Patents by Inventor Scott C. Cottrille

Scott C. Cottrille has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 8646027
    Abstract: The present invention extends to methods, systems, and computer program products for workflow based authorization for content access. A workflow can be triggered when a protection policy does not fully express an intended recipient's rights in protected content. A workflow processes relevant inputs to more fully express the intended recipient's rights in protected content. Workflows can provide policy item updates and authorizations decisions with respect to protected content. Through the use of workflows to make an authorization decision, access to information can become more flexible, allowing it to follow the desired flow of information throughout its lifecycle. This flexibility allows organizations to protect their information without worrying about the protection stopping the natural flow of business.
    Type: Grant
    Filed: June 27, 2008
    Date of Patent: February 4, 2014
    Assignee: Microsoft Corporation
    Inventors: Rushmi U. Malaviarachchi, Kenneth D. Ray, Scott C. Cottrille, Frederic Delombaerde, Conrad G. Bayer
  • Patent number: 8448228
    Abstract: The present invention extends to methods, systems, and computer program products for separating authorization identity from policy enforcement identity. Embodiments of the invention extend the consumption phase for protected information. Two identities, an authorization identity and a policy enforcement identity, are used for acquiring, issuing and enforcing usage license instead of one identity certificate. The authorization identity is used to evaluate against usage policy. The authorization identity is similar to identification information in an identity certificate. The policy enforcement identity is used to ensure the confidentiality of granted permissions and content key. The policy enforcement identity enforces a usage license on an authorization principal's (e.g., recipient's) machine. The policy enforcement identity's enforcement of a usage license is similar use of a cryptographic key in an identity certificate.
    Type: Grant
    Filed: September 29, 2010
    Date of Patent: May 21, 2013
    Assignee: Microsoft Corporation
    Inventors: Yuhui Zhong, Gregory Kostal, Tejas D. Patel, Scott C. Cottrille, Vladimir Yarmolenko, Pankaj Mohan Kamat, Sunitha Samuel, Frank D. Byrum, Mayank Mehta, Chandresh Kumar Jain, Edward Banti
  • Patent number: 8156538
    Abstract: One embodiment includes a method which may be practiced in a computing environment where resources are distributed. The method includes acts for obtaining policy information defining restrictions on resources distributed in the computing environment. The method includes sending a request to a server for metadata about one or more resource protection policies at the server. In response to the request, metadata about one or more resource protection polices at the server is received from the server. The metadata from the server is analyzed. Based on analyzing the metadata, one or more resource protection policies stored at the client are updated.
    Type: Grant
    Filed: December 18, 2007
    Date of Patent: April 10, 2012
    Assignee: Microsoft Corporation
    Inventors: Abhijat A. Kanade, Rushmi U. Malaviarachchi, Peter D. Waxman, Yuhui Zhong, Gregory Kostal, Scott C. Cottrille, Syed A. Mehdi, Patricia Priest, Kumar B. Parambir, Li Ren
  • Publication number: 20120079268
    Abstract: The present invention extends to methods, systems, and computer program products for separating authorization identity from policy enforcement identity. Embodiments of the invention extend the consumption phase for protected information. Two identities, an authorization identity and a policy enforcement identity, are used for acquiring, issuing and enforcing usage license instead of one identity certificate. The authorization identity is used to evaluate against usage policy. The authorization identity is similar to identification information in an identity certificate. The policy enforcement identity is used to ensure the confidentiality of granted permissions and content key. The policy enforcement identity enforces a usage license on an authorization principal's (e.g., recipient's) machine. The policy enforcement identity's enforcement of a usage license is similar use of a cryptographic key in an identity certificate.
    Type: Application
    Filed: September 29, 2010
    Publication date: March 29, 2012
    Applicant: Microsoft Corporation
    Inventors: Yuhui Zhong, Gregory Kostal, Tejas D. Patel, Scott C. Cottrille, Vladimir Yarmolenko, Pankaj Mohan Kamat, Sunitha Samuel, Frank D. Byrum, Mayank Mehta, Chandresh Kumar Jain, Edward Banti
  • Patent number: 8141129
    Abstract: The present invention extends to methods, systems, and computer program products for a centrally accessible policy repository. Protection policies for protecting resources within an organization are stored at a central policy repository. Thus, an administrator can centrally create, maintain, and manage resource protection polices for all of the organizational units within an organization. Accordingly, resources consumed when performing these protection policy related operations is significantly reduced. Additionally, since protection policies are centrally located, there is increased likelihood of being able to consistently apply an organization's protection policies within different organizational units, even when protection policies change.
