Patents by Inventor Peter Brundrett

Peter Brundrett has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20070186112
    Abstract: Systems and methods are described that control attempts made by an application to access data. In one embodiment, the application is associated with a security token that includes an application ID. In operation, the system receives a request, initiated by the application, for access to the data. The system is configured to evaluate the request for access based in part on comparison of the security token and a listing of approved application IDs associated with the data.
    Type: Application
    Filed: January 28, 2005
    Publication date: August 9, 2007
    Applicant: Microsoft Corporation
    Inventors: Eric Perlin, Klaus Schutz, Paul Leach, Peter Brundrett, Thomas Jones
  • Publication number: 20070005961
    Abstract: An operating system for a computing device has a first session for a user that includes a first base process that has a first privileges token attached thereto. The first privileges token includes substantially a full set of privileges of the user on the operating system. The operating system also has a second session for the user that includes a second base process that has a second privileges token attached thereto. The second privileges token is derived from the first privileges token and includes only a minimum set of privileges of the user on the operating system. Thus, the second, limited token does not have all privileges associated with the first, full token but instead has a limited set of privileges and not extra privileges that could be employed to take actions that would be harmful, deceptive, or malicious.
    Type: Application
    Filed: June 30, 2005
    Publication date: January 4, 2007
    Applicant: Microsoft Corporation
    Inventors: Jeffrey Hamblin, Jonathan Schwartz, Kedarnath Dubhashi, Klaus Schutz, Peter Brundrett, Richard Ward, Thomas Jones
  • Publication number: 20060277218
    Abstract: In various embodiments, applications that are configured to interact with the Internet in some way are executed in a restricted process with a reduced privilege level that can prohibit the application from accessing portions of an associated computing device. For example, in some embodiments, the restricted process can prohibit applications from read and write access to portions of a system's computer-readable media, such as the hard disk, that contains administrative data and settings information and user data and settings. In these embodiments, a special portion of the disk, termed a “containment zone”, is designated and used by applications in this restricted process.
    Type: Application
    Filed: June 3, 2005
    Publication date: December 7, 2006
    Applicant: Microsoft Corporation
    Inventors: Roberto Franco, Anantha Ganjam, John Bedworth, Peter Brundrett, Roland Tokumi
  • Publication number: 20060277311
    Abstract: In various embodiments, applications that are configured to interact with the Internet in some way are executed in a restricted process with a reduced privilege level that can prohibit the application from accessing portions of an associated computing device. For example, in some embodiments, the restricted process can prohibit applications from read and write access to portions of a system's computer-readable media, such as the hard disk, that contains administrative data and settings information and user data and settings. In these embodiments, a special portion of the disk, termed a “containment zone”, is designated and used by applications in this restricted process.
    Type: Application
    Filed: October 28, 2005
    Publication date: December 7, 2006
    Applicant: Microsoft Corporation
    Inventors: Roberto Franco, Anantha Ganjam, John Bedworth, Peter Brundrett, Roland Tokumi, Jeremiah Epling, Daniel Sie, Jianrong Gu, Marc Sibley, Vidya Nallathimmayyagari, Bogdan Tepordei
  • Publication number: 20060248585
    Abstract: The contemplated embodiments of the invention provide a method for implementing a mandatory integrity control (MIC) system that provides access control for each and every object and subject that need access control, but in a way that allows legacy operating systems to continue with little modification. The invention provides a novel method that selects an integrity level designator for a subject, when the subject logs onto the computer system. The selected integrity level designator is then added to an existing data structure in the computer system. The existing data structure may be a part of a security descriptor stored in a system access control list of an object. The existing data structure may be a part of a list of security permissions that constitute an access token for a process executing as a subject.
    Type: Application
    Filed: April 28, 2005
    Publication date: November 2, 2006
    Applicant: Microsoft Corporation
    Inventors: Richard Ward, Jeffrey Hamblin, Peter Brundrett
  • Publication number: 20060174334
    Abstract: Systems and methods are described that control attempts made by an application to access data. In one embodiment, the application is associated with a security token that includes an application ID. In operation, the system receives a request, initiated by the application, for access to the data. The system is configured to evaluate the request for access based in part on comparison of the security token and a listing of approved application IDs associated with the data.
    Type: Application
    Filed: January 28, 2005
    Publication date: August 3, 2006
    Applicant: Microsoft Corporation
    Inventors: Eric Perlin, Klaus Schutz, Paul Leach, Peter Brundrett, Thomas Jones
  • Patent number: 6249866
    Abstract: A system and method for encryption and decryption of files. The system and method operate in conjunction with the file system to transparently encrypt and decrypt files in using a public key-private key pair encryption scheme. When a user puts a file in an encrypted directory or encrypts a file, all data writes to the disk for that file are encrypted with a random file encryption key generated from a random number and encrypted with the public key of a user and the public key of at least one recovery agent. The encrypted key information is stored with the file, whereby the user or a recovery agent can decrypt the file data using the private key thereof. When a proper private key is used, encrypted reads from the disk are decrypted transparently by the file system and returned to the user.
    Type: Grant
    Filed: September 16, 1997
    Date of Patent: June 19, 2001
    Assignee: Microsoft Corporation
    Inventors: Peter Brundrett, Praerit Garg, Jianrong Gu, James W. Kelly, Jr., Keith S. Kaplan, Robert P. Reichel, Brian Andrew, Gary D. Kimura, Thomas J. Miller