Patents by Inventor Tony Chen
Tony Chen has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Publication number: 20230237154Abstract: A TPM is implemented in an SOC for thwarting PIN state replay attacks. Programmable fuses are used as a counter and an on-die RAM stores a blown-fuse count and a TPM state that includes a PIN-failure count and a fuse count. TPM initialization includes incrementing the TPM state PIN-failure count if the blown-fuse count is greater than the TPM state fuse count. Once a PIN is received, if the TPM state PIN-failure count satisfies a PIN failure policy and the PIN is correct, the TPM state PIN-failure count is cleared, and if the PIN is incorrect, a fuse is blown and the blown-fuse count is incremented. If the fuse blow fails, TPM activity is halted. If the fuse blow succeeds, the TPM state PIN-failure count is incremented and the TPM state fuse count is set equal to the blown-fuse count. The TPM state is saved to off-die non-volatile memory.Type: ApplicationFiled: March 24, 2023Publication date: July 27, 2023Applicant: Microsoft Technology Licensing, LLCInventors: Ling Tony CHEN, Felix DOMKE, Ankur CHOUDHARY, Bradley Joseph LITTERELL
-
Publication number: 20230222793Abstract: In some embodiments, the system is directed to an autonomous inspection system for electrical grid components. In some embodiments, the system collects electrical grid component data using an autonomous drone and then transmits the inspection data to one or more computers. In some embodiments, the system includes artificial intelligence that analysis the data and identifies electrical grid components defects and provides a model highlighting the defects to a user. In some embodiments, the system enables a user to train the artificial intelligence by providing feedback for models where defects or components are not properly identified.Type: ApplicationFiled: March 14, 2023Publication date: July 13, 2023Inventors: Kunal Datta, Tony Chen, Marcella Kwan, Patrick Buckles, Michael James Locatelli, Teresa Alapat, Maria Joseph, Michael S. Glass, Jonathan Mello, Khushar Faizan, Xiwang Li, Michael Signorotti, Guilherme Mattar Bastos, Jacinto Chen, Erin Melissa Tan Antono, David Grayson, Jeffrey Mark Lovington, Laura Fehr, Charlene Chi-Johnston
-
Publication number: 20230198746Abstract: A method for secure key exchange. The method comprises receiving a request to certify a key from a communication partner at an interface between an access and tamper resistant circuit block and exposed circuitry. Within the access and tamper resistant circuit block, a first random private key is generated. A corresponding public key of the first random private key is derived, and a cryptographic digest of the public key and attributes associated with the first random private key is generated. The generated cryptographic digest is signed using a second random private key that has been designated for signing by one or more associated attributes. The public key and the signature are then sent to the communication partner via the interface.Type: ApplicationFiled: February 13, 2023Publication date: June 22, 2023Applicant: Microsoft Technology Licensing, LLCInventors: Avdhesh CHHODAVDIA, Ling Tony CHEN, Felix Stefan DOMKE, Kambiz RAHIMI, Jay Scott FULLER
-
Patent number: 11615187Abstract: A TPM is implemented in an SOC for thwarting PIN state replay attacks. Programmable fuses are used as a counter and an on-die RAM stores a blown-fuse count and a TPM state that includes a PIN-failure count and a fuse count. TPM initialization includes incrementing the TPM state PIN-failure count if the blown-fuse count is greater than the TPM state fuse count. Once a PIN is received, if the TPM state PIN-failure count satisfies a PIN failure policy and the PIN is correct, the TPM state PIN-failure count is cleared, and if the PIN is incorrect, a fuse is blown and the blown-fuse count is incremented. If the fuse blow fails, TPM activity is halted. If the fuse blow succeeds, the TPM state PIN-failure count is incremented and the TPM state fuse count is set equal to the blown-fuse count. The TPM state is saved to off-die non-volatile memory.Type: GrantFiled: March 31, 2021Date of Patent: March 28, 2023Assignee: Microsoft Technology Licensing, LLCInventors: Ling Tony Chen, Felix Domke, Ankur Choudhary, Bradley Joseph Litterell
-
Patent number: 11604448Abstract: In some embodiments, the system is directed to an autonomous inspection system for electrical grid components. In some embodiments, the system collects electrical grid component data using an autonomous drone and then transmits the inspection data to one or more computers. In some embodiments, the system includes artificial intelligence that analysis the data and identifies electrical grid components defects and provides a model highlighting the defects to a user. In some embodiments, the system enables a user to train the artificial intelligence by providing feedback for models where defects or components are not properly identified.Type: GrantFiled: July 29, 2020Date of Patent: March 14, 2023Assignee: PACIFIC GAS AND ELECTRIC COMPANYInventors: Kunal Datta, Tony Chen, Marcella Kwan, Patrick Buckles, Michael James Locatelli, Teresa Alapat, Maria Joseph, Michael S. Glass, Jonathan Mello, Khushar Faizan, Xiwang Li
-
