Patents by Inventor Tony Chen

Tony Chen has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20230237154
    Abstract: A TPM is implemented in an SOC for thwarting PIN state replay attacks. Programmable fuses are used as a counter and an on-die RAM stores a blown-fuse count and a TPM state that includes a PIN-failure count and a fuse count. TPM initialization includes incrementing the TPM state PIN-failure count if the blown-fuse count is greater than the TPM state fuse count. Once a PIN is received, if the TPM state PIN-failure count satisfies a PIN failure policy and the PIN is correct, the TPM state PIN-failure count is cleared, and if the PIN is incorrect, a fuse is blown and the blown-fuse count is incremented. If the fuse blow fails, TPM activity is halted. If the fuse blow succeeds, the TPM state PIN-failure count is incremented and the TPM state fuse count is set equal to the blown-fuse count. The TPM state is saved to off-die non-volatile memory.
    Type: Application
    Filed: March 24, 2023
    Publication date: July 27, 2023
    Applicant: Microsoft Technology Licensing, LLC
    Inventors: Ling Tony CHEN, Felix DOMKE, Ankur CHOUDHARY, Bradley Joseph LITTERELL
  • Publication number: 20230222793
    Abstract: In some embodiments, the system is directed to an autonomous inspection system for electrical grid components. In some embodiments, the system collects electrical grid component data using an autonomous drone and then transmits the inspection data to one or more computers. In some embodiments, the system includes artificial intelligence that analysis the data and identifies electrical grid components defects and provides a model highlighting the defects to a user. In some embodiments, the system enables a user to train the artificial intelligence by providing feedback for models where defects or components are not properly identified.
    Type: Application
    Filed: March 14, 2023
    Publication date: July 13, 2023
    Inventors: Kunal Datta, Tony Chen, Marcella Kwan, Patrick Buckles, Michael James Locatelli, Teresa Alapat, Maria Joseph, Michael S. Glass, Jonathan Mello, Khushar Faizan, Xiwang Li, Michael Signorotti, Guilherme Mattar Bastos, Jacinto Chen, Erin Melissa Tan Antono, David Grayson, Jeffrey Mark Lovington, Laura Fehr, Charlene Chi-Johnston
  • Publication number: 20230198746
    Abstract: A method for secure key exchange. The method comprises receiving a request to certify a key from a communication partner at an interface between an access and tamper resistant circuit block and exposed circuitry. Within the access and tamper resistant circuit block, a first random private key is generated. A corresponding public key of the first random private key is derived, and a cryptographic digest of the public key and attributes associated with the first random private key is generated. The generated cryptographic digest is signed using a second random private key that has been designated for signing by one or more associated attributes. The public key and the signature are then sent to the communication partner via the interface.
    Type: Application
    Filed: February 13, 2023
    Publication date: June 22, 2023
    Applicant: Microsoft Technology Licensing, LLC
    Inventors: Avdhesh CHHODAVDIA, Ling Tony CHEN, Felix Stefan DOMKE, Kambiz RAHIMI, Jay Scott FULLER
  • Patent number: 11615187
    Abstract: A TPM is implemented in an SOC for thwarting PIN state replay attacks. Programmable fuses are used as a counter and an on-die RAM stores a blown-fuse count and a TPM state that includes a PIN-failure count and a fuse count. TPM initialization includes incrementing the TPM state PIN-failure count if the blown-fuse count is greater than the TPM state fuse count. Once a PIN is received, if the TPM state PIN-failure count satisfies a PIN failure policy and the PIN is correct, the TPM state PIN-failure count is cleared, and if the PIN is incorrect, a fuse is blown and the blown-fuse count is incremented. If the fuse blow fails, TPM activity is halted. If the fuse blow succeeds, the TPM state PIN-failure count is incremented and the TPM state fuse count is set equal to the blown-fuse count. The TPM state is saved to off-die non-volatile memory.
    Type: Grant
    Filed: March 31, 2021
    Date of Patent: March 28, 2023
    Assignee: Microsoft Technology Licensing, LLC
    Inventors: Ling Tony Chen, Felix Domke, Ankur Choudhary, Bradley Joseph Litterell
  • Patent number: 11604448
    Abstract: In some embodiments, the system is directed to an autonomous inspection system for electrical grid components. In some embodiments, the system collects electrical grid component data using an autonomous drone and then transmits the inspection data to one or more computers. In some embodiments, the system includes artificial intelligence that analysis the data and identifies electrical grid components defects and provides a model highlighting the defects to a user. In some embodiments, the system enables a user to train the artificial intelligence by providing feedback for models where defects or components are not properly identified.
