Search

Lars Kuhtz Phones & Addresses

  • 6012 29Th Ave NE, Seattle, WA 98115
  • Redmond, WA

Resumes

Resumes

Lars Kuhtz Photo 1

Senior Software Engineer

View page
Location:
Seattle, WA
Industry:
Information Technology And Services
Work:
Microsoft Aug 2015 - Apr 2018
Senior Software Engineer

Kadena Llc Aug 2015 - Apr 2018
Senior Software Engineer

Pivotcloud May 2012 - Jun 2015
Staff Software Engineer

Microsoft Jan 2011 - May 2012
Software Developer

Saarland University Nov 2004 - Dec 2010
Researcher
Education:
Universität Des Saarlandes 2004 - 2010
Doctorates, Doctor of Philosophy, Computer Science
Humboldt University of Berlin 1999 - 2004
Masters, Computer Science
Ruhr University Bochum 1998 - 1999
Universidad Centroamericana, San Salvador, El Salvador 1997 - 1998
Augustana - Hochschule Neuendettelsau 1995 - 1997
Skills:
Algorithms
Haskell
Distributed Systems
C++
C#
Cloud Computing
C
Javascript
Prolog
Git
Cryptography
Functional Programming
Sql
Oop
Software Development
Agile Methodologies
Programming
Cloud Security
Logic
Model Checking
Formal Verification
Theorem Proving
Ltl
F#
Riak
Mercurial
Interests:
Design
Object Oriented Software Development
Research
Open Source Development
Computer Aided Verification
Formal Methods
Computational Logic
Algorithms
Javascript
Analysis
Languages:
German
English
Spanish
Portuguese
Lars Kuhtz Photo 2

Lars Kuhtz

View page

Publications

Us Patents

Trust Services For Securing Data In The Cloud

View page
US Patent:
20140075184, Mar 13, 2014
Filed:
Sep 11, 2012
Appl. No.:
13/609945
Inventors:
Irina Gorbach - Bellevue WA, US
Venkatesh Krishnan - Sammamish WA, US
Andrey Shur - Redmond WA, US
Dmitry Denisov - Bellevue WA, US
Lars Kuhtz - Seattle WA, US
Sumalatha Adabala - Redmond WA, US
Roy Peter D'Souza - Bellevue WA, US
Michael Entin - Redmond WA, US
Michael Ray Clark - Redmond WA, US
Gitika Aggarwal Saubhasik - Sammamish WA, US
Assignee:
MICROSOFT CORPORATION - Redmond WA
International Classification:
H04L 29/06
US Classification:
713155
Abstract:
Embodiments are directed to securing data in the cloud, securely encrypting data that is to be stored in the cloud and to securely decrypting data accessed from the cloud. In one scenario, an instantiated trust service receives information indicating that a trust server is to be instantiated. The trust service instantiates the trust server, which is configured to store key references and encrypted keys. The trust service receives the public key portion of a digital certificate for each publisher and subscriber that is to have access to various specified portions of encrypted data. A data access policy is then defined that specifies which encrypted data portions can be accessed by which subscribers.

Securely Filtering Trust Services Records

View page
US Patent:
20140075196, Mar 13, 2014
Filed:
Sep 13, 2012
Appl. No.:
13/614988
Inventors:
Irina Gorbach - Bellevue WA, US
Venkatesh Krishnan - Sammamish WA, US
Andrey Shur - Redmond WA, US
Dmitry Denisov - Bellevue WA, US
Lars Kuhtz - Seattle WA, US
Sumant Mehta - Seattle WA, US
Marina Galata - Sammamish WA, US
Assignee:
MICROSOFT CORPORATION - Redmond WA
International Classification:
H04L 9/32
US Classification:
713175
Abstract:
Embodiments are directed to securely filtering trust services records. In one scenario, a client computer system receives at least one of the following trust services records: a trust services certificate, a principal certificate, a group certificate and a trust services policy. The client computer system performs a time validity check to validate the trust services record's timestamp, performs an integrity check to validate the integrity of the trust services record and performs a signature validity check to ensure that the entity claiming to have created the trust services record is the actual creator of the trust services record. The client computer system then, based on the time validity check, the integrity check and the signature validity check, determines that the trust services record is valid and allows a client computer system user to perform a specified task using the validated trust services record.

Monitoring And Controlling Access To Electronic Content

View page
US Patent:
20130212395, Aug 15, 2013
Filed:
Dec 17, 2012
Appl. No.:
13/716351
Inventors:
Roy Peter D'Souza - Belleview WA, US
Lars Kuhtz - Seattle WA, US
Assignee:
AlephCloud Systems, Inc. - Sunnyvale CA
International Classification:
H04L 9/08
US Classification:
713171
Abstract:
Methods, systems and apparatuses for monitoring and controlling access to an electronic content are disclosed. One method includes creating, by an owner server, a group comprising generating a group public key PKand a group secret key SK. The method further includes adding, by the owner server, a member to the group, comprising generating a first share SKfrom the group secret key SKand a public key of a member, and a second share SKfrom the group secret key SKand a public key of a mediator, and providing, by the owner server, the first share SKto a member server of the member and the second shares SKto a mediator server of the mediator.

