Patents by Inventor Karim Batthish

Karim Batthish has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 10504066
    Abstract: As described herein, a client system is automatically configured to access message objects in a plurality of mailboxes stored at a server system. The client system sends an autodiscover request to the server system. In response, the server system sends to the client system an autodiscover response that contains an autodiscover response document that comprises a primary mailbox element and at least one alternate mailbox element. The client system uses a first set of mailbox identification data specified by the primary mailbox element to access message objects in a primary mailbox stored at the server system and uses sets of mailbox identification data specified by the alternate mailbox elements to access message objects in alternate mailboxes stored at the server system. Email messages are one example type of message objects. The alternate mailbox may be an archive mailbox used to store message objects for occasional reference.
    Type: Grant
    Filed: December 4, 2008
    Date of Patent: December 10, 2019
    Assignee: MICROSOFT TECHNOLOGY LICENSING, LLC
    Inventors: Harvey Rook, Ashish Consul, Karim Batthish
  • Publication number: 20100145932
    Abstract: As described herein, a client system is automatically configured to access message objects in a plurality of mailboxes stored at a server system. The client system sends an autodiscover request to the server system. In response, the server system sends to the client system an autodiscover response that contains an autodiscover response document that comprises a primary mailbox element and at least one alternate mailbox element. The client system uses a first set of mailbox identification data specified by the primary mailbox element to access message objects in a primary mailbox stored at the server system and uses sets of mailbox identification data specified by the alternate mailbox elements to access message objects in alternate mailboxes stored at the server system. Email messages are one example type of message objects. The alternate mailbox may be an archive mailbox used to store message objects for occasional reference.
    Type: Application
    Filed: December 4, 2008
    Publication date: June 10, 2010
    Applicant: MICROSOFT CORPORATION
    Inventors: Harvey Rook, Ashish Consul, Karim Batthish
  • Patent number: 7293171
    Abstract: Encrypted email message structures can contain recipient information that can reveal, to any recipient, all of the other recipients of an email message. Because some recipients, such as recipients to whom the message was “blind carbon-copied”, should remain hidden from the other recipients, individual encrypted messages can be created. One encrypted message can be created for all of the recipients who are intended to be revealed, such as the recipients listed in the TO and CC fields of an email header. A second encrypted message can be created for all of the recipients of the message who are intended to be hidden, such as the recipient listed in the BCC field of an email header. Alternatively, multiple encrypted messages can be created individually for each recipient in the BCC field, if the BCC recipients are to be hidden even from other BCC recipients.
    Type: Grant
    Filed: January 21, 2004
    Date of Patent: November 6, 2007
    Assignee: Microsoft Corporation
    Inventors: Karim Batthish, Malcolm Davis, Roy Williams, Jean Wu
  • Publication number: 20070088798
    Abstract: A complex business logic encapsulation system and method are provided. The system can encapsulate complex business logic, for example, for workflow application(s). The system includes a common business logic layer component that encapsulates the business logic of objects in a store. The common business logic layer can employ response objects which encapsulate the business logic of complex objects in the store. The response object provides one or more suitable responses. The client can then identify the appropriate response, populate the response and send it back to the common business logic layer component. Each response object can embed an invariant identifier of the store item to which it corresponds, and, when sent or saved through a web service, causes the store to behave as if it had been processed by system.
    Type: Application
    Filed: January 11, 2006
    Publication date: April 19, 2007
    Applicant: Microsoft Corporation
    Inventors: John Merrill, Karim Batthish, Huw Upshall
  • Publication number: 20060242124
    Abstract: Maintaining a plurality of application component catalogs describing user experiences associated with particular application programs. The invention includes an extensible schema for the application component catalogs and a method for matching user experiences within the application component catalogs to particular user requests. The invention provides an extensible and scalable infrastructure for customizing a user interface experience.
    Type: Application
    Filed: April 25, 2005
    Publication date: October 26, 2006
    Applicant: Microsoft Corporation
    Inventors: Brendan Fields, Karim Batthish, Russell Simpson
  • Publication number: 20050160292
    Abstract: Encrypted email message structures can contain recipient information that can reveal, to any recipient, all of the other recipients of an email message. Because some recipients, such as recipients to whom the message was “blind carbon-copied”, should remain hidden from the other recipients, individual encrypted messages can be created. One encrypted message can be created for all of the recipients who are intended to be revealed, such as the recipients listed in the TO and CC fields of an email header. A second encrypted message can be created for all of the recipients of the message who are intended to be hidden, such as the recipient listed in the BCC field of an email header. Alternatively, multiple encrypted messages can be created individually for each recipient in the BCC field, if the BCC recipients are to be hidden even from other BCC recipients.
    Type: Application
    Filed: January 21, 2004
    Publication date: July 21, 2005
    Applicant: Microsoft Corporation
    Inventors: Karim Batthish, Malcolm Davis, Roy Williams, Jean Wu
  • Publication number: 20050108639
    Abstract: Disclosed is a policy based method for blocking the automatic dereferencing of web beacon links in an e-mail message sent in HTML format with a minimum sacrifice in the HTML body rendering quality. HTML content that potentially contains web beacons is replaced with non-dereferencing elements prior to HTML rendering by the e-mail browser so that the remaining HTML can be rendered as complete as possible without rendering the potential web beacons. Additionally, the present invention also provides a method for removing the HTTP Referer header from referenced external links and activated images. An HTTP redirector service is implemented as a server-based link redirection evaluator application which serves to eliminate the Referer header for the URL requested. Embodiments of the present invention provide for blocking web beacons and removing HTTP Referer headers in both a “down-level” e-mail client and a client which can make programmatic use of an HTML rendering engine.
    Type: Application
    Filed: November 19, 2003
    Publication date: May 19, 2005
    Applicant: Microsoft Corporation
    Inventors: Brendan Fields, Karim Batthish, Yuriy Inglikov, Jorge Pereira
  • Publication number: 20050021969
    Abstract: The principles of the present invention provide for delegating certificate validation. A client computer system sends a certificate validation request to a server computer system over a trusted link. The certificate validation request includes at least enough certificate information for a certificate authority to identify a digital certificate that binds a sending entity to a private key. The server computer system checks a validation path to determine if the digital certificate is valid and at least one certificate revocation list to determine if the certificate has been compromised. The server computer system sends a certificate status indication to the client computer system over the trusted link. Accordingly, the resources of the server computer system, instead of the client computer system, are utilized to validate a digital certificate. Further, digital certificate validation can be delegated to a server computer system that attempts to pre-validate a digital certificate.
    Type: Application
    Filed: July 1, 2003
    Publication date: January 27, 2005
    Inventors: Roy Williams, Karim Batthish, Jorge Pereira