Patents by Inventor Scott A. Field
Scott A. Field has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 7330970Abstract: The inventive methods and systems provide an approach to protecting unencrypted sensitive information from being paged out to secondary storage, such as a hard disk, during paging operations. In the described embodiment, a key is provided and is maintained in the main memory of a virtual memory system. Measures are taken to protect the key such as page-locking the key in the main memory to ensure that it never gets paged out to the secondary storage. The described key is a desirably large key that is randomly generated by the operating system. When sensitive information is to be placed in the main memory, it is encrypted with the page-locked key. The encrypted sensitive information can then be paged out to secondary storage without concern about its security. When the encrypted sensitive information is needed by a process or application, it is retrieved from secondary storage and decrypted using the page-locked key.Type: GrantFiled: January 20, 2000Date of Patent: February 12, 2008Assignee: Microsoft CorporationInventor: Scott A. Field
-
Patent number: 7325115Abstract: An operating system copies data from memory pages into a paging file on disk, in order to free up space in the memory. A mechanism is disclosed that causes the data to be encrypted as it is copied into the paging file, thereby protecting the paged data from unauthorized (or otherwise undesired) observation. The data that is stored in the paging file is encrypted with a session key, that is generated shortly after the machine on which the paging file exists is started. The session key, which is used both for encryption and decryption of the paging file data, is stored in volatile memory, so that the key is not persisted across boots of the machine. Since the key is not persisted across boots, old paging file data that was stored prior to the most recent boot cannot be recovered in clear text, thereby protecting the data from observation.Type: GrantFiled: November 25, 2003Date of Patent: January 29, 2008Assignee: Microsoft CorporationInventors: Benjamin A. Leis, David B. Cross, Duncan G. Bryce, Jianrong Gu, Rajeev Y. Nagar, Scott A. Field
-
Publication number: 20080022368Abstract: Remote administrative privileges in a distributed system are disabled by default. To administer a remote system, express action is taken to elevate a user status to obtain remote administrative privileges. When local and remote systems communicate, information pertaining to the status of the logged on user is included in the communications. If the user wishes to legitimately administer a remote system, the user provides an explicit request. The request is processed. If the user is configured as an administrator of the remote system and the request contains an indication that the user's administrative status has been elevated, an authorization token is generated. The authorization token is utilized by the remote system to allow the user to administer the remote system.Type: ApplicationFiled: June 9, 2006Publication date: January 24, 2008Applicant: Microsoft CorporationInventors: Scott A. Field, Liqiang Zhu, Peter T. Brundrett, Paul J. Leach
-
Publication number: 20080022093Abstract: At computer device power on, the operating system of the computer device initiates a monitor. The monitor assigns a monitoring program to each program and object (collectively, “program”) running on the computer device to monitor the activities of the program. When the monitoring program is assigned to a program, the monitoring program is assigned an integrity and/or privacy label (collectively, “integrity label”) based on predetermined criteria applied to the monitored program. The monitoring program, in turn, assigns an integrity label to the program monitored by the monitoring program. The integrity label assigned to the monitored program is less than or equal to the integrity label of the monitoring program. The monitor enforces an integrity policy of the computer device based on the integrity label assigned to monitored programs and the integrity label associated with data, another program, or a remote network resource that the monitored program is seeking to access.Type: ApplicationFiled: June 20, 2006Publication date: January 24, 2008Applicant: Microsoft CorporationInventors: Thekkthalackal Varugis Kurien, Jeffrey B. Hamblin, Narasimha Rao Nagampalli, Peter T. Brundrett, Scott Field
-
Publication number: 20080016127Abstract: A method of utilizing software for backing up and recovering data is disclosed. The method separates the backup functionality and the restore functionality of the software into at least two independent operations. The backup functionality is isolated from the restore functionality. The backup functionality comprises encrypting the data and the restore functionality comprises decrypting the data.Type: ApplicationFiled: June 30, 2006Publication date: January 17, 2008Applicant: Microsoft CorporationInventor: Scott A. Field
-
Publication number: 20080005797Abstract: Generally described, the present invention is directed at identifying malware. In one embodiment, a method is provided that performs a search for malware during the boot process. More specifically, the method causes a software module configured to scan for malware to be initialized at computer start up. Then, in response to identifying the occurrence of a scanning event, the method causes the software module to search computer memory for data that is characteristic of malware. If data characteristic of malware is identified, the method handles the malware infection.Type: ApplicationFiled: June 30, 2006Publication date: January 3, 2008Applicant: Microsoft CorporationInventors: Scott A Field, Rohan R. Phillips, Alexey A. Polyakov
-
