Eric D. Broberg - Redmond WA, US Matthew B. Jeffries - Kirkland WA, US Matthew Cohen - Kirkland WA, US
Assignee:
Microsoft Corporation - Redmond WA
International Classification:
G06F 9/44
US Classification:
717124, 717125, 717134, 717135
Abstract:
Techniques are provided for determining a minimum set of permissions for a software component. A first set of minimum permissions is determined for proper execution of the software component. The first set designates one or more permissions. Determining the first set includes performing iterative testing to determine whether one or more user permissions are included in the first set by only disabling one of the user permissions on an iteration. Verification processing may be performed in which a second set of minimum permissions is determined and the first set may be compared to the second set to determine whether the first set is equivalent to the second set.
James Richard Sturms - Seattle WA, US Matthew Bryan Jeffries - Kirkland WA, US William James Griffin - Sammamish WA, US
Assignee:
Microsoft Corporation - Redmond WA
International Classification:
G06F 7/04 G06F 17/30
US Classification:
726 9, 726 8, 726 10, 726 20, 726 21, 713159
Abstract:
Methods and computer-readable media are provided for refreshing a page validation token. In response to a request for a form from a client, a server responds with the requested form, a page validation token, and a page token refresh program. The client executes the page token refresh program in response to a request to post the contents of the form to the server computer. The page token refresh program determines whether a preset period of time has elapsed since server computer generated the page validation token. If the period of time has not elapsed, the form is posted to the server with the page validation token and processed by the server computer. If the page timeout has elapsed, the page token refresh program refreshes the page validation token prior to posting the form by requesting an updated page validation token from the server.
Relative Search Results Based Off Of User Interaction
Jeffrey Johnson - Redmond WA, US Matthew Jeffries - Kirkland WA, US
Assignee:
Microsoft Corporation - Redmond WA
International Classification:
G06F 17/30
US Classification:
707005000
Abstract:
A program product and method is disclosed that rely on user interaction in the ordering of search results returned by a search engine. Each of a plurality of records in a database is associated with a user-interaction parameter that is associated with the duration of time that a user accesses a particular record of the search result. Provided that the duration of time that the user accesses the record is greater than a predetermined relevant time period, the user-interaction parameter is weighted to increase the relevance of this record in relation to records that did were not accessed for the relevant time period used in ordering the records identified in a result set generated in response to a search request.
Jeffrey Johnson - Redmond WA, US Matthew Jeffries - Kirkland WA, US
Assignee:
Microsoft Corporation - Redmond WA
International Classification:
G06F 17/30
US Classification:
707002000
Abstract:
Techniques are provided for detecting injection vulnerabilities associated with a database query. An initial set of input data including one or more data items is received. A database query is in accordance with the initial set of input data. A detector determines whether one of the data items included in the initial set of input data is associated with an unexpected event by analyzing trace output generated as a result of operations executed in connection with performing the database query.
A device for rigging a fishing lure having a hollow cylindrical main body with a first tapered end and a second non-tapered end, such that the tapered end is sized to fit snugly on an artificial fishing worm lure. The device has a number of holes distributed around the central portion of the main body to enable the passage of a fishing hook through the lure and device combination. The device may be constructed of plastic, metal, rubber, or a combination of materials. The device may be weighted or have additional embellishments to enhance an angler's fishing success.
- Redmond WA, US Willson Kulandai Raj DAVID - Bothell WA, US Vinayak GOYAL - Kirkland WA, US Matthew Bryan JEFFRIES - Sammamish WA, US
International Classification:
H04L 29/06
Abstract:
A threat protection system provides for detecting links in a document and analyzing whether one of the detected links is a malicious link that may direct a user of the document to a malicious universal resource locator (URL). In one implementation of the described technology, when a user selects a link in a document, a link activation module calls a threat protection client module that performs a reputation check for the link. If the selected link is malicious, the threat protection client module sends a URL of a warning page to the link activation module.
- Redmond WA, US Thomas P. GALLAGHER - Redmond WA, US Matthew Bryan JEFFRIES - Sammamish WA, US
International Classification:
H04L 29/06 G06F 9/445
Abstract:
Implementations described herein disclose a system for providing personalized threat protection for users of computer applications. An implementation of a method disclosed herein includes analyzing usage pattern of an application by a client to determine various application functionalities used by the client, identifying security threats related to the various application functionalities used by the client, and changing the configuration settings of the application for the client based on the plurality of security threats.
- Redmond WA, US Willson Kulandai Raj DAVID - Bothell WA, US Vinayak GOYAL - Kirkland WA, US Matthew Bryan JEFFRIES - Sammamish WA, US
International Classification:
H04L 29/06
Abstract:
A threat protection system provides for detecting links in a document and analyzing whether one of the detected links is a malicious link that may direct a user of the document to a malicious universal resource locator (URL). In one implementation of the described technology, when a user selects a link in a document, a link activation module calls a threat protection client module that performs a reputation check for the link. If the selected link is malicious, the threat protection client module sends a URL of a warning page to the link activation module.