Patent number: 11595189Abstract: A method for secure key exchange. The method comprises receiving a request to certify a key from a communication partner at an interface between an access and tamper resistant circuit block and exposed circuitry. Within the access and tamper resistant circuit block, a first random private key is generated. A corresponding public key of the first random private key is derived, and a cryptographic digest of the public key and attributes associated with the first random private key is generated. The generated cryptographic digest is signed using a second random private key that has been designated for signing by one or more associated attributes. The public key and the signature are then sent to the communication partner via the interface.Type: GrantFiled: October 27, 2020Date of Patent: February 28, 2023Assignee: Microsoft Technology Licensing, LLCInventors: Avdhesh Chhodavdia, Ling Tony Chen, Felix Stefan Domke, Kambiz Rahimi, Jay Scott Fuller
-
Publication number: 20230051347Abstract: Methods, systems, apparatuses, and computer-readable storage mediums described herein enable executable code of a hardware security platform (HSP) circuit to communicate with a hypervisor in a separate processor. The hypervisor generates and manages virtual machines. The HSP code comprises trusted platform module (TPM) logic, that processes TPM commands received via the hypervisor, and in response to the processing, communicates security information (e.g., measurements, keys, authorization data) with the virtual machines via the hypervisor. The TPM logic receives security information related to a virtual machine from the hypervisor and stores the security information in non-volatile memory of the HSP circuit, where security information from a particular VM is distinguishable from security information from another VM in the HSP memory.Type: ApplicationFiled: August 12, 2021Publication date: February 16, 2023Inventors: Md. Nazmus SAKIB, Ronald AIGNER, Ling Tony CHEN, Peter David WAXMAN, David Guy WESTON, Bryan David KELLY
-
Publication number: 20230044383Abstract: This disclosure describes systems and methods for protecting commercial off-the-shelf software program code from piracy. A software program may include an executable file having code and data. A platform may modify the executable file such that the data may be placed at a location in memory that is an arbitrary distance from the code. The platform may modify the executable file to include a separation header. The separation header may indicate that the data can be placed at an arbitrary distance in the memory from the code. The separation header may indicate that the code should be loaded into a hardware enclave and that the data should be loaded outside of the hardware enclave. The platform may encrypt the code and provide it to a computing device. The computing device may load the encrypted code into the hardware enclave but load the data into memory outside the hardware enclave.Type: ApplicationFiled: October 20, 2022Publication date: February 9, 2023Inventors: Xinyang GE, Weidong CUI, Ben NIU, Ling Tony CHEN
-
Publication number: 20230014928Abstract: The disclosed system provides a novel framework for organizing, hosting and/or providing capabilities for an online, mobile esports gaming environment. In some embodiments, the disclosed framework supports tokenization and nonfungible tokens (NFTs), and can operate in connection with a Blockchain (or similar distributed ledger technology). In some embodiments, the disclosed framework provides a live-streaming, secure, cryptocurrency-enabled and backed gaming environment. In some embodiments, the disclosed framework provides an electronic tournament experience via an organization and streaming platform that enables gamers to accurately and efficiently organize mobile game tournaments that pay out real prizes in any currency (e.g., crypto or fiat). In some embodiments, the disclosed framework can be configured and built as a mobile computing environment, and/or with mobile functionality that enables an optimized mobile gaming experience.Type: ApplicationFiled: July 13, 2022Publication date: January 19, 2023Inventors: Krystal Yang, Tony Chen
-
Publication number: 20230000565Abstract: The present disclosure provides a system for enabling autonomous or semi-autonomous surgical operations. The system comprises: one or more processors that are individually or collectively configured to: process an image data stream comprising one or more images of a surgical site; fit a parametric model to a tissue surface identified in the one or more images; determine a direction for aligning a tool based in part on the parametric model; determine an optimal path for automatically moving the tool to perform a surgical procedure at the surgical site; and generate one or more control signals for controlling i) a movement of the tool based on the optimal path and ii) a tension force applied to the tissue by the tool during the surgical procedure.Type: ApplicationFiled: July 12, 2022Publication date: January 5, 2023Inventors: Michael C. Pickett, Tina P. Chen, Hossein Dehghani, Vasiliy E. Buharin, Emanuel DeMaio, Tony Chen, John Oberlin, Liam O'Shea, Thomas Calef
-
