1
Yuqun Chen, Mohammed Moinuddin, Yacov Yacobi: Mobile wallet and digital payment. Microsoft Corporation, October 18, 2011: US08041338 (61 worldwide citation)

The claimed subject matter provides a system and/or a method that facilitates securing a wireless digital transaction. A terminal component can receive a portion of data related to a payment for at least one of a good or a service. A mobile device can include at least one mobile payment card (m-card ...


2

3
Yuqun Chen, Darko Kirovski, Yacov Yacobi, Gideon A Yuval: Counterfeit and tamper resistant labels with randomly occurring features. Microsoft Corporation, Lee & Hayes PLLC, March 3, 2009: US07497379 (31 worldwide citation)

Techniques are disclosed to enable utilization of randomly-occurring features of a label (whether embedded or naturally inherent) to provide counterfeit-resistant and/or tamper-resistant labels. More specifically, labels including randomly-occurring features are scanned to determine the labels' feat ...


4
Saurabh Sinha, Mariusz H Jakubowski, Ramarathnam Venkatesan, Yuqun Chen, Matthew Cary, Ruoming Pang: Integrity ordainment and ascertainment of computer-executable instructions with consideration for execution context. Microsoft Corporation, Lee & Hayes PLLC, June 5, 2007: US07228426 (28 worldwide citation)

An implementation of a technology, described herein, for facilitating the protection computer-executable instructions, such as software. At least one implementation, described herein, may generate integrity signatures of one or more program modules—which are sets of computer-executable instructions— ...


5
Yuqun Chen, Ramarathnam Venkatesan, Mariusz H Jakubowski: Secure and opaque type library providing secure data protection of variables. Microsoft Corporation, Merchant & Gould P C, August 7, 2007: US07254586 (16 worldwide citation)

A method, apparatus, and article of manufacture for providing secure and opaque type libraries to automatically provide secure variables within a programming module. A system for providing secure and opaque type libraries to automatically provide secure variables within a programming module. The sys ...


6
Yuqun Chen, Zicheng Liu, Mariusz H Jakubowski, Yacov Yacobi: Data protection for a mobile device. Microsoft Corporation, June 7, 2011: US07957532 (15 worldwide citation)

A network-based data protection scheme for a mobile device utilizes encryption techniques and a remote key server that stores encryption keys on behalf of the mobile device. The mobile device stores encrypted data, preferably having no unencrypted counterpart stored therewith. On an as-needed basis, ...


7
Saurabh Sinha, Mariusz H Jakubowski, Ramarathnam Venkatesan, Yuqun Chen, Matthew Cary, Ruoming Pang: Integrity ordainment and ascertainment of computer-executable instructions with consideration for execution context. Microsoft Corporation, Lee & Hayes PLLC, January 5, 2010: US07644440 (11 worldwide citation)

An implementation of a technology, described herein, for facilitating the protection of computer-executable instructions, such as software. At least one implementation, described herein, may generate integrity signatures of one or more program modules—which are sets of computer-executable instructio ...


8
Saurabh Sinha, Mariusz H Jakubowski, Ramarathnam Venkatesan, Yuqun Chen, Matthew Cary, Ruoming Pang: Integrity ordainment and ascertainment of computer-executable instructions. Microsoft Corporation, Lee & Hayes PLLC, March 18, 2008: US07346780 (11 worldwide citation)

An implementation of a technology, described herein, for facilitating the protection computer-executable instructions, such as software. At least one implementation, described herein, may generate integrity signatures of multiple sets of computer-executable instructions based upon the output trace a ...


9
Yuqun Chen, Darko Kirovski, Yacov Yacobi, Gideon A Yuval: Counterfeit and tamper resistant labels with randomly occurring features. Microsoft Corporation, Lee & Hayes PLLC, February 1, 2011: US07878398 (7 worldwide citation)

Techniques are disclosed to enable utilization of randomly-occurring features of a label (whether embedded or naturally inherent) to provide counterfeit-resistant and/or tamper-resistant labels. More specifically, labels including randomly-occurring features are scanned to determine the labels' feat ...


10
Yuqun Chen, Gang Tan: Tamper response mechanism. Microsoft Corporation, Lee & Hayes PLLC, October 19, 2010: US07818799 (7 worldwide citation)

A tamper response mechanism introduces a delayed failure into a program in response to detected tampering with the program. The mechanism determines a manner of responding to the detected tampering. The manner of responding may include corrupting a global pointer or using other techniques. The mecha ...