Patents by Inventor Philip J. Hallin

Philip J. Hallin has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20190123913
    Abstract: One aspect relates to a process and associated device for managing digital ID lifecycles for application programs, and abstracting application programs for multiple types of credentials through a common Digital Identity Management System (DIMS) and Application Programming Interface (API) layer.
    Type: Application
    Filed: September 23, 2016
    Publication date: April 25, 2019
    Inventors: David B. Cross, Philip J. Hallin, Thomas C. Jones, Matthew W. Thomlinson
  • Publication number: 20170012784
    Abstract: One aspect relates to a process and associated device for managing digital ID lifecycles for application programs, and abstracting application programs for multiple types of credentials through a common Digital Identity Management System (DIMS) and Application Programming Interface (API) layer.
    Type: Application
    Filed: September 23, 2016
    Publication date: January 12, 2017
    Inventors: David B. Cross, Philip J. Hallin, Thomas C. Jones, Matthew W. Thomlinson
  • Patent number: 9477832
    Abstract: One aspect relates to a process and associated device for managing digital ID lifecycles for application programs, and abstracting application programs for multiple types of credentials through a common Digital Identity Management System (DIMS) and Application Programming Interface (API) layer.
    Type: Grant
    Filed: August 25, 2014
    Date of Patent: October 25, 2016
    Assignee: Microsoft Technology Licensing, LLC
    Inventors: David B. Cross, Matthew W. Thomlinson, Philip J. Hallin, Thomas C. Jones
  • Patent number: 9281948
    Abstract: Techniques for providing revocation information for revocable items are described. In implementations, a revocation service is employed to manage revocation information for various revocable items. For example, the revocation service can maintain a revoked list that includes revoked revocable items, such as revoked digital certificates, revoked files (e.g., files that are considered to the unsafe), unsafe network resources (e.g., a website that is determined to be unsafe), and so on. In implementations, the revocation service can communicate a revoked list to a client device to enable the client device to maintain an updated list of revocation information.
    Type: Grant
    Filed: February 9, 2012
    Date of Patent: March 8, 2016
    Assignee: Microsoft Technology Licensing, LLC
    Inventors: Philip J. Hallin, Yogesh A. Mehta, Violet Anna Barhudarian, Magnus Bo Gustaf Nyström
  • Patent number: 9183361
    Abstract: Techniques for resource access authorization are described. In one or more implementations, an application identifier is used to control access to user resources by an application. A determination is made whether to allow the application to access the user resources by comparing an application identifier received from an authorization service with a system application identifier for the application obtained from a computing device on which the application is executing.
    Type: Grant
    Filed: September 12, 2011
    Date of Patent: November 10, 2015
    Assignee: Microsoft Technology Licensing, LLC
    Inventors: Oludare V. Obasanjo, Stephen R. Gordon, Aleksandr Radutskiy, Philip J. Hallin, Atanas D. Oskov, Jeremy D. Viegas, Daniel C. Kitchener
  • Publication number: 20140366108
    Abstract: One aspect relates to a process and associated device for managing digital ID lifecycles for application programs, and abstracting application programs for multiple types of credentials through a common Digital Identity Management System (DIMS) and Application Programming Interface (API) layer.
    Type: Application
    Filed: August 25, 2014
    Publication date: December 11, 2014
    Inventors: David B. Cross, Matthew W. Thomlinson, Philip J. Hallin, Thomas C. Jones
  • Patent number: 8819797
    Abstract: One aspect relates to a process and associated device for managing digital ID lifecycles for application programs, and abstracting application programs for multiple types of credentials through a common Digital Identity Management System (DIMS) and Application Programming Interface (API) layer.
    Type: Grant
    Filed: March 1, 2012
    Date of Patent: August 26, 2014
    Assignee: Microsoft Corporation
    Inventors: David B. Cross, Matthew W. Thomlinson, Philip J. Hallin, Thomas C. Jones
  • Publication number: 20130212383
    Abstract: Techniques for providing revocation information for revocable items are described. In implementations, a revocation service is employed to manage revocation information for various revocable items. For example, the revocation service can maintain a revoked list that includes revoked revocable items, such as revoked digital certificates, revoked files (e.g., files that are considered to the unsafe), unsafe network resources (e.g., a website that is determined to be unsafe), and so on. In implementations, the revocation service can communicate a revoked list to a client device to enable the client device to maintain an updated list of revocation information.
