Patents by Inventor Rob M. Trace

Rob M. Trace has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 9813337
    Abstract: Techniques for securing name resolution technologies and for ensuring that name resolution technologies can function in modern networks that have a plurality of overlay networks accessible via a single network interface. In accordance with some of the principles described herein, a set of resolution parameters may be implemented by a user to be used during a name resolution process. In some implementations, when an identifier is obtained for a network resource, the identifier may be stored in a cache with resolution parameters that were used in obtaining the identifier. When a new name resolution request is received, the cache may be examined to determine whether a corresponding second identifier is in the cache, and whether resolution parameters used to retrieve the second identifier in the cache match the resolution parameters for the new resolution request. If so, the second identifier may be returned from the cache.
    Type: Grant
    Filed: March 14, 2013
    Date of Patent: November 7, 2017
    Assignee: Microsoft Technology Licensing, LLC
    Inventors: Rob M. Trace, Libby Meren
  • Patent number: 8762554
    Abstract: Techniques for securing name resolution technologies and for ensuring that name resolution technologies can function in modern networks that have a plurality of overlay networks accessible via a single network interface. In accordance with some of the principles described herein, a set of resolution parameters may be implemented by a user, such as an end user or an administrator, to be used during a name resolution process for securing the process and/or for conducting the process in an overlay network. In some implementations, the set of resolution parameters may be maintained as a table of rules, and used to govern name resolution processes. For example, resolution parameters may be created that govern a DNSSEC session, or that govern how to communicate with networks implemented with Microsoft's Direct Access overlay technologies, or that govern communications using any other networking technology.
    Type: Grant
    Filed: November 20, 2012
    Date of Patent: June 24, 2014
    Assignee: Microsoft Corporation
    Inventors: Rob M. Trace, Libby Meren
  • Patent number: 8429715
    Abstract: Techniques for securing name resolution technologies and for ensuring that name resolution technologies can function in modern networks that have a plurality of overlay networks accessible via a single network interface. In accordance with some of the principles described herein, a set of resolution parameters may be implemented by a user to be used during a name resolution process. In some implementations, when an identifier is obtained for a network resource, the identifier may be stored in a cache with resolution parameters that were used in obtaining the identifier. When a new name resolution request is received, the cache may be examined to determine whether a corresponding second identifier is in the cache, and whether resolution parameters used to retrieve the second identifier in the cache match the resolution parameters for the new resolution request. If so, the second identifier may be returned from the cache.
    Type: Grant
    Filed: August 8, 2008
    Date of Patent: April 23, 2013
    Assignee: Microsoft Corporation
    Inventors: Libby Meren, Rob M. Trace
  • Patent number: 8332487
    Abstract: Techniques for securing name resolution technologies and for ensuring that name resolution technologies can function in modern networks that have a plurality of overlay networks accessible via a single network interface. In accordance with some of the principles described herein, a set of resolution parameters may be implemented by a user, such as an end user or an administrator, to be used during a name resolution process for securing the process and/or for conducting the process in an overlay network. In some implementations, the set of resolution parameters may be maintained as a table of rules, and used to govern name resolution processes. For example, resolution parameters may be created that govern a DNSSEC session, or that govern how to communicate with networks implemented with Microsoft's Direct Access overlay technologies, or that govern communications using any other networking technology.
    Type: Grant
    Filed: December 27, 2010
    Date of Patent: December 11, 2012
    Assignee: Microsoft Corporation
    Inventors: Rob M. Trace, Libby Meren
  • Publication number: 20110162039
    Abstract: Techniques for securing name resolution technologies and for ensuring that name resolution technologies can function in modern networks that have a plurality of overlay networks accessible via a single network interface. In accordance with some of the principles described herein, a set of resolution parameters may be implemented by a user, such as an end user or an administrator, to be used during a name resolution process for securing the process and/or for conducting the process in an overlay network. In some implementations, the set of resolution parameters may be maintained as a table of rules, and used to govern name resolution processes. For example, resolution parameters may be created that govern a DNSSEC session, or that govern how to communicate with networks implemented with Microsoft's Direct Access overlay technologies, or that govern communications using any other networking technology.
    Type: Application
    Filed: December 27, 2010
    Publication date: June 30, 2011
    Applicant: Microsoft Corporation
    Inventors: Rob M. Trace, Libby Meren
  • Patent number: 7917616
    Abstract: Techniques for securing name resolution technologies and for ensuring that name resolution technologies can function in modern networks that have a plurality of overlay networks accessible via a single network interface. In accordance with some of the principles described herein, a set of resolution parameters may be implemented by a user, such as an end user or an administrator, to be used during a name resolution process for securing the process and/or for conducting the process in an overlay network. In some implementations, the set of resolution parameters may be maintained as a table of rules, and used to govern name resolution processes. For example, resolution parameters may be created that govern a DNSSEC session, or that govern how to communicate with networks implemented with Microsoft's Direct Access overlay technologies, or that govern communications using any other networking technology.
