Patents by Inventor Scott A. Field

Scott A. Field has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 7330970
    Abstract: The inventive methods and systems provide an approach to protecting unencrypted sensitive information from being paged out to secondary storage, such as a hard disk, during paging operations. In the described embodiment, a key is provided and is maintained in the main memory of a virtual memory system. Measures are taken to protect the key such as page-locking the key in the main memory to ensure that it never gets paged out to the secondary storage. The described key is a desirably large key that is randomly generated by the operating system. When sensitive information is to be placed in the main memory, it is encrypted with the page-locked key. The encrypted sensitive information can then be paged out to secondary storage without concern about its security. When the encrypted sensitive information is needed by a process or application, it is retrieved from secondary storage and decrypted using the page-locked key.
    Type: Grant
    Filed: January 20, 2000
    Date of Patent: February 12, 2008
    Assignee: Microsoft Corporation
    Inventor: Scott A. Field
  • Patent number: 7325115
    Abstract: An operating system copies data from memory pages into a paging file on disk, in order to free up space in the memory. A mechanism is disclosed that causes the data to be encrypted as it is copied into the paging file, thereby protecting the paged data from unauthorized (or otherwise undesired) observation. The data that is stored in the paging file is encrypted with a session key, that is generated shortly after the machine on which the paging file exists is started. The session key, which is used both for encryption and decryption of the paging file data, is stored in volatile memory, so that the key is not persisted across boots of the machine. Since the key is not persisted across boots, old paging file data that was stored prior to the most recent boot cannot be recovered in clear text, thereby protecting the data from observation.
    Type: Grant
    Filed: November 25, 2003
    Date of Patent: January 29, 2008
    Assignee: Microsoft Corporation
    Inventors: Benjamin A. Leis, David B. Cross, Duncan G. Bryce, Jianrong Gu, Rajeev Y. Nagar, Scott A. Field
  • Publication number: 20080022368
    Abstract: Remote administrative privileges in a distributed system are disabled by default. To administer a remote system, express action is taken to elevate a user status to obtain remote administrative privileges. When local and remote systems communicate, information pertaining to the status of the logged on user is included in the communications. If the user wishes to legitimately administer a remote system, the user provides an explicit request. The request is processed. If the user is configured as an administrator of the remote system and the request contains an indication that the user's administrative status has been elevated, an authorization token is generated. The authorization token is utilized by the remote system to allow the user to administer the remote system.
    Type: Application
    Filed: June 9, 2006
    Publication date: January 24, 2008
    Applicant: Microsoft Corporation
    Inventors: Scott A. Field, Liqiang Zhu, Peter T. Brundrett, Paul J. Leach
  • Publication number: 20080022093
    Abstract: At computer device power on, the operating system of the computer device initiates a monitor. The monitor assigns a monitoring program to each program and object (collectively, “program”) running on the computer device to monitor the activities of the program. When the monitoring program is assigned to a program, the monitoring program is assigned an integrity and/or privacy label (collectively, “integrity label”) based on predetermined criteria applied to the monitored program. The monitoring program, in turn, assigns an integrity label to the program monitored by the monitoring program. The integrity label assigned to the monitored program is less than or equal to the integrity label of the monitoring program. The monitor enforces an integrity policy of the computer device based on the integrity label assigned to monitored programs and the integrity label associated with data, another program, or a remote network resource that the monitored program is seeking to access.
    Type: Application
    Filed: June 20, 2006
    Publication date: January 24, 2008
    Applicant: Microsoft Corporation
    Inventors: Thekkthalackal Varugis Kurien, Jeffrey B. Hamblin, Narasimha Rao Nagampalli, Peter T. Brundrett, Scott Field
  • Publication number: 20080016127
    Abstract: A method of utilizing software for backing up and recovering data is disclosed. The method separates the backup functionality and the restore functionality of the software into at least two independent operations. The backup functionality is isolated from the restore functionality. The backup functionality comprises encrypting the data and the restore functionality comprises decrypting the data.
    Type: Application
    Filed: June 30, 2006
    Publication date: January 17, 2008
    Applicant: Microsoft Corporation
    Inventor: Scott A. Field
  • Publication number: 20080005797
    Abstract: Generally described, the present invention is directed at identifying malware. In one embodiment, a method is provided that performs a search for malware during the boot process. More specifically, the method causes a software module configured to scan for malware to be initialized at computer start up. Then, in response to identifying the occurrence of a scanning event, the method causes the software module to search computer memory for data that is characteristic of malware. If data characteristic of malware is identified, the method handles the malware infection.
    Type: Application
    Filed: June 30, 2006
    Publication date: January 3, 2008
    Applicant: Microsoft Corporation
    Inventors: Scott A Field, Rohan R. Phillips, Alexey A. Polyakov
  • Publication number: 20070292418
    Abstract: The invention relates to immunotherapeutic compounds, compositions that include such compounds, and methods of using the compounds, for example, to treat an individual having, at risk for, or previously treated for a cancer.
