Patents by Inventor Shon Schmidt

Shon Schmidt has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 8533801
    Abstract: A system for binding a subscription-based computer to an internet service provider (ISP) may include a binding module and a security module residing on the computer. The binding module may identify and authenticate configuration data from peripheral devices that attempt to connect to the computer, encrypt any requests for data from the computer to the ISP, and decrypt responses from the ISP. If the binding module is able to authenticate the configuration data and the response to the request for data from the ISP, then the security module may allow the communication between the computer and the ISP. However, if either the configuration cycle or the response cannot be properly verified, then the security module may degrade operation of the computer.
    Type: Grant
    Filed: June 14, 2011
    Date of Patent: September 10, 2013
    Assignee: Microsoft Corporation
    Inventors: Todd Carpenter, Shon Schmidt, David J. Sebesta, William J. Westerinen
  • Patent number: 8161532
    Abstract: A system for managing a subscription-based computer independent of an operating system of the computer may include a security module that accesses, decrements, and stores subscription data during operation of the subscription-based computer. Additionally, the system may include a network module in communication with the security module and comprising a network stack, a web server, and a user interface in an operating system independent format. A web browser of the computer may request the user interface from the network stack. The interface may be populated with the subscription data, and a network driver may retrieve the populated user interface from the network module. The populated interface may then be sent to the web server to be served back to the requesting web browser.
    Type: Grant
    Filed: April 4, 2007
    Date of Patent: April 17, 2012
    Assignee: Microsoft Corporation
    Inventors: David J. Sebesta, Shon Schmidt, William J. Westerinen, Todd Carpenter
  • Patent number: 8151118
    Abstract: A computer or other electronic device requiring physical integrity of its components, for example, a pay-per-use computer may use a master security device in communication with a plurality of slave security devices, known as security beans. Each security bean may be given a cryptographic key or keys for use in authenticating communication with the master security device. Each security bean may be coupled to an associated component and may have the ability to disable that associated component. In one embodiment, security bean has an analog switch that may be configured to block or attenuate a critical signal used by the associated component. The security bean may start up in the disable mode and respond to a verified signal from the master security device to enable its corresponding component.
    Type: Grant
    Filed: January 29, 2007
    Date of Patent: April 3, 2012
    Assignee: Microsoft Corporation
    Inventors: David James Foster, Shon Schmidt, David Jaroslav Sebesta, Curt Andrew Steeb, William J. Westerinen, Zhangwei Xu, Todd L. Carpenter
  • Publication number: 20110271335
    Abstract: A system for binding a subscription-based computer to an internet service provider (ISP) may include a binding module and a security module residing on the computer. The binding module may identify and authenticate configuration data from peripheral devices that attempt to connect to the computer, encrypt any requests for data from the computer to the ISP, and decrypt responses from the ISP. If the binding module is able to authenticate the configuration data and the response to the request for data from the ISP, then the security module may allow the communication between the computer and the ISP. However, if either the configuration cycle or the response cannot be properly verified, then the security module may degrade operation of the computer.
    Type: Application
    Filed: June 14, 2011
    Publication date: November 3, 2011
    Applicant: MICROSOFT CORPORATION
    Inventors: Todd Carpenter, Shon Schmidt, David J. Sebesta, William J. Westerinen
  • Patent number: 8000108
    Abstract: A method having a socket for coupling signals between an electrical component and a circuit board or equivalent has a mechanism that, when activated, attaches the electrical component to the socket so that it is not possible to remove the electrical component without damaging it. The mechanism may include a clamshell lid with a one-time locking mechanism, a pin contact mechanism that, after initial locking, will detach the pins of the electrical component if further disturbed, or a moat around the base of the electrical component for disposing an epoxy fastener. The moat may include a heating element to cure the epoxy or other glue. The socket may include an electrical component that allows detection of tampering with the socket.