Publication number: 20220391510Abstract: Embodiments described herein are directed to firmware policy enforcement of a computing device. For example, a security processor of the computing device is utilized to boot the computing device. During a boot session, the security processor loads and executes specialized firmware. The specialized firmware, when executed, causes the security processor to determine whether other types of firmware to be executed on the computing device is in compliance with a policy specified by the specialized firmware. Based at least on a determination that the other firmware is in compliance with the policy, the security processor executes the other firmware. Based at least on a determination that the other firmware is not in compliance with the policy, the security processor performs a mitigation with respect to the other firmware.Type: ApplicationFiled: June 2, 2021Publication date: December 8, 2022Inventors: Md. Nazmus SAKIB, Bryan David KELLY, Ling Tony CHEN, Peter David WAXMAN
-
Publication number: 20220382872Abstract: Embodiments described herein are directed to transferring the ownership of a computing device from one entity to another entity. For example, a security processor is utilized to boot the computing device. During a boot session, the security processor loads and executes boot code, which determines whether specialized firmware authorized by the current owner indicates whether a transfer of ownership is to occur. In response to determining that the specialized firmware indicates that a transfer of ownership is to occur, the secure processor loads and executes the specialized firmware. The specialized firmware, when executed, causes the security processor to program a set of fuses with the public key of the new owner. Execution of the specialized firmware also causes the security processor to invalidate the public key of the original owner, which is stored in another set of fuses.Type: ApplicationFiled: May 25, 2021Publication date: December 1, 2022Inventors: Md. Nazmus SAKIB, Bryan David KELLY, Ling Tony CHEN, Peter David WAXMAN
-
Patent number: 11500969Abstract: This disclosure describes systems and methods for protecting commercial off-the-shelf software program code from piracy. A software program may include multiple image files having code and data. A platform may modify the executable file such that the data may be placed at a location in memory that is an arbitrary distance from the code. The platform may encrypt the code and provide it to a computing device comprising a hardware enclave. The computing device may load the encrypted code into the hardware enclave but load the data into memory outside the hardware enclave. The computing device may request a decryption key from an authentication server using a hash of the hardware enclave signed by a processor. The authentication server may provide the decryption key if it verifies the signature and the hash. The computing device may decrypt the code and mark the hardware enclave as non-readable.Type: GrantFiled: January 3, 2020Date of Patent: November 15, 2022Assignee: Microsoft Technology Licensing, LLCInventors: Xinyang Ge, Weidong Cui, Ben Niu, Ling Tony Chen
-
Publication number: 20220336033Abstract: A TPM with programmable fuses in an SOC includes an on-die RAM storing a blown-fuse count and a TPM state read from off-die NV memory. During initialization, if the blown-fuse count is greater than a TPM state fuse count, a TPM state PIN-attempt-failure count is incremented, thereby thwarting a replay attack. If a PIN satisfies a PIN failure policy, and if a TPM state previously-passed-PIN indicator is set to true, a fuse is blown and the blown-fuse count incremented depending on the PIN being incorrect, but if the TPM state previously-passed-PIN indicator is set to false, a fuse is blown and the blown-fuse count incremented independent of whether the PIN is correct or incorrect. The TPM state fuse count is set equal to the blown-fuse count. If a counter cleared before processing the PIN remains cleared during the next initialization, a fuse voltage cut is detected and a penalty imposed.Type: ApplicationFiled: March 18, 2022Publication date: October 20, 2022Applicant: Microsoft Technology Licensing, LLCInventors: Ling Tony CHEN, Felix DOMKE, Ankur CHOUDHARY, Bradley Joseph LITTERELL
-
Publication number: 20220318405Abstract: A TPM is implemented in an SOC for thwarting PIN state replay attacks. Programmable fuses are used as a counter and an on-die RAM stores a blown-fuse count and a TPM state that includes a PIN-failure count and a fuse count. TPM initialization includes incrementing the TPM state PIN-failure count if the blown-fuse count is greater than the TPM state fuse count. Once a PIN is received, if the TPM state PIN-failure count satisfies a PIN failure policy and the PIN is correct, the TPM state PIN-failure count is cleared, and if the PIN is incorrect, a fuse is blown and the blown-fuse count is incremented. If the fuse blow fails, TPM activity is halted. If the fuse blow succeeds, the TPM state PIN-failure count is incremented and the TPM state fuse count is set equal to the blown-fuse count. The TPM state is saved to off-die non-volatile memory.Type: ApplicationFiled: March 31, 2021Publication date: October 6, 2022Inventors: Ling Tony CHEN, Felix DOMKE, Ankur CHOUDHARY, Bradley Joseph LITTERELL
-