    Type: Application
    Filed: November 28, 2006
    Publication date: December 20, 2007
    Inventors: Scott Fields, Lynn Hawkins, Sally Ishizaka, Daniel Rossignol
  • Patent number: 7293173
    Abstract: The inventive methods and systems provide an approach to protecting unencrypted sensitive information from being paged out to secondary storage, such as a hard disk, during paging operations. In the described embodiment, a key is provided and is maintained in the main memory of a virtual memory system. Measures are taken to protect the key such as page-locking the key in the main memory to ensure that it never gets paged out to the secondary storage. The described key is a desirably large key that is randomly generated by the operating system. When sensitive information is to be placed in the main memory, it is encrypted with the page-locked key. The encrypted sensitive information can then be paged out to secondary storage without concern about its security. When the encrypted sensitive information is needed by a process or application, it is retrieved from secondary storage and decrypted using the page-locked key.
    Type: Grant
    Filed: July 26, 2005
    Date of Patent: November 6, 2007
    Assignee: Microsoft Corporation
    Inventor: Scott A. Field
  • Patent number: 7280956
    Abstract: An encrypted file system (EFS) and an underlying file transfer protocol to permit a client to encrypt, decrypt, and transfer file(s) resident on a server are disclosed. A user at a client computer can open, read, and write to encrypted files, including header information associated with encrypted files, and can add users to or remove users from an encrypted file.
    Type: Grant
    Filed: October 24, 2003
    Date of Patent: October 9, 2007
    Assignee: Microsoft Corporation
    Inventors: David B. Cross, Jainrong Gu, Duncan Bryce, Shishir Pardikar, Pradeep Jnana Madhavarapu, Scott A. Field, Kelvin S. Yiu
  • Publication number: 20070234330
    Abstract: Prevention of executable code modification is provided by making the act of allocating and modifying existing memory backed code pages a highly privileged operating system (OS) function. The integrity of loaded code is also optionally checked at load time inside the OS kernel. A privilege check in the system is invoked when executable pages are allocated or modified. This privilege is assigned only to the operating system kernel and highly trusted identities in the operating system.
    Type: Application
    Filed: March 1, 2006
    Publication date: October 4, 2007
    Applicant: Microsoft Corporation
    Inventor: Scott Field
  • Patent number: 7266690
    Abstract: The inventive methods and systems provide an approach to protecting unencrypted sensitive information from being paged out to secondary storage, such as a hard disk, during paging operations. In the described embodiment, a key is provided and is maintained in the main memory of a virtual memory system. Measures are taken to protect the key such as page-locking the key in the main memory to ensure that it never gets paged out to the secondary storage. The described key is a desirably large key that is randomly generated by the operating system. When sensitive information is to be placed in the main memory, it is encrypted with the page-locked key. The encrypted sensitive information can then be paged out to secondary storage without concern about its security. When the encrypted sensitive information is needed by a process or application, it is retrieved from secondary storage and decrypted using the page-locked key.
    Type: Grant
    Filed: July 26, 2005
    Date of Patent: September 4, 2007
    Assignee: Microsoft Corporation
    Inventor: Scott A. Field
  • Publication number: 20070162975
    Abstract: Generally described, a method, software system, and computer-readable medium are provided for efficiently collecting data this useful in developing software systems to identify and protect against malware. In accordance with one embodiment, a method for collecting data to determine whether a malware is propagating in a networking environment is provided. More specifically, the method includes receiving preliminary data sets at a server computer from a plurality of client computers that describes attributes of a potential malware. Then a determination is made regarding whether secondary data is needed to implement systems for protecting against the potential malware. If secondary data is needed, the method causes the secondary data to be collected when an additional preliminary data set is received from a client computer.
    Type: Application
    Filed: January 6, 2006
    Publication date: July 12, 2007
    Applicant: Microssoft Corporation
    Inventors: Adam Overton, Alexey Polyakov, Andrew Newman, Jason Garms, Ronald Franczyk, Scott Field, Sterling Reasor
  • Publication number: 20070101148
    Abstract: Techniques are described herein for securely prompting a user to confirm sensitive operations, input sensitive information or the like. The techniques include receiving or intercepting calls from applications to prompting routines. When a call to a prompting routine is received or intercepted a hint may be provided to the user to switch to a secure desktop. When the user switches from the user desktop to the secure desktop the particular prompt is displayed. The input to the prompt is received on the secure desktop and verified to have been provided by the user. The user input or a representation of the input is then returned to the application running on the user desktop. Using these techniques, interception of prompting messages by malware does not result in sensitive information being revealed. Furthermore, spoofing of new messages by malware does not lead to the dismissal of critical prompting.
