Patents Represented by Attorney Collins & Collins Intellectual, LLC
  • Patent number: 8347085
    Abstract: At computer device power on, the operating system of the computer device initiates a monitor. The monitor assigns a monitoring program to each program and object (collectively, “program”) running on the computer device to monitor the activities of the program. When the monitoring program is assigned to a program, the monitoring program is assigned an integrity and/or privacy label (collectively, “integrity label”) based on predetermined criteria applied to the monitored program. The monitoring program, in turn, assigns an integrity label to the program monitored by the monitoring program. The integrity label assigned to the monitored program is less than or equal to the integrity label of the monitoring program. The monitor enforces an integrity policy of the computer device based on the integrity label assigned to monitored programs and the integrity label associated with data, another program, or a remote network resource that the monitored program is seeking to access.
    Type: Grant
    Filed: December 30, 2011
    Date of Patent: January 1, 2013
    Assignee: Microsoft Corporation
    Inventors: Thekkthalackal Varugis Kurien, Jeffrey B Hamblin, Narasimha Rao Nagampalli, Peter T Brundrett, Scott Field
  • Patent number: 8346974
    Abstract: A standardized 802.11 hardware control interface may be provided such that a driver may communicate with any one or more of a variety of network adapters.
    Type: Grant
    Filed: July 27, 2007
    Date of Patent: January 1, 2013
    Assignee: Microsoft Corporation
    Inventors: Jiandong Ruan, Thomas W. Kuehnel
  • Patent number: 8346973
    Abstract: Technologies, systems, and methods for ordered message delivery that avoid message races or crisscrosses between communicating nodes. For example, if Node A sends message 3 towards Node B and, shortly thereafter, Node B sends message X to Node A, Node A would like to know whether or not message X reflects Node B's state after receiving message 3. If Node B received message 3 prior to sending message X, then proper state may be maintained between the nodes. But if messages 3 and X crisscrossed, or if message 3 was never properly received by Node B, then the state between the nodes may be corrupt. Technologies, systems, and methods are provided to avoid such corruption.
    Type: Grant
    Filed: June 25, 2010
    Date of Patent: January 1, 2013
    Assignee: Microsoft Corporation
    Inventors: Atul Adya, Alastair Wolman, John D. Dunagan
  • Patent number: 8332822
    Abstract: The present examples provide technologies for estimating code failure proneness probabilities for a code set and/or the files that make up the set. The code set being evaluated is typically comprised of binary and/or source files that embody the software for which the estimates are desired. The estimates are typically based on a set of selected code metrics, the code metrics typically selected based on corresponding failures of a previous version of the software. A historically variant metric feedback factor may also be calculated and code metric values classified relative to a baseline code set embodying the previous version of the software.
    Type: Grant
    Filed: March 7, 2011
    Date of Patent: December 11, 2012
    Assignee: Microsoft Corporation
    Inventors: Nachiappan Nagappan, Thirumalesh Bhat
  • Patent number: 8332357
    Abstract: A method for synchronizing files is provided. Current metadata including a filename and a hash identifier for each file of the synchronized folder is created. The current metadata is compared to previous metadata. Based on the comparison, a first file and a first folder added to the synchronized folder and a second file and a second folder deleted from the synchronized folder are identified. The hash identifiers of the first and second files are compared. If the hash identifiers match, the filenames of the first and second files are compared. If the filenames do not match, the first file is identified as a renamed file. Metadata is sent to a synchronized device with information related to the first folder sent before information related to the first file, which is sent before information related to the second folder.
    Type: Grant
    Filed: June 10, 2011
    Date of Patent: December 11, 2012
    Assignee: Microsoft Corporation
    Inventor: Richard Y. Chung
  • Patent number: 8327135
    Abstract: A software based wireless infrastructure system is provided. The system has a driver that communicates with the network stack and a network interface card (NIC), a station server in communication with the station driver and an 802.1X supplicant or an 802.1X authenticator. Each NIC provides station and/or access point functionality support. The driver drops packets that have been received if the packet has not been authenticated and associated. Packets that have been fragmented or encrypted are unfragmented and decrypted. An association manager is used in conjunction with a configuration table manager to associate stations and access points via management packets. A manager receives 802.1X data packets from the packet processor and sends them up to a station server that communicates with user mode applications and an 802.1X supplicant or an 802.1X authenticator that are used to authenticate and deauthenticate stations and access points. APIs are provided to enable communication between the components.
    Type: Grant
    Filed: January 23, 2007
    Date of Patent: December 4, 2012
    Assignee: Microsoft Corporation
    Inventors: Abhishek Abhishek, Arun Ayyagari, Hui Shen, Krishna Ganugapati, Jiandong Ruan
  • Patent number: 8327030
    Abstract: Technologies, systems, and methods for ordered message delivery that avoid message races or crisscrosses between communicating nodes. For example, if Node A sends message 3 towards Node B and, shortly thereafter, Node B sends message X to Node A, Node A would like to know whether or not message X reflects Node B's state after receiving message 3. If Node B received message 3 prior to sending message X, then proper state may be maintained between the nodes. But if messages 3 and X crisscrossed, or if message 3 was never properly received by Node B, then the state between the nodes may be corrupt. Technologies, systems, and methods are provided to avoid such corruption.
