Patents by Inventor Shon Schmidt
Shon Schmidt has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 8533801Abstract: A system for binding a subscription-based computer to an internet service provider (ISP) may include a binding module and a security module residing on the computer. The binding module may identify and authenticate configuration data from peripheral devices that attempt to connect to the computer, encrypt any requests for data from the computer to the ISP, and decrypt responses from the ISP. If the binding module is able to authenticate the configuration data and the response to the request for data from the ISP, then the security module may allow the communication between the computer and the ISP. However, if either the configuration cycle or the response cannot be properly verified, then the security module may degrade operation of the computer.Type: GrantFiled: June 14, 2011Date of Patent: September 10, 2013Assignee: Microsoft CorporationInventors: Todd Carpenter, Shon Schmidt, David J. Sebesta, William J. Westerinen
-
Patent number: 8161532Abstract: A system for managing a subscription-based computer independent of an operating system of the computer may include a security module that accesses, decrements, and stores subscription data during operation of the subscription-based computer. Additionally, the system may include a network module in communication with the security module and comprising a network stack, a web server, and a user interface in an operating system independent format. A web browser of the computer may request the user interface from the network stack. The interface may be populated with the subscription data, and a network driver may retrieve the populated user interface from the network module. The populated interface may then be sent to the web server to be served back to the requesting web browser.Type: GrantFiled: April 4, 2007Date of Patent: April 17, 2012Assignee: Microsoft CorporationInventors: David J. Sebesta, Shon Schmidt, William J. Westerinen, Todd Carpenter
-
Patent number: 8151118Abstract: A computer or other electronic device requiring physical integrity of its components, for example, a pay-per-use computer may use a master security device in communication with a plurality of slave security devices, known as security beans. Each security bean may be given a cryptographic key or keys for use in authenticating communication with the master security device. Each security bean may be coupled to an associated component and may have the ability to disable that associated component. In one embodiment, security bean has an analog switch that may be configured to block or attenuate a critical signal used by the associated component. The security bean may start up in the disable mode and respond to a verified signal from the master security device to enable its corresponding component.Type: GrantFiled: January 29, 2007Date of Patent: April 3, 2012Assignee: Microsoft CorporationInventors: David James Foster, Shon Schmidt, David Jaroslav Sebesta, Curt Andrew Steeb, William J. Westerinen, Zhangwei Xu, Todd L. Carpenter
-
Publication number: 20110271335Abstract: A system for binding a subscription-based computer to an internet service provider (ISP) may include a binding module and a security module residing on the computer. The binding module may identify and authenticate configuration data from peripheral devices that attempt to connect to the computer, encrypt any requests for data from the computer to the ISP, and decrypt responses from the ISP. If the binding module is able to authenticate the configuration data and the response to the request for data from the ISP, then the security module may allow the communication between the computer and the ISP. However, if either the configuration cycle or the response cannot be properly verified, then the security module may degrade operation of the computer.Type: ApplicationFiled: June 14, 2011Publication date: November 3, 2011Applicant: MICROSOFT CORPORATIONInventors: Todd Carpenter, Shon Schmidt, David J. Sebesta, William J. Westerinen
-
Patent number: 8000108Abstract: A method having a socket for coupling signals between an electrical component and a circuit board or equivalent has a mechanism that, when activated, attaches the electrical component to the socket so that it is not possible to remove the electrical component without damaging it. The mechanism may include a clamshell lid with a one-time locking mechanism, a pin contact mechanism that, after initial locking, will detach the pins of the electrical component if further disturbed, or a moat around the base of the electrical component for disposing an epoxy fastener. The moat may include a heating element to cure the epoxy or other glue. The socket may include an electrical component that allows detection of tampering with the socket.Type: GrantFiled: June 15, 2007Date of Patent: August 16, 2011Assignee: Microsoft CorporationInventors: Shon Schmidt, Nicholas Temple, Kurt A. Jenkins, Thomas Patrick Lennon, David Michael Lane
