-
公开(公告)号:US11200300B2
公开(公告)日:2021-12-14
申请号:US16013816
申请日:2018-06-20
Applicant: Microsoft Technology Licensing, LLC
Inventor: Giridhar Viswanathan , Sudeep Kumar Ghosh , Ankit Srivastava , Michael Trevor Pashniak , Benjamin M Schultz , Balaji Balasubramanyan , Hari R Pulapaka , Tushar Suresh Sugandhi , Matthew David Kurjanowicz , Ahmed Saruhan Karademir
Abstract: Techniques for secure sharing of data in computing systems are disclosed herein. In one embodiment, a method includes when exchanging data between the host operating system and the guest operating system, encrypting, at a trusted platform module (TPM) of the host, data to be exchanged with a first key to generate encrypted data. The method also includes transmitting the encrypted data from the host operating system to the guest operating system and decrypting, at the guest operating system, the transmitted encrypted data using a second key previously exchanged between the TPM of the host and a virtual TPM of the guest operating system.
-
公开(公告)号:US20190370436A1
公开(公告)日:2019-12-05
申请号:US15994928
申请日:2018-05-31
Applicant: Microsoft Technology Licensing, LLC
Inventor: Ahmed Saruhan Karademir , Sudeep Kumar Ghosh , Ankit Srivastava , Michael Trevor Pashniak , Benjamin M. Schultz , Balaji Balasubramanyan , Hari R. Pulapaka , Tushar Suresh Sugandhi , Matthew David Kurjanowicz , Giridhar Viswanathan
Abstract: Techniques for memory assignment for guest operating systems are disclosed herein. In one embodiment, a method includes generating a license blob containing data representing a product key copied from a record of license information in the host storage upon receiving a user request to launch an application in the guest operating system. The method also includes storing the generated license blob in a random memory location accessible by the guest operating system. The guest operating system can then query the license blob for permission to launch the application and launching the application in the guest operating system without having a separate product key for the guest operating system.
-
公开(公告)号:US11507687B2
公开(公告)日:2022-11-22
申请号:US15931020
申请日:2020-05-13
Applicant: Microsoft Technology Licensing, LLC
Inventor: Sergey Yekhanin , Joshua Stanley Allen , Ankit Srivastava , Ralph Kennedy Johnston, Jr. , Janardhan Dattatreya Kulkarni
Abstract: A secure enclave may be used to satisfy privacy requirements and audit requirements. Code may be loaded into the secure enclave. The code may generate a predefined report based on data and added noise. The pre-defined report may be subject to audit requirements. The data may be subject to the privacy requirements. The secure enclave may generate an encryption key and a decryption key based on the code. Only the secure enclave may have access to the decryption key. And the secure enclave may allow only a verified copy of the code to access the decryption key. With the added noise, the report may satisfy a pre-defined differential privacy guarantee. Encrypting the code and ensuring that the report satisfies the differential privacy guarantee may satisfy the privacy requirements. Retaining the report, the code, the secure enclave, and the encrypted data may satisfy the audit requirements.
-
公开(公告)号:US11074323B2
公开(公告)日:2021-07-27
申请号:US16015064
申请日:2018-06-21
Applicant: MICROSOFT TECHNOLOGY LICENSING, LLC
Inventor: Benjamin M. Schultz , Balaji Balasubramanyan , Giridhar Viswanathan , Ankit Srivastava , Margarit Simeonov Chenchev , Hari R. Pulapaka , Nived Kalappuraikal Sivadas , Raphael Gianotti Serrano dos Santo , Narasimhan Ramasubramanian , Frederick Justus Smith , Matthew David Kurjanowicz , Prakhar Srivastava , Jonathan Schwartz
Abstract: Securely performing file operations. A method includes determining a licensing characteristic assigned to a file. When the licensing characteristic assigned to the file meets or exceeds a predetermined licensing condition, then the method includes performing a file operation on the file in a host operating system while preventing the file operation from being performed in the guest operating system. When the licensing characteristic assigned to the file does not meet or exceed the predetermined licensing condition, then the method includes performing the file operation on the file in the guest operating system while preventing the file operation from being performed directly in the host operating system.
-
公开(公告)号:US10795974B2
公开(公告)日:2020-10-06
申请号:US15994928
申请日:2018-05-31
Applicant: Microsoft Technology Licensing, LLC
Inventor: Ahmed Saruhan Karademir , Sudeep Kumar Ghosh , Ankit Srivastava , Michael Trevor Pashniak , Benjamin M. Schultz , Balaji Balasubramanyan , Hari R. Pulapaka , Tushar Suresh Sugandhi , Matthew David Kurjanowicz , Giridhar Viswanathan
Abstract: Techniques for memory assignment for guest operating systems are disclosed herein. In one embodiment, a method includes generating a license blob containing data representing a product key copied from a record of license information in the host storage upon receiving a user request to launch an application in the guest operating system. The method also includes storing the generated license blob in a random memory location accessible by the guest operating system. The guest operating system can then query the license blob for permission to launch the application and launching the application in the guest operating system without having a separate product key for the guest operating system.