    Type: Application
    Filed: February 9, 2012
    Publication date: August 15, 2013
    Inventors: Philip J. Hallin, Yogesh A. Mehta, Violet Anna Barhudarian, Magnus Bo Gustaf Nyström
  • Publication number: 20130067568
    Abstract: Techniques for resource access authorization are described. In one or more implementations, an application identifier is used to control access to user resources by an application. A determination is made whether to allow the application to access the user resources by comparing an application identifier received from an authorization service with a system application identifier for the application obtained from a computing device on which the application is executing.
    Type: Application
    Filed: September 12, 2011
    Publication date: March 14, 2013
    Inventors: Oludare V. Obasanjo, Stephen R. Gordon, Aleksandr Radutskiy, Philip J. Hallin, Atanas D. Oskov, Jeremy D. Viegas, Daniel C. Kitchener
  • Publication number: 20120174200
    Abstract: One aspect relates to a process and associated device for managing digital ID lifecycles for application programs, and abstracting application programs for multiple types of credentials through a common Digital Identity Management System (DIMS) and Application Programming Interface (API) layer.
    Type: Application
    Filed: March 1, 2012
    Publication date: July 5, 2012
    Applicant: Microsoft Corporation
    Inventors: David B. Cross, Philip J. Hallin, Matthew W. Thomlinson, Thomas C. Jones
  • Patent number: 8151332
    Abstract: One aspect relates to a process and associated device for managing digital ID lifecycles for application programs, and abstracting application programs for multiple types of credentials through a common Digital Identity Management System (DIMS) and Application Programming Interface (API) layer.
    Type: Grant
    Filed: October 25, 2006
    Date of Patent: April 3, 2012
    Assignee: Microsoft Corporation
    Inventors: David B. Cross, Philip J. Hallin, Matthew W. Thomlinson, Thomas C. Jones
  • Patent number: 7984488
    Abstract: An exemplary system enabling credential roaming among a plurality of different computing devices may include an event handler to receive event notifications such as, e.g., a client logon. The event handler may invoke a management service in response to receiving an event notification. The management service may include a synchronizing module to synchronize a user's credentials with a remote directory service, such as, e.g., Active Directory, so that the user's credentials are available from any of a number of different computing devices.
    Type: Grant
    Filed: April 9, 2004
    Date of Patent: July 19, 2011
    Assignee: Microsoft Corporation
    Inventors: David B. Cross, Xiaohong Su, Hao Zhuang, Philip J. Hallin
  • Patent number: 7818575
    Abstract: An efficient protocol for retrieving cryptographic evidence may be selected by evaluating a local policy and a number of relevant factors. Furthermore, updated cryptographic evidence may be prefetched during a time period in which there is a low volume of requests for cryptographic evidence. This low volume time period may be defined, approximately, as an overlapping window in which both a first cryptographic evidence publication and a second cryptographic evidence publication are valid.
    Type: Grant
    Filed: June 24, 2005
    Date of Patent: October 19, 2010
    Assignee: Microsoft Corporation
    Inventors: David B. Cross, Kelvin S. Yiu, Philip J. Hallin, Ryan M. Hurst, Vishal Agarwal
  • Patent number: 7703128
    Abstract: One aspect relates to a process and associated device for managing digital ID lifecycles for application programs, and abstracting application programs for multiple types of credentials through a common Digital Identity Management System (DIMS) and Application Programming Interface (API) layer.
    Type: Grant
    Filed: February 13, 2003
    Date of Patent: April 20, 2010
    Assignee: Microsoft Corporation
    Inventors: David B. Cross, Philip J. Hallin, Matthew W. Thomlinson, Thomas C. Jones
  • Patent number: 7240194
    Abstract: Systems and methods are described for distributing and updating trusted certification authorities to computer systems and users. When a digital certificate is encountered during a secured electronic transaction, the root authority of the certificate is determined. It is then determined whether the root authority is a trusted authority by attempting to locate the root authority in a trusted root list. If the root authority is not included in the trusted root list, a remote site is accessed and an updated version of the trusted root list is downloaded. The new trusted root list is checked for the presence of the encountered certificate and, if found, the transaction is allowed to proceed. In one implementation, the entire trusted root list is not downloaded. Instead, if an appropriate digital certificate is located, then the certificate is downloaded and added to the trusted root list of the computer system. The transaction may then proceed.
