Patents by Inventor Wen-Pin Scott Hsu
Wen-Pin Scott Hsu has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Publication number: 20200034516Abstract: A software licensing Application Programming Interface (API) that allows software products to use the license management functionality of a common service. A license specifies rights in a software product. The software product calls a consume method on the API in order to consume a right. If the right exists, the service binds the right to the license in which the right is found. The software product enforces the terms of the license by granting, or denying, access to some or all features depending on whether a valid instance of the right is found. Arbitrary data can be associated with a right. The API includes a method to retrieve data from a right that has been previously bound by the consume method.Type: ApplicationFiled: October 2, 2019Publication date: January 30, 2020Inventors: Caglar Gunyakti, Wen-Pin Scott Hsu, Ning Zhang
-
Patent number: 10437964Abstract: A software licensing Application Programming Interface (API) that allows software products to use the license management functionality of a common service. A license specifies rights in a software product. The software product calls a consume method on the API in order to consume a right. If the right exists, the service binds the right to the license in which the right is found. The software product enforces the terms of the license by granting, or denying, access to some or all features depending on whether a valid instance of the right is found. Arbitrary data can be associated with a right. The API includes a method to retrieve data from a right that has been previously bound by the consume method.Type: GrantFiled: October 24, 2003Date of Patent: October 8, 2019Assignee: Microsoft Technology Licensing, LLCInventors: Caglar Gunyakti, Wen-Pin Scott Hsu, Ning Zhang
-
Patent number: 9847880Abstract: Techniques are described for ensuring data integrity and authentication of received messages. One technique includes sending a request from a first module to a second module in which the request includes a first portion that is a shared secret encrypted with a public key, obtaining by the second module a private key from a secure and trusted information store, such as a license information store, including license information or other application specific information for the first module, using the private key to decrypt the first portion and obtain the shared secret, sending a response from the second module to the first module in which the response includes authentication data and at least one data item used with the shared secret to determine the authentication data, and performing by the first module verification processing to verify the authentication data included in the response.Type: GrantFiled: January 12, 2015Date of Patent: December 19, 2017Assignee: Microsoft Technology Licensing, LLCInventors: Wen-Pin Scott Hsu, Tarik Soulami, Mark Zagorski, Ning Zhang, Brian Perlman
-
Publication number: 20160014136Abstract: A system grants “provisional privileges” to a user request for the purpose of provisionally performing a requested transaction. If the provisionally-performed transaction does not put the system in a degraded state, the transaction is authorized despite the user request having inadequate privileges originally.Type: ApplicationFiled: September 21, 2015Publication date: January 14, 2016Inventors: Brian Perlman, Richard S. Eizenhoefer, Wen-Pin Scott Hsu
-
Patent number: 9152778Abstract: A system grants “provisional privileges” to a user request for the purpose of provisionally performing a requested transaction. If the provisionally-performed transaction does not put the system in a degraded state, the transaction is authorized despite the user request having inadequate privileges originally.Type: GrantFiled: December 16, 2013Date of Patent: October 6, 2015Assignee: MICROSOFT TECHNOLOGY LICENSING, LLCInventors: Brian Perlman, Richard S. Eizenhoefer, Wen-Pin Scott Hsu
-
Publication number: 20150261957Abstract: A system grants “provisional privileges” to a user request for the purpose of provisionally performing a requested transaction. If the provisionally-performed transaction does not put the system in a degraded state, the transaction is authorized despite the user request having inadequate privileges originally.Type: ApplicationFiled: May 28, 2015Publication date: September 17, 2015Inventors: Brian Perlman, Richard S. Eizenhoefer, Wen-Pin Scott Hsu
-
Patent number: 9092598Abstract: A software license for a particular version of a software product on a computing device includes both a branding identifier that identifies the particular version of the software product and component dependency information that identifies one or more aspects of the particular version of the software product. To activate a software product on the computing device, the branding identifier is compared to a portion of the software product on the computing device. If the branding identifier matches the portion of the software product, then the component dependency information is compared to one or more aspects of the software product on the computing device. If the component dependency information matches the one or more aspects of the software product then the software product is activated. Otherwise, the a license state of the software product is kept unchanged.Type: GrantFiled: July 30, 2009Date of Patent: July 28, 2015Assignee: Microsoft Technology Licensing, LLCInventors: Wen-Pin Scott Hsu, Tarik Soulami, Richard S. Eizenhoefer, Ning Zhang, Anil Bazaz, Thomas J. Layson, Josue L Noriega de la Vega
