1
D Chase Franklin, Daniel Rosen, Josh Benaloh, Daniel R Simon: Electronic online commerce card with customer generated transaction proxy number for online transactions. Microsoft Corporation, Lee & Hayes PLLC, December 14, 1999: US06000832 (698 worldwide citation)

An online commerce system facilitates online commerce over a public network using an online commerce card. The "card" does not exist in physical form, but instead exists in digital form. It is assigned a customer account number that includes digits for a prefix number for bank-handling information, ...


2
Bennet Yee, Josh Benaloh: System and method for self-identifying a portable information device to a computing unit. Microsoft Corporation, Lee & Hayes PLLC, July 14, 1998: US05781723 (190 worldwide citation)

A system includes a portable information device and a computing unit, and is architected to enable the portable information device to identify its type and properties to the computing unit. The portable information device has a processor and a memory. The memory stores a device class tag which is in ...


3
Iulian D Calinov, Danpo Zhang, Jonathan Wilkins, Julien Couvreur, Josh Benaloh: Prevention of unauthorized scripts. Microsoft Corporation, Senniger Powers, October 20, 2009: US07606915 (59 worldwide citation)

Methods and system of preventing unauthorized scripting. The invention includes providing one or more tests to a user for distinguishing the user from a machine when the user requests access to the server. By storing information on a correct solution to the test in a block of data and sending the bl ...


4
Daniel R Simon, Josh Benaloh, Donald D Chinn, Gregory Hitchcock, David Meltzer: System and method for secure font subset distribution. Microsoft Corporation, Lee & Hayes PLLC, May 16, 2000: US06065008 (52 worldwide citation)

This invention concerns a system and method for securely distributing subsetted fonts from a distributor to a client. The system includes a signing module to construct an authentication tree having leaves formed of glyphs, one or more intermediate levels of nodes computed as one-way functions of the ...


5
Josh Benaloh, Wei Dai: Computer-implemented method and computer for performing modular reduction. Microsoft Corporation, Lee & Hayes PLLC, March 3, 1998: US05724279 (36 worldwide citation)

This invention provides a computer-implemented method for performing a modular reduction operation "X mod M" and doing modular arithmetic on a computer. In a first stage of the method, the number X=, written in base .alpha., is reduced from k+1 blocks to an n+1 block integer Y that is equivalent to ...


6
Patrice Y Simard, Richard Stephen Szeliski, Josh Benaloh, Iulian D Calinov, Julien D Couvreur: Content alteration for prevention of unauthorized scripts. Microsoft Corporation, Senniger Powers, November 24, 2009: US07624277 (34 worldwide citation)

Methods for preventing unauthorized scripting. The invention generates a human interactive proof to distinguish a human from a machine by generating a random set of characters and altering each of the characters individually to inhibit computerized character recognition. The invention also includes ...


7
Ling Tony Chen, Josh Benaloh: Licensing the use of software on a particular CPU. Microsoft Corporation, Woodcock Washburn, June 23, 2009: US07552341 (30 worldwide citation)

Software is licensed for use on a particular computing device, such as a gaming console or a multimedia console. An unlocking code is provided from a distribution service to the computing device (either directly or via a user), which in turn, unlocks the appropriate software or portion of software f ...


8
Josh Benaloh, Ismail Cem Paya: System and method for non-interactive human answerable challenges. Microsoft, Lyon & Harr, Katrina A Lyon, February 26, 2008: US07337324 (21 worldwide citation)

A system and method for automatically determining if a computer user is a human or an automated script. Human interactive proofs (HIPs) are currently used to deter automated registration for web services by automated computer scripts. Unfortunately, HIPs entail multiple steps (request service, recei ...


9
James M Alkove, Clifford P Van Dyke, Eduardo Oliveira, Josh Benaloh, Troy Batterberry: Rendering protected digital content within a network of computing devices or the like. Woodcock Washburn, Woodcock Washburn, October 14, 2008: US07437771 (12 worldwide citation)

Transmitter and receiver computing device are interconnected by a network. The transmitter transmits protected digital content to the receiver in a manner so that the receiver can access the content even though the content is directly licensed to the transmitter and not the receiver.


10
Trevor William Freeman, Josh Benaloh, K John Biccum, Atul Kumar Shah: One time password key ring for mobile computing device. Microsoft Corporation, July 24, 2012: US08230231 (10 worldwide citation)

Single-use character combinations are a secure mechanism for user authentication. Such “one-time passwords” (OTPs) can be generated by a mobile device to which the user otherwise maintains easy access. A key exchange, such as in accordance with the Diffie-Hellman algorithm, can provide both the mobi ...