-
Patent number: 7984497Abstract: A system for binding a subscription-based computer to an internet service provider (ISP) may include a binding module and a security module residing on the computer. The binding module may identify and authenticate configuration data from peripheral devices that attempt to connect to the computer, encrypt any requests for data from the computer to the ISP, and decrypt responses from the ISP. If the binding module is able to authenticate the configuration data and the response to the request for data from the ISP, then the security module may allow the communication between the computer and the ISP. However, if either the configuration cycle or the response cannot be properly verified, then the security module may degrade operation of the computer.Type: GrantFiled: April 4, 2007Date of Patent: July 19, 2011Assignee: Microsoft CorporationInventors: Todd Carpenter, Shon Schmidt, David J. Sebesta, William J. Westerinen
-
Patent number: 7979721Abstract: A pay-per-use computer, or other electronic device that uses local security, may use a security module or other circuit for monitoring and enforcement of a usage policy. To help prevent physical attacks on the security module, or the circuit board near the security module, a second circuit may be mounted over the security module to help prevent access to the security module. Both circuits may be mounted on a interposer and the interposer mounted to the circuit board, creating a stack including the first circuit, the interposer, the security module, and a main PC board. When the PC board includes dense signal traces under the security module a three dimensional envelope is created around the security module. When the first circuit is a high value circuit, such as a Northbridge, the risk/reward of attacking the security module is increased substantially and may deter all but the most determined hackers.Type: GrantFiled: December 18, 2006Date of Patent: July 12, 2011Assignee: Microsoft CorporationInventors: William J. Westerinen, Todd L. Carpenter, Alexander Frank, Shon Schmidt, Stephen Richard Drake, David James Foster, Tse-Ching James Yu
-
Patent number: 7859941Abstract: Apodization control techniques for a microbeamformer including a plurality of microbeamformer channels each including a transducer, a microbeamformer transmitter for driving the transducer, a microbeamformer receiver for receiving signals from the transducer and usually a delay element for delaying the received transducer signals. To improve the generation of waveforms by the transducers, the voltage provided to the microbeamformer transmitters is adjusted and/or the current provided by the microbeamformer transmitters is adjusted. The microbeamformer channels can also be grouped together into patches and/or clusters with the patches and clusters being provided with a common voltage source or current.Type: GrantFiled: August 18, 2004Date of Patent: December 28, 2010Assignee: Koninklijke Philips Electronics N.V.Inventors: Steven Freeman, Bernard Savord, Andrew Robinson, Shon Schmidt
-
Patent number: 7844808Abstract: A security module for a pay-per-use computer supplies an appropriate BIOS for a given mode of operation. A power manager in the security module powers only essential circuits until the BIOS is operational to help prevent substitution of a non-authorized BIOS. The security module also includes a capability to monitor and restrict data lines on a bus between a main computer processor and computer system memory. When the computer is operating in a restricted use mode, data lines may be restricted to allow only minimal access to the computer system memory. Bus transactions may be monitored to ensure that only valid transactions are occurring and are within the designated memory space.Type: GrantFiled: December 18, 2006Date of Patent: November 30, 2010Assignee: Microsoft CorporationInventors: William J. Westerinen, Todd L. Carpenter, Alexander Frank, Shon Schmidt, Stephen Richard Drake
-
Publication number: 20100037325Abstract: A pay-per-use computer, or other electronic device that uses local security, may use a security module or other circuit for monitoring and enforcement of a usage policy. To help prevent physical attacks on the security module, or the circuit board near the security module, a second circuit may be mounted over the security module to help prevent access to the security module. Both circuits may be mounted on a interposer and the interposer mounted to the circuit board, creating a stack including the first circuit, the interposer, the security module, and a main PC board. When the PC board includes dense signal traces under the security module a three dimensional envelope is created around the security module. When the first circuit is a high value circuit, such as a Northbridge, the risk/reward of attacking the security module is increased substantially and may deter all but the most determined hackers.Type: ApplicationFiled: December 18, 2006Publication date: February 11, 2010Inventors: William J. Westerinen, Todd L. Carpenter, Alexander Frank, Shon Schmidt, Stephen Richard Drake, David James Foster, Tse-Ching James Yu
