Patents by Inventor Malcolm Pearson
Malcolm Pearson has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Publication number: 20060248373Abstract: Failover systems and methods for providing redundant backup of data transmitted over a network to provide transport high availability of electronic data. The present invention relates to creating redundant backup copies of electronic data as well as transmission of the backup copies over a network in the event of a failure of a network component.Type: ApplicationFiled: April 29, 2005Publication date: November 2, 2006Applicant: Microsoft CorporationInventors: Leon Warman, Eric Tribble, Malcolm Pearson
-
Publication number: 20060212286Abstract: A workflow manager application transfers message data received from an originating device via a communication network to a target application for processing. A graphical user interface displays the received message data and allows the user to view and designate one or more target applications for processing the message data. The workflow manger application is responsive to user input to transfer message data to the designated one or more target applications for processing the message data. Alternatively, the workflow manager application analyzes received message data to identify one or more target applications, and transfers the message data to the identified one or more target applications for processing.Type: ApplicationFiled: February 15, 2006Publication date: September 21, 2006Applicant: Microsoft CorporationInventors: Malcolm Pearson, Leon Warman
-
Publication number: 20060195457Abstract: Prior to sending a message to an extensibility point, the message is wrapped with a wrapper object associated with the extensibility point. The wrapper object can be validated by the extensibility point when the extensibility point is ready to commence its operation on the message. Validation of the wrapper object enables the extensibility point to access the message. The wrapper object can later be invalidated by the extensibility point when the extensibility point has completed its operation on the message. Invalidation of the wrapper object denies the extensibility point access to the message.Type: ApplicationFiled: February 28, 2005Publication date: August 31, 2006Applicant: Microsoft CorporationInventors: Malcolm Pearson, Steven White
-
Publication number: 20060195531Abstract: Within a mail transfer agent of a message transfer system, a message is received and if the recipient entity resolves to a number of recipients exceeding a specified quantity, the original message is not processed. Instead, at least two messages are created, with each of the created messages addressed to a subset of the original set of recipients. The created messages are returned to the calling module for processing.Type: ApplicationFiled: February 28, 2005Publication date: August 31, 2006Applicant: Microsoft CorporationInventors: David Braun, Daniel Longley, Malcolm Pearson, Steven White
-
Publication number: 20060195530Abstract: Within a mail transfer agent of a message transfer system, a message is received and if the recipient entity resolves to a number of recipients exceeding a specified quantity, the original message is not processed. Instead, at least two messages are created, with each of the created messages addressed to a subset of the original set of recipients. The created messages are returned to the calling module for processing.Type: ApplicationFiled: February 28, 2005Publication date: August 31, 2006Applicant: Microsoft CorporationInventors: David Braun, Daniel Longley, Malcolm Pearson, Steven White
-
Publication number: 20060195529Abstract: Within a mail transfer agent of a message transfer system, a message is received and if the recipient entity resolves to a number of recipients exceeding a specified quantity, the original message is not processed. Instead, at least two messages are created, with each of the created messages addressed to a subset of the original set of recipients. The created messages are returned to the calling module for processing.Type: ApplicationFiled: February 28, 2005Publication date: August 31, 2006Applicant: Microsoft CorporationInventors: David Braun, Daniel Longley, Malcolm Pearson, Steven White
-
Publication number: 20060090080Abstract: The present invention allows for remotely and securely configuring settings for targeted devices within a network with multiple security-trust boundaries. Configuration information is encoded in messages that are digitally signed to ensure the integrity of the configuration information and sent in accordance with a standard messaging transport protocol. By utilizing an already existing port of the standard messaging transport protocol, e.g., SMTP, the number of open ports for configuration purposes is minimized. Further, example embodiments take advantage of hidden fields, i.e., machine readable fields that contain metadata that by default are not presented at a client user interface, for encoding the configuration or command/control information within the messages.Type: ApplicationFiled: January 7, 2005Publication date: April 27, 2006Applicant: Microsoft CorporationInventors: Malcolm Pearson, Leon Warman, Robert Atkinson, David Reed, Steven White
