Patents by Inventor Scott A. Kupec

Scott A. Kupec has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 8656182
    Abstract: A security technique to reduce the risk of unauthorized release of a software object. The technique allows identification of an individual responsible for the unauthorized release by marking each object with information, which acts as a fingerprint from which a person manipulating the object in a development environment can be identified. The development environment may be configured to quickly and automatically mark the object whenever a manipulation that may precede an unauthorized release occurs. To prevent circumventing the security technique, the object may be configured to enforce a requirement for a valid fingerprint such that the object is disabled if the fingerprint is removed or altered. Despite the marking, personally identifiable information is not revealed because the fingerprint is generated through a one-way cryptographic function performed on identifying information.
    Type: Grant
    Filed: September 12, 2011
    Date of Patent: February 18, 2014
    Assignee: Microsoft Corporation
    Inventors: Jeffrey M. Homme, Mariusz H. Jakubowski, Jeremy S. Russell, Scott A. Kupec, Dragos C. Sambotin
  • Publication number: 20130067238
    Abstract: A security technique to reduce the risk of unauthorized release of a software object. The technique allows identification of an individual responsible for the unauthorized release by marking each object with information, which acts as a fingerprint from which a person manipulating the object in a development environment can be identified. The development environment may be configured to quickly and automatically mark the object whenever a manipulation that may precede an unauthorized release occurs. To prevent circumventing the security technique, the object may be configured to enforce a requirement for a valid fingerprint such that the object is disabled if the fingerprint is removed or altered. Despite the marking, personally identifiable information is not revealed because the fingerprint is generated through a one-way cryptographic function performed on identifying information.
    Type: Application
    Filed: September 12, 2011
    Publication date: March 14, 2013
    Applicant: Microsoft Corporation
    Inventors: Jeffrey M. Homme, Mariusz H. Jakubowski, Jeremy S. Russell, Scott A. Kupec, Dragos C. Sambotin
  • Patent number: 7730451
    Abstract: A method and system for accessing at debug time the source code used to create a binary. During or shortly after compilation, an extractor extracts the names of source code files used to create the binary, communicates with a version control server to obtain information that identifies the versions of source code files used to create the binary, and stores the information in the binary or in a file associated with the binary. At debug time, the information is retrieved and used to obtain copies of the source code files from the version control server. The copies of the source code files are placed in a directory where the debugger expects to find them. The debugger may then show the source code corresponding to the binary instructions of the binary during debugging.
    Type: Grant
    Filed: December 26, 2003
    Date of Patent: June 1, 2010
    Assignee: Microsoft Corporation
    Inventors: Pat Styles, Scott A. Kupec
  • Publication number: 20050144599
    Abstract: A method and system for accessing at debug time the source code used to create a binary. During or shortly after compilation, an extractor extracts the names of source code files used to create the binary, communicates with a version control server to obtain information that identifies the versions of source code files used to create the binary, and stores the information in the binary or in a file associated with the binary. At debug time, the information is retrieved and used to obtain copies of the source code files from the version control server. The copies of the source code files are placed in a directory where the debugger expects to find them. The debugger may then show the source code corresponding to the binary instructions of the binary during debugging.
    Type: Application
    Filed: December 26, 2003
    Publication date: June 30, 2005
    Applicant: MICROSOFT CORPORATION
    Inventors: Pat Styles, Scott Kupec