1
Stephen J Purpura: Method and system for authentication and single sign on using cryptographically assured cookies in a distributed computer environment. First Data Corporation, Robert B Beyers, Joseph Yang, Skadden Arps, July 16, 2002: US06421768 (159 worldwide citation)

Cryptographically assured data structures are created to enable a single sign on and/or authentication method for securely transferring user authentication information from a first computer to a second computer to allow the user to seamlessly interact with the second computer without necessarily re- ...


2
Yehuda Feuerstein, Jared E Pfost, Stephen J Purpura: Security component for a computing device. Microsoft Corporation, Lee & Hayes PLLC, June 6, 2006: US07058978 (79 worldwide citation)

A security component determines whether a request for a resource poses a security risk to a computing device and verifies the integrity of the requested resource before the request is allowed. For a request having arguments and a resource path with a filename that identifies the resource, the securi ...


3
Darren Mitchell, Cem Paya, Rajeev Dujari, Stephen J Purpura, Aaron R Goldfeder, Frank M Schwieterman: Method and system for protecting internet users privacy by evaluating web site platform for privacy preferences policy. Microsoft Corporation, Law Offices of Albert S Michalik PLLC, October 25, 2005: US06959420 (40 worldwide citation)

A system and method that evaluates privacy policies from web sites to determine whether each site is permitted to perform operations (e.g., store, retrieve or delete) directed to cookies on a user's computer. Various properties of each cookie and the context in which it is being used are evaluated a ...


4
Aaron Goldfeder, Cem Paya, Joseph J Gallagher, Roberto A Franco, Stephen J Purpura, Darren Mitchell, Frank M Schwieterman, Viresh Ramdatmisier: Internet privacy user interface. Microsoft Corporation, April 24, 2012: US08166406 (22 worldwide citation)

A method and system that provide an intuitive user interface and related components for making Internet users aware of Internet cookie-related privacy issues, and enabling users to control Internet privacy through automatic cookie handling. Default privacy settings for handling cookies are provided, ...


5
Aaron R Goldfeder, Cem Paya, Frank M Schwieterman, Darren Mitchell, Rajeev Dujari, Stephen J Purpura: Method and system for protecting internet users privacy by evaluating web site platform for privacy preferences policy. Microsoft Corporation, November 3, 2009: US07614002 (18 worldwide citation)

A system and method that evaluates privacy policies from web sites to determine whether each site is permitted to perform operations (e.g., store, retrieve or delete) directed to cookies on a user's computer. Various properties of each cookie and the context in which it is being used are evaluated a ...


6
Ismail Cem Paya, Trevin Chow, Stephen J Purpura: Managing state information across communication sessions between a client and a server via a stateless protocol. Microsoft Corporation, Senniger Powers, December 15, 2009: US07634570 (5 worldwide citation)

Managing state information across communication sessions between a client and a server via a stateless protocol. The server delivers to the client a cacheable web page with a hyperlink to non-cacheable embedded content. In the hyperlink to the non-cacheable embedded content, the server adds a token ...


7
Yehuda Feuerstein, Jared E Pfost, Stephen J Purpura: Security component for a computing device. Microsoft Corporation, Lee & Hayes PLLC, June 30, 2009: US07555781 (1 worldwide citation)

A security component determines whether a request for a resource poses a security risk to a computing device and verifies the integrity of the requested resource before the request is allowed. For a request having arguments and a resource path with a filename that identifies the resource, the securi ...


8
Ismail Cem Paya, Trevin Chow, Stephen J Purpura: Managing state information across communication sessions between a client and a server via a stateless protocol. Microsoft Corporation, Senniger Powers Leavitt And Roedel, September 16, 2004: US20040181598-A1

Managing state information across communication sessions between a client and a server via a stateless protocol. The server delivers to the client a cacheable web page with a hyperlink to non-cacheable embedded content. In the hyperlink to the non-cacheable embedded content, the server adds a token ...


9
Yehuda Feuerstein, Jared E Pfost, Stephen J Purpura: Security component for a computing device. Lee & Hayes Pllc, June 27, 2002: US20020083341-A1

A security component determines whether a request for a resource poses a security risk to a computing device and verifies the integrity of the requested resource before the request is allowed. For a request having arguments and a resource path with a filename that identifies the resource, the securi ...


10
Darren Mitchell, Cem Paya, Rajeev Dujari, Stephen J Purpura, Aaron R Goldfeder, Frank M Schwieterman: Method and system for protecting internet users privacy by evaluating web site platform for privacy preferences policy. Microsoft Corporation, Law Offices Of Albert S Michalik Pllc, November 17, 2005: US20050257250-A1

A system and method that evaluates privacy policies from web sites to determine whether each site is permitted to perform operations (e.g., store, retrieve or delete) directed to cookies on a user's computer. Various properties of each cookie and the context in which it is being used are evaluated a ...