Publication number: 20220318375Abstract: A TPM with programmable fuses in an SOC includes an on-die RAM storing a blown-fuse count and a TPM state including a PIN-attempt-failure count and a fuse count, read from off-die NV memory. During initialization, if the blown-fuse count is greater than TPM state fuse count, TPM state PIN-attempt-failure count is incremented, thereby thwarting a replay attack. A PIN is received for access, and if the TPM state PIN-attempt-failure count satisfies a policy, a fuse is blown and the blown-fuse count incremented. If the fuse blow fails, TPM activity is halted. If the fuse blow succeeds and the PIN is correct, the TPM state PIN-attempt-failure count is cleared, but if the PIN is incorrect the TPM state PIN-attempt-failure count is incremented. TPM state fuse count is set equal to the blown-fuse count, and the TPM state is saved to off-die NV memory.Type: ApplicationFiled: March 31, 2021Publication date: October 6, 2022Inventors: Ling Tony CHEN, Felix DOMKE, Ankur CHOUDHARY, Bradley Joseph LITTERELL
-
Publication number: 20220261727Abstract: A novel location and marking system is configured to provide a seamless in-the-field access to resource and asset information databases with automated functionality that effectively and more efficiently manages, controls, and distributes data according to some embodiments. In some embodiments, such systems can enable utilities to manage assets in real-time, provide map asset status, and provide automatic ticket routing, dispatching and management. For example, in some embodiments, the system is configured to generate maps with identifiers or components of an active division including tickets of one or more assets of an active division. These assets include sites of residential and business gas, electrical, and/or water and sewer conduits and metering systems, as well as related underground infrastructure that can be susceptible to earthquakes, ground disturbances, and other emergency situations according to some embodiments.Type: ApplicationFiled: March 7, 2022Publication date: August 18, 2022Inventors: Shelbey Warner, Michael Robert Wolf, Billy Dean Glenn, Michael Hansen, Morgan Sharif, Jason Klemm, Zachary Scofield, Edward Dotson, Travis Huston, Steven Walker, Michael S. Glass, Patrick Buckles, Tony Chen, Sivakrishna Jasti
-
Publication number: 20220131686Abstract: A method for secure key exchange. The method comprises receiving a request to certify a key from a communication partner at an interface between an access and tamper resistant circuit block and exposed circuitry. Within the access and tamper resistant circuit block, a first random private key is generated. A corresponding public key of the first random private key is derived, and a cryptographic digest of the public key and attributes associated with the first random private key is generated. The generated cryptographic digest is signed using a second random private key that has been designated for signing by one or more associated attributes. The public key and the signature are then sent to the communication partner via the interface.Type: ApplicationFiled: October 27, 2020Publication date: April 28, 2022Applicant: Microsoft Technology Licensing, LLCInventors: Avdhesh CHHODAVDIA, Ling Tony CHEN, Felix Stefan DOMKE, Kambiz RAHIMI, Jay Scott FULLER
-
SYSTEMS AND METHODS FOR MULTI-MODAL SENSING OF DEPTH IN VISION SYSTEMS FOR AUTOMATED SURGICAL ROBOTS
Publication number: 20220117689Abstract: Systems and methods for multi-modal sensing of three-dimensional position information of the surface of an object are disclosed. In particular, multiple visualization modalities are each used to collect distinctive positional information of a surface of an object. Each of the computed positional information is combined using weighting factors to compute a final, weighted three-dimensional position. In various embodiments, a first depth may be recorded using fiducial markers, a second depth may be recorded using a structured light pattern, and a third depth may be recorded using a light-field camera. Weighting factors may be applied to each of the recorded depths and a final, weighted depth may be computed.Type: ApplicationFiled: October 27, 2021Publication date: April 21, 2022Inventors: Thomas J. Calef, Tina P. Chen, Emanuel Demaio, Tony Chen, Vasiliy Evgenyevich Buharin, Michael G. Ruehlman -
Patent number: 11302411Abstract: A TPM with programmable fuses in an SOC includes an on-die RAM storing a blown-fuse count and a TPM state read from off-die NV memory. During initialization, if the blown-fuse count is greater than a TPM state fuse count, a TPM state PIN-attempt-failure count is incremented, thereby thwarting a replay attack. If a PIN satisfies a PIN failure policy, and if a TPM state previously-passed-PIN indicator is set to true, a fuse is blown and the blown-fuse count incremented depending on the PIN being incorrect, but if the TPM state previously-passed-PIN indicator is set to false, a fuse is blown and the blown-fuse count incremented independent of whether the PIN is correct or incorrect. The TPM state fuse count is set equal to the blown-fuse count. If a counter cleared before processing the PIN remains cleared during the next initialization, a fuse voltage cut is detected and a penalty imposed.Type: GrantFiled: March 31, 2021Date of Patent: April 12, 2022Assignee: MICROSOFT TECHNOLOGY LICENSING, LLCInventors: Ling Tony Chen, Felix Domke, Ankur Choudhary, Bradley Joseph Litterell