    Type: Application
    Filed: October 17, 2005
    Publication date: May 3, 2007
    Applicant: Microsoft Corporation
    Inventors: Klaus Schutz, Matthew Thomlinson, Scott Field
  • Publication number: 20070048701
    Abstract: A math teaching aid for helping beginning students learn how to count change. The invention includes a number of base units with cylindrical depressions in slots for a flag. A flag which determines the desired amount of change is placed in a flag holder in the base unit. Units representing pennies, nickels, dimes and quarters are then placed in the grooves of the base unit to arrive at the desired amount of change.
    Type: Application
    Filed: September 1, 2005
    Publication date: March 1, 2007
    Inventor: Scott Fields
  • Publication number: 20070020232
    Abstract: The invention relates to immunotherapeutic compounds and to methods for stimulating an immune response in a subject individual at risk for developing cancer, diagnosed with a cancer, in treatment for cancer, or in post-therapy recovery from cancer or the compounds of the invention can be administered as a prophylactic to a subject individual to prevent or delay the development of cancer.
    Type: Application
    Filed: April 26, 2006
    Publication date: January 25, 2007
    Applicant: Eisai Co., Ltd.
    Inventors: Daniel Rossignol, Sally Ishizaka, Lynn Hawkins, Scott Fields
  • Publication number: 20070015789
    Abstract: The invention provides safe and effective methods for treating and/or preventing gastrointestinal disorders, psychiatric disorders, learning disabilities, Tourette's syndrome, obesity, epilepsy, post-menopausal syndrome, pre-menstrual syndrome, asthma, laryngitis and/or migraines by administering to a patient in need thereof at least one aminobenzoic acid compound. The aminobenzoic acid compound can optionally be administered in combination with other medications that are useful for the disease being treated.
    Type: Application
    Filed: January 11, 2006
    Publication date: January 18, 2007
    Inventors: Jay Barth, Kathleen Lomax, Scott Fields, Mindell Seidlin
  • Publication number: 20070016675
    Abstract: A computer system having secured network services is presented. The computer system comprises a processor, a memory, and a network action processing module. The network action processing module processes network actions from one or more network services executing on the computer system. The computer system is further configured to execute at least network service performing network actions in conjunction with the network action processing module. Upon receiving a network action from a network service, the network action processing module determines whether the network action is a valid network action according to a network action control list. If the network action is determined to not be a valid network action, the network action is blocked. Alternatively, if the network action is determined to be a valid network action, the network action is permitted to be completed.
    Type: Application
    Filed: July 13, 2005
    Publication date: January 18, 2007
    Applicant: Microsoft Corporation
    Inventors: Pradeep Bahl, Ramesh Chinta, Narasimha Nagampalli, Scott Field
  • Publication number: 20070006304
    Abstract: Malware recovery optimization is provided in which malware detection processes and protocol processes on a device are monitored for events indicating a breach of security of the device, such as the presence of an infection or other evidence of a malware attack. The devices report the events for collection on a centralized event collector that issues alerts of the events to other devices that may have been compromised as a result of the breach of security. Upon receipt of the alert, the receiving devices may initiate malware recovery optimization, including activating anti-virus software to initiate a targeted scan of those resources that may have been compromised. In this manner, malware recovery processes are optimized to recover the receiving device and/or resources when indicated.
    Type: Application
    Filed: June 30, 2005
    Publication date: January 4, 2007
    Applicant: Microsoft Corporation
    Inventors: Michael Kramer, Scott Field, Marc Seinfeld
  • Publication number: 20060294592
    Abstract: Embodiments of a RootKit detector are directed to identifying a RootKit on a computer that is designed to conceal malware. Aspects of the RootKit detector leverage services provided by kernel debugger facilities to automatically obtain data in specified data structures that are maintained by an operating system. Then the data obtained from the kernel debugger facilities is processed with an integrity checker that determines whether the data contains properties sufficient to declare that a RootKit is resident on the computer.
    Type: Application
    Filed: June 28, 2005
    Publication date: December 28, 2006
    Applicant: Microsoft Corporation
    Inventors: Alexey Polyakov, Gretchen Loihle, Mihai Costea, Robert Hensing, Scott Field, Vincent Orgovan, Yi-Min Wang, Yun Lin
  • Publication number: 20060272021
    Abstract: The present invention is directed toward a system, method, and computer-readable medium that scan a file for malware that maintains a restrictive access attribute that limits access to the file. In accordance with one aspect of the present invention, a method for performing a scan for malware is provided when antivirus software on a computer encounters a file with a restrictive access attribute that prevents the file from being scanned. More specifically, the method includes identifying the restrictive access attribute that limits access to the file; bypassing the restrictive access attribute to access data in the file; and using a scan engine to scan the data in the file for malware.
    Type: Application
    Filed: May 27, 2005
    Publication date: November 30, 2006
    Applicant: Microsoft Corporation
    Inventors: Adrian Marinescu, George Chicioreanu, Marius Gheorghescu, Scott Field