-
公开(公告)号:US20190392117A1
公开(公告)日:2019-12-26
申请号:US16013816
申请日:2018-06-20
Applicant: Microsoft Technology Licensing, LLC
Inventor: Giridhar Viswanathan , Sudeep Kumar Ghosh , Ankit Srivastava , Michael Trevor Pashniak , Benjamin M. Schultz , Balaji Balasubramanyan , Hari R. Pulapaka , Tushar Suresh Sugandhi , Matthew David Kurjanowicz , Ahmed Saruhan Karademir
Abstract: Techniques for secure sharing of data in computing systems are disclosed herein. In one embodiment, a method includes when exchanging data between the host operating system and the guest operating system, encrypting, at a trusted platform module (TPM) of the host, data to be exchanged with a first key to generate encrypted data. The method also includes transmitting the encrypted data from the host operating system to the guest operating system and decrypting, at the guest operating system, the transmitted encrypted data using a second key previously exchanged between the TPM of the host and a virtual TPM of the guest operating system.
-
公开(公告)号:US20190180003A1
公开(公告)日:2019-06-13
申请号:US16015064
申请日:2018-06-21
Applicant: MICROSOFT TECHNOLOGY LICENSING, LLC
Inventor: Benjamin M. Schultz , Balaji Balasubramanyan , Giridhar Viswanathan , Ankit Srivastava , Margarit Simeonov Chenchev , Hari R. Pulapaka , Nived Kalappuraikal Sivadas , Raphael Gianotti Serrano dos Santo , Narasimhan Ramasubramanian , Frederick Justus Smith , Matthew David Kurjanowicz , Prakhar Srivastava , Jonathan Schwartz
Abstract: Securely performing file operations. A method includes determining a licensing characteristic assigned to a file. When the licensing characteristic assigned to the file meets or exceeds a predetermined licensing condition, then the method includes performing a file operation on the file in a host operating system while preventing the file operation from being performed in the guest operating system. When the licensing characteristic assigned to the file does not meet or exceed the predetermined licensing condition, then the method includes performing the file operation on the file in the guest operating system while preventing the file operation from being performed directly in the host operating system.
-
13.
公开(公告)号:US12135817B2
公开(公告)日:2024-11-05
申请号:US17970148
申请日:2022-10-20
Applicant: Microsoft Technology Licensing, LLC
Inventor: Sergey Yekhanin , Joshua Stanley Allen , Ankit Srivastava , Ralph Kennedy Johnston, Jr. , Janardhan Dattatreya Kulkarni
Abstract: A secure enclave may be used to satisfy privacy requirements and audit requirements. Code may be loaded into the secure enclave. The code may generate a predefined report based on data and added noise. The pre-defined report may be subject to audit requirements. The data may be subject to the privacy requirements. The secure enclave may generate an encryption key and a decryption key based on the code. Only the secure enclave may have access to the decryption key. And the secure enclave may allow only a verified copy of the code to access the decryption key. With the added noise, the report may satisfy a pre-defined differential privacy guarantee. Encrypting the code and ensuring that the report satisfies the differential privacy guarantee may satisfy the privacy requirements. Retaining the report, the code, the secure enclave, and the encrypted data may satisfy the audit requirements.
-
公开(公告)号:US10375111B2
公开(公告)日:2019-08-06
申请号:US15430301
申请日:2017-02-10
Applicant: Microsoft Technology Licensing, LLC
Inventor: Benjamin M. Schultz , Frederick Justus Smith , Daniel Vasquez Lopez , Abhinav Mishra , Ian James McCarty , John A. Starks , Joshua David Ebersol , Ankit Srivastava , Hari R. Pulapaka , Mehmet Iyigun , Stephen E. Bensley , Giridhar Viswanathan
Abstract: Anonymous containers are discussed herein. An operating system running on a computing device, also referred to herein as a host operating system running on a host device, prevents an application from accessing personal information (e.g., user information or corporate information) by activating an anonymous container that is isolated from the host operating system. In order to create and activate the anonymous container, a container manager anonymizes the configuration and settings data of the host operating system, and injects the anonymous configuration and settings data into the anonymous container. Such anonymous configuration and settings data may include, by way of example and not limitation, application data, machine configuration data, and user settings data. The host operating system then allows the application to run in the anonymous container.
-
公开(公告)号:US20180139238A1
公开(公告)日:2018-05-17
申请号:US15430301
申请日:2017-02-10
Applicant: Microsoft Technology Licensing, LLC
Inventor: Benjamin M. Schultz , Frederick Justus Smith , Daniel Vasquez Lopez , Abhinav Mishra , Ian James McCarty , John A. Starks , Joshua David Ebersol , Ankit Srivastava , Hari R. Pulapaka , Mehmet Iyigun , Stephen E. Bensley , Giridhar Viswanathan
CPC classification number: H04L63/1491 , G06F9/45558 , G06F21/53 , G06F21/6254 , G06F2009/45587 , H04L63/0272 , H04L63/0421
Abstract: Anonymous containers are discussed herein. An operating system running on a computing device, also referred to herein as a host operating system running on a host device, prevents an application from accessing personal information (e.g., user information or corporate information) by activating an anonymous container that is isolated from the host operating system. In order to create and activate the anonymous container, a container manager anonymizes the configuration and settings data of the host operating system, and injects the anonymous configuration and settings data into the anonymous container. Such anonymous configuration and settings data may include, by way of example and not limitation, application data, machine configuration data, and user settings data. The host operating system then allows the application to run in the anonymous container.
-
-
-
-