Patents by Inventor Samuel John Wenker
Samuel John Wenker has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Publication number: 20240265071Abstract: Methods and systems are described which facilitate protecting a virtual desktop infrastructure (VDI) session. A first communication channel is established between a first cryptographic element and a VDI service. The first cryptographic element decrypts a video stream from the VDI service and overlays the decrypted video stream on a user's display. A second communication channel is established between a second cryptographic element and the VDI service. The second cryptographic element encrypts input received at a user's input device and sends the encrypted input to the cloud VDI service.Type: ApplicationFiled: April 3, 2023Publication date: August 8, 2024Inventors: Orr SROUR, Ori LASLO, Ashish GUPTA, Vadim MAKHERVAKS, Andrew Lee JENKS, Samuel John WENKER
-
Publication number: 20240265072Abstract: Methods and systems are described which facilitate protecting a virtual desktop infrastructure (VDI) session. A first communication channel is established between a DRM component and a VDI service. The DRM component decrypts a video stream from the VDI service and overlays the decrypted video stream on a user's display. A second communication channel is established between an inputs protection component and the VDI service. The inputs protection component encrypts input received at a user's input device and sends the encrypted input to the cloud VDI service.Type: ApplicationFiled: April 3, 2023Publication date: August 8, 2024Inventors: Orr SROUR, Ori LASLO, Ashish GUPTA, Vadim MAKHERVAKS, Andrew Lee JENKS, Samuel John WENKER
-
Patent number: 11917084Abstract: Described herein is a system and method for validating media integrity using asymmetric key cryptography utilizing a public/private cryptographic key pair. The private key is kept secret and is known to an originator and/or publisher of a media file. The public key is added to the media file and is used to validate integrity of the media file, that is, that content of the media file (e.g., portion(s), frame(s)) has not been altered since publication of the media file. By validating integrity of the media file, strong proof that the media file came from an owner of the keypair (e.g., had possession of the private key) can be obtained, for example, resolving issues of trust and/or authenticity common in altered content. In some embodiments, information regarding an origin of the content can further be determined.Type: GrantFiled: August 8, 2022Date of Patent: February 27, 2024Assignee: MICROSOFT TECHNOLOGY LICENSING, LLCInventors: Rebecca Nicole Burke-Aguero, Samuel John Wenker, Andrew Lee Jenks, Isha Sharma
-
Publication number: 20230052755Abstract: Described herein is a system and method for validating media integrity using asymmetric key cryptography utilizing a public/private cryptographic key pair. The private key is kept secret and is known to an originator and/or publisher of a media file. The public key is added to the media file and is used to validate integrity of the media file, that is, that content of the media file (e.g., portion(s), frame(s)) has not been altered since publication of the media file. By validating integrity of the media file, strong proof that the media file came from an owner of the keypair (e.g., had possession of the private key) can be obtained, for example, resolving issues of trust and/or authenticity common in altered content. In some embodiments, information regarding an origin of the content can further be determined.Type: ApplicationFiled: August 8, 2022Publication date: February 16, 2023Inventors: Rebecca Nicole BURKE-AGUERO, Samuel John WENKER, Andrew Lee JENKS, Isha SHARMA
-
Patent number: 11431512Abstract: Described herein is a system and method for validating media integrity using asymmetric key cryptography utilizing a public/private cryptographic key pair. The private key is kept secret and is known to an originator and/or publisher of a media file. The public key is added to the media file and is used to validate integrity of the media file, that is, that content of the media file (e.g., portion(s), frame(s)) has not been altered since publication of the media file. By validating integrity of the media file, strong proof that the media file came from an owner of the keypair (e.g., had possession of the private key) can be obtained, for example, resolving issues of trust and/or authenticity common in altered content. In some embodiments, information regarding an origin of the content can further be determined.Type: GrantFiled: January 23, 2020Date of Patent: August 30, 2022Assignee: Microsoft Technology Licensing, LLCInventors: Rebecca Nicole Burke-Aguero, Samuel John Wenker, Andrew Lee Jenks, Isha Sharma
-
Patent number: 11093586Abstract: Examples are disclosed related to presenting on a client device configured for a first digital rights management technology (DRM-1) content that is protected by a second digital rights management technology (DRM-2).Type: GrantFiled: December 4, 2018Date of Patent: August 17, 2021Assignee: Microsoft Technology Licensing, LLCInventors: Samuel John Wenker, John Carl Simmons, Andrew Lee Jenks
-
Publication number: 20210119810Abstract: Described herein is a system and method for validating media integrity using asymmetric key cryptography utilizing a public/private cryptographic key pair. The private key is kept secret and is known to an originator and/or publisher of a media file. The public key is added to the media file and is used to validate integrity of the media file, that is, that content of the media file (e.g., portion(s), frame(s)) has not been altered since publication of the media file. By validating integrity of the media file, strong proof that the media file came from an owner of the keypair (e.g., had possession of the private key) can be obtained, for example, resolving issues of trust and/or authenticity common in altered content. In some embodiments, information regarding an origin of the content can further be determined.Type: ApplicationFiled: January 23, 2020Publication date: April 22, 2021Applicant: Microsoft Technology Licensing, LLCInventors: Rebecca Nicole BURKE-AGUERO, Samuel John WENKER, Andrew Lee JENKS, Isha SHARMA
-
Publication number: 20200117772Abstract: Examples are disclosed related to presenting on a client device configured for a first digital rights management technology (DRM-1) content that is protected by a second digital rights management technology (DRM-2).Type: ApplicationFiled: December 4, 2018Publication date: April 16, 2020Applicant: Microsoft Technology Licensing, LLCInventors: Samuel John WENKER, John Carl SIMMONS, Andrew Lee JENKS
-
Patent number: 9590952Abstract: Lossy data stream decoder techniques are described herein. In response to a request for decoded content from a consuming application, a decoder may validate headers and identify portions of the data that are considered pertinent to the request. The decoder then performs lossy extraction to form incomplete data that is provided to the consuming application in response to the request. The full data for the data stream is not exposed to the consuming application or other downstream components. In this way, the consuming application is provided data sufficient to perform requested graphics processing and resource management operations, while at the same time the risk of piracy is mitigated since the consuming application is unable to get a full version of the data in the clear and the data have been validated by the decoder.Type: GrantFiled: September 5, 2014Date of Patent: March 7, 2017Assignee: Microsoft Technology Licensing, LLCInventors: Yongjun Wu, Fedir Yuriyovych Kyslov, Shyam Sadhwani, Samuel John Wenker, Brian P. Evans, Hany Farag
-
Publication number: 20160072773Abstract: Lossy data stream decoder techniques are described herein. In response to a request for decoded content from a consuming application, a decoder may validate headers and identify portions of the data that are considered pertinent to the request. The decoder then performs lossy extraction to form incomplete data that is provided to the consuming application in response to the request. The full data for the data stream is not exposed to the consuming application or other downstream components. In this way, the consuming application is provided data sufficient to perform requested graphics processing and resource management operations, while at the same time the risk of piracy is mitigated since the consuming application is unable to get a full version of the data in the clear and the data have been validated by the decoder.Type: ApplicationFiled: September 5, 2014Publication date: March 10, 2016Inventors: Yongjun Wu, Fedir Yuriyovych Kyslov, Shyam Sadhwani, Samuel John Wenker, Brian P. Evans, Hany Farag