Publication number: 20070292418Abstract: The invention relates to immunotherapeutic compounds, compositions that include such compounds, and methods of using the compounds, for example, to treat an individual having, at risk for, or previously treated for a cancer.Type: ApplicationFiled: November 28, 2006Publication date: December 20, 2007Inventors: Scott Fields, Lynn Hawkins, Sally Ishizaka, Daniel Rossignol
-
Patent number: 7293173Abstract: The inventive methods and systems provide an approach to protecting unencrypted sensitive information from being paged out to secondary storage, such as a hard disk, during paging operations. In the described embodiment, a key is provided and is maintained in the main memory of a virtual memory system. Measures are taken to protect the key such as page-locking the key in the main memory to ensure that it never gets paged out to the secondary storage. The described key is a desirably large key that is randomly generated by the operating system. When sensitive information is to be placed in the main memory, it is encrypted with the page-locked key. The encrypted sensitive information can then be paged out to secondary storage without concern about its security. When the encrypted sensitive information is needed by a process or application, it is retrieved from secondary storage and decrypted using the page-locked key.Type: GrantFiled: July 26, 2005Date of Patent: November 6, 2007Assignee: Microsoft CorporationInventor: Scott A. Field
-
Patent number: 7280956Abstract: An encrypted file system (EFS) and an underlying file transfer protocol to permit a client to encrypt, decrypt, and transfer file(s) resident on a server are disclosed. A user at a client computer can open, read, and write to encrypted files, including header information associated with encrypted files, and can add users to or remove users from an encrypted file.Type: GrantFiled: October 24, 2003Date of Patent: October 9, 2007Assignee: Microsoft CorporationInventors: David B. Cross, Jainrong Gu, Duncan Bryce, Shishir Pardikar, Pradeep Jnana Madhavarapu, Scott A. Field, Kelvin S. Yiu
-
Publication number: 20070234330Abstract: Prevention of executable code modification is provided by making the act of allocating and modifying existing memory backed code pages a highly privileged operating system (OS) function. The integrity of loaded code is also optionally checked at load time inside the OS kernel. A privilege check in the system is invoked when executable pages are allocated or modified. This privilege is assigned only to the operating system kernel and highly trusted identities in the operating system.Type: ApplicationFiled: March 1, 2006Publication date: October 4, 2007Applicant: Microsoft CorporationInventor: Scott Field
-
Patent number: 7266690Abstract: The inventive methods and systems provide an approach to protecting unencrypted sensitive information from being paged out to secondary storage, such as a hard disk, during paging operations. In the described embodiment, a key is provided and is maintained in the main memory of a virtual memory system. Measures are taken to protect the key such as page-locking the key in the main memory to ensure that it never gets paged out to the secondary storage. The described key is a desirably large key that is randomly generated by the operating system. When sensitive information is to be placed in the main memory, it is encrypted with the page-locked key. The encrypted sensitive information can then be paged out to secondary storage without concern about its security. When the encrypted sensitive information is needed by a process or application, it is retrieved from secondary storage and decrypted using the page-locked key.Type: GrantFiled: July 26, 2005Date of Patent: September 4, 2007Assignee: Microsoft CorporationInventor: Scott A. Field
-
Publication number: 20070162975Abstract: Generally described, a method, software system, and computer-readable medium are provided for efficiently collecting data this useful in developing software systems to identify and protect against malware. In accordance with one embodiment, a method for collecting data to determine whether a malware is propagating in a networking environment is provided. More specifically, the method includes receiving preliminary data sets at a server computer from a plurality of client computers that describes attributes of a potential malware. Then a determination is made regarding whether secondary data is needed to implement systems for protecting against the potential malware. If secondary data is needed, the method causes the secondary data to be collected when an additional preliminary data set is received from a client computer.Type: ApplicationFiled: January 6, 2006Publication date: July 12, 2007Applicant: Microssoft CorporationInventors: Adam Overton, Alexey Polyakov, Andrew Newman, Jason Garms, Ronald Franczyk, Scott Field, Sterling Reasor
-
Publication number: 20070101148Abstract: Techniques are described herein for securely prompting a user to confirm sensitive operations, input sensitive information or the like. The techniques include receiving or intercepting calls from applications to prompting routines. When a call to a prompting routine is received or intercepted a hint may be provided to the user to switch to a secure desktop. When the user switches from the user desktop to the secure desktop the particular prompt is displayed. The input to the prompt is received on the secure desktop and verified to have been provided by the user. The user input or a representation of the input is then returned to the application running on the user desktop. Using these techniques, interception of prompting messages by malware does not result in sensitive information being revealed. Furthermore, spoofing of new messages by malware does not lead to the dismissal of critical prompting.Type: ApplicationFiled: October 17, 2005Publication date: May 3, 2007Applicant: Microsoft CorporationInventors: Klaus Schutz, Matthew Thomlinson, Scott Field
