Patents by Inventor Stephen Richard Drake

Stephen Richard Drake has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 7979721
    Abstract: A pay-per-use computer, or other electronic device that uses local security, may use a security module or other circuit for monitoring and enforcement of a usage policy. To help prevent physical attacks on the security module, or the circuit board near the security module, a second circuit may be mounted over the security module to help prevent access to the security module. Both circuits may be mounted on a interposer and the interposer mounted to the circuit board, creating a stack including the first circuit, the interposer, the security module, and a main PC board. When the PC board includes dense signal traces under the security module a three dimensional envelope is created around the security module. When the first circuit is a high value circuit, such as a Northbridge, the risk/reward of attacking the security module is increased substantially and may deter all but the most determined hackers.
    Type: Grant
    Filed: December 18, 2006
    Date of Patent: July 12, 2011
    Assignee: Microsoft Corporation
    Inventors: William J. Westerinen, Todd L. Carpenter, Alexander Frank, Shon Schmidt, Stephen Richard Drake, David James Foster, Tse-Ching James Yu
  • Patent number: 7844808
    Abstract: A security module for a pay-per-use computer supplies an appropriate BIOS for a given mode of operation. A power manager in the security module powers only essential circuits until the BIOS is operational to help prevent substitution of a non-authorized BIOS. The security module also includes a capability to monitor and restrict data lines on a bus between a main computer processor and computer system memory. When the computer is operating in a restricted use mode, data lines may be restricted to allow only minimal access to the computer system memory. Bus transactions may be monitored to ensure that only valid transactions are occurring and are within the designated memory space.
    Type: Grant
    Filed: December 18, 2006
    Date of Patent: November 30, 2010
    Assignee: Microsoft Corporation
    Inventors: William J. Westerinen, Todd L. Carpenter, Alexander Frank, Shon Schmidt, Stephen Richard Drake
  • Patent number: 7750923
    Abstract: A display device for use with a computer adapted for operation in an unrestricted use mode and a limited function mode and a method for enforcing a limited function mode display is disclosed. The display device enters a limited function mode when a condition of non-compliance with an operating policy is discovered by the computer. Additionally, the display device may also enter a limited function mode upon powering up or when connections to the computer and/or selected components of the display are disabled or disconnected. When in the limited function mode, the display may support a limited function interface for use in correcting the condition of non-compliance.
    Type: Grant
    Filed: April 5, 2007
    Date of Patent: July 6, 2010
    Assignee: Microsoft Corporation
    Inventors: Hanumant Kumar Yadav, William J. Westerinen, Todd L. Carpenter, Stephen Richard Drake
  • Publication number: 20100037325
    Abstract: A pay-per-use computer, or other electronic device that uses local security, may use a security module or other circuit for monitoring and enforcement of a usage policy. To help prevent physical attacks on the security module, or the circuit board near the security module, a second circuit may be mounted over the security module to help prevent access to the security module. Both circuits may be mounted on a interposer and the interposer mounted to the circuit board, creating a stack including the first circuit, the interposer, the security module, and a main PC board. When the PC board includes dense signal traces under the security module a three dimensional envelope is created around the security module. When the first circuit is a high value circuit, such as a Northbridge, the risk/reward of attacking the security module is increased substantially and may deter all but the most determined hackers.
    Type: Application
    Filed: December 18, 2006
    Publication date: February 11, 2010
    Inventors: William J. Westerinen, Todd L. Carpenter, Alexander Frank, Shon Schmidt, Stephen Richard Drake, David James Foster, Tse-Ching James Yu
  • Publication number: 20080282017
    Abstract: An SPI switch allows selection of a BIOS memory transparent to a Southbridge chipset component. The SPI switch provides address translation to a selected BIOS memory area under the control of a security module processor. The SPI switch also provides command filtering to prevent commands that represent a security risk such as bulk erase commands. Because the SPI switch allows transparent redirection between BIOS programs, booting in different operating modes may be supported without any changes to the basic computer architecture or major chipset components.
    Type: Application
    Filed: May 9, 2007
    Publication date: November 13, 2008
    Applicant: MICROSOFT CORPORATION
    Inventors: Todd L. Carpenter, William J. Westerinen, Shon Schmidt, Stephen Richard Drake, Tse-Ching James Yu, Achim Schmidt, Stephan Schoenfeldt, Frank Preiss
  • Publication number: 20080246774
    Abstract: A display device for use with a computer adapted for operation in an unrestricted use mode and a limited function mode and a method for enforcing a limited function mode display is disclosed. The display device enters a limited function mode when a condition of non-compliance with an operating policy is discovered by the computer. Additionally, the display device may also enter a limited function mode upon powering up or when connections to the computer and/or selected components of the display are disabled or disconnected. When in the limited function mode, the display may support a limited function interface for use in correcting the condition of non-compliance.
    Type: Application
    Filed: April 5, 2007
    Publication date: October 9, 2008
    Applicant: MICROSOFT CORPORATION
    Inventors: Hanumant Kumar Yadav, William J. Westerinen, Todd L. Carpenter, Stephen Richard Drake
  • Publication number: 20080148036
    Abstract: A security module for a pay-per-use computer supplies an appropriate BIOS for a given mode of operation. A power manager in the security module powers only essential circuits until the BIOS is operational to help prevent substitution of a non-authorized BIOS. The security module also includes a capability to monitor and restrict data lines on a bus between a main computer processor and computer system memory. When the computer is operating in a restricted use mode, data lines may be restricted to allow only minimal access to the computer system memory. Bus transactions may be monitored to ensure that only valid transactions are occurring and are within the designated memory space.
    Type: Application
    Filed: December 18, 2006
    Publication date: June 19, 2008
    Inventors: William J. Westerinen, Todd L. Carpenter, Alexander Frank, Shon Schmidt, Stephen Richard Drake