    Type: Grant
    Filed: July 29, 2020
    Date of Patent: March 14, 2023
    Assignee: PACIFIC GAS AND ELECTRIC COMPANY
    Inventors: Kunal Datta, Tony Chen, Marcella Kwan, Patrick Buckles, Michael James Locatelli, Teresa Alapat, Maria Joseph, Michael S. Glass, Jonathan Mello, Khushar Faizan, Xiwang Li
  • Patent number: 11595189
    Abstract: A method for secure key exchange. The method comprises receiving a request to certify a key from a communication partner at an interface between an access and tamper resistant circuit block and exposed circuitry. Within the access and tamper resistant circuit block, a first random private key is generated. A corresponding public key of the first random private key is derived, and a cryptographic digest of the public key and attributes associated with the first random private key is generated. The generated cryptographic digest is signed using a second random private key that has been designated for signing by one or more associated attributes. The public key and the signature are then sent to the communication partner via the interface.
    Type: Grant
    Filed: October 27, 2020
    Date of Patent: February 28, 2023
    Assignee: Microsoft Technology Licensing, LLC
    Inventors: Avdhesh Chhodavdia, Ling Tony Chen, Felix Stefan Domke, Kambiz Rahimi, Jay Scott Fuller
  • Publication number: 20230051347
    Abstract: Methods, systems, apparatuses, and computer-readable storage mediums described herein enable executable code of a hardware security platform (HSP) circuit to communicate with a hypervisor in a separate processor. The hypervisor generates and manages virtual machines. The HSP code comprises trusted platform module (TPM) logic, that processes TPM commands received via the hypervisor, and in response to the processing, communicates security information (e.g., measurements, keys, authorization data) with the virtual machines via the hypervisor. The TPM logic receives security information related to a virtual machine from the hypervisor and stores the security information in non-volatile memory of the HSP circuit, where security information from a particular VM is distinguishable from security information from another VM in the HSP memory.
    Type: Application
    Filed: August 12, 2021
    Publication date: February 16, 2023
    Inventors: Md. Nazmus SAKIB, Ronald AIGNER, Ling Tony CHEN, Peter David WAXMAN, David Guy WESTON, Bryan David KELLY
  • Publication number: 20230044383
    Abstract: This disclosure describes systems and methods for protecting commercial off-the-shelf software program code from piracy. A software program may include an executable file having code and data. A platform may modify the executable file such that the data may be placed at a location in memory that is an arbitrary distance from the code. The platform may modify the executable file to include a separation header. The separation header may indicate that the data can be placed at an arbitrary distance in the memory from the code. The separation header may indicate that the code should be loaded into a hardware enclave and that the data should be loaded outside of the hardware enclave. The platform may encrypt the code and provide it to a computing device. The computing device may load the encrypted code into the hardware enclave but load the data into memory outside the hardware enclave.
    Type: Application
    Filed: October 20, 2022
    Publication date: February 9, 2023
    Inventors: Xinyang GE, Weidong CUI, Ben NIU, Ling Tony CHEN
  • Publication number: 20230014928
    Abstract: The disclosed system provides a novel framework for organizing, hosting and/or providing capabilities for an online, mobile esports gaming environment. In some embodiments, the disclosed framework supports tokenization and nonfungible tokens (NFTs), and can operate in connection with a Blockchain (or similar distributed ledger technology). In some embodiments, the disclosed framework provides a live-streaming, secure, cryptocurrency-enabled and backed gaming environment. In some embodiments, the disclosed framework provides an electronic tournament experience via an organization and streaming platform that enables gamers to accurately and efficiently organize mobile game tournaments that pay out real prizes in any currency (e.g., crypto or fiat). In some embodiments, the disclosed framework can be configured and built as a mobile computing environment, and/or with mobile functionality that enables an optimized mobile gaming experience.
    Type: Application
    Filed: July 13, 2022
    Publication date: January 19, 2023
    Inventors: Krystal Yang, Tony Chen
  • Publication number: 20230000565
    Abstract: The present disclosure provides a system for enabling autonomous or semi-autonomous surgical operations. The system comprises: one or more processors that are individually or collectively configured to: process an image data stream comprising one or more images of a surgical site; fit a parametric model to a tissue surface identified in the one or more images; determine a direction for aligning a tool based in part on the parametric model; determine an optimal path for automatically moving the tool to perform a surgical procedure at the surgical site; and generate one or more control signals for controlling i) a movement of the tool based on the optimal path and ii) a tension force applied to the tissue by the tool during the surgical procedure.
    Type: Application
    Filed: July 12, 2022
    Publication date: January 5, 2023
    Inventors: Michael C. Pickett, Tina P. Chen, Hossein Dehghani, Vasiliy E. Buharin, Emanuel DeMaio, Tony Chen, John Oberlin, Liam O'Shea, Thomas Calef
  • Publication number: 20220391510
    Abstract: Embodiments described herein are directed to firmware policy enforcement of a computing device. For example, a security processor of the computing device is utilized to boot the computing device. During a boot session, the security processor loads and executes specialized firmware. The specialized firmware, when executed, causes the security processor to determine whether other types of firmware to be executed on the computing device is in compliance with a policy specified by the specialized firmware. Based at least on a determination that the other firmware is in compliance with the policy, the security processor executes the other firmware. Based at least on a determination that the other firmware is not in compliance with the policy, the security processor performs a mitigation with respect to the other firmware.