-
公开(公告)号:US20170315974A1
公开(公告)日:2017-11-02
申请号:US15263323
申请日:2016-09-12
Applicant: Microsoft Technology Licensing, LLC.
Inventor: Fanguang Kong , Yanir Shahak , Wei Wang , Jorge Eugenio Aguirre Gonzalez , Jay Ongg , Darren Glenn Austin , Gareth Alun Jones , Rahee Ghosh , Ankit Srivastava , Guy Daher , Kiky Wibowo Tangerine , Mun Ying Leong
CPC classification number: G06F17/24 , G06F16/972 , G06F17/2247 , G06F17/242 , H04L51/22
Abstract: Freeform input is not native to several application or document types, but is desired by users as an input mode, especially for collaboration. Systems and methods are therefore provided to enable the insertion of an electronic collaboration workspace that accepts and stores freeform input for use as an object embeddable in various documents. An external host application provides the functionalities needed for freeform input, and the inputs may be committed to the document or stored as a separate document which may be referenced and accessed by multiple users for purposes of collaboration.
-
公开(公告)号:US12293206B2
公开(公告)日:2025-05-06
申请号:US17543022
申请日:2021-12-06
Applicant: Microsoft Technology Licensing, LLC
Inventor: Hu Lu , XiWen Yue , Lingxiao Hang , Haiyang Wang , Ankit Srivastava , Fan Yin , Naga Venkata Rajagopal Ramadugu , Nandita Sharma , Jyh-Han Lin , Sandeep Patnaik
IPC: G06F9/455
Abstract: The present disclosure relates to systems, methods, and computer-readable media for receiving usage data for a virtual device (or other virtual service), analyzing the usage data to determine a usage bucket characteristic of usage of the virtual device over a period of time, and determining a usage score for the virtual device. The systems described herein further involve causing a deployment of the virtual device to be upgraded, downgraded, or otherwise modified based on the usage bucket and associated usage score. The features and functionalities described herein can provide an efficient mechanism for administrating a tenant deployment as well as implementing a more efficient utilization of cloud computing resources for a variety of virtual services.
-
公开(公告)号:US10528083B1
公开(公告)日:2020-01-07
申请号:US16149866
申请日:2018-10-02
Applicant: Microsoft Technology Licensing, LLC
Inventor: Ankit Srivastava , Hari Pulapaka
IPC: G06F1/16 , H01L31/042 , H02J7/00 , H02S20/30
Abstract: A cover for a mobile device includes solar panels and an integrated keyboard. The solar panels are positioned on a stand of the cover and an angle associated with the solar panels can be changed so as to maximize input from a light source. The cover can be used to supply power and keyboard input to a mobile device while in use.
-
公开(公告)号:US20180074867A1
公开(公告)日:2018-03-15
申请号:US15265857
申请日:2016-09-15
Applicant: MICROSOFT TECHNOLOGY LICENSING, LLC
Inventor: Ankit Srivastava , Kiky Tangerine , Hao Cen
IPC: G06F9/54
Abstract: Variety of approaches to provide a copy of a notebook document are described. A copy application programming interface (API) of a productivity service initiates operations to copy a source notebook document upon receiving a request to copy a designated portion of the source notebook document to a destination. In response to the received request, the copy API retrieves serialized data stored in a source section file associated with the designated portion of the source notebook document. The serialized data is provided such that a new portion of a destination notebook document is constructed at the destination based at least in part on the serialized data.
-
公开(公告)号:US10885189B2
公开(公告)日:2021-01-05
申请号:US15601759
申请日:2017-05-22
Applicant: Microsoft Technology Licensing, LLC
Inventor: Charles G. Jeffries , Benjamin M. Schultz , Giridhar Viswanathan , Frederick Justus Smith , David Guy Weston , Ankit Srivastava , Ling Tony Chen , Hari R. Pulapaka
Abstract: A host operating system running on a computing device monitors resource access by an application running in a container that is isolated from the host operating system. In response to detecting resource access by the application, a security event is generated describing malicious activity that occurs from the accessing the resource. This security event is analyzed to determine a threat level of the malicious activity. If the threat level does not satisfy a threat level threshold, the host operating system allows the application to continue accessing resources and continues to monitor resource access. When the threat level satisfies the threat level threshold, the operating system takes corrective action to prevent the malicious activity from spreading beyond the isolated container. Through the use of security events, the host operating system is protected from even kernel-level attacks without using resources required to run anti-virus software in the isolated container.
-
-
-
-
-
-
-
-
-