    Type: Grant
    Filed: August 8, 2008
    Date of Patent: March 29, 2011
    Assignee: Microsoft Corporation
    Inventors: Rob M. Trace, Libby Meren
  • Publication number: 20100107240
    Abstract: A client computer that supports different behaviors when connected to a private network behind a network firewall than when outside the network firewall and connected indirectly through an access device. The client computer is configured to attempt communication with a device on the network. Based on the response, the client computer can determine that it is behind the network firewall, and therefore can operate with less restrictive security or settings for other parameters appropriate for when the client is directly connected to the network. Alternatively, the client computer may determine that it is indirectly connected to the network through the Internet or other outside network, and therefore, because it is outside the private network firewall, should operate with more restrictive security or settings of other parameters more appropriate for use in that network location.
    Type: Application
    Filed: January 22, 2009
    Publication date: April 29, 2010
    Applicant: Microsoft Corporation
    Inventors: David Thaler, Rob M. Trace, Deon C. Brewis, Arun K. Buduri, Bill Begorre, Scott Roberts, Srinivas Raghu Gatta, Gerardo Diaz Cuellar
  • Publication number: 20100034381
    Abstract: Techniques for securing name resolution technologies and for ensuring that name resolution technologies can function in modern networks that have a plurality of overlay networks accessible via a single network interface. In accordance with some of the principles described herein, a set of resolution parameters may be implemented by a user to be used during a name resolution process. In some implementations, when an identifier is obtained for a network resource, the identifier may be stored in a cache with resolution parameters that were used in obtaining the identifier. When a new name resolution request is received, the cache may be examined to determine whether a corresponding second identifier is in the cache, and whether resolution parameters used to retrieve the second identifier in the cache match the resolution parameters for the new resolution request. If so, the second identifier may be returned from the cache.
    Type: Application
    Filed: August 8, 2008
    Publication date: February 11, 2010
    Applicant: Microsoft Corporation
    Inventors: Rob M. Trace, Libby Meren
  • Publication number: 20100036959
    Abstract: Techniques for securing name resolution technologies and for ensuring that name resolution technologies can function in modern networks that have a plurality of overlay networks accessible via a single network interface. In accordance with some of the principles described herein, a set of resolution parameters may be implemented by a user, such as an end user or an administrator, to be used during a name resolution process for securing the process and/or for conducting the process in an overlay network. In some implementations, the set of resolution parameters may be maintained as a table of rules, and used to govern name resolution processes. For example, resolution parameters may be created that govern a DNSSEC session, or that govern how to communicate with networks implemented with Microsoft's Direct Access overlay technologies, or that govern communications using any other networking technology.
    Type: Application
    Filed: August 8, 2008
    Publication date: February 11, 2010
    Applicant: Microsoft Corporation
    Inventors: Rob M. Trace, Libby Meren
  • Patent number: 6957274
    Abstract: Concurrent access to a first networking connection, such as an Internet connection, and a second networking connection, such as a virtual private networking (VPN) connection, is disclosed. The first connection is established, adding first default routes to a routing table. The first routes are associated with the first connection and have priority. The second connection is established, adding second default routes to the routing table. The second routes are associated with the second connection, and have priority over the first routes. Specific routes associated with the second connection are added from a preset routing file to the routing table. The second routes are removed, regaining priority for the first routes. Data packets intended for the second connection are routed according to the specific routes added to the routing table from the preset table. Other data packets are routed to the first connection according to the first routes.
    Type: Grant
    Filed: June 27, 2001
    Date of Patent: October 18, 2005
    Assignee: Microsoft Corporation
    Inventors: Rob M. Trace, Donald H. Rule, Nicholas P. Ball
  • Publication number: 20030046397
    Abstract: Concurrent access to a first networking connection, such as an Internet connection, and a second networking connection, such as a virtual private networking (VPN) connection, is disclosed. The first connection is established, adding first default routes to a routing table. The first routes are associated with the first connection and have priority. The second connection is established, adding second default routes to the routing table. The second routes are associated with the second connection, and have priority over the first routes. Specific routes associated with the second connection are added from a preset routing file to the routing table. The second routes are removed, regaining priority for the first routes. Data packets intended for the second connection are routed according to the specific routes added to the routing table from the preset table. Other data packets are routed to the first connection according to the first routes.
    Type: Application
    Filed: June 27, 2001
    Publication date: March 6, 2003
    Inventors: Rob M. Trace, Donald H. Rule, Nicholas P. Ball
  • Publication number: 20020199020
    Abstract: A new method and naming proxy are disclosed for resolving resource names over multiple subnets interconnected via a machine having multiple network interfaces. The discloses system comprises a network naming proxy server embedded within the multi-interface machine. The naming proxy executes resource discovery requests over the multiple interfaces. The machine executes a RAS server that supports connections to a RAS client on a first interface and a local area network on a second interface. The naming proxy receives requests on the first interface and forwards naming queries corresponding to the received requests via the second interface. The naming proxy includes a resource name-to-address cache for temporarily storing the addresses that it receives for resources connected via the multiple network interfaces.
    Type: Application
    Filed: June 25, 2001
    Publication date: December 26, 2002
    Applicant: Microsoft Corporation
    Inventors: Rob M. Trace, Mohammad Shabbir Alam