new TOP 200 Companies filing patents this week

new Companies with the Most Patent Filings

Innokentiy Basmov patents

Recent patents with Innokentiy Basmov listed as an inventor - additional entries may be under other spellings.


Innokentiy Basmov - Related organizations: Microsoft Technology Licensing, Llc patents, Microsoft Corporation patents

Map-based rapid data encryption policy compliance

01/05/17 - 20170004094 - To comply with a policy for a computing device indicating that data written by the computing device to the storage volume after activation of the policy be encrypted, a sector map is accessed. The sector map identifies one or more sectors of a storage volume and also identifies, for each
Inventors: Innokentiy Basmov, Magnus Bo Gustaf Nyström, Alex M. Semenko, Douglas M. Maciver, Donghui Li

Secure key management for roaming protected content

03/17/16 - 20160080149 - Content on a device is encrypted and protected based on a data protection key corresponding to a particular identity of the user of the device. The protected content can then be stored to cloud storage, and from the cloud storage the protected content can be transferred to various other ones
Inventors: Yogesh A. Mehta, Innokentiy Basmov, Octavian T. Ureche, Peter J. Novotney, Preston Derek Adam, Mugdha Lakhani, Saurav Sinha, Narendra S. Acharya, Karanbir Singh

Preserving data protection with policy

03/10/16 - 20160072796 - Data files are encrypted based on a key associated with an entity that sets a data protection policy controlling access to the data files. The data protection policy identifies various restrictions on how the plaintext data of the encrypted data in the data files can be used. The data files
Inventors: Preston Derek Adam, Narendra S. Acharya, Innokentiy Basmov, Octavian T. Ureche, Yogesh A. Mehta, Alex M. Semenko

Rapid data protection for storage devices

09/24/15 - 20150270956 - A computing device uses a data encryption and decryption system that includes a trusted runtime and an inline cryptographic processor. The trusted runtime provides a trusted execution environment, and the inline cryptographic processor provides decryption and encryption of data in-line with storage device read and write operations. When a portion
Inventors: Innokentiy Basmov, Magnus Bo Gustaf Nyström, Niels T. Ferguson, Alex M. Semenko

Accessing data in a compressed container through dynamic redirection

06/11/15 - 20150161155 - Embodiments of the disclosure provide access to data in a compressed container through dynamic redirection, without storing decompressed data in persistent memory. The compressed container is stored in a first portion of memory. User data and reference files, with redirect pointers, for accessing corresponding files in the compressed container are
Inventors: Richard A. Pletcher, Malcolm J. Smith, Alain F. Gefflaut, Alex Bendetov, Andrey Shedel, David J. Linsley, Aaron M. Farmer, James Aaron Holmes, Troy E. Shaw, Emily N. Wilson, Innokentiy Basmov, Michael J. Grass, Alex M. Semenko, Scott D. Anderson, Kinshuman Kinshumann

Sector map-based rapid data encryption policy compliance

01/29/15 - 20150033039 - To comply with a policy for a computing device indicating that data written by the computing device to the storage volume after activation of the policy be encrypted, a sector map is accessed. The sector map identifies one or more sectors of a storage volume and also identifies, for each
Inventors: Innokentiy Basmov, Magnus Bo Gustaf Nyström, Alex M. Semenko, Douglas M. Maciver, Donghui Li

Gesture-based authentication without retained credentialing gestures

12/18/14 - 20140373132 - This document describes techniques and apparatuses enabling gesture-based authentication without retained credentialing gestures. The techniques are capable of determining an identifier for a credentialing gesture where the identifier can be reproduced on receiving a similar authentication gesture at a later time. The identifier for the credentialing gesture can be encrypted,
Inventors: Innokentiy Basmov, Jeffrey Jay Johnson

Securely obtaining memory content after device malfunction

12/18/14 - 20140372740 - One or more techniques and/or systems are provided for securely obtaining memory content after a device malfunction. For example, applications, components, and/or an operating system of a device may maintain information within volatile memory in a secure manner (e.g., using encryption). When the device malfunctions, such information may be useful
Inventors: Alex Mark Semenko, Kirsten Valery Stark, Innokentiy Basmov, Kevin Chin, Scott Chao-chueh Lee

Data protection for organizations on computing devices

11/20/14 - 20140344571 - An application on a device can communicate with organization services. The application accesses a protection system on the device, which encrypts data obtained by the application from an organization service using an encryption key, and includes with the data an indication of a decryption key usable to decrypt the encrypted
Inventors: Preston Derek Adam, Peter J. Novotney, Nathan J. Ide, Innokentiy Basmov, Narendra S. Acharya, Octavian T. Ureche, Saurav Sinha, Gopinathan Kannan, Christopher R. Macaulay, Michael J. Grass

Data protection for organizations on computing devices

11/20/14 - 20140344570 - An application on a device can communicate with organization services. The application accesses a protection system on the device, which encrypts data obtained by the application from an organization service using an encryption key, and includes with the data an indication of a decryption key usable to decrypt the encrypted
Inventors: Preston Derek Adam, Peter J. Novotney, Nathan J. Ide, Innokentiy Basmov, Narendra S. Acharya, Octavian T. Ureche, Saurav Sinha, Gopinathan Kannan, Christopher R. Macaulay, Michael J. Grass