    Type: Grant
    Filed: June 15, 2007
    Date of Patent: August 16, 2011
    Assignee: Microsoft Corporation
    Inventors: Shon Schmidt, Nicholas Temple, Kurt A. Jenkins, Thomas Patrick Lennon, David Michael Lane
  • Patent number: 7984497
    Abstract: A system for binding a subscription-based computer to an internet service provider (ISP) may include a binding module and a security module residing on the computer. The binding module may identify and authenticate configuration data from peripheral devices that attempt to connect to the computer, encrypt any requests for data from the computer to the ISP, and decrypt responses from the ISP. If the binding module is able to authenticate the configuration data and the response to the request for data from the ISP, then the security module may allow the communication between the computer and the ISP. However, if either the configuration cycle or the response cannot be properly verified, then the security module may degrade operation of the computer.
    Type: Grant
    Filed: April 4, 2007
    Date of Patent: July 19, 2011
    Assignee: Microsoft Corporation
    Inventors: Todd Carpenter, Shon Schmidt, David J. Sebesta, William J. Westerinen
  • Patent number: 7979721
    Abstract: A pay-per-use computer, or other electronic device that uses local security, may use a security module or other circuit for monitoring and enforcement of a usage policy. To help prevent physical attacks on the security module, or the circuit board near the security module, a second circuit may be mounted over the security module to help prevent access to the security module. Both circuits may be mounted on a interposer and the interposer mounted to the circuit board, creating a stack including the first circuit, the interposer, the security module, and a main PC board. When the PC board includes dense signal traces under the security module a three dimensional envelope is created around the security module. When the first circuit is a high value circuit, such as a Northbridge, the risk/reward of attacking the security module is increased substantially and may deter all but the most determined hackers.
    Type: Grant
    Filed: December 18, 2006
    Date of Patent: July 12, 2011
    Assignee: Microsoft Corporation
    Inventors: William J. Westerinen, Todd L. Carpenter, Alexander Frank, Shon Schmidt, Stephen Richard Drake, David James Foster, Tse-Ching James Yu
  • Patent number: 7859941
    Abstract: Apodization control techniques for a microbeamformer including a plurality of microbeamformer channels each including a transducer, a microbeamformer transmitter for driving the transducer, a microbeamformer receiver for receiving signals from the transducer and usually a delay element for delaying the received transducer signals. To improve the generation of waveforms by the transducers, the voltage provided to the microbeamformer transmitters is adjusted and/or the current provided by the microbeamformer transmitters is adjusted. The microbeamformer channels can also be grouped together into patches and/or clusters with the patches and clusters being provided with a common voltage source or current.
    Type: Grant
    Filed: August 18, 2004
    Date of Patent: December 28, 2010
    Assignee: Koninklijke Philips Electronics N.V.
    Inventors: Steven Freeman, Bernard Savord, Andrew Robinson, Shon Schmidt
  • Patent number: 7844808
    Abstract: A security module for a pay-per-use computer supplies an appropriate BIOS for a given mode of operation. A power manager in the security module powers only essential circuits until the BIOS is operational to help prevent substitution of a non-authorized BIOS. The security module also includes a capability to monitor and restrict data lines on a bus between a main computer processor and computer system memory. When the computer is operating in a restricted use mode, data lines may be restricted to allow only minimal access to the computer system memory. Bus transactions may be monitored to ensure that only valid transactions are occurring and are within the designated memory space.
    Type: Grant
    Filed: December 18, 2006
    Date of Patent: November 30, 2010
    Assignee: Microsoft Corporation
    Inventors: William J. Westerinen, Todd L. Carpenter, Alexander Frank, Shon Schmidt, Stephen Richard Drake
  • Publication number: 20100037325
    Abstract: A pay-per-use computer, or other electronic device that uses local security, may use a security module or other circuit for monitoring and enforcement of a usage policy. To help prevent physical attacks on the security module, or the circuit board near the security module, a second circuit may be mounted over the security module to help prevent access to the security module. Both circuits may be mounted on a interposer and the interposer mounted to the circuit board, creating a stack including the first circuit, the interposer, the security module, and a main PC board. When the PC board includes dense signal traces under the security module a three dimensional envelope is created around the security module. When the first circuit is a high value circuit, such as a Northbridge, the risk/reward of attacking the security module is increased substantially and may deter all but the most determined hackers.