    Type: Grant
    Filed: May 29, 2008
    Date of Patent: March 20, 2012
    Assignee: Microsoft Corporation
    Inventors: Kenneth D. Ray, Keith S. Brintzenhofe, Rushmi U. Malaviarachchi, Scott C. Cottrille, Gregory Kostal, Vladimir Yarmolenko, Abhijat Kanade
  • Patent number: 8078958
    Abstract: A scalable computing system for managing annotations is capable of handling requests for annotations to millions of documents a day. The computing system consists of multiple tiers of servers. A tier I server indicates whether there are annotations associated with a content source. A tier II server indexes the annotations. A tier III server stores the body of the annotation.
    Type: Grant
    Filed: May 1, 2006
    Date of Patent: December 13, 2011
    Assignee: Hewlett-Packard Development Company
    Inventors: Scott C Cottrille, Yoram Yaacovi, Antony Halim
  • Patent number: 7987496
    Abstract: The secure application of content protection policies to content. The secure application of content protection polices is accomplished by having an enforcement mechanism monitor policy application points to detect the transfer of content. The enforcement mechanism accesses the content and a determination is made to protect the content. A usage policy is then identified by the enforcement mechanism to apply to the content and the usage policy is then applied to the content, resulting in a usage policy for the content.
    Type: Grant
    Filed: April 11, 2008
    Date of Patent: July 26, 2011
    Assignee: Microsoft Corporation
    Inventors: Duncan G. Bryce, Scott C. Cottrille, Pankaj Mohan Kamat, Krassimir Karamfilov, Gregory Kostal, Kenneth D. Ray, Vladimir Yarmolenko, Yuhui Zhong
  • Patent number: 7949944
    Abstract: A method, apparatus, and software are disclosed for delivering customized content to clients with diverse content needs, such as clients from diverse geographical areas an language backgrounds. Customizable content is separated from the underlying code, which is used as a template for inserting localized content into a basic document framework as represented by the template. Both electronic mail and Web community customization techniques are disclosed.
    Type: Grant
    Filed: October 27, 2006
    Date of Patent: May 24, 2011
    Assignee: Microsoft Corporation
    Inventors: Scott C Cottrille, Ade A Olubummo, Antony Halim, Brian R Daugherty, Patrick Pei Cai, Craig Harry
  • Patent number: 7913167
    Abstract: Embodiments described herein are directed to selectively redacting and unredacting display information in accordance with a redaction policy. In one embodiment, a computer system receives user input indicating a user's intention to selectively redact portions of accessed documents. The computer system accesses at least one document, such that the document is capable of being displayed to the user. The computer system determines that the accessed document comprises one or more tags indicating which portions of the document are to be redacted. The computer system dynamically redacts those portions of the document identified by the tags without otherwise altering the structure of the document, in accordance with the user's intention. The computer system also displays the document according to the document's original structure, omitting the dynamically redacted portions.
    Type: Grant
    Filed: December 19, 2007
    Date of Patent: March 22, 2011
    Assignee: Microsoft Corporation
    Inventor: Scott C. Cottrille
  • Patent number: 7882035
    Abstract: The present invention extends to methods, systems, and computer program products for pre-performing operations for accessing protected content. Cryptographic user key pairs can be pre-generated and distributed in response to a variety of different events prior to provisioning client machine for accessing protected content. Usage licenses can be pre-generated and allocated prior to requests for usage licenses. Usage licenses can be pre-obtained for client machines prior to client machines access protected content. Pre-performed operations can be performed in response to detected events, such as, for example, reduced resource consumption in a Digital Rights Management system.
