1
D Chase Franklin, Daniel Rosen, Josh Benaloh, Daniel R Simon: Electronic online commerce card with customer generated transaction proxy number for online transactions. Microsoft Corporation, Lee & Hayes PLLC, December 14, 1999: US06000832 (698 worldwide citation)

An online commerce system facilitates online commerce over a public network using an online commerce card. The "card" does not exist in physical form, but instead exists in digital form. It is assigned a customer account number that includes digits for a prefix number for bank-handling information, ...


2
Vinay Deo, Robert B Seidensticker, Daniel R Simon: Authentication system and method for smart card transactions. Microsoft Corporation, Lee & Hayes PLLC, February 24, 1998: US05721781 (695 worldwide citation)

An authentication system includes a portable information device, such as a smart card, that is configured to store and process multiple different applications. The smart card is assigned its own digital certificate which contains a digital signature from a trusted certifying authority and a unique p ...


3
Terence R Spies, Daniel R Simon: System and method for secure purchase and delivery of video content programs. Microsoft Corporation, Lee & Hayes PLLC, April 25, 2000: US06055314 (610 worldwide citation)

A system and method for secure purchase and delivery of video content programs over various distribution media, including distribution networks and digital video disks, includes an integrated circuit card (e.g., a smart card, PCMCIA card) which is configured to store decryption capabilities for rela ...


4
Matthew W Thomlinson, Daniel R Simon, Bennet Yee: Non-biased pseudo random number generator. Microsoft Corporation, Lee & Hayes PLLC, July 7, 1998: US05778069 (197 worldwide citation)

A computer-implemented pseudo random number generator includes an input device to assemble multiple classes of bits from multiple sources into an input bit string. The multiple classes of bits include an internal class of bits from at least one source internal to the random number generator, such as ...


5
Terrence R Spies, Jeffrey F Spelman, Daniel R Simon: Cryptography system and method for providing cryptographic services for a computer application. Microsoft Corporation, Lee & Hayes PLLC, November 18, 1997: US05689565 (196 worldwide citation)

A cryptography system architecture provides cryptographic functionality to support an application requiring encryption, decryption, signing, and verification of electronic messages. The cryptography system has a cryptographic application program interface (CAPI) which interfaces with the application ...


6
Daniel R Simon: Untraceable electronic cash. Microsoft Corporation, Peter L Michaelson, Michaelson & Wallace, June 16, 1998: US05768385 (167 worldwide citation)

An electronic cash protocol including the steps of using a one-way function f.sub.1 (x) to generate an image f.sub.1 (x.sub.1) from a preimage x.sub.1 ; sending the image f.sub.1 (x.sub.1) in an unblinded form to a second party; and receiving from the second party a note including a digital signatur ...


7
Yi Min Wang, Qixiang Sun, Daniel R Simon, Wilfred Russell: System and method for protecting privacy and anonymity of parties of network communications. Microsoft Corporation, Lee & Hayes PLLC, February 23, 2010: US07669049 (162 worldwide citation)

A system and method is provided for handling network communications between a client and a target server on the Internet to protect the privacy and anonymity of the client. For a session between the client and the target server, a routing control server sets up a routing chain using a plurality of W ...


8
Vinay Deo, David Tuniman, Daniel R Simon: System for transmitting subscription information and content to a mobile device. Microsoft Corporation, Joseph R Kelly, Westman Champlin & Kelly P A, December 17, 2002: US06496928 (65 worldwide citation)

A system controls access to broadcast messages received by a plurality of mobile devices. Selected mobile devices are provided with a broadcast encryption key (BEK). The broadcast messages are encrypted using the BEK prior to broadcasting so that the selected mobile devices containing the BEK can de ...


9
Mark Lucovsky, Shaun D Pierce, Alexander T Weinert, Michael G Burner, Richard B Ward, Paul J Leach, George M Moore, Arthur Zwiegincew, Vivek Gundotra, Robert M Hyman, Jonathan D Pincus, Daniel R Simon: Messaging infrastructure for identity-centric data access. Microsoft Corporation, Workman Nydegger, January 10, 2006: US06985958 (60 worldwide citation)

A messaging data structure for accessing data in an identity-centric manner. An identity may be a user, a group of users, or an organization. Instead of data being maintained on an application-by-application basis, the data associated with a particular identity is stored by one or more data services ...


10
Daniel R Simon, Dirk Balfanz: Enhancing computer system security via multiple user desktops. Microsoft Corporation, July 17, 2007: US07246374 (53 worldwide citation)

Users can create multiple different desktops for themselves and easily switch between these desktops. These multiple desktops are “walled off” from one another, limiting the ability of processes and other subjects in one desktop from accessing objects, such as data files or other processes, in anoth ...