Rollback protection for login security policy

12/26/13 - 20130346757 - In one embodiment, an encryption system may protect user login metadata from hammering attacks. A data storage 140 may store an integrity protected data set 602 for an operating system in a storage location. A processor 120 may register a counter reading from a remote counter 202 in a secure
Inventors: Benjamin Nick, Magnus Nystrom, Innokentiy Basmov, Peter Novotney, Micheal Grass

Cryptographic key attack mitigation

11/21/13 - 20130311786 - Cryptographic keys and, subsequently, the data they are intended to protect, are safeguarded from unwarranted attacks utilizing various systems and methodologies designed to minimize the time period in which meaningful versions of cryptographic keys exist in accessible memory, and therefore, are vulnerable. Cryptographic keys, and consequently the data they are
Inventors: Octavian T. Ureche, Innokentiy Basmov, Grigory B. Lyakhovitskiy, Stefan Thom

Sector map-based rapid data encryption policy compliance

02/28/13 - 20130054979 - To comply with a policy for a computing device indicating that data written by the computing device to the storage volume after activation of the policy be encrypted, a sector map is accessed. The sector map identifies one or more sectors of a storage volume and also identifies, for each
Inventors: Innokentiy Basmov, Magnus Bo Gustaf Nyström, Alex M. Semenko, Douglas M. Maciver, Donghui Li

Encrypted chunk-based rapid data encryption policy compliance

02/28/13 - 20130054977 - To comply with a policy for a computing device indicating that data written by the computing device to the storage volume after activation of the policy be encrypted, an encrypted chunks map is accessed. The encrypted chunks map identifies whether, for each chunk of sectors of a storage volume, the
Inventors: Innokentiy Basmov, Alex M. Semenko, Dustin L. Green, Magnus Bo Gustaf Nyström

Cryptographic key attack mitigation

11/01/12 - 20120275596 - Cryptographic keys and, subsequently, the data they are intended to protect, are safeguarded from unwarranted attacks utilizing various systems and methodologies designed to minimize the time period in which meaningful versions of cryptographic keys exist in accessible memory, and therefore, are vulnerable. Cryptographic keys, and consequently the data they are
Inventors: Octavian T. Ureche, Innokentiy Basmov, Grigory B. Lyakhovitskiy, Stefan Thom

Single-use authentication methods for accessing encrypted data

12/22/11 - 20110314279 - Single-use authentication methods for accessing encrypted data stored on a protected volume of a computer are described, wherein access to the encrypted data involves decrypting a key protector stored on the computer that holds a volume-specific cryptographic key needed to decrypt the protected volume. Such single-use authentication methods rely on
Inventors: Octavian T. Ureche, Nils Dussart, Charles G. Jeffries, Cristian M. Ilac, Vijay G. Bharadwaj, Innokentiy Basmov, Stefan Thom, Son Voba

Key protectors based on online keys

12/08/11 - 20110302398 - An online key stored by a remote service is generated or otherwise obtained, and a storage media (as it applies to the storage of data on a physical or virtual storage media) master key for encrypting and decrypting a physical or virtual storage media or encrypting and decrypting one or
Inventors: Octavian T. Ureche, Nils Dussart, Michael A. Halcrow, Charles G. Jeffries, Nathan T. Lewis, Cristian M. Ilac, Innokentiy Basmov, Bo Gustaf Magnus Nystr+e,uml O+ee M, Niels T. Ferguson

Data encryption conversion for independent agents

12/01/11 - 20110296238 - The re-encryption of data can be performed with independent cryptographic agents that can automatically encrypt and decrypt data in accordance with cryptographic regions, such that data within a single cryptographic region is encrypted and decrypted with the same cryptographic key. An “in-place” re-encryption can be performed by reading data from
Inventors: David Abzarian, Darren Glen Moss, Grigory Borisovich Lyakhovitskiy, Karan Mehra, Innokentiy Basmov, Octavian T. Ureche

Use of software update policies

04/14/11 - 20110088025 - A portable device may be roamed from one host to another. In one example, the portable device stores software that is to be executed by a host. The host may maintain a policy that governs which software may be executed on the host. When the portable device is connected to
Inventors: Innokentiy Basmov, Troy A. Funk, Octavian T. Ureche


### Innokentiy Basmov patent invention listings

The bibliographic references displayed about Innokentiy Basmov's patents are for a recent sample of Innokentiy Basmov's publicly published patent applications. The inventor/author may have additional bibliographic citations listed at the USPTO.gov. FreshPatents.com is not associated or affiliated in any way with the author/inventor or the United States Patent/Trademark Office but is providing this non-comprehensive sample listing for educational and research purposes using public bibliographic data published and disseminated from the United States Patent/Trademark Office public datafeed. This information is also available for free on the USPTO.gov website. If Innokentiy Basmov filed recent patent applications under another name, spelling or location then those applications could be listed on an alternate page. If no bibliographic references are listed here, it is possible there are no recent filings or there is a technical issue with the listing--in that case, we recommend doing a search on the USPTO.gov website.

###



Sign up for the FreshPatents.com FREE Keyword Monitor and check for keyword phrases (ie. "RFID" , "wireless", "web development", "fuel cells" etc.)...You will be notified when new patent applications and inventions are published that match your keywords. Also you can save for later research public patent/invention documents using our FREE Organizer. It takes only 30 seconds to sign up or login.

Advertise on FreshPatents.com - Rates & Info

###

FreshPatents.com Support - Terms & Conditions