    Type: Grant
    Filed: January 25, 2008
    Date of Patent: February 1, 2011
    Assignee: Microsoft Corporation
    Inventors: Scott C. Cottrille, Gregory Kostal, Rushmi U. Malaviarachchi, Jeffrey M. Brown, Umesh R. Dhond, Amit Fulay, Jody A. Hendrix, Krassimir E. Karamfilov, Yevgeniy Rozenfeld, Vladimir Yarmolenko, Yuhui Zhong
  • Patent number: 7725816
    Abstract: A method, apparatus, and software are disclosed for delivering customized content to clients with diverse content needs, such as clients from diverse geographical areas an language backgrounds. Customizable content is separated from the underlying code, which is used as a template for inserting localized content into a basic document framework as represented by the template. Both electronic mail and Web community customization techniques are disclosed.
    Type: Grant
    Filed: October 27, 2006
    Date of Patent: May 25, 2010
    Assignee: Microsoft Corporation
    Inventors: Scott C Cottrille, Ade A Olubummo, Antony Halim, Brian R Daugherty, Patrick Pei Cai, Craig Harry
  • Publication number: 20090328156
    Abstract: The present invention extends to methods, systems, and computer program products for workflow based authorization for content access. A workflow can be triggered when a protection policy does not fully express an intended recipient's rights in protected content. A workflow processes relevant inputs to more fully express the intended recipient's rights in protected content. Workflows can provide policy item updates and authorizations decisions with respect to protected content. Through the use of workflows to make an authorization decision, access to information can become more flexible, allowing it to follow the desired flow of information throughout its lifecycle. This flexibility allows organizations to protect their information without worrying about the protection stopping the natural flow of business.
    Type: Application
    Filed: June 27, 2008
    Publication date: December 31, 2009
    Applicant: Microsoft Corporation
    Inventors: Rushmi U. Malaviarachchi, Kenneth D. Ray, Scott C. Cottrille, Frederic Delombaerde, Conrad G. Bayer
  • Patent number: 7631318
    Abstract: Systems and methods for providing digital rights management services are disclosed. Such a system includes a service program that provides a processing framework for performing a digital rights management service, such as publishing or licensing rights managed digital content. A plurality of plug-in components are provided, each of which performs a respective task associated with the digital rights management service. The plug-in components are integrated into the processing framework according to predefined sets of interface rules.
    Type: Grant
    Filed: June 28, 2002
    Date of Patent: December 8, 2009
    Assignee: Microsoft Corporation
    Inventors: Scott C. Cottrille, Peter David Waxman, Vinay Krishnaswamy, Chandramouli Venkatesh, Attilla Narin, Gregory Kostal, Prashant Malik, Vladimir Yarmolenko, Frank Byrum, Thomas K. Lindeman
  • Publication number: 20090300706
    Abstract: The present invention extends to methods, systems, and computer program products for a centrally accessible policy repository. Protection policies for protecting resources within an organization are stored at a central policy repository. Thus, an administrator can centrally create, maintain, and manage resource protection polices for all of the organizational units within an organization. Accordingly, resources consumed when performing these protection policy related operations is significantly reduced. Additionally, since protection policies are centrally located, there is increased likelihood of being able to consistently apply an organization's protection policies within different organizational units, even when protection policies change.
    Type: Application
    Filed: May 29, 2008
    Publication date: December 3, 2009
    Applicant: Microsoft Corporation
    Inventors: Kenneth D. Ray, Keith S. Brintzenhofe, Rushmi U. Malaviarachchi, Scott C. Cottrille, Gregory Kostal, Vladimir Yarmolenko, Abhijat Kanade
  • Publication number: 20090260054
    Abstract: The secure application of content protection policies to content. The secure application of content protection polices is accomplished by having an enforcement mechanism monitor policy application points to detect the transfer of content. The enforcement mechanism accesses the content and a determination is made to protect the content. A usage policy is then identified by the enforcement mechanism to apply to the content and the usage policy is then applied to the content, resulting in a usage policy for the content.