    Type: Application
    Filed: June 2, 2021
    Publication date: December 8, 2022
    Inventors: Md. Nazmus SAKIB, Bryan David KELLY, Ling Tony CHEN, Peter David WAXMAN
  • Publication number: 20220382872
    Abstract: Embodiments described herein are directed to transferring the ownership of a computing device from one entity to another entity. For example, a security processor is utilized to boot the computing device. During a boot session, the security processor loads and executes boot code, which determines whether specialized firmware authorized by the current owner indicates whether a transfer of ownership is to occur. In response to determining that the specialized firmware indicates that a transfer of ownership is to occur, the secure processor loads and executes the specialized firmware. The specialized firmware, when executed, causes the security processor to program a set of fuses with the public key of the new owner. Execution of the specialized firmware also causes the security processor to invalidate the public key of the original owner, which is stored in another set of fuses.
    Type: Application
    Filed: May 25, 2021
    Publication date: December 1, 2022
    Inventors: Md. Nazmus SAKIB, Bryan David KELLY, Ling Tony CHEN, Peter David WAXMAN
  • Patent number: 11500969
    Abstract: This disclosure describes systems and methods for protecting commercial off-the-shelf software program code from piracy. A software program may include multiple image files having code and data. A platform may modify the executable file such that the data may be placed at a location in memory that is an arbitrary distance from the code. The platform may encrypt the code and provide it to a computing device comprising a hardware enclave. The computing device may load the encrypted code into the hardware enclave but load the data into memory outside the hardware enclave. The computing device may request a decryption key from an authentication server using a hash of the hardware enclave signed by a processor. The authentication server may provide the decryption key if it verifies the signature and the hash. The computing device may decrypt the code and mark the hardware enclave as non-readable.
    Type: Grant
    Filed: January 3, 2020
    Date of Patent: November 15, 2022
    Assignee: Microsoft Technology Licensing, LLC
    Inventors: Xinyang Ge, Weidong Cui, Ben Niu, Ling Tony Chen
  • Publication number: 20220336033
    Abstract: A TPM with programmable fuses in an SOC includes an on-die RAM storing a blown-fuse count and a TPM state read from off-die NV memory. During initialization, if the blown-fuse count is greater than a TPM state fuse count, a TPM state PIN-attempt-failure count is incremented, thereby thwarting a replay attack. If a PIN satisfies a PIN failure policy, and if a TPM state previously-passed-PIN indicator is set to true, a fuse is blown and the blown-fuse count incremented depending on the PIN being incorrect, but if the TPM state previously-passed-PIN indicator is set to false, a fuse is blown and the blown-fuse count incremented independent of whether the PIN is correct or incorrect. The TPM state fuse count is set equal to the blown-fuse count. If a counter cleared before processing the PIN remains cleared during the next initialization, a fuse voltage cut is detected and a penalty imposed.
    Type: Application
    Filed: March 18, 2022
    Publication date: October 20, 2022
    Applicant: Microsoft Technology Licensing, LLC
    Inventors: Ling Tony CHEN, Felix DOMKE, Ankur CHOUDHARY, Bradley Joseph LITTERELL
  • Publication number: 20220318405
    Abstract: A TPM is implemented in an SOC for thwarting PIN state replay attacks. Programmable fuses are used as a counter and an on-die RAM stores a blown-fuse count and a TPM state that includes a PIN-failure count and a fuse count. TPM initialization includes incrementing the TPM state PIN-failure count if the blown-fuse count is greater than the TPM state fuse count. Once a PIN is received, if the TPM state PIN-failure count satisfies a PIN failure policy and the PIN is correct, the TPM state PIN-failure count is cleared, and if the PIN is incorrect, a fuse is blown and the blown-fuse count is incremented. If the fuse blow fails, TPM activity is halted. If the fuse blow succeeds, the TPM state PIN-failure count is incremented and the TPM state fuse count is set equal to the blown-fuse count. The TPM state is saved to off-die non-volatile memory.