-
Publication number: 20150163058Abstract: Techniques are described for ensuring data integrity and authentication of received messages. One technique includes sending a request from a first module to a second module in which the request includes a first portion that is a shared secret encrypted with a public key, obtaining by the second module a private key from a secure and trusted information store, such as a license information store, including license information or other application specific information for the first module, using the private key to decrypt the first portion and obtain the shared secret, sending a response from the second module to the first module in which the response includes authentication data and at least one data item used with the shared secret to determine the authentication data, and performing by the first module verification processing to verify the authentication data included in the response.Type: ApplicationFiled: January 12, 2015Publication date: June 11, 2015Inventors: Wen-Pin Scott Hsu, Tarik Soulami, Mark Zagorski, Ning Zhang, Brian Perlman
-
Patent number: 8935528Abstract: Techniques are described for ensuring data integrity and authentication of received messages. One technique includes sending a request from a first module to a second module in which the request includes a first portion that is a shared secret encrypted with a public key, obtaining by the second module a private key from a secure and trusted information store, such as a license information store, including license information or other application specific information for the first module, using the private key to decrypt the first portion and obtain the shared secret, sending a response from the second module to the first module in which the response includes authentication data and at least one data item used with the shared secret to determine the authentication data, and performing by the first module verification processing to verify the authentication data included in the response.Type: GrantFiled: June 26, 2008Date of Patent: January 13, 2015Assignee: Microsoft CorporationInventors: Wen-Pin Scott Hsu, Tarik Soulami, Mark Zagorski, Ning Zhang, Brian Perlman
-
Publication number: 20140109218Abstract: A system grants “provisional privileges” to a user request for the purpose of provisionally performing a requested transaction. If the provisionally-performed transaction does not put the system in a degraded state, the transaction is authorized despite the user request having inadequate privileges originally.Type: ApplicationFiled: December 16, 2013Publication date: April 17, 2014Applicant: Microsoft CorporationInventors: Brian Perlman, Richard S. Eizenhoefer, Wen-Pin Scott Hsu
-
Patent number: 8613077Abstract: A system grants “provisional privileges” to a user request for the purpose of provisionally performing a requested transaction. If the provisionally-performed transaction does not put the system in a degraded state, the transaction is authorized despite the user request having inadequate privileges originally.Type: GrantFiled: May 23, 2012Date of Patent: December 17, 2013Assignee: Microsoft CorporationInventors: Brian Perlman, Richard S. Eizenhoefer, Wen-Pin Scott Hsu
-
Publication number: 20120240221Abstract: A system grants “provisional privileges” to a user request for the purpose of provisionally performing a requested transaction. If the provisionally-performed transaction does not put the system in a degraded state, the transaction is authorized despite the user request having inadequate privileges originally.Type: ApplicationFiled: May 23, 2012Publication date: September 20, 2012Applicant: Microsoft CorporationInventors: Brian Perlman, Richard S. Eizenhoefer, Wen-Pin Scott Hsu
-
Patent number: 8196196Abstract: A system grants “provisional privileges” to a user request for the purpose of provisionally performing a requested transaction. If the provisionally-performed transaction does not put the system in a degraded state, the transaction is authorized despite the user request having inadequate privileges originally.Type: GrantFiled: December 1, 2010Date of Patent: June 5, 2012Assignee: Microsoft CorporationInventors: Brian Perlman, Richard S. Eizenhoefer, Wen-Pin Scott Hsu
-
Patent number: 8095987Abstract: Licensing aspects of vendor software packages can be protected with reduced user interaction and effort by automating licensing exploit identification, and if allowed, exploit correction. Automating licensing exploit detection ensures that known exploits are more quickly and efficiently discovered to help maintain genuine software status. Minimizing user interaction in licensing exploit detection and correction involves less disruption to users and generally supports increased user satisfaction with vendor software package usage.Type: GrantFiled: September 4, 2008Date of Patent: January 10, 2012Assignee: Microsoft CorporationInventors: Satish K. Shetty, Michelle L. Holtmann, Wei Jiang, Wen-Pin Scott Hsu, Wen Wha Lee, Qiong Tang