    Type: Application
    Filed: April 11, 2008
    Publication date: October 15, 2009
    Applicant: MICROSOFT CORPORATION
    Inventors: Duncan G. Bryce, Scott C. Cottrille, Pankaj Mohan Kamat, Krassimir Karamfilov, Gregory Kostal, Kenneth D. Ray, Vladimir Yarmolenko, Yuhui Zhong
  • Publication number: 20090222879
    Abstract: Providing access to information based on super policy. Information is associated with author policy expressing restrictions on use of the information The author policy is processed using super policy programmatic code to generate a composite policy. The composite policy includes a combination of the author policy and super policy applied by the super policy programmatic code, such that restrictions are added to or removed from the author policy to create the composite policy. A request for the information is evaluated. This includes evaluating information about the requester against the composite policy to determine if the requester is authorized to access the information. A determination is made that the requester is authorized to access the information based on the composite policy, where after the requester is authorized to access the information based on the composite policy, access is granted to the information to the requester.
    Type: Application
    Filed: March 3, 2008
    Publication date: September 3, 2009
    Applicant: MICROSOFT CORPORATION
    Inventors: Gregory Kostal, Rushmi U. Malaviarachchi, Scott C. Cottrille
  • Publication number: 20090208015
    Abstract: The offline consumption and publication of protected information in a networked environment. The offline consumption of protected information is accomplished by having the consuming user maintain a store of asymmetric encryption keys. The protected information is encrypted by the publishing user using a symmetric key and the symmetric key is then encrypted using a public asymmetric key associated with the consuming user. The consuming user received the protected information and a usage policy containing the encrypted symmetric key. The consuming user verifies that it can decrypt the symmetric key using a private asymmetric key maintained by the consumer. The user then decrypts the symmetric key and accesses the content of the protected information.
    Type: Application
    Filed: February 15, 2008
    Publication date: August 20, 2009
    Applicant: MICROSOFT CORPORATION
    Inventors: Pankaj Mohan Kamat, Duncan G. Bryce, Scott C. Cottrille, Gregory Kostal
  • Publication number: 20090192942
    Abstract: The present invention extends to methods, systems, and computer program products for pre-performing operations for accessing protected content. Cryptographic user key pairs can be pre-generated and distributed in response to a variety of different events prior to provisioning client machine for accessing protected content. Usage licenses can be pre-generated and allocated prior to requests for usage licenses. Usage licenses can be pre-obtained for client machines prior to client machines access protected content. Pre-performed operations can be performed in response to detected events, such as, for example, reduced resource consumption in a Digital Rights Management system.
    Type: Application
    Filed: January 25, 2008
    Publication date: July 30, 2009
    Applicant: MICROSOFT CORPORATION
    Inventors: Scott C. Cottrille, Gregory Kostal, Rushmi U. Malaviarachchi, Jeffrey M. Brown, Umesh R. Dhond, Amit Fulay, Jody A. Hendrix, Krassimir E. Karamfilov, Yevgeniy Rozenfeld, Vladimir Yarmolenko, Yuhui Zhong
  • Publication number: 20090164878
    Abstract: Embodiments described herein are directed to selectively redacting and unredacting display information in accordance with a redaction policy. In one embodiment, a computer system receives user input indicating a user's intention to selectively redact portions of accessed documents. The computer system accesses at least one document, such that the document is capable of being displayed to the user. The computer system determines that the accessed document comprises one or more tags indicating which portions of the document are to be redacted. The computer system dynamically redacts those portions of the document identified by the tags without otherwise altering the structure of the document, in accordance with the user's intention. The computer system also displays the document according to the document's original structure, omitting the dynamically redacted portions.
    Type: Application
    Filed: December 19, 2007
    Publication date: June 25, 2009
    Applicant: Microsoft Corporation
    Inventor: Scott C. Cottrille
  • Publication number: 20090158384
    Abstract: One embodiment includes a method which may be practiced in a computing environment where resources are distributed. The method includes acts for obtaining policy information defining restrictions on resources distributed in the computing environment. The method includes sending a request to a server for metadata about one or more resource protection policies at the server. In response to the request, metadata about one or more resource protection polices at the server is received from the server. The metadata from the server is analyzed. Based on analyzing the metadata, one or more resource protection policies stored at the client are updated.
    Type: Application
    Filed: December 18, 2007
    Publication date: June 18, 2009
    Applicant: MICROSOFT CORPORATION
    Inventors: Abhijat A. Kanade, Rushmi U. Malaviarachchi, Peter D. Waxman, Yuhui Zhong, Gregory Kostal, Scott C. Cottrille, Syed A. Mehdi, Patricia Priest, Kumar B. Parambir, Li Ren