    Type: Grant
    Filed: March 22, 2002
    Date of Patent: July 3, 2007
    Assignee: Microsoft Corporation
    Inventors: Philip J. Hallin, John J. Lambert, Klaus U. Schutz, Sunil Pai
  • Patent number: 7143165
    Abstract: An update process is used to update root certificates in a root certificate store of a client computer, maintaining the integrity of the existing root certificates as well as any new root certificates. In accordance with certain aspects, the integrity of a certificate trust list identifying one or more root certificates is verified. The root certificate store of the client computer is modified in accordance with the certificate trust list if the integrity of the certificate trust list is verified.
    Type: Grant
    Filed: October 18, 2004
    Date of Patent: November 28, 2006
    Assignee: Microsoft Corporation
    Inventors: Keith R. Vogel, Charlie D. Chase, Kelvin S. Yiu, Philip J. Hallin, Louis K. Thomas
  • Patent number: 6816900
    Abstract: An update process is used to update root certificates in a root certificate store of a client computer, maintaining the integrity of the existing root certificates as well as any new root certificates. In one embodiment, the root certificate store is updated by adding root certificates to the store, removing root certificates from the store, or modifying usage restrictions of root certificates in the store. A cryptographically signed message including a certificate trust list, as well as any new root certificates to be added to the root certificate store, is accessed by an update root control to update the root certificates in the root certificate store. The update root control verifies the integrity of the message, and thus the integrity of the certificate trust list contained therein. Once such integrity is verified, the update root control proceeds to update the root certificate store in accordance with the information in the certificate trust list.
    Type: Grant
    Filed: April 4, 2000
    Date of Patent: November 9, 2004
    Assignee: Microsoft Corporation
    Inventors: Keith R. Vogel, Charlie D. Chase, Kelvin S. Yiu, Philip J. Hallin, Louis K. Thomas
  • Publication number: 20040162786
    Abstract: One aspect relates to a process and associated device for managing digital ID lifecycles for application programs, and abstracting application programs for multiple types of credentials through a common Digital Identity Management System (DIMS) and Application Programming Interface (API) layer.
    Type: Application
    Filed: February 13, 2003
    Publication date: August 19, 2004
    Inventors: David B. Cross, Philip J. Hallin, Matthew W. Thomlinson, Thomas C. Jones
  • Patent number: 6754661
    Abstract: Hierarchical storage systems for holding objects used for evidentiary purposes, and methods of manipulating such systems are described. A logical store is provided and one or more physical stores are associated with and accessible through the logical store. Access to the physical stores can take place through the logical store with a single call to an appropriate application programming interface. Associations within and amongst stores can be define. One particular type of association is a context link which enables one evidentiary object in one physical store to get its context from another evidentiary object in another physical store.
    Type: Grant
    Filed: February 22, 2000
    Date of Patent: June 22, 2004
    Assignee: Microsoft Corporation
    Inventors: Philip J. Hallin, Keith R. Vogel, Kirt Debique
  • Publication number: 20040096055
    Abstract: A certificate-based encryption mechanism in which a source client does not access the entire certificate corresponding to a destination client when encrypting an electronic message to be sent to the destination client. Instead, the source client only requests a portion of the certificate from a certificate server. That portion includes encryption information, but may lack some or even all of the self-verification information in the certificate. The certificate server preferably performs any validation of the certificate prior to sending the encryption information to the source client. The certificate need not be separately validated by the source client, especially if the certificate server is trusted by the source client.
    Type: Application
    Filed: June 13, 2003
    Publication date: May 20, 2004
    Inventors: Roy Williams, Jorge Pereira, Karim Michel Batthish, Philip J. Hallin, Yu Lin Sie