Patents by Inventor Peter Novotney
Peter Novotney has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Publication number: 20220207130Abstract: A computing device can perform operations to unlock encrypted volumes of the computing device while the computing device is in a recovery environment. In some examples, the computing device can work in conjunction with a test computing device to unlock the encrypted volumes using an unlock token and a PIN. In other examples, the computing device can perform operations without a test computing device. For example, the computing device can, while in the recovery environment, use credentials associated with a user of the computing device to obtain a recovery password to unlock keys for interpreting the encrypted volumes. In some examples, the computing device can use a shortened recovery password in conjunction with anti-hammering capabilities of a Trusted Platform Module in order to unlock keys for interpreting the encrypted volumes. These and other operations can facilitate secure unlock of volumes of encrypted data on a consumer device.Type: ApplicationFiled: March 17, 2022Publication date: June 30, 2022Inventors: Yogesh A. MEHTA, Octavian T. URECHE, Scott R. SHELL, Innokentiy BASMOV, Peter NOVOTNEY, Christopher L. WALSTAD
-
Patent number: 11295004Abstract: A computing device can perform operations to unlock encrypted volumes of the computing device while the computing device is in a recovery environment. In some examples, the computing device can work in conjunction with a test computing device to unlock the encrypted volumes using an unlock token and a PIN. In other examples, the computing device can perform operations without a test computing device. For example, the computing device can, while in the recovery environment, use credentials associated with a user of the computing device to obtain a recovery password to unlock keys for interpreting the encrypted volumes. In some examples, the computing device can use a shortened recovery password in conjunction with anti-hammering capabilities of a Trusted Platform Module in order to unlock keys for interpreting the encrypted volumes. These and other operations can facilitate secure unlock of volumes of encrypted data on a consumer device.Type: GrantFiled: January 31, 2020Date of Patent: April 5, 2022Assignee: Microsoft Technology Licensing, LLCInventors: Yogesh A. Mehta, Octavian T. Ureche, Scott R. Shell, Innokentiy Basmov, Peter Novotney, Christopher L. Walstad
-
Patent number: 10915656Abstract: In one embodiment, an encryption system may protect user login metadata from hammering attacks. A data storage may store an integrity protected data set for an operating system in a storage location. A processor may register a counter reading from a remote counter in a secure location separate from the storage location. The processor may determine a lockout state of the integrity protected data set based on the counter reading.Type: GrantFiled: April 25, 2018Date of Patent: February 9, 2021Assignee: MICROSOFT TECHNOLOGY LICENSING, LLCInventors: Benjamin Nick, Magnus Nystrom, Innokentiy Basmov, Peter Novotney, Michael Grass
-
Patent number: 10726147Abstract: Native file encryption support is integrated into an existing file system that does not provide such support, such as the FAT family of file systems, while maintaining backwards compatibility with previous implementations of these file systems.Type: GrantFiled: July 19, 2018Date of Patent: July 28, 2020Assignee: Microsoft Technology Licensing, LLC.Inventors: Darwin Ou-Yang, Peter Novotney, Ravinder Thind
-
Patent number: 10713350Abstract: A computing device can perform operations to unlock encrypted volumes of the computing device while the computing device is in a recovery environment. In some examples, the computing device can work in conjunction with a test computing device to unlock the encrypted volumes using an unlock token and a PIN. In other examples, the computing device can perform operations without a test computing device. For example, the computing device can, while in the recovery environment, use credentials associated with a user of the computing device to obtain a recovery password to unlock keys for interpreting the encrypted volumes. In some examples, the computing device can use a shortened recovery password in conjunction with anti-hammering capabilities of a Trusted Platform Module in order to unlock keys for interpreting the encrypted volumes. These and other operations can facilitate secure unlock of volumes of encrypted data on a consumer device.Type: GrantFiled: August 21, 2018Date of Patent: July 14, 2020Assignee: Microsoft Technology Licensing, LLCInventors: Yogesh A. Mehta, Octavian T. Ureche, Scott R. Shell, Innokentiy Basmov, Peter Novotney, Christopher L. Walstad
-
Publication number: 20200167462Abstract: A computing device can perform operations to unlock encrypted volumes of the computing device while the computing device is in a recovery environment. In some examples, the computing device can work in conjunction with a test computing device to unlock the encrypted volumes using an unlock token and a PIN. In other examples, the computing device can perform operations without a test computing device. For example, the computing device can, while in the recovery environment, use credentials associated with a user of the computing device to obtain a recovery password to unlock keys for interpreting the encrypted volumes. In some examples, the computing device can use a shortened recovery password in conjunction with anti-hammering capabilities of a Trusted Platform Module in order to unlock keys for interpreting the encrypted volumes. These and other operations can facilitate secure unlock of volumes of encrypted data on a consumer device.Type: ApplicationFiled: January 31, 2020Publication date: May 28, 2020Inventors: Yogesh A. MEHTA, Octavian T. URECHE, Scott R. SHELL, Innokentiy BASMOV, Peter NOVOTNEY, Christopher L. WALSTAD
-
Publication number: 20190065768Abstract: Native file encryption support is integrated into an existing file system that does not provide such support, such as the FAT family of file systems, while maintaining backwards compatibility with previous implementations of these file systems.Type: ApplicationFiled: July 19, 2018Publication date: February 28, 2019Inventors: Darwin Ou-Yang, Peter Novotney, Ravinder Thind
-