-
Publication number: 20070048701Abstract: A math teaching aid for helping beginning students learn how to count change. The invention includes a number of base units with cylindrical depressions in slots for a flag. A flag which determines the desired amount of change is placed in a flag holder in the base unit. Units representing pennies, nickels, dimes and quarters are then placed in the grooves of the base unit to arrive at the desired amount of change.Type: ApplicationFiled: September 1, 2005Publication date: March 1, 2007Inventor: Scott Fields
-
Publication number: 20070020232Abstract: The invention relates to immunotherapeutic compounds and to methods for stimulating an immune response in a subject individual at risk for developing cancer, diagnosed with a cancer, in treatment for cancer, or in post-therapy recovery from cancer or the compounds of the invention can be administered as a prophylactic to a subject individual to prevent or delay the development of cancer.Type: ApplicationFiled: April 26, 2006Publication date: January 25, 2007Applicant: Eisai Co., Ltd.Inventors: Daniel Rossignol, Sally Ishizaka, Lynn Hawkins, Scott Fields
-
Publication number: 20070015789Abstract: The invention provides safe and effective methods for treating and/or preventing gastrointestinal disorders, psychiatric disorders, learning disabilities, Tourette's syndrome, obesity, epilepsy, post-menopausal syndrome, pre-menstrual syndrome, asthma, laryngitis and/or migraines by administering to a patient in need thereof at least one aminobenzoic acid compound. The aminobenzoic acid compound can optionally be administered in combination with other medications that are useful for the disease being treated.Type: ApplicationFiled: January 11, 2006Publication date: January 18, 2007Inventors: Jay Barth, Kathleen Lomax, Scott Fields, Mindell Seidlin
-
Publication number: 20070016675Abstract: A computer system having secured network services is presented. The computer system comprises a processor, a memory, and a network action processing module. The network action processing module processes network actions from one or more network services executing on the computer system. The computer system is further configured to execute at least network service performing network actions in conjunction with the network action processing module. Upon receiving a network action from a network service, the network action processing module determines whether the network action is a valid network action according to a network action control list. If the network action is determined to not be a valid network action, the network action is blocked. Alternatively, if the network action is determined to be a valid network action, the network action is permitted to be completed.Type: ApplicationFiled: July 13, 2005Publication date: January 18, 2007Applicant: Microsoft CorporationInventors: Pradeep Bahl, Ramesh Chinta, Narasimha Nagampalli, Scott Field
-
Publication number: 20070006304Abstract: Malware recovery optimization is provided in which malware detection processes and protocol processes on a device are monitored for events indicating a breach of security of the device, such as the presence of an infection or other evidence of a malware attack. The devices report the events for collection on a centralized event collector that issues alerts of the events to other devices that may have been compromised as a result of the breach of security. Upon receipt of the alert, the receiving devices may initiate malware recovery optimization, including activating anti-virus software to initiate a targeted scan of those resources that may have been compromised. In this manner, malware recovery processes are optimized to recover the receiving device and/or resources when indicated.Type: ApplicationFiled: June 30, 2005Publication date: January 4, 2007Applicant: Microsoft CorporationInventors: Michael Kramer, Scott Field, Marc Seinfeld
-
Publication number: 20060294592Abstract: Embodiments of a RootKit detector are directed to identifying a RootKit on a computer that is designed to conceal malware. Aspects of the RootKit detector leverage services provided by kernel debugger facilities to automatically obtain data in specified data structures that are maintained by an operating system. Then the data obtained from the kernel debugger facilities is processed with an integrity checker that determines whether the data contains properties sufficient to declare that a RootKit is resident on the computer.Type: ApplicationFiled: June 28, 2005Publication date: December 28, 2006Applicant: Microsoft CorporationInventors: Alexey Polyakov, Gretchen Loihle, Mihai Costea, Robert Hensing, Scott Field, Vincent Orgovan, Yi-Min Wang, Yun Lin
-
Publication number: 20060272021Abstract: The present invention is directed toward a system, method, and computer-readable medium that scan a file for malware that maintains a restrictive access attribute that limits access to the file. In accordance with one aspect of the present invention, a method for performing a scan for malware is provided when antivirus software on a computer encounters a file with a restrictive access attribute that prevents the file from being scanned. More specifically, the method includes identifying the restrictive access attribute that limits access to the file; bypassing the restrictive access attribute to access data in the file; and using a scan engine to scan the data in the file for malware.Type: ApplicationFiled: May 27, 2005Publication date: November 30, 2006Applicant: Microsoft CorporationInventors: Adrian Marinescu, George Chicioreanu, Marius Gheorghescu, Scott Field