Patents by Inventor Malcolm Pearson

Malcolm Pearson has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20060248373
    Abstract: Failover systems and methods for providing redundant backup of data transmitted over a network to provide transport high availability of electronic data. The present invention relates to creating redundant backup copies of electronic data as well as transmission of the backup copies over a network in the event of a failure of a network component.
    Type: Application
    Filed: April 29, 2005
    Publication date: November 2, 2006
    Applicant: Microsoft Corporation
    Inventors: Leon Warman, Eric Tribble, Malcolm Pearson
  • Publication number: 20060212286
    Abstract: A workflow manager application transfers message data received from an originating device via a communication network to a target application for processing. A graphical user interface displays the received message data and allows the user to view and designate one or more target applications for processing the message data. The workflow manger application is responsive to user input to transfer message data to the designated one or more target applications for processing the message data. Alternatively, the workflow manager application analyzes received message data to identify one or more target applications, and transfers the message data to the identified one or more target applications for processing.
    Type: Application
    Filed: February 15, 2006
    Publication date: September 21, 2006
    Applicant: Microsoft Corporation
    Inventors: Malcolm Pearson, Leon Warman
  • Publication number: 20060195457
    Abstract: Prior to sending a message to an extensibility point, the message is wrapped with a wrapper object associated with the extensibility point. The wrapper object can be validated by the extensibility point when the extensibility point is ready to commence its operation on the message. Validation of the wrapper object enables the extensibility point to access the message. The wrapper object can later be invalidated by the extensibility point when the extensibility point has completed its operation on the message. Invalidation of the wrapper object denies the extensibility point access to the message.
    Type: Application
    Filed: February 28, 2005
    Publication date: August 31, 2006
    Applicant: Microsoft Corporation
    Inventors: Malcolm Pearson, Steven White
  • Publication number: 20060195531
    Abstract: Within a mail transfer agent of a message transfer system, a message is received and if the recipient entity resolves to a number of recipients exceeding a specified quantity, the original message is not processed. Instead, at least two messages are created, with each of the created messages addressed to a subset of the original set of recipients. The created messages are returned to the calling module for processing.
    Type: Application
    Filed: February 28, 2005
    Publication date: August 31, 2006
    Applicant: Microsoft Corporation
    Inventors: David Braun, Daniel Longley, Malcolm Pearson, Steven White
  • Publication number: 20060195530
    Abstract: Within a mail transfer agent of a message transfer system, a message is received and if the recipient entity resolves to a number of recipients exceeding a specified quantity, the original message is not processed. Instead, at least two messages are created, with each of the created messages addressed to a subset of the original set of recipients. The created messages are returned to the calling module for processing.
    Type: Application
    Filed: February 28, 2005
    Publication date: August 31, 2006
    Applicant: Microsoft Corporation
    Inventors: David Braun, Daniel Longley, Malcolm Pearson, Steven White
  • Publication number: 20060195529
    Abstract: Within a mail transfer agent of a message transfer system, a message is received and if the recipient entity resolves to a number of recipients exceeding a specified quantity, the original message is not processed. Instead, at least two messages are created, with each of the created messages addressed to a subset of the original set of recipients. The created messages are returned to the calling module for processing.
    Type: Application
    Filed: February 28, 2005
    Publication date: August 31, 2006
    Applicant: Microsoft Corporation
    Inventors: David Braun, Daniel Longley, Malcolm Pearson, Steven White
  • Publication number: 20060090080
    Abstract: The present invention allows for remotely and securely configuring settings for targeted devices within a network with multiple security-trust boundaries. Configuration information is encoded in messages that are digitally signed to ensure the integrity of the configuration information and sent in accordance with a standard messaging transport protocol. By utilizing an already existing port of the standard messaging transport protocol, e.g., SMTP, the number of open ports for configuration purposes is minimized. Further, example embodiments take advantage of hidden fields, i.e., machine readable fields that contain metadata that by default are not presented at a client user interface, for encoding the configuration or command/control information within the messages.
