Vikas Malhotra - Redmond WA, US Benjamin E. Canning - Seattle WA, US Daniel B. Jump - Redmond WA, US David C. LeBlanc - Monroe WA, US Benjamen E. Ross - Seattle WA, US James Campbell - Seattle WA, US Brian Carver - Kirkland WA, US Joshua Pollock - Seattle WA, US
Assignee:
Microsoft Corporation - Redmond WA
International Classification:
G06F 21/00 G06F 3/00 G06F 15/16
US Classification:
726 4, 715700, 709203, 726 26
Abstract:
Architecture that provides a secure environment in which data (e.g., code, instructions, files, images, etc.) can be opened and run by a client application. Once opened the data can be viewed (in a “protected view”) by the user without incurring risk to other client processing and systems. Accordingly, the architecture mitigates malicious attacks by enabling users to preview untrusted and potentially harmful data (e.g., files) in a low risk manner. Files opened in the protected view are isolated from accessing key resources on the client computer and provides the user a safer way to read files that can contain dangerous content. The protected view also provides a seamless user experience. The user is unaware that the client is operating on data in a different mode and allows for the reduction of security prompts.
Venkataramann Renganathan - Sammamish WA, US Brian Thomas Carver - Kirkland WA, US Daniel Browne Jump - Redmond WA, US David Charles LeBlanc - Monroe WA, US Samuel Ira Weiss - Sacramento CA, US
Assignee:
MICROSOFT CORPORATION - Redmond WA
International Classification:
H04L 9/30
US Classification:
713168
Abstract:
A secure hash, such as a Hash-based Message Authentication Code (“HMAC”), is generated using a piece of secret information (e.g., a secret key) and a piece of public information specific to each escrow key (e.g., a certificate hash or public key). Using the secret key ensures that escrow key validation data can only be generated by knowing the secret key, which prevents an attacker from generating the appropriate escrow key validation data. Using the certificate hash as the public data ties each escrow key validation data to a particular certificate, thereby preventing the attacker from simply copying the validation data from another escrow key. Any escrow key that is found to be invalid may be removed from the file container and a system audit log may be generated so that a company, individual, or other entity can be aware of the possible attempt at a security breach.
Dynamic Cross-Site Request Forgery Protection In A Web-Based Client Application
Thomas Patrick Gallagher - Redmond WA, US Venkataramann Renganathan - Sammamish WA, US Brian Thomas Carver - Kirkland WA, US Muhammed Serdar Soran - Seattle WA, US Matthew Michael Swann - Bothell WA, US Trace David Ferrier - Redmond WA, US
Assignee:
Microsoft Corporation - Redmond WA
International Classification:
G06F 15/16
US Classification:
709206
Abstract:
A canary value is used to validate a message from a non-web browser client application to a web server providing web services to mitigate cross-site forgery attacks. The canary value is generated by the server in party by applying a hash function to a user identifier and a time stamp. The server provides the canary value to the client application in response to receiving a message that does not have a canary or has an expired canary. The client application upon receiving an error message with a canary message will resend the prior message with the canary value present. The client application caches the canary value for subsequent messages until a new canary value is received. The canary value allows the server to ignore messages generated by the client application under control of an attacker.
Template Based Calendar Events With Graphic Enrichment
- Redmond WA, US Hiroshi TSUKAHARA - Bellevue WA, US Brian T. CARVER - Bellevue WA, US Margaret R. CLINTON - Redmond WA, US Elona TUOMI - Redmond WA, US Jiang WAN - Redmond WA, US
Template based calendar events with graphic enrichment are provided. In some examples, upon receiving a request to create a calendar event, an event creation prompt may be presented. The prompt may include an event template selection element comprising visual aids, such as icons or emojis, that each represent different event templates for selection. Upon receiving a visual aid selection, information associated with the user requesting the calendar event may be retrieved based on the selected visual aid to infer one or more aspects of the requested event such as title, timing, and location. A suggested event with the inferred aspects may be presented to the user and upon receiving confirmation and/or modification, the suggested or modified event may be added to the user's calendar. Some events may be presented with a visual background such as an image or graphics on the calendar for prompt recognition.
Automatic Association And Sharing Of Photos With Calendar Events
- Redmond WA, US Brian T. CARVER - Kirkland WA, US
Assignee:
MICROSOFT TECHNOLOGY LICENSING, LLC - Redmond WA
International Classification:
G06Q 10/10 G06F 17/30 G06K 9/00
Abstract:
Technologies are described for automatic association and sharing of photos with calendar events. For example, photos or similar material associated with a calendar event may be determined and searched for through a variety of resources such as enterprise databases, personal data stores, cloud resources, or even the Internet based on an attribute of each photo and an attribute of the calendar event. Candidate photos resulting from the search may be presented to a user such as an organizer of a meeting or person setting an appointment for confirmation and selection. Upon receiving selection and confirmation of one or more photos from the candidate photos, the one or more photos may be made available to a group of users within a context of the calendar event. Various sharing options such as email, shared cloud storage, or calendar event itself may be used for sharing the photos.
