1
Paul England, John D DeTreville, Butler W Lampson: Digital rights management operating system. Microsoft Corporation, Lee & Hayes PLLC, December 11, 2001: US06330670 (502 worldwide citation)

A digital rights management operating system protects rights-managed data, such as downloaded content, from access by untrusted programs while the data is loaded into memory or on a page file as a result of the execution of a trusted application that accesses the memory. To protect the rights-manage ...


2
Paul England, John D DeTreville, Butler W Lampson: Loading and identifying a digital rights management operating system. Microsoft Corporation, Lee & Hayes PLLC, December 4, 2001: US06327652 (452 worldwide citation)

The identity of an operating system running on a computer is determined from an identity associated with an initial component for the operating system, combined with identities of additional components that are loaded afterwards. Loading of a digital rights management operating system on a subscribe ...


3
Paul England, John D DeTreville, Butler W Lampson: Controlling access to content based on certificates and access predicates. Microsoft Corporation, Lee & Hayes PLLC, November 16, 2004: US06820063 (121 worldwide citation)

Digital rights for content downloaded to a subscriber computer from a provider are specified in an access predicate. The access predicate is compared with a rights manager certificate associated with an entity, such as an application, that wants access to the content. If the rights manager certifica ...


4
John D DeTreville: Item selection by prediction and refinement. Digital Equipment Corporation, Dirk Brinkman, Pennie & Edmonds, June 20, 2000: US06078740 (83 worldwide citation)

In a computerized method for predicting a particular user preference for an item based on observations made about the item by other users, client computers are used to enter the observations about the items. The observations are forwarded to a server computer via a network. The observations are coll ...


5
Paul England, John D DeTreville, Butler W Lampson: Key-based secure storage. Microsoft Corporation, Lee & Hayes PLLC, March 20, 2007: US07194092 (54 worldwide citation)

Secure storage for downloaded content on a subscriber computer is keyed to a trusted digital rights management operating system, a trusted application, a trusted user or a combination thereof. A one-way hash function is applied to a seed supplied by an application to produce a hashed seed that is us ...


6
Paul England, John D DeTreville, Butler W Lampson: System and method for authenticating an operating system to a central processing unit, providing the CPU/OS with secure storage, and authenticating the CPU/OS to a third party. Microsoft Corporation, Lee & Hayes PLLC, February 6, 2007: US07174457 (41 worldwide citation)

A general-purpose processor (CPU) is configured with a new mechanism facilitating an authenticated boot sequence that provides building blocks for client-side rights management when the system is online, and provides continued protection of persistent data even when the system goes offline or is reb ...


7
Bryan M Willman, Paul England, John D DeTreville: Method and system for restricting the load of physical address translations of virtual addresses. Microsoft Corporation, Leydig Voit & Mayer, June 1, 2004: US06745306 (29 worldwide citation)

A method and system for protecting data on a computer system uses one or more restricted areas of memory to store proprietary or confidential data. The translation lookaside buffer (TLB) is used to regulate access to the restricted memory. When a TLB miss occurs during the execution of a program, th ...


8
John D DeTreville: Method and system for detecting pirated content. Microsoft Corporation, Lee & Hayes PLLC, September 9, 2008: US07424747 (26 worldwide citation)

A content player can detect pirated content by storing a list of highly compressed content pieces that correspond to different pieces of content (e.g., audio content, video content, audio/video content, etc.). A piece of content to be played back by the content player is compared to the highly compr ...


9
Paul England, John D DeTreville, Butler W Lampson: Key-based secure storage. Microsoft Corporation, November 27, 2007: US07302709 (24 worldwide citation)

A one-way hash function is applied to a seed supplied by an application to produce a hashed seed that is used to generate the application storage key. A one-way hash function is applied to a seed supplied by a user to produce a first hashed seed that is passed to a keyed hash function, which is keye ...


10
Galen C Hunt, Thomas Roeder, James R Larus, Manuel Fahndrich, John D DeTreville, Steven P Levi, Benjamin Zorn, Wolfgang Grieskamp: Self-describing artifacts and application abstractions. Microsoft Corporation, Lee & Hayes PLLC, November 11, 2008: US07451435 (20 worldwide citation)

Described herein is at least one implementation employing multiple self-describing software artifacts persisted on one or more computer-storage media of a software-based computer. In this implementation, each artifact is representative of at least part of the software components (e.g., load modules, ...