Mediator Device Monitoring And Controlling Access To Electronic Content

View page
US Patent:
20150149780, May 28, 2015
Filed:
Jan 31, 2015
Appl. No.:
14/611206
Inventors:
- Sunnyvale CA, US
Lars Kuhtz - Seattle WA, US
Assignee:
PivotCloud, Inc. - Sunnyvale CA
International Classification:
H04L 9/14
H04L 9/30
US Classification:
713171
Abstract:
Methods, systems and apparatuses for a mediator controlling access to an electronic content, are disclosed. One method includes receiving, by a mediator device of a mediator, a second share SKfrom an owner device, wherein a first share SKis provided to a member device of a member of a group by the owner device. Further, the mediator receives a request from the member for mediation, including the mediator receiving a dispatch of the header of the encrypted electronic content. Further, the mediator receives a request for mediation, including the mediator receiving a dispatch of the header of the encrypted electronic content from the member. Further, the mediator determines whether the member is eligible to decrypt the electronic content, if eligible, the mediator responding to the request for mediation with a member accessible header, wherein the member accessible header includes the header after application of SK.

Securely Filtering Trust Services Records

View page
US Patent:
20150143127, May 21, 2015
Filed:
Jan 29, 2015
Appl. No.:
14/608803
Inventors:
- Redmond WA, US
Venkatesh Krishnan - Sammamish WA, US
Andrey Shur - Redmond WA, US
Dmitry Denisov - Bellevue WA, US
Lars Kuhtz - Seattle WA, US
Sumant Mehta - Seattle WA, US
Marina Galata - Sammamish WA, US
International Classification:
H04L 9/32
H04L 29/06
US Classification:
713175
Abstract:
Embodiments include method, systems, and computer program products for filtering trust services records. Embodiments include receiving a trust services record that includes a plurality of security components and that is usable to secure data that is stored in an untrusted location. It is determined whether the trust services record has been tampered with, including verifying each of the plurality of security components of the trust services record. The trust services record is filtered based on the determination of whether the trust services record has been tampered with. The filtering includes, when the trust services record is determined to have not been tampered with, allowing performance of at least one task with respect to the secured data; and, when the trust services record is determined to have been tampered with, disallowing performance of any task with respect to the secured data.

Data Mapping Using Trust Services

View page
US Patent:
20140351884, Nov 27, 2014
Filed:
Aug 13, 2014
Appl. No.:
14/459081
Inventors:
- Redmond WA, US
Dmitry Denisov - Bellevue WA, US
Lars Kuhtz - Seattle WA, US
Irina Gorbach - Bellevue WA, US
Venkatesh Krishnan - Sammamish WA, US
Andrey Shur - Redmond WA, US
International Classification:
G06F 21/62
G06F 17/30
US Classification:
726 1
Abstract:
Embodiments are directed to mapping encryption policies to data stored in a database using a policy identifier, and to accessing data stored in a database using a policy identifier. In one scenario, a computer system receives an indication that identifies which type of encryption is to be applied when encrypting a specified portion of data stored in a database. The database has a database schema identified by a database schema identifier, where the database schema defines relationships for data stored in the database. The computer system then accesses a namespace that identifies a set of databases in which the specified portion of data is accessed in the same manner. The computer system also generates a policy identifier, which contains information including the namespace and the database schema identifier.

Mediator Monitoring And Controlling Access To Electronic Content

View page
US Patent:
20140149734, May 29, 2014
Filed:
Feb 3, 2014
Appl. No.:
14/171682
Inventors:
Roy Peter D'Souza - Belleview WA, US
Lars Kuhtz - Seattle WA, US
Assignee:
ALEPHCLOUD SYSTEMS, INC. - Sunnyvale CA
International Classification:
H04L 9/30
US Classification:
713155
Abstract:
Methods, systems and apparatuses for a mediator controlling access to an electronic content, are disclosed. One method includes receiving, by a mediator server of a mediator, a second share SKfrom an owner server, wherein a first share SKis provided to a member server of a member of a group by the owner server. Further, the mediator receives a request for mediation, including the mediator receiving a dispatch of the header of the encrypted electronic content from the member. Further, the mediator determines whether the member is eligible to decrypt the electronic content, if eligible, the mediator responding to the request for mediation with a member accessible header, wherein the member accessible header includes the header after application of SK.

Trust Services Data Encryption For Multiple Parties

View page
US Patent:
20140115327, Apr 24, 2014
Filed:
Oct 22, 2012
Appl. No.:
13/657246
Inventors:
- Redmond WA, US
Venkatesh Krishnan - Sammamish WA, US
Rafayel Bezirganyan - Redmond WA, US
Andrey Shur - Redmond WA, US
Dmitry Denisov - Bellevue WA, US
Lars Kuhtz - Seattle WA, US
Assignee:
Microsoft Corporation - Redmond WA
International Classification:
H04L 29/06
US Classification:
713165
Abstract:
In one scenario, a computer system accesses a first principal's public key to generate a group private key that is encrypted using the first principal's public key. The generated group private key provides access to data keys that are used to encrypt data resources. The computer system accesses a second principal's public key to encrypt the generated group private key using the second principal's public key and encrypts at least one of the data keys using a group public key, where the data key allows access to encrypted data resources. The first principal then decrypts the group private key using the first principal's private key, decrypts the data key using the decrypted group private key and accesses the data resource using the decrypted data key. The second principal also performs these functions with their private key to access the data resource.
Lars Kuhtz from Seattle, WA, age ~50 Get Report