    Type: Application
    Filed: March 31, 2021
    Publication date: October 6, 2022
    Inventors: Ling Tony CHEN, Felix DOMKE, Ankur CHOUDHARY, Bradley Joseph LITTERELL
  • Publication number: 20220318375
    Abstract: A TPM with programmable fuses in an SOC includes an on-die RAM storing a blown-fuse count and a TPM state including a PIN-attempt-failure count and a fuse count, read from off-die NV memory. During initialization, if the blown-fuse count is greater than TPM state fuse count, TPM state PIN-attempt-failure count is incremented, thereby thwarting a replay attack. A PIN is received for access, and if the TPM state PIN-attempt-failure count satisfies a policy, a fuse is blown and the blown-fuse count incremented. If the fuse blow fails, TPM activity is halted. If the fuse blow succeeds and the PIN is correct, the TPM state PIN-attempt-failure count is cleared, but if the PIN is incorrect the TPM state PIN-attempt-failure count is incremented. TPM state fuse count is set equal to the blown-fuse count, and the TPM state is saved to off-die NV memory.
    Type: Application
    Filed: March 31, 2021
    Publication date: October 6, 2022
    Inventors: Ling Tony CHEN, Felix DOMKE, Ankur CHOUDHARY, Bradley Joseph LITTERELL
  • Publication number: 20220261727
    Abstract: A novel location and marking system is configured to provide a seamless in-the-field access to resource and asset information databases with automated functionality that effectively and more efficiently manages, controls, and distributes data according to some embodiments. In some embodiments, such systems can enable utilities to manage assets in real-time, provide map asset status, and provide automatic ticket routing, dispatching and management. For example, in some embodiments, the system is configured to generate maps with identifiers or components of an active division including tickets of one or more assets of an active division. These assets include sites of residential and business gas, electrical, and/or water and sewer conduits and metering systems, as well as related underground infrastructure that can be susceptible to earthquakes, ground disturbances, and other emergency situations according to some embodiments.
    Type: Application
    Filed: March 7, 2022
    Publication date: August 18, 2022
    Inventors: Shelbey Warner, Michael Robert Wolf, Billy Dean Glenn, Michael Hansen, Morgan Sharif, Jason Klemm, Zachary Scofield, Edward Dotson, Travis Huston, Steven Walker, Michael S. Glass, Patrick Buckles, Tony Chen, Sivakrishna Jasti
  • Publication number: 20220131686
    Abstract: A method for secure key exchange. The method comprises receiving a request to certify a key from a communication partner at an interface between an access and tamper resistant circuit block and exposed circuitry. Within the access and tamper resistant circuit block, a first random private key is generated. A corresponding public key of the first random private key is derived, and a cryptographic digest of the public key and attributes associated with the first random private key is generated. The generated cryptographic digest is signed using a second random private key that has been designated for signing by one or more associated attributes. The public key and the signature are then sent to the communication partner via the interface.
    Type: Application
    Filed: October 27, 2020
    Publication date: April 28, 2022
    Applicant: Microsoft Technology Licensing, LLC
    Inventors: Avdhesh CHHODAVDIA, Ling Tony CHEN, Felix Stefan DOMKE, Kambiz RAHIMI, Jay Scott FULLER
  • Publication number: 20220117689
    Abstract: Systems and methods for multi-modal sensing of three-dimensional position information of the surface of an object are disclosed. In particular, multiple visualization modalities are each used to collect distinctive positional information of a surface of an object. Each of the computed positional information is combined using weighting factors to compute a final, weighted three-dimensional position. In various embodiments, a first depth may be recorded using fiducial markers, a second depth may be recorded using a structured light pattern, and a third depth may be recorded using a light-field camera. Weighting factors may be applied to each of the recorded depths and a final, weighted depth may be computed.
    Type: Application
    Filed: October 27, 2021
    Publication date: April 21, 2022
    Inventors: Thomas J. Calef, Tina P. Chen, Emanuel Demaio, Tony Chen, Vasiliy Evgenyevich Buharin, Michael G. Ruehlman
  • Patent number: 11302411
    Abstract: A TPM with programmable fuses in an SOC includes an on-die RAM storing a blown-fuse count and a TPM state read from off-die NV memory. During initialization, if the blown-fuse count is greater than a TPM state fuse count, a TPM state PIN-attempt-failure count is incremented, thereby thwarting a replay attack. If a PIN satisfies a PIN failure policy, and if a TPM state previously-passed-PIN indicator is set to true, a fuse is blown and the blown-fuse count incremented depending on the PIN being incorrect, but if the TPM state previously-passed-PIN indicator is set to false, a fuse is blown and the blown-fuse count incremented independent of whether the PIN is correct or incorrect. The TPM state fuse count is set equal to the blown-fuse count. If a counter cleared before processing the PIN remains cleared during the next initialization, a fuse voltage cut is detected and a penalty imposed.
    Type: Grant
    Filed: March 31, 2021
    Date of Patent: April 12, 2022
    Assignee: MICROSOFT TECHNOLOGY LICENSING, LLC
    Inventors: Ling Tony Chen, Felix Domke, Ankur Choudhary, Bradley Joseph Litterell