Dinarte Morais - Redmond WA, US Jon Lange - Bellevue WA, US Daniel R. Simon - Redmond WA, US Ling Tony Chen - Bellevue WA, US Josh D. Benaloh - Redmond WA, US
Assignee:
Microsoft Corporation - Redmond WA
International Classification:
G06F012/14
US Classification:
713 2, 713 1, 713200, 713173, 711102
Abstract:
Machine instructions comprising a bootstrap code are buried within a critical component of an electronic game console where they cannot readily be accessed or modified. A preloader portion in a read only memory (ROM) is hashed by the bootstrap code and the result is compared to an expected hash value maintained in the bootstrap code. Further verification of the boot-up process is carried out by the preloader, which hashes the code in ROM to obtain a hash value for the code. The result is verified against a digital signature value that defines an expected value for this hash. Failure to obtain any expected result terminates the boot-up process. Since the bootstrap code confirms the preloader, and the preloader confirms the remainder of the code in ROM, this technique is useful for ensuring that the code used for booting up the device has not been modified or replaced.
Network Architecture For Secure Communications Between Two Console-Based Gaming Systems
A network architecture for console-based gaming systems enables secure communication among multiple game consoles over a local area network. The system architecture supports a three-phase secure communication protocol. The first phase involves generating shared keys that are unique to an authentic game console running an authentic game title. In the second phase, a “client” console attempts to discover existing game sessions being hosted by a “host” game console by broadcasting a request over the local area network. The broadcast request is protected using the shared keys. If the host console agrees to let the client console play, the host console generates session keys that are returned to the client console. The third phase involves a key exchange in which the client and host consoles exchange data used to derive one or more secrets for securing future communications. The key exchange is protected using the session keys.
Architecture For Manufacturing Authenticatable Gaming Systems
Boyd C. Multerer - Seattle WA, US Ling Tony Chen - Bellevue WA, US
Assignee:
Microsoft Corporation - Redmond WA
International Classification:
G06F 17/00
US Classification:
713168, 713170, 713171
Abstract:
An architecture is described to manufacture console-based gaming systems in a manner that allows them to be authenticated to a remote entity for online participation. The architecture involves placing pre-established secrets on the game console during console manufacturing that may be subsequently used to guarantee the authenticity of the game console during registration time.
Multiple User Authentication For Online Console-Based Gaming
Boyd C. Multerer - Seattle WA, US Ling Tony Chen - Bellevue WA, US Darren L. Anderson - Sammamish WA, US
Assignee:
Microsoft Corporation - Redmond WA
International Classification:
H04K 1/00
US Classification:
380251, 463 29
Abstract:
A console-based multi-user authentication process allows multiple users of a game console to be authenticated together in a single request/reply exchange with an authentication entity. The results of which is the possession of a single ticket that can be used to prove authenticity of multiple authentication principals to one or more online services. Also described is a handshake process that can be used to initially establish an authentication account for each game console, in which the account creation server can trust that a genuine game console is making the request.
Challenge And Response Interaction Between Client And Server Computing Devices
Ling Tony Chen - Bellevue WA, US Michael Courage - Kirkland WA, US Dinarte Morais - Redmond WA, US
Assignee:
Microsoft Corporation - Redmond WA
International Classification:
G06F 15/16
US Classification:
709203, 709219
Abstract:
A condition on a client that is communicating with a server is determined by issuing a challenge to the client, causing the client to produce a response indicative of the condition. The server compares the response to an expected response to determine if the condition is as expected, and if not, takes appropriate action, such as terminating the connection with the client. The challenge preferably includes parameters and a code segment that causes the client to produce the response by executing the code segment. The code segment could perform a one-way hashing algorithm of a portion of memory indicated in the parameters. The server can thus determine if the client is using a modified basic input output system, modified software, pirated software, or whether other conditions exist on the client. The challenge can be changed to prevent the client from returning a false, predetermined response to the challenge.