-
Publication number: 20060090195Abstract: The present invention allows for remotely and securely configuring settings for targeted devices within a network with multiple security-trust boundaries. Configuration information is encoded in messages that are digitally signed to ensure the integrity of the configuration information and sent in accordance with a standard messaging transport protocol. By utilizing an already existing port of the standard messaging transport protocol, e.g., SMTP, the number of open ports for configuration purposes is minimized. Further, example embodiments take advantage of hidden fields, i.e., machine readable fields that contain metadata that by default are not presented at a client user interface, for encoding the configuration or command/control information within the messages.Type: ApplicationFiled: October 22, 2004Publication date: April 27, 2006Applicant: Microsoft CorporationInventors: Malcolm Pearson, Leon Warman, Robert Atkinson, David Reed, Steven White
-
Publication number: 20060089970Abstract: The present invention provides for methods, systems, and computer program products for ensuring that sensitive subject matter within electronic messages is not inappropriately transferred between domains with differing security rights. The present invention utilizes the appropriate placement of message transfer agents or servers along with policy documents that include configurable semantics pattern recognition data for identifying deviant messages. Once deviant messages or messages that potentially have sensitive subject matter are identified, the present invention further provides for adaptable actions or remedies for ensuring that the sensitive subject matter is not inappropriately transferred between domains.Type: ApplicationFiled: September 30, 2004Publication date: April 27, 2006Applicant: Microsoft CorporationInventors: Malcolm Pearson, David Reed, Robert Atkinson, Steven White
-
Publication number: 20060075099Abstract: The present invention utilizes honeypots, which are messaging system resources set up to attract unauthorized or illicit use thereof, for automatically identifying messages with malignant content. As messages are received at a honeypot, fingerprints of the messages are generated, which correspond to pattern information within the messages. These fingerprints are then used to determine a confidence level that messages received at a legitimate messaging service are malignant. Based on the confidence level, various actions (e.g., deleting the malignant content) may be executed.Type: ApplicationFiled: September 16, 2004Publication date: April 6, 2006Inventors: Malcolm Pearson, Leon Warman, Robert Atkinson, David Reed, Steven White
-
Publication number: 20060059183Abstract: The present invention utilizes existing encapsulation or encoding mechanisms for embedding user profile information in electronic messages. Such information may then be distributed amid a community of users for which an individual, organization or other entity interact. The present invention takes advantage of hidden fields, i.e., machine readable fields that contain metadata that by default are not presented at client user interface, for including the user profile information. The user profiles may be stored in a repository of user profiles, wherein a recipient of the user profiles may subsequently query the repository using keywords for accessing desired information about individuals or organizations for which they interact with.Type: ApplicationFiled: September 16, 2004Publication date: March 16, 2006Inventors: Malcolm Pearson, Robert Atkinson
-
Publication number: 20060047759Abstract: The present invention provides for a messaging system that automatically identifies a forest that corresponds to a particular recipient of a message, without using a common or unified directory that maps forests with recipients. In a network with multiple forests, each forest having multiple recipients, when a message is received at a message server with a destination address that does not uniquely identify a particular forest, the present invention provides for using a standard messaging protocol for quarrying each forest. The forests respond with status codes that indicate whether or not a recipient associated with the destination address corresponds to the forest being quarried. If a status code indicates that the recipient corresponds to the particular forest, information may be stored and used to quarry that particular forest first, before quarrying other forests within the network.Type: ApplicationFiled: August 27, 2004Publication date: March 2, 2006Inventors: Alexander Wetmore, Malcolm Pearson, Wayne Cranston
-