-
Publication number: 20110072513Abstract: A system grants “provisional privileges” to a user request for the purpose of provisionally performing a requested transaction. If the provisionally-performed transaction does not put the system in a degraded state, the transaction is authorized despite the user request having inadequate privileges originally.Type: ApplicationFiled: December 1, 2010Publication date: March 24, 2011Applicant: Microsoft CorporationInventors: Brian Perlman, Richard S. Eizenhoefer, Wen-Pin Scott Hsu
-
Publication number: 20110030062Abstract: A software license for a particular version of a software product on a computing device includes both a branding identifier that identifies the particular version of the software product and component dependency information that identifies one or more aspects of the particular version of the software product. To activate a software product on the computing device, the branding identifier is compared to a portion of the software product on the computing device. If the branding identifier matches the portion of the software product, then the component dependency information is compared to one or more aspects of the software product on the computing device. If the component dependency information matches the one or more aspects of the software product then the software product is activated. Otherwise, the a license state of the software product is kept unchanged.Type: ApplicationFiled: July 30, 2009Publication date: February 3, 2011Applicant: Microsoft CorporationInventors: Wen-Pin Scott Hsu, Tarik Soulami, Richard S. Eizenhoefer, Ning Zhang, Anil Bazaz, Thomas J. Layson, Josue L. Noriega de la Vega
-
Patent number: 7865949Abstract: A system grants “provisional privileges” to a user request for the purpose of provisionally performing a requested transaction. If the provisionally-performed transaction does not put the system in a degraded state, the transaction is authorized despite the user request having inadequate privileges originally.Type: GrantFiled: January 18, 2007Date of Patent: January 4, 2011Assignee: Microsoft CorporationInventors: Brian Perlman, Richard S. Eizenhoefer, Wen-Pin Scott Hsu
-
Patent number: 7747533Abstract: A plurality of digital licenses correspond to a piece of content, including a base license and at least one add-on license. Each add-on license includes a reference to the base license, and each of the base license and each add-on license sets forth rules specifying how the content may be employed. Each add-on license is identified by way of the reference therein to the base license, and the rules in the base license and in each identified add-on license are aggregated into an aggregated set of rules that is evaluated to determine if such aggregated set of rules allows employing the content in a particular manner.Type: GrantFiled: October 26, 2005Date of Patent: June 29, 2010Assignee: Microsoft CorporationInventors: Ning Zhang, Richard S. Eizenhoefer, Wen-Pin Scott Hsu
-
Publication number: 20100058478Abstract: Licensing aspects of vendor software packages can be protected with reduced user interaction and effort by automating licensing exploit identification, and if allowed, exploit correction. Automating licensing exploit detection ensures that known exploits are more quickly and efficiently discovered to help maintain genuine software status. Minimizing user interaction in licensing exploit detection and correction involves less disruption to users and generally supports increased user satisfaction with vendor software package usage.Type: ApplicationFiled: September 4, 2008Publication date: March 4, 2010Applicant: Microsoft CorporationInventors: Satish K Shetty, Michelle L. Holtmann, Wei Jiang, Wen-Pin Scott Hsu, Wen-Wha Lee, Oiong Tang
-
Publication number: 20090327737Abstract: Techniques are described for ensuring data integrity and authentication of received messages. One technique includes sending a request from a first module to a second module in which the request includes a first portion that is a shared secret encrypted with a public key, obtaining by the second module a private key from a secure and trusted information store, such as a license information store, including license information or other application specific information for the first module, using the private key to decrypt the first portion and obtain the shared secret, sending a response from the second module to the first module in which the response includes authentication data and at least one data item used with the shared secret to determine the authentication data, and performing by the first module verification processing to verify the authentication data included in the response.Type: ApplicationFiled: June 26, 2008Publication date: December 31, 2009Applicant: Microsoft CorporationInventors: Wen-Pin Scott Hsu, Tarik Soulami, Mark Zagorski, Ning Zhang, Brian Perlman