-
Publication number: 20090146695Abstract: A hybrid integrated circuit package for a microbeamformer in an ultrasound probe includes a substrate, a driver circuit for generating transmit pulses to be transmitted to the transducer elements of the probe for producing a transmit beam, and a beamformer circuit including time delay circuits and a summation circuit, the time delay circuits being operatively arranged for receiving a plurality of reflected pulses from the transducer elements and delaying the reflected pulses and the summation circuit operatively arranged summing groups of the delayed reflected pulses for producing beamformed signals. The driver circuit is part of a high voltage integrated circuit device including said driver circuit. At least a portion of the beamformer circuit is part of a low voltage integrated circuit device, wherein the high voltage integrated circuit and the low voltage integrated circuit are mounted on the substrate.Type: ApplicationFiled: November 17, 2005Publication date: June 11, 2009Applicant: KONINKLIJKE PHILIPS ELECTRONICS, N.V.Inventors: Scott Schweizer, Shon Schmidt, Manfred Bartz
-
Publication number: 20090094455Abstract: A computer or other electronic device may use a security module to securely control a system or processor clock to set a predetermined performance level. In an exemplary embodiment, the performance level may be high, medium, or low, supporting a range of application performance requirements. Changes to the performance level may be authorized by a third party presenting cryptographic rights to alter the performance level. Alternatively, postpaid ro pre-paid value may be accumulated at a rate corresponding to the predetermined performance level set by the security module.Type: ApplicationFiled: October 9, 2007Publication date: April 9, 2009Applicant: MICROSOFT CORPORATIONInventors: Shon Schmidt, Todd L. Carpenter, David James Foster, Harjit Singh
-
Publication number: 20080319925Abstract: A computer or other electronic device may be used in one of several selectable modes of operation. Computer resources, such as a processor, memory, or a graphics controller, are individually settable for operation at different levels of performance. A mode of operation or performance level is determined by the combination of individual settings for the various resources. Pay-per-use operation is charged at a rate determined by the mode of operation or performance level. Operation in a gaming mode may be charged at a higher rate than operation in web-browsing mode. A metering agent may be associated with each scalable use resource to securely set the performance level and to securely report on metered operation of the resource.Type: ApplicationFiled: June 21, 2007Publication date: December 25, 2008Applicant: MICROSOFT CORPORATIONInventors: Jeffrey Alan Herold, James S. Duffus, Curt Andrew Steeb, Thomas G. Phillips, William J. Westerinen, Martin H. Hall, Todd L. Carpenter, Daniel Makoski, Shon Schmidt
-
Publication number: 20080310127Abstract: A socket for coupling signals between an electrical component and a circuit board or equivalent has a mechanism that, when activated, attaches the electrical component to the socket so that it is not possible to remove the electrical component without damaging it. The mechanism may include a clamshell lid with a one-time locking mechanism, a pin contact mechanism that, after initial locking, will detach the pins of the electrical component if further disturbed, or a moat around the base of the electrical component for disposing an epoxy fastener. The moat may include a heating element to cure the epoxy or other glue. The socket may include an electrical component that allows detection of tampering with the socket.Type: ApplicationFiled: June 15, 2007Publication date: December 18, 2008Applicant: MICROSOFT CORPORATIONInventors: Shon Schmidt, Nicholas D. Temple, Kurt A. Jenkins, Thomas Patrick Lennon, David Michael Lane
-
Publication number: 20080282017Abstract: An SPI switch allows selection of a BIOS memory transparent to a Southbridge chipset component. The SPI switch provides address translation to a selected BIOS memory area under the control of a security module processor. The SPI switch also provides command filtering to prevent commands that represent a security risk such as bulk erase commands. Because the SPI switch allows transparent redirection between BIOS programs, booting in different operating modes may be supported without any changes to the basic computer architecture or major chipset components.Type: ApplicationFiled: May 9, 2007Publication date: November 13, 2008Applicant: MICROSOFT CORPORATIONInventors: Todd L. Carpenter, William J. Westerinen, Shon Schmidt, Stephen Richard Drake, Tse-Ching James Yu, Achim Schmidt, Stephan Schoenfeldt, Frank Preiss
