1
Barbara L Fox, Lester L Waters, Jeffrey F Spelman, Robert B Seidensticker, Matthew W Thomlinson: System and method for secure electronic commerce transactions. Microsoft Corporation, Lee & Hayes PLLC, August 4, 1998: US05790677 (708 worldwide citation)

An electronic commerce system facilitates secure electronic commerce transactions among multiple participants. Each electronic commerce transaction involves at least one commerce document defining the transaction and at least one commerce instrument defining a payment for the transaction. The electr ...


2
Barbara L Fox, Lester L Waters, Jeffrey F Spelman, Robert B Seidensticker, Matthew W Thomlinson: System and method for secure electronic commerce transaction. Visa International Service Association, Townsend and Townsend and Crew, May 6, 2003: US06560581 (349 worldwide citation)

An electronic commerce system facilitates secure electronic commerce transactions among multiple participants. Each electronic commerce transaction involves at least one commerce document defining the transaction and at least one commerce instrument defining a payment for the transaction. The electr ...


3
Matthew W Thomlinson, Daniel R Simon, Bennet Yee: Non-biased pseudo random number generator. Microsoft Corporation, Lee & Hayes PLLC, July 7, 1998: US05778069 (197 worldwide citation)

A computer-implemented pseudo random number generator includes an input device to assemble multiple classes of bits from multiple sources into an input bit string. The multiple classes of bits include an internal class of bits from at least one source internal to the random number generator, such as ...


4
Matthew W Thomlinson, Scott Field, Allan Cooper: Method and system for securely archiving core data secrets. Microsoft Corporation, Lee & Hayes PLLC, March 28, 2000: US06044155 (187 worldwide citation)

The invention provides central storage for core data secrets, referred to as data items. The data items are encrypted by a client computer using a client key that is derived from a logon secret, such as a password, supplied by a user during a network logon procedure. The client key is escrowed with ...


5
Matthew W Thomlinson, Scott Field, Allan Cooper: Protected storage of core data secrets. Microsoft Corporation, Lee & Hayes PLLC, August 7, 2001: US06272631 (146 worldwide citation)

The invention provides central storage for core data secrets, referred to as data items. The architecture includes a storage server, a plurality of installable storage providers, and one or more authentication providers. Programming interfaces are exposed so that application programs can utilize the ...


6
Matthew W Thomlinson: Adapting input to find integer overflows. Microsoft Corporation, Lee & Hayes PLLC, January 13, 2009: US07478428 (90 worldwide citation)

Systems and methods are described for use in evaluating an application for security risks related to integer overflow conditions in conjunction with memory allocations. The evaluation includes finding a relationship between data input to the application and memory allocation requests made by the app ...


7
Matthew W Thomlinson, Scott Field, Allan Cooper: Cryptographic protection of core data secrets. Microsoft Corporation, Lee & Hayes PLLC, May 14, 2002: US06389535 (57 worldwide citation)

Described herein is a system for protecting data from unauthorized access. The system uses a central service provider with exposed complementary interfaces: a data protect function that accepts clear data and returns an encrypted representation of the data, and a data unprotect function that accepts ...


8
John R Douceur, Michael P Calligaro, Matthew W Thomlinson: Coercion resistant one-time-pad cryptosystem that facilitates transmission of messages having different levels of security. Microsoft Corporation, Lee & Hayes PLLC, February 1, 2000: US06021203 (50 worldwide citation)

A protocol is provided for transmitting low security messages and high security messages with one-time-pad cryptosystem. In one implementation of the present invention, low security messages are encrypted using random bit strings in accordance with a one-time-pad encryption scheme. A high security m ...


9
Jeffrey F Spelman, Matthew W Thomlinson: Root key compromise recovery. Microsoft Corporation, Peter L Michaelson, Michaelson & Wallace, October 21, 1997: US05680458 (41 worldwide citation)

A method of recovering from a compromise of a root key which is the private key of a first public key-private key pair, the method including the steps of electronically sending out an emergency message indicating that the root key has been compromised and also containing a replacement key and a digi ...


10
Matthew W Thomlinson, Scott Field: Protected storage of core data secrets. Microsoft Corporation, Lee & Hayes PLLC, March 11, 2003: US06532542 (35 worldwide citation)

The invention provides central storage for core data secrets, referred to as data items. The architecture includes a storage server, a plurality of installable storage providers, and one or more authentication providers. Programming interfaces are exposed so that application programs can utilize the ...