new TOP 200 Companies filing patents this week

new Companies with the Most Patent Filings

David J. Steeves patents

Recent patents with David J. Steeves listed as an inventor - additional entries may be under other spellings.


David J. Steeves - Related organizations: Microsoft Technology Licensing, Llc patents, Microsoft Corporation patents

Risk assessment modeling

10/13/16 - 20160300059 - One or more techniques and/or systems are provided for risk assessment. Historical authentication data and/or compromised user account data may be evaluated to identify a set of authentication context properties associated with user authentication sessions and/or a set of malicious account context properties associated with compromised user accounts (e.g., properties
Inventors: Luke Abrams, David J. Steeves, Robert Alexander Sim, Pui-yin Winfred Wong, Harry Simon Katz, Aaron Small, Dana Scott Kaufman, Adrian Kreuziger, Mark A. Nikiel, Laurentiu Bogdan Cristofor, Alexa Lynn Keizur, Collin Tibbetts, Charles Hayden

Secure online transactions using a trusted digital identity

03/03/16 - 20160063491 - Techniques for conducting secure online transactions are provided. Some techniques utilize a trusted, secure device that is distributed to a human user, and which only the user can access, a device reader, and a one-time secret valid only to authenticate a single transaction to improve on the traditional transaction model
Inventors: David J. Steeves

Risk assessment modeling

11/26/15 - 20150339477 - One or more techniques and/or systems are provided for risk assessment. Historical authentication data and/or compromised user account data may be evaluated to identify a set of authentication context properties associated with user authentication sessions and/or a set of malicious account context properties associated with compromised user accounts (e.g., properties
Inventors: Luke Abrams, David J. Steeves, Robert Alexander Sim, Pui-yin Winfred Wong, Harry Simon Katz, Aaron Small, Dana Scott Kaufman, Adrian Kreuziger, Mark A. Nikiel, Laurentiu Bogdan Cristofor, Alexa Lynn Keizur, Collin Tibbetts, Charles Hayden

Passive security enforcement

10/01/15 - 20150281200 - Technology is described for enabling passive enforcement of security at computing systems. A component of a computing system can passively authenticate or authorize a user based on observations of the user's interactions with the computing system. The technology may increase or decrease an authentication or authorization level based on the
Inventors: David J. Steeves, Kim Cameron, Todd L. Carpenter, David Foster, Quentin S. Miller

Protecting transactions

09/24/15 - 20150269537 - Technology is described for protecting transactions. The technology may include a switching component that a user can employ to switch an associated mobile device into a secure mode so that a user can confirm the transaction. After initiating a transaction request, the user can confirm the transaction request by activating
Inventors: David J. Steeves, Kim Cameron, Todd L. Carpenter, David Foster, Quentin S. Miller, Gregory D. Hartrell

Malicious code infection cause-and-effect analysis

04/09/15 - 20150101010 - A malware analysis system for automating cause and effect analysis of malware infections is provided. The malware analysis system monitors and records computer system activities. Upon being informed of a suspected malware infection, the malware analysis system creates a time-bounded snapshot of the monitored activities that were conducted within a
Inventors: Gregory D. Hartrell, David J. Steeves, Efim Hudis

Malicious code infection cause-and-effect analysis

01/08/15 - 20150013007 - A malware analysis system for automating cause and effect analysis of malware infections is provided. The malware analysis system monitors and records computer system activities. Upon being informed of a suspected malware infection, the malware analysis system creates a time-bounded snapshot of the monitored activities that were conducted within a
Inventors: Gregory D. Hartrell, David J. Steeves, Efim Hudis

Passive security enforcement

08/07/14 - 20140223522 - Technology is described for enabling passive enforcement of security at computing systems. A component of a computing system can passively authenticate or authorize a user based on observations of the user's interactions with the computing system. The technology may increase or decrease an authentication or authorization level based on the
Inventors: David J. Steeves, Kim Cameron, Bradley Carpenter, David Foster, Quentin S. Miller

Communicating state information to legacy clients using legacy protocols

05/01/14 - 20140123257 - When a user account is in an alternate (fault) state, communication or sync between an application provider and a device or client application typically is interrupted. When parties do not support rich fault messaging, communication of the reason for the interruption and remediation steps has been impossible. An application server
Inventors: Ariel N. Gordon, David J. Steeves, Luke T. Abrams, Pui-yin Wong, Krishna C. Vitaldevara

Client-side captcha ceremony for user verification

07/05/12 - 20120174215 - A facility for performing a local human verification ceremony to obtain user verification is provided. Upon determining that user verification is needed to perform an action on a computer system, the facility presents a CAPTCHA challenge requesting verification that the user wants the action performed on the computer system. Upon
Inventors: David J. Steeves