Ling Tony Chen - Bellevue WA, US Shyam Krishnamoorthy - Kirkland WA, US Daniel M. C. Caiafa - Redmond WA, US Jerry Paul Hook - Everett WA, US Dan E. Walther - Redmond WA, US
Assignee:
Microsoft Corporation - Redmond WA
International Classification:
H04K 1/00 H04L 9/00
US Classification:
705 59, 705 51, 726 7, 726 17, 726 19
Abstract:
Various techniques are described for managing license rights for a variety of digital content. One technique involves initiating a request for a specific content package. The content package includes a unique content package identifier that can be linked with a license offer that also has a unique identifier. A determination is made as to whether the specific content package is available locally, and if not, the specific content package is downloaded. A use license can be obtained for digital content contained within the specific content package. One or more use-license parameters can be determined based on the use license obtained for the digital content. Finally, use of the digital content is enabled in accord with the license parameters that were thus determined.
A trust rating factor (TRF) based upon data collected for players participating in previous online games sessions is used in determining official results for an online game session when different results are reported by the participants. Counters corresponding to each of a plurality of parameters related to conditions that arise during or at the end of a game session are employed in determining the TRF for each player. For example, if one of the players may have experienced a packet bombing that interrupted normal data communication, a counter related to that condition will be incremented for all players in the game session. If all of the players report results that are consistent at the end of the game session, the TRF of each player is improved. A separate TRF is determined for each game title in which a player participates.
Dinarte R. Morais - Redmond WA, US Ling T. Chen - Bellevue WA, US Mark D. VanAntwerp - Redmond WA, US Daniel Caiafa - Redmond WA, US Boyd C. Multerer - Seattle WA, US Damon V. Danieli - Bellevue WA, US Sean Christian Wohlgemuth - Marysville WA, US Eric Neustadter - Sammamish WA, US Michael Courage - Kirkland WA, US
Assignee:
Microsoft Corporation - Redmond WA
International Classification:
H04K 1/00 H04L 9/00 G06F 7/04
US Classification:
713153, 380251, 380279, 726 10
Abstract:
An exemplary implementation of a security gateway for online console-based gaming operates as a gateway between a public network (e. g. , the Internet), and a private network (e. g. , an internal data center network). The security gateway allows secure communication channels to be established with game consoles via the public network, and allows secure communication between game consoles on the public network and service devices on the private network.
Nanhai Oil General Service Company Ltd Zhuhai, CN Mar 1988 to 1990 Retail Manager/AccountantNanhai Oil General Service Company Ltd Zhuhai, CN 1984 to 1988 Import/Export LiaisonSurvey & Measure Bureau of Zhuhai City
Aug 1980 to May 1984 Cash ControllerSteel & Mine Co. of Yang Chun
Jul 1978 to 1980 Accountant
Education:
University of the District of Columbia Washington, DC 2010 BA in AccountingTie Xi Science & Technology College of Shenyang Shenyang, CN 1982 to 1984 Certificate in Commercial Accounting
Ling P Chen MD 2505 Samaritan Dr STE 107, San Jose, CA 95124 4083588852 (phone), 4083588303 (fax)
Education:
Medical School Case Western Reserve University School of Medicine Graduated: 1992
Procedures:
Cesarean Section (C-Section) Cystoscopy D & C Dilation and Curettage Delivery After Previous Caesarean Section Hysterectomy Myomectomy Oophorectomy Ovarian Surgery Tubal Surgery Vaccine Administration Vaginal Delivery Vaginal Repair
Conditions:
Abnormal Vaginal Bleeding Breast Disorders Conditions of Pregnancy and Delivery Endometriosis Female Infertility
Languages:
Chinese English
Description:
Dr. Chen graduated from the Case Western Reserve University School of Medicine in 1992. She works in San Jose, CA and specializes in Obstetrics & Gynecology. Dr. Chen is affiliated with El Camino Hospital Of Los Gatos and Good Samaritan Hospital.
I love our Lord Jesus! I believe and desire that we are a fragrance of Christ, a letter inscribed with the Spirit of the living God, in the tablets of hearts of flesh, known and the read by all men......
Tagline:
Galatians 2:20
Bragging Rights:
If I must boast, I will boast of the things of my weakness...Most gladly therefore I will rather boast in my weaknesses that the power of Christ might tabernacle over me.
Ling Chen
Education:
Virginia Polytechnic Institute and State University - Computer Science
Ling Chen
Ling Chen
Ling Chen
Ling Chen
News
Gates Foundation: 'We need to reinvent the toilet'
Yu-Ling Chen, from the University of Toronto, is trying to make a toilet that will "sanitize feces within 24 hours" so human waste doesn't transmit disease through a community. Chen plans to use a process of dehydration, filtration and smoldering to render the waste harmless.