Publication number: 20050256930Abstract: Provided is a messaging system capable of detecting and processing at least a portion of a malformed message, e.g., a message that previously failed to process. An identifier and state information for the message can be logged. Based on the stored information, a determination can be made that the message previously failed to process. The message can then progressively be de-featured until the message can be processed or until the message is determined to be poisonous, whereupon it can be deleted or otherwise removed from the message stream permanently or temporarily-including moving the message to storage for operator inspection or for delayed delivery.Type: ApplicationFiled: April 12, 2004Publication date: November 17, 2005Inventors: Malcolm Pearson, Robert Atkinson, David Reed, Steven White, Alexander Wetmore
-
Publication number: 20050192992Abstract: The present invention relates to systems and methods that determine intent for received data (e.g., email, voice, graphics . . . ) and respond to the data based on the intent. The systems and methods employ various combinations of features based on shallow and deep linguistic analysis (e.g., semantic and syntactic) to yield very high accuracy. The systems and methods analyze and categorize received data to locate data that can include intent. This data can be further refined by extracting features related to the intent. The features can be utilized by a classifier to determine the intent. If the intent warrants a response, the data are further scrutinized and reformulated to generate a description that is indicative of the intent. The reformulation can include representing the features in a logical form, transforming the form and generating a description of the intent that can be presented to a user visually and/or audibly.Type: ApplicationFiled: June 15, 2004Publication date: September 1, 2005Applicant: Microsoft CorporationInventors: David Reed, Eric Ringger, Michael Gamon, Richard Campbell, Robert Atkinson, Simon Corston, Malcolm Pearson
-
Patent number: 6595877Abstract: A basketball return net assembly is attachable to a basketball hoop support having a post extending upwardly from the ground and carrying a basketball hoop adjacent an upper end thereof. The return net assembly includes a flexible foldable return net and an elongated rigid net-carrying member extending along the upper end of the net to enable the net to be supported in a latterly-extending configuration. The upper end of the net and the net-carrying member can be suspended from an upper portion of the hoop support behind the hoop, and an attachment bracket is connected to opposite lower corner portions of the net and is adjustably securable to the post to enable the bracket to be adjusted relative thereto.Type: GrantFiled: August 15, 2001Date of Patent: July 22, 2003Assignee: Dicon Rose Inc.Inventor: Malcolm Pearson
-
Publication number: 20020025865Abstract: A basketball return net assembly is attachable to a basketball hoop support having a post extending upwardly from the ground and carrying a basketball hoop adjacent an upper end thereof. The return net assembly includes a flexible foldable return net and an elongated rigid net-carrying member extending along the upper end of the net to enable the net to be supported in a latterly-extending configuration. The upper end of the net and the net-carrying member can be suspended from an upper portion of the hoop support behind the hoop, and an attachment bracket is connected to opposite lower corner portions of the net and is adjustably securable to the post to enable the bracket to be adjusted relative thereto.Type: ApplicationFiled: August 15, 2001Publication date: February 28, 2002Inventor: Malcolm Pearson
-
Publication number: 20020010041Abstract: A portable basketball hoop assembly includes a post having at least one hinge connecting two portions thereof together to enable the post to be in an elongated operative position or a folded transportable position, a backboard and hoop carried by the post at one end thereof, and an attachment member adjacent the other end of the post to enable the post to be detachably secured to a support.Type: ApplicationFiled: May 16, 2001Publication date: January 24, 2002Inventor: Malcolm Pearson
-
Patent number: 6074313Abstract: A basketball return net assembly attachable to a basketball hoop support behind a basketball hoop carried thereby has a flexible foldable return net having an upper end with an upper sleeve portion extending therealong, an elongated rigid net-carrying member removably insertable into the upper sleeve portion to enable the net to be suspended in a laterally-extended configuration from the net-carrying member, and at least one attachment member for securing the net-carrying member to an upper portion of the hoop support behind the hoop. The net also has a lower end portion for receiving ballast to retain the lower end of the net in a laterally extended configuration at a selected location on the ground.Type: GrantFiled: October 22, 1998Date of Patent: June 13, 2000Assignee: Dicon Rose Inc.Inventor: Malcolm Pearson