Malicious code infection cause-and-effect analysis

06/07/12 - 20120144490 - A malware analysis system for automating cause and effect analysis of malware infections is provided. The malware analysis system monitors and records computer system activities. Upon being informed of a suspected malware infection, the malware analysis system creates a time-bounded snapshot of the monitored activities that were conducted within a
Inventors: Gregory D. Hartrell, David J. Steeves, Efim Hudis

Malicious code infection cause-and-effect analysis

05/31/12 - 20120137342 - A malware analysis system for automating cause and effect analysis of malware infections is provided. The malware analysis system monitors and records computer system activities. Upon being informed of a suspected malware infection, the malware analysis system creates a time-bounded snapshot of the monitored activities that were conducted within a
Inventors: Gregory D. Hartrell, David J. Steeves, Efim Hudis

Protecting account security settings using strong proofs

09/01/11 - 20110214173 - One or more strong proofs are maintained as associated with an account of a user. In response to a request to change a security setting of the account, an attempt is made to confirm the request by using one of the one or more strong proofs to notify the user.
Inventors: Tarek Bahaa El-din Mahmoud Kamel, Yordan I. Rouskov, David J. Steeves, Rammohan Nagasubramani, Pui-yin Winfred Wong, Weiqiang Michael Guo, Vikas Rajvanshy, Orville C. Mcdonald, Sean Christian Wohlgemuth

Portable secure computing network

11/25/10 - 20100299518 - As provided herein, when using an untrusted network connection, a secure online environment can be created for a remote machine by connecting to a trusted computer with a trusted network connection. A proxy server is installed on a first computing device and shared encryption keys are generated for the first
Inventors: Rajesh Viswanathan, David J. Steeves

Offline device-side logical unit number controller

09/16/10 - 20100235596 - Described is a technology by which a single physical storage device such as a USB flash memory device is able to boot different computing devices via corresponding different operating systems. The storage device includes a selection mechanism that determines which virtual disk (corresponding to a LUN) is seen by the
Inventors: Todd L. Carpenter, David Abzarian, Mark Myers, David J. Steeves

Protecting transactions

07/29/10 - 20100192230 - Technology is described for protecting transactions. The technology may include a switching component that a user can employ to switch an associated mobile device into a secure mode so that a user can confirm the transaction. After initiating a transaction request, the user can confirm the transaction request by activating
Inventors: David J. Steeves, Kim Cameron, Todd L. Carpenter, David Foster, Quentin S. Miller, Gregory D. Hartrell

Passive security enforcement

07/29/10 - 20100192209 - Technology is described for enabling passive enforcement of security at computing systems. A component of a computing system can passively authenticate or authorize a user based on observations of the user's interactions with the computing system. The technology may increase or decrease an authentication or authorization level based on the
Inventors: David J. Steeves, Kim Cameron, Todd L. Carpenter, David Foster, Quentin S. Miller

Device-side inline pattern matching and policy enforcement

04/08/10 - 20100088759 - Inline pattern matching and policy enforcement may be implemented by a memory storage device. In an example embodiment, a device-implemented method includes acts of receiving, intercepting, and performing and conditional acts of invoking or permitting. A request from a host to perform a memory access operation is received at a
Inventors: David Abzarian, Todd L. Carpenter, Harish S. Kulkarni, Mark A. Myers, David J. Steeves

Two stage access control for intelligent storage device

02/11/10 - 20100037319 - Systems and methods that resist malicious attacks on an intelligent storage device via an access control component that supplies security at a dual layer of defense. Such dual layer defense encompasses both resistance to brute force (e.g., unauthorized users), and resistance to a replay attack (e.g., a malicious code residing
Inventors: David J. Steeves, Cormac E. Herley


### David J. Steeves patent invention listings

The bibliographic references displayed about David J. Steeves's patents are for a recent sample of David J. Steeves's publicly published patent applications. The inventor/author may have additional bibliographic citations listed at the USPTO.gov. FreshPatents.com is not associated or affiliated in any way with the author/inventor or the United States Patent/Trademark Office but is providing this non-comprehensive sample listing for educational and research purposes using public bibliographic data published and disseminated from the United States Patent/Trademark Office public datafeed. This information is also available for free on the USPTO.gov website. If David J. Steeves filed recent patent applications under another name, spelling or location then those applications could be listed on an alternate page. If no bibliographic references are listed here, it is possible there are no recent filings or there is a technical issue with the listing--in that case, we recommend doing a search on the USPTO.gov website.

###



Sign up for the FreshPatents.com FREE Keyword Monitor and check for keyword phrases (ie. "RFID" , "wireless", "web development", "fuel cells" etc.)...You will be notified when new patent applications and inventions are published that match your keywords. Also you can save for later research public patent/invention documents using our FREE Organizer. It takes only 30 seconds to sign up or login.

Advertise on FreshPatents.com - Rates & Info

###

FreshPatents.com Support - Terms & Conditions