- Redmond WA, US Benjamin E. CANNING - Seattle WA, US Daniel B. JUMP - Redmond WA, US David C. LeBLANC - Monroe WA, US Benjamen E. ROSS - Seattle WA, US James CAMPBELL - Seattle WA, US Brian CARVER - Kirkland WA, US Joshua POLLOCK - Seattle WA, US
International Classification:
G06F 21/53 G06F 21/62 G06F 21/60
Abstract:
Architecture that provides a secure environment in which data (e.g., code, instructions, files, images, etc.) can be opened and run by a client application. Once opened the data can be viewed (in a “protected view”) by the user without incurring risk to other client processing and systems. Accordingly, the architecture mitigates malicious attacks by enabling users to preview untrusted and potentially harmful data (e.g., files) in a low risk manner. Files opened in the protected view are isolated from accessing key resources on the client computer and provides the user a safer way to read files that can contain dangerous content. The protected view also provides a seamless user experience. The user is unaware that the client is operating on data in a different mode and allows for the reduction of security prompts.
Template Based Calendar Events With Graphic Enrichment
- Redmond WA, US Hiroshi Tsukahara - Bellevue WA, US Brian T. Carver - Bellevue WA, US Margaret R. Clinton - Redmond WA, US Elona Tuomi - Redmond WA, US Jiang Wan - Redmond WA, US
Template based calendar events with graphic enrichment are provided. In some examples, upon receiving a request to create a calendar event, an event creation prompt may be presented. The prompt may include an event template selection element comprising visual aids, such as icons or emojis, that each represent different event templates for selection. Upon receiving a visual aid selection, information associated with the user requesting the calendar event may be retrieved based on the selected visual aid to infer one or more aspects of the requested event such as title, timing, and location. A suggested event with the inferred aspects may be presented to the user and upon receiving confirmation and/or modification, the suggested or modified event may be added to the user's calendar. Some events may be presented with a visual background such as an image or graphics on the calendar for prompt recognition.
- Redmond WA, US Benjamin E. Canning - Seattle WA, US Daniel B. Jump - Redmond WA, US David C LeBlanc - Monroe WA, US Benjamen E. Ross - Seattle WA, US James Campbell - Seattle WA, US Brian Carver - Kirkland WA, US Joshua Pollock - Seattle WA, US
International Classification:
G06F 21/53 G06F 21/60 G06F 21/62
Abstract:
Architecture that provides a secure environment in which data (e.g., code, instructions, files, images, etc.) can be opened and run by a client application. Once opened the data can be viewed (in a “protected view”) by the user without incurring risk to other client processing and systems. Accordingly, the architecture mitigates malicious attacks by enabling users to preview untrusted and potentially harmful data (e.g., files) in a low risk manner. Files opened in the protected view are isolated from accessing key resources on the client computer and provides the user a safer way to read files that can contain dangerous content. The protected view also provides a seamless user experience. The user is unaware that the client is operating on data in a different mode and allows for the reduction of security prompts.
Freelance writing - Greater Los Angeles Area since Jun 2000
Freelance writer
Miramar College Aug 2005 - Jun 2011
Athletic Groundskeeper
San Diego City College Nov 2007 - Jan 2008
Instructional Lab Technician
Palomar College Sep 2007 - Jan 2008
Floor Director
Bath & Body Works Dec 2001 - Sep 2005
Stockroom Supervisor
Education:
University of California
B.A, Visual Arts: Media - Film and Television
Skills:
Multi Camera Directing Video Production Sound Design Television Directing Digital Photography Sketch Comedy Teaching Video Editing Photography Playwriting Creative Writing Sound Editing Screenwriting Photojournalism News Writing Copywriting Graphics Software Film Production Media Production
Imdb.com
Senior Manager - Pm Team
Amazon Oct 2013 - Mar 2015
Senior Manager - Product Management, Kindle Direct Publishing
Amazon Jul 2010 - Oct 2013
Principal Product Manager, Kindle Self Publishing
Amazon Jan 2009 - Jul 2010
Manager, Ww Lean Program
Amazon Aug 2006 - Jan 2009
Manager, Tier 2 Technical Account Management Team
Education:
University of Washington 2002 - 2005
Master of Science, Masters, Management, Engineering
University of Washington - Michael G. Foster School of Business 2002 - 2004
Master of Business Administration, Masters
University of Washington 1997 - 2001
Bachelors, Bachelor of Science, Engineering, Mechanical Engineering
Skills:
Product Management Business Intelligence Cross Functional Team Leadership Analytics E Commerce Six Sigma Operations Management Cloud Computing Supply Chain Account Management Lean Manufacturing Engineering