1
Trevin M Chow, Colin Chow, Pui Yin Winfred Wong, Dilip K Pai, Sanjeev M Nagvekar, Wei Jiang, Yordan I Rouskov: Multiple security token transactions. Microsoft Corporation, Lee & Hayes PLLC, July 17, 2012: US08225385 (66 worldwide citation)

Embodiments of multiple security token transactions are described herein. One or more of the described techniques may be utilized to provide, in a single request and response, an authentication token and a plurality security tokens for proof of identity at respective service providers.


2
Ismail Cem Paya, Josh D Benaloh, Raja P Perumal, Trevin M Chow, Erren Dusan Lester, Jeffrey Steinbok, Julien D Couvreur: Human interactive proof service. Microsoft Corporation, Lee & Hayes PLLC, May 12, 2009: US07533419 (13 worldwide citation)

A human interactive proof (HIP) service is described. In response to a request from a web server, the HIP service generates a HIP challenge and an associated attestation. The web server can then embed the generated HIP challenge in a requested web page. The attestation is used to determine whether o ...


3
Erren Dusan Lester, Kok Wai Chan, Lynn C Ayres, Naresh Jain, Rui Chen, Trevin M Chow: Multiuse web service sign-in client side components. Microsoft Technology Licensing, Bryan Webster, Kate Drakos, Micky Minhas, March 31, 2015: US08997189 (1 worldwide citation)

Embodiments of multi-user web service sign-in client side components are presented herein. In an implementation, the currently authenticated user account of a first application of a client is transferred to another application of a client. In another implementation, a common credential store is used ...


4
Erren Dusan Lester, Lynn C Ayres, Trevin M Chow, Kok Wai Chan, Rui Chen, Naresh Jain: Multiuser web service sign-in client side components. Microsoft Corporation, Lee & Hayes PLLC, June 4, 2013: US08458775 (1 worldwide citation)

Embodiments of multi-user web service sign-in client side components are presented herein. In an implementation, the currently authenticated user account of a first application of a client is transferred to another application of a client. In another implementation, a common credential store is used ...


5
Michael C Kunz, Lynn C Ayres, Trevin M Chow, Erren Dusan Lester, Campbell D Gunn: Persistent public machine setting. Microsoft Corporation, Lee & Hayes PLLC, October 2, 2012: US08280979 (1 worldwide citation)

Disclosed herein are methods for protecting user information on a client device that may have a plurality of users. A user interface with a public machine designation portion is presented to a user prior to the start of the authentication process. The public machine designation removes web service a ...


6
Trevin M Chow, Pui Yin Winfred Wong, Yordan I Rouskov, Kok Wai Chan, Wei Jiang, Colin Chow, Sanjeev M Nagvekar, Matt Sullivan, Kalyan Sayyaparaju, Dilip K Pai, Avinash Belur: Short-lived certificate authority service. Microsoft Corporation, Lee & Hayes PLLC, December 25, 2012: US08341718 (1 worldwide citation)

An integrated authentication service is described which may receive a bundled request from one or more clients. One or more of the described techniques may be utilized to provide, in response to a single bundled request, a token for proof of identity and a certificate for establishing secure communi ...


7
Michael C Kunz, Lynn C Ayres, Trevin M Chow, Erren Dusan Lester, Campbell D Gunn: Persistent public machine setting. Microsoft Technology Licensing, Bryan Webster, Judy Yee, Micky Minhas, November 22, 2016: US09503440

Disclosed herein are methods for protecting user information on a client device that may have a plurality of users. A user interface with a public machine designation portion is presented to a user prior to the start of the authentication process. The public machine designation removes web service a ...


8
Michael C Kunz, Lynn C Ayres, Trevin M Chow, Erren Dusan Lester, Campbell D Gunn: Persistent public machine setting. Microsoft Corporation, Carole A Boelitz, Micky Minhas, March 4, 2014: US08667608

Disclosed herein are methods for protecting user information on a client device that may have a plurality of users. A user interface with a public machine designation portion is presented to a user prior to the start of the authentication process. The public machine designation removes web service a ...


9
Erren Dusan Lester, Jason C Fluegel, Jeffrey Steinbok, Katrina M Blanch, Mark K Wong, Ranjib S Badh, Rui Chen, Trevin M Chow: Login screen with identifying data. Microsoft Corporation, Lee & Hayes PLLC, March 9, 2010: US07676833

Techniques are described which may be employed to provide a login screen with identifying data. In an implementation, a login screen is displayed having an image that identifies a user. Credentials are received via the login screen to log the user onto a service provider over a network.


10
Trevin M Chow, Asim Memon, Dilip K Pai, Naresh Jain, Wei Jiang, Yordan I Rouskov: Scheduling of software updates. Microsoft Corporation, Lee & Hayes Pllc, May 24, 2007: US20070118530-A1

Software updates are described. In an implementation, a method includes forming an authentication request to be communicated to an authentication service over a network that includes a version identifier of at least one application module of a client. A response is received to the authentication req ...