Patents by Inventor Son VoBa

Son VoBa has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 10063565
    Abstract: A method of geolocation verification, including obtaining the geolocation of an operating system, generating a unique system ID for an installed operating system, and transmitting the geolocation of the operating system and a system ID to a data repository. The method further includes receiving a request to either initiate deployment of, or grant access to, a computer object associated with the operating system, identifying if the computer object requires geolocation verification, then identifying an object ID associated with the computer object and communicating each of the object ID, the geolocation of the operating system, and the system ID, to a domain controller for assessment. The method also includes searching the data repository to identify one or more geolocation object resource claims associated with the object ID, and comparing the geolocation resource claims with the communicated geolocation of the operating system.
    Type: Grant
    Filed: October 29, 2015
    Date of Patent: August 28, 2018
    Assignee: SYNC-N-SCALE, LLC
    Inventor: Son VoBa
  • Patent number: 9703586
    Abstract: A virtual hard disk drive containing a guest operating system is bound to a source computing device through encryption. When the virtual hard drive is moved to a difference computing device, a virtual machine manager instantiates a virtual machine and causing the virtual machine to boot the operating system from the virtual hard disk drive. Because the guest operating system is encrypted by an encryption device on a source computing device, the virtual machine causing the decryption of the guest operating system with a copy of the key. The virtual hard disk is bound to the target computing device through encryption based on a hardware on the target computing device.
    Type: Grant
    Filed: February 17, 2010
    Date of Patent: July 11, 2017
    Assignee: Microsoft Technology Licensing, LLC
    Inventors: Son VoBa, Octavian T. Ureche
  • Publication number: 20160127384
    Abstract: A method of geolocation verification, including obtaining the geolocation of an operating system, generating a unique system ID for an installed operating system, and transmitting the geolocation of the operating system and a system ID to a data repository. The method further includes receiving a request to either initiate deployment of, or grant access to, a computer object associated with the operating system, identifying if the computer object requires geolocation verification, then identifying an object ID associated with the computer object and communicating each of the object ID, the geolocation of the operating system, and the system ID, to a domain controller for assessment. The method also includes searching the data repository to identify one or more geolocation object resource claims associated with the object ID, and comparing the geolocation resource claims with the communicated geolocation of the operating system.
    Type: Application
    Filed: October 29, 2015
    Publication date: May 5, 2016
    Applicant: SYNC-N-SCALE, LLC
    Inventor: Son VoBa
  • Patent number: 8745386
    Abstract: Single-use authentication methods for accessing encrypted data stored on a protected volume of a computer are described, wherein access to the encrypted data involves decrypting a key protector stored on the computer that holds a volume-specific cryptographic key needed to decrypt the protected volume. Such single-use authentication methods rely on the provision of a key protector that can only be used once and/or that requires a new access credential for each use. In certain embodiments, a challenge-response process is also used as part of the authentication method to tie the issuance of a key protector and/or access credential to particular pieces of information that can uniquely identify a user.
    Type: Grant
    Filed: June 21, 2010
    Date of Patent: June 3, 2014
    Assignee: Microsoft Corporation
    Inventors: Octavian T. Ureche, Nils Dussart, Charles G. Jeffries, Cristian M. Ilac, Vijay G. Bharadwaj, Innokentiy Basmov, Stefan Thom, Son VoBa
  • Publication number: 20110314279
    Abstract: Single-use authentication methods for accessing encrypted data stored on a protected volume of a computer are described, wherein access to the encrypted data involves decrypting a key protector stored on the computer that holds a volume-specific cryptographic key needed to decrypt the protected volume. Such single-use authentication methods rely on the provision of a key protector that can only be used once and/or that requires a new access credential for each use. In certain embodiments, a challenge-response process is also used as part of the authentication method to tie the issuance of a key protector and/or access credential to particular pieces of information that can uniquely identify a user.
    Type: Application
    Filed: June 21, 2010
    Publication date: December 22, 2011
    Applicant: MICROSOFT CORPORATION
    Inventors: Octavian T. Ureche, Nils Dussart, Charles G. Jeffries, Cristian M. Ilac, Vijay G. Bharadwaj, Innokentiy Basmov, Stefan Thom, Son VoBa
  • Publication number: 20110202916
    Abstract: A virtual hard disk drive containing a guest operating system is bound to a source computing device through encryption. When the virtual hard drive is moved to a difference computing device, a virtual machine manager instantiates a virtual machine and causing the virtual machine to boot the operating system from the virtual hard disk drive. Because the guest operating system is encrypted by an encryption device on a source computing device, the virtual machine causing the decryption of the guest operating system with a copy of the key. The virtual hard disk is bound to the target computing device through encryption based on a hardware on the target computing device.
