Patents by Inventor Thekkthalackal Kurien

Thekkthalackal Kurien has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20070028096
    Abstract: Disclosed herein is a technique for certifying distributable objects. The technique involves creating a certification for each distributable object to indicate properties of the object. Using certifications such as this, it is possible to accept objects having certain properties only from specified entities.
    Type: Application
    Filed: July 29, 2005
    Publication date: February 1, 2007
    Applicant: Microsoft Corporation
    Inventors: Paul England, Muthukrishnan Paramasivam, Thekkthalackal Kurien, Charles Rose, Ravindra Pandya
  • Publication number: 20060236127
    Abstract: Systems and methods provide multiple partitions hosted on an isolation technology such as a hypervisor where at least one of the partitions, a local secure service partition (LSSP), provides security services to other partitions. The service partitions (LSSPs) host those high assurance services that require strict security isolation, where the service can be shared across partitions and accessed even when the user is not connected to a network. The LSSP also can certify the results of any computation using a key signed by a TPM attestation identity key (AIK), or other key held securely by the hypervisor or a service partition. The LSSPs may be configured to provide trusted audit logs, trusted security scans, trusted cryptographic services, trusted compilation and testing, trusted logon services, and the like.
    Type: Application
    Filed: April 1, 2005
    Publication date: October 19, 2006
    Inventors: Thekkthalackal Kurien, Paul England, Ravindra Pandya, Niels Ferguson
  • Publication number: 20060200859
    Abstract: To authenticate a program on a computing device to a resource local to or remote from the computing device, a stored program security identifier (PSID) corresponding to the program is retrieved, where the stored PSID includes information taking into account the program itself, the execution setting of the program, and any inputs and initializations that are provided to the program. The PSID is re-constructed based on the same information as obtained from local sources, and the stored and reconstructed PSIDs are compared to determine whether a match exists. If so, it may be concluded that the program operates in a trusted manner according to an approved set of conditions.
    Type: Application
    Filed: March 4, 2005
    Publication date: September 7, 2006
    Applicant: Microsoft Corporation
    Inventors: Paul England, Thekkthalackal Kurien
  • Publication number: 20060005034
    Abstract: A mechanism for protected operating system boot that prevents rogue components from being loaded with the operating system, and thus prevents divulgence of the system key under inappropriate circumstances. After a portion of the machine startup procedure has occurred, the operating system loader is run, the loader is validated, and a correct machine state is either verified to exist and/or created. Once the loader has been verified to be a legitimate loader, and the machine state under which it is running is verified to be correct, the loader's future behavior is known to protect against the loading of rogue components that could cause divulgence of the system key. With the loader's behavior being known to be safe for the system key, the validator may unseal the system key and provides it to the loader.
    Type: Application
    Filed: June 30, 2004
    Publication date: January 5, 2006
    Applicant: Microsoft Corporation
    Inventors: Bryan Willman, Paul England, Kenneth Ray, Jamie Hunter, Lonny McMichael, Derek LaSalle, Pierre Jacomet, Mark Paley, Thekkthalackal Kurien, David Cross
  • Publication number: 20050172134
    Abstract: A method is provided for a processor of a computing device to obtain a trusted identification of a hardware peripheral of the computing device, for the computing device and the peripheral to derive a set of shared keys, and for the processor to send trusted data to the peripheral.
    Type: Application
    Filed: February 4, 2004
    Publication date: August 4, 2005
    Inventors: Andrew Thornton, John Paff, Marcus Peinado, Thekkthalackal Kurien
  • Publication number: 20050125548
    Abstract: A resource is obtained from a resource provider (RP) for a resource requester (RR) operating on a computing device. The RR has an identity descriptor (id) associated therewith, where the id including security-related information specifying an environment in which the RR operates. A code identity (code-ID) is calculated corresponding to and based on the loaded RR and loaded id. The RP verifies that the calculated code-ID in a request for the resource matches one of one or more valid code-IDs for the identified RR to conclude that the RR and id can be trusted, and the RP responds to the forwarded request by providing the requested resource to the RR.
    Type: Application
    Filed: October 23, 2003
    Publication date: June 9, 2005
    Inventors: Paul England, Anshul Dhir, Thekkthalackal Kurien, Kenneth Ray
  • Publication number: 20050091661
    Abstract: Application factoring or partitioning is used to integrate secure features into a conventional application. An application's functionality is partitioned into two sets according to whether a given action does, or does not, involve the handling of sensitive data. Separate software objects (processors) are created to perform these two sets of actions. A trusted processor handles secure data and runs in a high-assurance environment. When another processor encounters secure data, that data is sent to the trusted processor. The data is wrapped in such a way that allows it to be routed to the trusted processor, and prevents the data from being deciphered by any entity other than the trusted processor. An infrastructure is provided that wraps objects, routes them to the correct processor, and allows their integrity to be attested through a chain of trust leading back to base component that is known to be trustworthy.
    Type: Application
    Filed: October 24, 2003
    Publication date: April 28, 2005
    Inventors: Thekkthalackal Kurien, Kenneth Ray, Marcus Peinado, Paul England
  • Publication number: 20050010818
    Abstract: The present invention provides for trusted side-band communications between components in a computer system, so that use of the system bus may be avoided. Two components may be connected by means other than a bus (e.g., an infrared port, a wire, an unused pin, etc.), whereby these components may communicate without the use of the system bus. The non-bus communication channel may be referred to as “side-band.” The side-band channel may be used to communicate information that might identify the user's hardware (e.g., a public key) or other information that the user may not want to be easily intercepted by the public at large. Communication over the side-band channel may also be used to verify that the participants in a communication are within a defined positional relationship to each other.
    Type: Application
    Filed: January 16, 2004
    Publication date: January 13, 2005
    Inventors: John Paff, Marcus Peinado, Thekkthalackal Kurien, Bryan Willman, Paul England, Andrew Thornton