    Type: Application
    Filed: December 18, 2006
    Publication date: February 11, 2010
    Inventors: William J. Westerinen, Todd L. Carpenter, Alexander Frank, Shon Schmidt, Stephen Richard Drake, David James Foster, Tse-Ching James Yu
  • Publication number: 20090146695
    Abstract: A hybrid integrated circuit package for a microbeamformer in an ultrasound probe includes a substrate, a driver circuit for generating transmit pulses to be transmitted to the transducer elements of the probe for producing a transmit beam, and a beamformer circuit including time delay circuits and a summation circuit, the time delay circuits being operatively arranged for receiving a plurality of reflected pulses from the transducer elements and delaying the reflected pulses and the summation circuit operatively arranged summing groups of the delayed reflected pulses for producing beamformed signals. The driver circuit is part of a high voltage integrated circuit device including said driver circuit. At least a portion of the beamformer circuit is part of a low voltage integrated circuit device, wherein the high voltage integrated circuit and the low voltage integrated circuit are mounted on the substrate.
    Type: Application
    Filed: November 17, 2005
    Publication date: June 11, 2009
    Applicant: KONINKLIJKE PHILIPS ELECTRONICS, N.V.
    Inventors: Scott Schweizer, Shon Schmidt, Manfred Bartz
  • Publication number: 20090094455
    Abstract: A computer or other electronic device may use a security module to securely control a system or processor clock to set a predetermined performance level. In an exemplary embodiment, the performance level may be high, medium, or low, supporting a range of application performance requirements. Changes to the performance level may be authorized by a third party presenting cryptographic rights to alter the performance level. Alternatively, postpaid ro pre-paid value may be accumulated at a rate corresponding to the predetermined performance level set by the security module.
    Type: Application
    Filed: October 9, 2007
    Publication date: April 9, 2009
    Applicant: MICROSOFT CORPORATION
    Inventors: Shon Schmidt, Todd L. Carpenter, David James Foster, Harjit Singh
  • Publication number: 20080319925
    Abstract: A computer or other electronic device may be used in one of several selectable modes of operation. Computer resources, such as a processor, memory, or a graphics controller, are individually settable for operation at different levels of performance. A mode of operation or performance level is determined by the combination of individual settings for the various resources. Pay-per-use operation is charged at a rate determined by the mode of operation or performance level. Operation in a gaming mode may be charged at a higher rate than operation in web-browsing mode. A metering agent may be associated with each scalable use resource to securely set the performance level and to securely report on metered operation of the resource.
    Type: Application
    Filed: June 21, 2007
    Publication date: December 25, 2008
    Applicant: MICROSOFT CORPORATION
    Inventors: Jeffrey Alan Herold, James S. Duffus, Curt Andrew Steeb, Thomas G. Phillips, William J. Westerinen, Martin H. Hall, Todd L. Carpenter, Daniel Makoski, Shon Schmidt
  • Publication number: 20080310127
    Abstract: A socket for coupling signals between an electrical component and a circuit board or equivalent has a mechanism that, when activated, attaches the electrical component to the socket so that it is not possible to remove the electrical component without damaging it. The mechanism may include a clamshell lid with a one-time locking mechanism, a pin contact mechanism that, after initial locking, will detach the pins of the electrical component if further disturbed, or a moat around the base of the electrical component for disposing an epoxy fastener. The moat may include a heating element to cure the epoxy or other glue. The socket may include an electrical component that allows detection of tampering with the socket.
    Type: Application
    Filed: June 15, 2007
    Publication date: December 18, 2008
    Applicant: MICROSOFT CORPORATION
    Inventors: Shon Schmidt, Nicholas D. Temple, Kurt A. Jenkins, Thomas Patrick Lennon, David Michael Lane
  • Publication number: 20080282017
    Abstract: An SPI switch allows selection of a BIOS memory transparent to a Southbridge chipset component. The SPI switch provides address translation to a selected BIOS memory area under the control of a security module processor. The SPI switch also provides command filtering to prevent commands that represent a security risk such as bulk erase commands. Because the SPI switch allows transparent redirection between BIOS programs, booting in different operating modes may be supported without any changes to the basic computer architecture or major chipset components.
