Igor Sedukhin - Issaquah WA, US Girish Mittur Venkataramanappa - Redmond WA, US Sumit Mohanty - Redmond WA, US Cristian S. Salvan - Redmond WA, US Anubhav Dhoot - Bothell WA, US Rama Rao Raghavendra Rao - Sammamish WA, US
Assignee:
Microsoft Corporation - Redmond WA
International Classification:
G06F 9/45
US Classification:
717139, 717104, 717108, 717146, 717168, 719322
Abstract:
The present invention extends to methods, systems, and computer program products for translating declarative models. Embodiments of the present invention facilitate processing declarative models to perform various operations on applications, such as, for example, application deployment, application updates, application control such as start and stop, application monitoring by instrumenting the applications to emit events, and so on. Declarative models of applications are processed and realized onto a target environment, after which they can be executed, controlled, and monitored.
Igor Sedukhin - Issaquah WA, US Girish Mittur Venkataramanappa - Redmond WA, US Sumit Mohanty - Redmond WA, US Cristian S. Salvan - Redmond WA, US Anubhav Dhoot - Bothell WA, US Rama Rao Raghavendra Rao - Sammamish WA, US
Assignee:
MICROSOFT CORPORATION - Redmond WA
International Classification:
G06F 9/50
US Classification:
718103
Abstract:
The present invention extends to methods, systems, and computer program products for translating declarative models. Embodiments of the present invention facilitate processing declarative models to perform various operations on applications, such as, for example, application deployment, application updates, application control such as start and stop, application monitoring by instrumenting the applications to emit events, and so on. Declarative models of applications are processed and realized onto a target environment, after which they can be executed, controlled, and monitored.
Weisheng Li - Bothell WA, US Prabu Raju - Issaquah WA, US Cristian Salvan - Redmond WA, US Kris Iverson - Redmond WA, US
Assignee:
Microsoft Corporation - Redmond WA
International Classification:
G06F 21/20
US Classification:
726 3
Abstract:
In one embodiment, a human interactive proof portal may control access to an online data service . A communication interface may establish a human interactive proof session with a client user by presenting a proof challenge set having multiple proof challenges. A clock may record a challenge response time for each proof challenge. A processor may provide access to an online data service based on the human interactive proof session.
Autonomous Secrets Management For A Key Distribution Service
- Redmond WA, US Kamran Riaz KHAN - Redmond WA, US Brian S. LOUNSBERRY - Kenmore WA, US Cristian Stefan SALVAN - Redmond WA, US
International Classification:
H04L 9/08 H04L 9/32
Abstract:
Various methods and systems are provided for autonomous secrets management for a key distribution service (“KDS”). A KDS server performs centralized management and distribution of keys for client devices in a distributed computing system, which obviates key management and distribution at the client devices. In operation, a key request is received at a KDS server from a KDS client device. The key request is generated using a data protector and a KDS client component of the KDS client device. The key request is associated with a caller and a security token of the caller. The caller is authenticated at a security token service (STS) based on a security token. An encryption key or decryption key associated with the key request is generated. The encryption key or the decryption key is generated based on an interval-based key derivation scheme. The encryption key or the decryption key is communicated to KDS client.
- Redmond WA, US Peter David Waxman - Seattle WA, US Gabriel Fortunato Stocco - Redmond WA, US Kam Kouladjie - Woodinville WA, US Cristian Stefan Salvan - Redmond WA, US Prabu Raju - Kirkland WA, US Himanshu Soni - Bothell WA, US Giridhar Viswanathan - Redmond WA, US
The present invention provides for streamlined issuance of certificates and other tokens that are contingent on key attestation of keys from a trusted platform module within a computing platform. Various methods are described for wrapping the requested token in a secret, such as an AES key, that is encrypted to a TPM based key in a key challenge. If the requesting platform fails the key challenge, the encrypted certificate or token cannot be decrypted. If requesting platform passes the challenge, the encrypted certificate or token can be decrypted using the AES key recovered from the key challenge.
- Redmond WA, US Peter David Waxman - Seattle WA, US Gabriel Fortunato Stocco - Redmond WA, US Kam Kouladjie - Woodinville WA, US Cristian Stefan Salvan - Redmond WA, US Prabu Raju - Kirkland WA, US Himanshu Soni - Bothell WA, US Giridhar Viswanathan - Redmond WA, US
The present invention provides for streamlined issuance of certificates and other tokens that are contingent on key attestation of keys from a trusted platform module within a computing platform. Various methods are described for wrapping the requested token in a secret, such as an AES key, that is encrypted to a TPM based key in a key challenge. If the requesting platform fails the key challenge, the encrypted certificate or token cannot be decrypted. If requesting platform passes the challenge, the encrypted certificate or token can be decrypted using the AES key recovered from the key challenge.