    Type: Application
    Filed: February 17, 2010
    Publication date: August 18, 2011
    Applicant: Microsoft Corporation
    Inventors: Son VoBa, Octavian T. Ureche
  • Publication number: 20110202765
    Abstract: A virtual hard drive is moved as an at least partially encrypted file to a different computing device. A key is provided to the different computing device in a protected form and a user on the different computing device can access the protected key by authentication. For example, the user may be authenticated to a server. Because the guest operating system is encrypted by an encryption device on a source computing device, the virtual hard disk drive can be decrypted with a copy of the key.
    Type: Application
    Filed: February 17, 2010
    Publication date: August 18, 2011
    Applicant: Microsoft Corporation
    Inventors: Sean N. McGrane, Octavian T. Ureche, Son VoBa
  • Patent number: 7337442
    Abstract: Cooperatively scheduling hardware resources by providing information on shared resources within processor packages to the operating system. Logical processors may be included in packages in which some or all processor execution resources are shared among logical processors. In order to better schedule thread execution, information regarding which logical processors are sharing processor execution resources and information regarding which system resources are shared among processor packages is provided to the operating system. Extensions to the SRAT (static resource affinity table) can be used to provide this information.
    Type: Grant
    Filed: December 3, 2002
    Date of Patent: February 26, 2008
    Assignee: Microsoft Corporation
    Inventors: Son VoBa, Valerie R. See, Tony Dwayne Pierce, William J. Westerinen
  • Patent number: 7071825
    Abstract: A radio frequency identification (RFID) tag is used to detect the presence and identification of devices or equipment in a rack. Each device in the rack has an associated RFID tag that contains device information. The system which is implemented in the rack receives the information from the RFID tag on each device in the rack and provides the information to a central location, such as a central computer, where that information can be acted on, stored, processed, analyzed, and/or accessed by a system administrator or user, for example. The system that is implemented in the rack may continue to monitor the presence of the devices in the rack for security purposes.
    Type: Grant
    Filed: April 26, 2004
    Date of Patent: July 4, 2006
    Assignee: Microsoft Corporation
    Inventor: Son VoBa
  • Patent number: 7061366
    Abstract: An RFID tag is used to determine the presence or absence of a user. Rules or instructions responsive to this presence or absence are implemented to control a device or multiple devices accordingly. In this manner, a device can be maintained in a normal operating mode if a user is present, even though a user is not actively interacting with the device. Moreover, the device can be shut down or locked or be on restricted access if an authorized user is no longer in the presence of the device.
    Type: Grant
    Filed: April 12, 2004
    Date of Patent: June 13, 2006
    Assignee: Microsoft Corporation
    Inventors: Stephen McMorris Bell, Son VoBa
  • Publication number: 20050237194
    Abstract: A radio frequency identification (RFID) tag is used to detect the presence and identification of devices or equipment in a rack. Each device in the rack has an associated RFID tag that contains device information. The system which is implemented in the rack receives the information from the RFID tag on each device in the rack and provides the information to a central location, such as a central computer, where that information can be acted on, stored, processed, analyzed, and/or accessed by a system administrator or user, for example. The system that is implemented in the rack may continue to monitor the presence of the devices in the rack for security purposes.
    Type: Application
    Filed: April 26, 2004
    Publication date: October 27, 2005
    Applicant: Microsoft Corporation
    Inventor: Son VoBa
  • Publication number: 20050225427
    Abstract: An RFID tag is used to determine the presence or absence of a user. Rules or instructions responsive to this presence or absence are implemented to control a device or multiple devices accordingly. In this manner, a device can be maintained in a normal operating mode if a user is present, even though a user is not actively interacting with the device. Moreover, the device can be shut down or locked or be on restricted access if an authorized user is no longer in the presence of the device.
    Type: Application
    Filed: April 12, 2004
    Publication date: October 13, 2005
    Applicant: Microsoft Corporation
    Inventors: Stephen Bell, Son VoBa
  • Publication number: 20040107421
    Abstract: Cooperatively scheduling hardware resources by providing information on shared resources within processor packages to the operating system. Logical processors may be included in packages in which some or all processor execution resources are shared among logical processors. In order to better schedule thread execution, information regarding which logical processors are sharing processor execution resources and information regarding which system resources are shared among processor packages is provided to the operating system. Extensions to the SRAT (static resource affinity table) can be used to provide this information.
    Type: Application
    Filed: December 3, 2002
    Publication date: June 3, 2004
    Applicant: Microsoft Corporation
    Inventors: Son VoBa, Valerie R. See, Tony Dwayne Pierce, William J. Westerinen