Search

Bethan T Cantrell

from Bellevue, WA
Age ~52

Bethan Cantrell Phones & Addresses

  • 815 101St Ave SE, Bellevue, WA 98004
  • 18107 NE 22Nd St, Redmond, WA 98052 (425) 679-6965
  • Tucson, AZ
  • Tempe, AZ
  • Reno, NV
  • Mesa, AZ
  • Kiona, WA

Publications

Us Patents

Restricting Information Requested By An Application

View page
US Patent:
20150071436, Mar 12, 2015
Filed:
Sep 6, 2013
Appl. No.:
14/019937
Inventors:
- Redmond WA, US
Sean Smith - Redmond WA, US
Bethan Tetrault Cantrell - Redmond WA, US
Michelle R. Bruno - Snohomish WA, US
Assignee:
Microsoft Corporation - Redmond WA
International Classification:
H04N 7/167
H04L 29/06
US Classification:
380241, 726 3, 726 4
Abstract:
The technology includes a method for a computing device (console) to restrict transferring information to others on the Internet. A user does not have to explicitly make a choice of having the console restrict the transferring of information to an external computing device because the technology determines that such information cannot be transferred. When an application is loaded, a NSAL is read to determine whether the application will communicate with an external computing device. A NSAL may include authorized network addresses that an application may communicate with when executing on a computing device. When the NSAL does not include any network addresses, there is no need to obtain consent from a user regarding transferring the information externally because the application does not have the capability to do so. When one or more network addresses are includes in a NSAL, consent from a user is obtained.

Verification That Particular Information Is Transferred By An Application

View page
US Patent:
20150074689, Mar 12, 2015
Filed:
Sep 6, 2013
Appl. No.:
14/019978
Inventors:
- Redmond WA, US
Bethan Tetrault Cantrell - Redmond WA, US
Michelle R. Bruno - Snohomish WA, US
Assignee:
Microsoft Corporation - Redmond WA
International Classification:
G06F 9/54
US Classification:
719320
Abstract:
The technology includes a method to test what information an application transfers to an external computing device. A user's consent is explicitly obtained before the application transfers certain types of information, such as sensitive information. When a determination is made that an application is transferring sensitive information, a prompt for consent from a user may be provided that is accurate and detailed. In pre-production environments, technology can be used to detect whether this sensitive information is being transferred, and to validate whether a prompt for consent is necessary or unnecessary. To determine this, shimming is used to intercept application calls to APIs that return sensitive information. Requested sensitive information may be substituted with recorded or forged information from those APIs to produce a sentinel or canary. Similarly, network traffic of the application may be analyzed by another shim to determine when the substitute information is present.
Bethan T Cantrell from Bellevue, WA, age ~52 Get Report