Publication number: 20180357412Abstract: A computing device can perform operations to unlock encrypted volumes of the computing device while the computing device is in a recovery environment. In some examples, the computing device can work in conjunction with a test computing device to unlock the encrypted volumes using an unlock token and a PIN. In other examples, the computing device can perform operations without a test computing device. For example, the computing device can, while in the recovery environment, use credentials associated with a user of the computing device to obtain a recovery password to unlock keys for interpreting the encrypted volumes. In some examples, the computing device can use a shortened recovery password in conjunction with anti-hammering capabilities of a Trusted Platform Module in order to unlock keys for interpreting the encrypted volumes. These and other operations can facilitate secure unlock of volumes of encrypted data on a consumer device.Type: ApplicationFiled: August 21, 2018Publication date: December 13, 2018Inventors: Yogesh A. MEHTA, Octavian T. URECHE, Scott R. SHELL, Innokentiy BASMOV, Peter NOVOTNEY, Christopher L. WALSTAD
-
Patent number: 10078748Abstract: A computing device can perform operations to unlock encrypted volumes of the computing device while the computing device is in a recovery environment. In some examples, the computing device can work in conjunction with a test computing device to unlock the encrypted volumes using an unlock token and a PIN. In other examples, the computing device can perform operations without a test computing device. For example, the computing device can, while in the recovery environment, use credentials associated with a user of the computing device to obtain a recovery password to unlock keys for interpreting the encrypted volumes. In some examples, the computing device can use a shortened recovery password in conjunction with anti-hammering capabilities of a Trusted Platform Module in order to unlock keys for interpreting the encrypted volumes. These and other operations can facilitate secure unlock of volumes of encrypted data on a consumer device.Type: GrantFiled: November 13, 2015Date of Patent: September 18, 2018Assignee: Microsoft Technology Licensing, LLCInventors: Yogesh A Mehta, Octavian T. Ureche, Scott R. Shell, Innokentiy Basmov, Peter Novotney, Christopher L Walstad
-
Publication number: 20180239927Abstract: In one embodiment, an encryption system may protect user login metadata from hammering attacks. A data storage 140 may store an integrity protected data set 602 for an operating system in a storage location. A processor 120 may register a counter reading from a remote counter 202 in a secure location 204 separate from the storage location. The processor 120 may determine a lockout state of the integrity protected data set 602 based on the counter reading.Type: ApplicationFiled: April 25, 2018Publication date: August 23, 2018Inventors: Benjamin NICK, Magnus NYSTROM, Innokently BASMOV, Peter NOVOTNEY, Michael GRASS
-
Patent number: 10049228Abstract: Native file encryption support is integrated into an existing file system that does not provide such support, such as the FAT family of file systems, while maintaining backwards compatibility with previous implementations of these file systems.Type: GrantFiled: December 3, 2015Date of Patent: August 14, 2018Assignee: Microsoft Technology Licensing, LLCInventors: Darwin Ou-Yang, Peter Novotney, Ravinder Thind
-
Patent number: 9984250Abstract: In one embodiment, an encryption system may protect user login metadata from hammering attacks. A data storage 140 may store an integrity protected data set 602 for an operating system in a storage location. A processor 120 may register a counter reading from a remote counter 202 in a secure location 204 separate from the storage location. The processor 120 may determine a lockout state of the integrity protected data set 602 based on the counter reading.Type: GrantFiled: June 22, 2012Date of Patent: May 29, 2018Assignee: Microsoft Technology Licensing, LLCInventors: Benjamin Nick, Magnus Nystrom, Innokentiy Basmov, Peter Novotney, Michael Grass
-
Publication number: 20170140146Abstract: A computing device can perform operations to unlock encrypted volumes of the computing device while the computing device is in a recovery environment. In some examples, the computing device can work in conjunction with a test computing device to unlock the encrypted volumes using an unlock token and a PIN. In other examples, the computing device can perform operations without a test computing device. For example, the computing device can, while in the recovery environment, use credentials associated with a user of the computing device to obtain a recovery password to unlock keys for interpreting the encrypted volumes. In some examples, the computing device can use a shortened recovery password in conjunction with anti-hammering capabilities of a Trusted Platform Module in order to unlock keys for interpreting the encrypted volumes. These and other operations can facilitate secure unlock of volumes of encrypted data on a consumer device.Type: ApplicationFiled: November 13, 2015Publication date: May 18, 2017Inventors: Yogesh A. Mehta, Octavian T. Ureche, Scott R. Shell, Innokentiy Basmov, Peter Novotney, Christopher L. Walstad
-
Publication number: 20160210469Abstract: Native file encryption support is integrated into an existing file system that does not provide such support, such as the FAT family of file systems, while maintaining backwards compatibility with previous implementations of these file systems.Type: ApplicationFiled: December 3, 2015Publication date: July 21, 2016Inventors: Darwin Ou-Yang, Peter Novotney, Ravinder Thind
-
Publication number: 20130346757Abstract: In one embodiment, an encryption system may protect user login metadata from hammering attacks. A data storage 140 may store an integrity protected data set 602 for an operating system in a storage location. A processor 120 may register a counter reading from a remote counter 202 in a secure location 204 separate from the storage location. The processor 120 may determine a lockout state of the integrity protected data set 602 based on the counter reading.Type: ApplicationFiled: June 22, 2012Publication date: December 26, 2013Applicant: MICROSOFT CORPORATIONInventors: Benjamin Nick, Magnus Nystrom, Innokentiy Basmov, Peter Novotney, Micheal Grass