    Type: Application
    Filed: May 9, 2007
    Publication date: November 13, 2008
    Applicant: MICROSOFT CORPORATION
    Inventors: Todd L. Carpenter, William J. Westerinen, Shon Schmidt, Stephen Richard Drake, Tse-Ching James Yu, Achim Schmidt, Stephan Schoenfeldt, Frank Preiss
  • Publication number: 20080250129
    Abstract: A system for binding a subscription-based computer to an internet service provider (ISP) may include a binding module and a security module residing on the computer. The binding module may identify and authenticate configuration data from peripheral devices that attempt to connect to the computer, encrypt any requests for data from the computer to the ISP, and decrypt responses from the ISP. If the binding module is able to authenticate the configuration data and the response to the request for data from the ISP, then the security module may allow the communication between the computer and the ISP. However, if either the configuration cycle or the response cannot be properly verified, then the security module may degrade operation of the computer.
    Type: Application
    Filed: April 4, 2007
    Publication date: October 9, 2008
    Applicant: MICROSOFT CORPORATION
    Inventors: Todd Carpenter, Shon Schmidt, David J. Sebesta, William J. Westerinen
  • Publication number: 20080250237
    Abstract: A system for managing a subscription-based computer independent of an operating system of the computer may include a security module that accesses, decrements, and stores subscription data during operation of the subscription-based computer. Additionally, the system may include a network module in communication with the security module and comprising a network stack, a web server, and a user interface in an operating system independent format. A web browser of the computer may request the user interface from the network stack. The interface may be populated with the subscription data, and a network driver may retrieve the populated user interface from the network module. The populated interface may then be sent to the web server to be served back to the requesting web browser.
    Type: Application
    Filed: April 4, 2007
    Publication date: October 9, 2008
    Applicant: MICROSOFT CORPORATION
    Inventors: David J. Sebesta, Shon Schmidt, William J. Westerinen, Todd Carpenter
  • Publication number: 20080229835
    Abstract: Backing block (16) for interconnecting a transducer array (12) and interconnection cables (18) connecting the transducer array (12) to a main system processing unit of an ultrasound imaging system which includes at least one base electronic component (24) electrically connected to the interconnection cable(s) (18) and which provides a pattern of interconnection structures (28), a redistribution interposer (22) electrically coupled on one side (40) to the base components) (24) and on an opposite side (38) to transducer array (12), and at least one subsidiary electronic component (26) supported by the base component(s) (24). The subsidiary components (26) can be arranged alongside the redistribution interposer (22), i.e., on a common side of the base component(s) (24) therewith, since the redistribution interposer (22) tapers in at least one dimension so that it has a smaller pitch on the side (40) connected to the base component(s) (24) than on the side (38) connected to the transducer array (12).
    Type: Application
    Filed: June 5, 2006
    Publication date: September 25, 2008
    Applicant: KONINKLIJKE PHILIPS ELECTRONICS, N.V.
    Inventors: Richard Davidsen, Shon Schmidt
  • Publication number: 20080183305
    Abstract: A computer or other electronic device requiring physical integrity of its components, for example, a pay-per-use computer may use a master security device in communication with a plurality of slave security devices, known as security beans. Each security bean may be given a cryptographic key or keys for use in authenticating communication with the master security device. Each security bean may be coupled to an associated component and may have the ability to disable that associated component. In one embodiment, security bean has an analog switch that may be configured to block or attenuate a critical signal used by the associated component. The security bean may start up in the disable mode and respond to a verified signal from the master security device to enable its corresponding component.
    Type: Application
    Filed: January 29, 2007
    Publication date: July 31, 2008
    Inventors: David James Foster, Shon Schmidt, David Jaroslav Sebesta, Curt Andrew Steeb, William J. Westerinen, Zhangwei Xu, Todd L. Carpenter
  • Publication number: 20080184341
    Abstract: A computer or electronic device uses a dedicated communication protocol for configuring, managing, and end-of-life operation of a master device controlling a plurality of security devices. The protocol includes messages for binding each security device to the master, for installing cryptographic keys, periodic heartbeat signals, as well as shutdown and disable-security messages.
    Type: Application
    Filed: January 29, 2007
    Publication date: July 31, 2008
    Inventors: David Jaroslav Sebesta, Shon Schmidt, Zhangwei Xu, Todd L. Carpenter, William I. Westerinen