    Type: Application
    Filed: January 7, 2005
    Publication date: April 27, 2006
    Applicant: Microsoft Corporation
    Inventors: Malcolm Pearson, Leon Warman, Robert Atkinson, David Reed, Steven White
  • Publication number: 20060090195
    Abstract: The present invention allows for remotely and securely configuring settings for targeted devices within a network with multiple security-trust boundaries. Configuration information is encoded in messages that are digitally signed to ensure the integrity of the configuration information and sent in accordance with a standard messaging transport protocol. By utilizing an already existing port of the standard messaging transport protocol, e.g., SMTP, the number of open ports for configuration purposes is minimized. Further, example embodiments take advantage of hidden fields, i.e., machine readable fields that contain metadata that by default are not presented at a client user interface, for encoding the configuration or command/control information within the messages.
    Type: Application
    Filed: October 22, 2004
    Publication date: April 27, 2006
    Applicant: Microsoft Corporation
    Inventors: Malcolm Pearson, Leon Warman, Robert Atkinson, David Reed, Steven White
  • Publication number: 20060089970
    Abstract: The present invention provides for methods, systems, and computer program products for ensuring that sensitive subject matter within electronic messages is not inappropriately transferred between domains with differing security rights. The present invention utilizes the appropriate placement of message transfer agents or servers along with policy documents that include configurable semantics pattern recognition data for identifying deviant messages. Once deviant messages or messages that potentially have sensitive subject matter are identified, the present invention further provides for adaptable actions or remedies for ensuring that the sensitive subject matter is not inappropriately transferred between domains.
    Type: Application
    Filed: September 30, 2004
    Publication date: April 27, 2006
    Applicant: Microsoft Corporation
    Inventors: Malcolm Pearson, David Reed, Robert Atkinson, Steven White
  • Publication number: 20060075099
    Abstract: The present invention utilizes honeypots, which are messaging system resources set up to attract unauthorized or illicit use thereof, for automatically identifying messages with malignant content. As messages are received at a honeypot, fingerprints of the messages are generated, which correspond to pattern information within the messages. These fingerprints are then used to determine a confidence level that messages received at a legitimate messaging service are malignant. Based on the confidence level, various actions (e.g., deleting the malignant content) may be executed.
    Type: Application
    Filed: September 16, 2004
    Publication date: April 6, 2006
    Inventors: Malcolm Pearson, Leon Warman, Robert Atkinson, David Reed, Steven White
  • Publication number: 20060059183
    Abstract: The present invention utilizes existing encapsulation or encoding mechanisms for embedding user profile information in electronic messages. Such information may then be distributed amid a community of users for which an individual, organization or other entity interact. The present invention takes advantage of hidden fields, i.e., machine readable fields that contain metadata that by default are not presented at client user interface, for including the user profile information. The user profiles may be stored in a repository of user profiles, wherein a recipient of the user profiles may subsequently query the repository using keywords for accessing desired information about individuals or organizations for which they interact with.
    Type: Application
    Filed: September 16, 2004
    Publication date: March 16, 2006
    Inventors: Malcolm Pearson, Robert Atkinson
  • Publication number: 20060047759
    Abstract: The present invention provides for a messaging system that automatically identifies a forest that corresponds to a particular recipient of a message, without using a common or unified directory that maps forests with recipients. In a network with multiple forests, each forest having multiple recipients, when a message is received at a message server with a destination address that does not uniquely identify a particular forest, the present invention provides for using a standard messaging protocol for quarrying each forest. The forests respond with status codes that indicate whether or not a recipient associated with the destination address corresponds to the forest being quarried. If a status code indicates that the recipient corresponds to the particular forest, information may be stored and used to quarry that particular forest first, before quarrying other forests within the network.
    Type: Application
    Filed: August 27, 2004
    Publication date: March 2, 2006
    Inventors: Alexander Wetmore, Malcolm Pearson, Wayne Cranston
  • Publication number: 20050256930
    Abstract: Provided is a messaging system capable of detecting and processing at least a portion of a malformed message, e.g., a message that previously failed to process. An identifier and state information for the message can be logged. Based on the stored information, a determination can be made that the message previously failed to process. The message can then progressively be de-featured until the message can be processed or until the message is determined to be poisonous, whereupon it can be deleted or otherwise removed from the message stream permanently or temporarily-including moving the message to storage for operator inspection or for delayed delivery.