-
Publication number: 20080250237Abstract: A system for managing a subscription-based computer independent of an operating system of the computer may include a security module that accesses, decrements, and stores subscription data during operation of the subscription-based computer. Additionally, the system may include a network module in communication with the security module and comprising a network stack, a web server, and a user interface in an operating system independent format. A web browser of the computer may request the user interface from the network stack. The interface may be populated with the subscription data, and a network driver may retrieve the populated user interface from the network module. The populated interface may then be sent to the web server to be served back to the requesting web browser.Type: ApplicationFiled: April 4, 2007Publication date: October 9, 2008Applicant: MICROSOFT CORPORATIONInventors: David J. Sebesta, Shon Schmidt, William J. Westerinen, Todd Carpenter
-
Publication number: 20080250129Abstract: A system for binding a subscription-based computer to an internet service provider (ISP) may include a binding module and a security module residing on the computer. The binding module may identify and authenticate configuration data from peripheral devices that attempt to connect to the computer, encrypt any requests for data from the computer to the ISP, and decrypt responses from the ISP. If the binding module is able to authenticate the configuration data and the response to the request for data from the ISP, then the security module may allow the communication between the computer and the ISP. However, if either the configuration cycle or the response cannot be properly verified, then the security module may degrade operation of the computer.Type: ApplicationFiled: April 4, 2007Publication date: October 9, 2008Applicant: MICROSOFT CORPORATIONInventors: Todd Carpenter, Shon Schmidt, David J. Sebesta, William J. Westerinen
-
Publication number: 20080229835Abstract: Backing block (16) for interconnecting a transducer array (12) and interconnection cables (18) connecting the transducer array (12) to a main system processing unit of an ultrasound imaging system which includes at least one base electronic component (24) electrically connected to the interconnection cable(s) (18) and which provides a pattern of interconnection structures (28), a redistribution interposer (22) electrically coupled on one side (40) to the base components) (24) and on an opposite side (38) to transducer array (12), and at least one subsidiary electronic component (26) supported by the base component(s) (24). The subsidiary components (26) can be arranged alongside the redistribution interposer (22), i.e., on a common side of the base component(s) (24) therewith, since the redistribution interposer (22) tapers in at least one dimension so that it has a smaller pitch on the side (40) connected to the base component(s) (24) than on the side (38) connected to the transducer array (12).Type: ApplicationFiled: June 5, 2006Publication date: September 25, 2008Applicant: KONINKLIJKE PHILIPS ELECTRONICS, N.V.Inventors: Richard Davidsen, Shon Schmidt
-
Publication number: 20080183305Abstract: A computer or other electronic device requiring physical integrity of its components, for example, a pay-per-use computer may use a master security device in communication with a plurality of slave security devices, known as security beans. Each security bean may be given a cryptographic key or keys for use in authenticating communication with the master security device. Each security bean may be coupled to an associated component and may have the ability to disable that associated component. In one embodiment, security bean has an analog switch that may be configured to block or attenuate a critical signal used by the associated component. The security bean may start up in the disable mode and respond to a verified signal from the master security device to enable its corresponding component.Type: ApplicationFiled: January 29, 2007Publication date: July 31, 2008Inventors: David James Foster, Shon Schmidt, David Jaroslav Sebesta, Curt Andrew Steeb, William J. Westerinen, Zhangwei Xu, Todd L. Carpenter
-
Publication number: 20080184341Abstract: A computer or electronic device uses a dedicated communication protocol for configuring, managing, and end-of-life operation of a master device controlling a plurality of security devices. The protocol includes messages for binding each security device to the master, for installing cryptographic keys, periodic heartbeat signals, as well as shutdown and disable-security messages.Type: ApplicationFiled: January 29, 2007Publication date: July 31, 2008Inventors: David Jaroslav Sebesta, Shon Schmidt, Zhangwei Xu, Todd L. Carpenter, William I. Westerinen