relates to a first authentication context being submitted from a client to the first server that it obtained a delegable credential. The pass-thru is used in combination with the credential to request a second authentication context from the client to a second server.
    Type: Application
    Filed: April 15, 2003
    Publication date: October 21, 2004
    Applicant: MICROSOFT CORPORATION
    Inventors: David R. Mowers, John Banes, Daniel R. Simon, Paul J. Leach
  • Publication number: 20040146015
    Abstract: One aspect relates to a process and associated device that provides a private key of an asymmetric key pair in a key device. A symmetric master key is derived from the private key of the asymmetric key pair. The symmetric master key is stored in a computer memory location. The symmetric master key is used to encrypt or decrypt a file encryption key. The file encryption key can encrypt or decrypt files. In another aspect, the user can still access the files even if a user deactivates the key device by encrypting or decrypting the file encryption key directly from the symmetric master key.
    Type: Application
    Filed: January 27, 2003
    Publication date: July 29, 2004
    Inventors: David B. Cross, Jianrong Gu, Josh D. Benaloh, Thomas C. Jones, Paul J. Leach, Glenn D. Pittaway
  • Publication number: 20040143736
    Abstract: File system interaction with digital rights management (DRM) is facilitated by enabling one or more file system components to be DRM-aware. These one or more file system components may be part of a computer operating system. An exemplary system implementation includes: one or more processors; and one or more media in operative communication therewith, the media storing one or more file system components that are configured to provide content having DRM controls to a requesting program in either a raw form or a decrypted form in dependence on whether the DRM controls comprise simple DRM content controls or complex DRM content controls. In another exemplary system implementation, the one or more file system components are configured to provide files with simple DRM content controls to requesting applications in a decrypted form and to provide files with complex DRM content controls to requesting applications in an unaltered form.
    Type: Application
    Filed: January 17, 2003
    Publication date: July 22, 2004
    Inventors: David B. Cross, Paul J. Leach
  • Publication number: 20040098615
    Abstract: Systems and related methods enable a web service to map a unique identifier received from a client to the client's user account in a directory service using an authentication protocol and thereby receive permission to access resources for the client in the service's domain or in a distant domain. When the unique identifier is a web service unique identifier (PUID), the PUID is changed to a user principal name (UPN) mappable to the client's user account object in the directory service.
    Type: Application
    Filed: November 16, 2002
    Publication date: May 20, 2004
    Inventors: David R. Mowers, John E. Brezak, Richard B. Ward, Scott A. Field, Todd F. Stecher, Paul J. Leach, Donald E. Schmidt
  • Publication number: 20030191953
    Abstract: Improved intrusion detection and/or tracking methods and systems are provided for use across various computing devices and networks. Certain methods, for example, form a substantially unique audit identifier during each authentication/logon process. One method includes identifying one or more substantially unique parameters that are associated with the authentication/logon process and encrypting them to form at least one audit identifier that can then be generated and logged by each device involved in the authentication/logon process. The resulting audit log file can then be audited along with similar audit log files from other devices to track a user across multiple platforms.
    Type: Application
    Filed: April 8, 2002
    Publication date: October 9, 2003
    Inventors: Bhalchandra S. Pandit, Praerit Garg, Richard B. Ward, Paul J. Leach, Scott A. Field, Robert P. Reichel, John E. Brezak