    Type: Application
    Filed: April 12, 2004
    Publication date: November 17, 2005
    Inventors: Malcolm Pearson, Robert Atkinson, David Reed, Steven White, Alexander Wetmore
  • Publication number: 20050192992
    Abstract: The present invention relates to systems and methods that determine intent for received data (e.g., email, voice, graphics . . . ) and respond to the data based on the intent. The systems and methods employ various combinations of features based on shallow and deep linguistic analysis (e.g., semantic and syntactic) to yield very high accuracy. The systems and methods analyze and categorize received data to locate data that can include intent. This data can be further refined by extracting features related to the intent. The features can be utilized by a classifier to determine the intent. If the intent warrants a response, the data are further scrutinized and reformulated to generate a description that is indicative of the intent. The reformulation can include representing the features in a logical form, transforming the form and generating a description of the intent that can be presented to a user visually and/or audibly.
    Type: Application
    Filed: June 15, 2004
    Publication date: September 1, 2005
    Applicant: Microsoft Corporation
    Inventors: David Reed, Eric Ringger, Michael Gamon, Richard Campbell, Robert Atkinson, Simon Corston, Malcolm Pearson
  • Patent number: 6595877
    Abstract: A basketball return net assembly is attachable to a basketball hoop support having a post extending upwardly from the ground and carrying a basketball hoop adjacent an upper end thereof. The return net assembly includes a flexible foldable return net and an elongated rigid net-carrying member extending along the upper end of the net to enable the net to be supported in a latterly-extending configuration. The upper end of the net and the net-carrying member can be suspended from an upper portion of the hoop support behind the hoop, and an attachment bracket is connected to opposite lower corner portions of the net and is adjustably securable to the post to enable the bracket to be adjusted relative thereto.
    Type: Grant
    Filed: August 15, 2001
    Date of Patent: July 22, 2003
    Assignee: Dicon Rose Inc.
    Inventor: Malcolm Pearson
  • Publication number: 20020025865
    Abstract: A basketball return net assembly is attachable to a basketball hoop support having a post extending upwardly from the ground and carrying a basketball hoop adjacent an upper end thereof. The return net assembly includes a flexible foldable return net and an elongated rigid net-carrying member extending along the upper end of the net to enable the net to be supported in a latterly-extending configuration. The upper end of the net and the net-carrying member can be suspended from an upper portion of the hoop support behind the hoop, and an attachment bracket is connected to opposite lower corner portions of the net and is adjustably securable to the post to enable the bracket to be adjusted relative thereto.
    Type: Application
    Filed: August 15, 2001
    Publication date: February 28, 2002
    Inventor: Malcolm Pearson
  • Publication number: 20020010041
    Abstract: A portable basketball hoop assembly includes a post having at least one hinge connecting two portions thereof together to enable the post to be in an elongated operative position or a folded transportable position, a backboard and hoop carried by the post at one end thereof, and an attachment member adjacent the other end of the post to enable the post to be detachably secured to a support.
    Type: Application
    Filed: May 16, 2001
    Publication date: January 24, 2002
    Inventor: Malcolm Pearson
  • Patent number: 6074313
    Abstract: A basketball return net assembly attachable to a basketball hoop support behind a basketball hoop carried thereby has a flexible foldable return net having an upper end with an upper sleeve portion extending therealong, an elongated rigid net-carrying member removably insertable into the upper sleeve portion to enable the net to be suspended in a laterally-extended configuration from the net-carrying member, and at least one attachment member for securing the net-carrying member to an upper portion of the hoop support behind the hoop. The net also has a lower end portion for receiving ballast to retain the lower end of the net in a laterally extended configuration at a selected location on the ground.
    Type: Grant
    Filed: October 22, 1998
    Date of Patent: June 13, 2000
    Assignee: Dicon Rose Inc.
    Inventor: Malcolm Pearson