    Type: Grant
    Filed: June 25, 2010
    Date of Patent: December 4, 2012
    Assignee: Microsoft Corporation
    Inventors: Atul Adya, Alastair Wolman, John D. Dunagan
  • Patent number: 8326834
    Abstract: Described is using density to efficiently mine co-location patterns, such as closely located businesses frequently found together in business listing databases, geographic search logs, and/or GPS-based data. A data space of such information is geographically partitioned into a grid of cells, with dense cells scanned first. A dynamic upper bound of prevalence measure of co-location patterns is maintained during the scanning process. If the current upper bound is smaller than a threshold, the scanning is stopped, thereby significantly reducing the computation cost for processing many cells, while providing suitable results.
    Type: Grant
    Filed: June 25, 2008
    Date of Patent: December 4, 2012
    Assignee: Microsoft Corporation
    Inventors: Xiangye Xiao, Xing Xie, Wei-Ying Ma
  • Patent number: 8321583
    Abstract: Methods of tuning a receive window. A receiving device and a sending device may be in communication over a network. The receiving device may advertise a receive window to the sending device. The size of the receive window may be adjusted over time based on one or more connection parameters, application parameters and/or operating system parameters.
    Type: Grant
    Filed: February 14, 2012
    Date of Patent: November 27, 2012
    Assignee: Microsoft Corporation
    Inventors: Kevin T. Weston, Abolade Gbadegesin, Deepak Bansal, Murari Sridharan, Sanjay N. Kaniyar
  • Patent number: 8315964
    Abstract: Technologies for a human computation framework suitable for answering common sense questions that are difficult for computers to answer but easy for humans to answer. The technologies support solving general common sense problems without a priori knowledge of the problems; support for determining whether an answer is from a bot or human so as to screen out spurious answers from bots; support for distilling answers collected from human users to ensure high quality solutions to the questions asked; and support for preventing malicious elements in or out of the system from attacking other system elements or contaminating the solutions produced by the system, and preventing users from being compensated without contributing answers.
    Type: Grant
    Filed: October 27, 2008
    Date of Patent: November 20, 2012
    Assignee: Microsoft Corporation
    Inventors: Shipeng Li, Yang Yang, Bin Benjamin Zhu, Rui Guo, Linjun Yang
  • Patent number: 8291093
    Abstract: A network in which peer-to-peer remediation is provided to keep clients in the network up-to-date. As network clients establish peer-to-peer connections, they exchange status information. The status information allows the clients to mutually identify whether one client is more out-of-date than another. The more up-to-date client provides update information to the more out-of-date client. To preserve the integrity of the update process, updates are provided as signed binary files and are only applied by the client receiving the update if the binary file may be authenticated by the recipient.
    Type: Grant
    Filed: December 8, 2005
    Date of Patent: October 16, 2012
    Assignee: Microsoft Corporation
    Inventor: Calvin Choon-Hwan Choe
  • Patent number: 8286223
    Abstract: Software for managing access control functions in a network. The software includes a host that receives access control commands or information and calls one or more methods. The methods perform access control functions and communicate access control results or messages to be transmitted. The host may be installed in a network peer seeking access to the network or in a server controlling access to the network. When installed in a peer, the host receives commands and exchanges information with a supplicant. When installed in an access control server, the host receives commands and exchanges information with an authenticator. The host has a flexible architecture that enables multiple features, such as allowing the same methods to be used for authentication by multiple supplicants, providing ready integration of third party access control software, simplifying network maintenance by facilitating upgrades of authenticator software and enabling access control functions other than peer authentication.
    Type: Grant
    Filed: July 8, 2005
    Date of Patent: October 9, 2012
    Assignee: Microsoft Corporation
    Inventors: Anthony M. Leibovitz, Mark C. Schurman, Mudit Goel, Paul G. Mayfield, Sudhakar Pasupuleti, Taroon Mandhana, Vivek P. Kamath, Wei Zheng, Xuemei Bao
  • Patent number: 8286056
    Abstract: A method for calculating an extended hamming checksum and applying the extended hamming checksum to a data packet, the method comprising forming a packet extended hamming checksum mask, calculating a hamming code, calculating an extended hamming checksum using the packet extended hamming checksum mask and the hamming code, and inserting the extended hamming checksum into the data packet.
    Type: Grant
    Filed: January 20, 2009
    Date of Patent: October 9, 2012
    Assignee: Microsoft Corporation
    Inventors: Daniel M. Sangster, Robert A. Kleewein, Nino Aldrin L. Sarmiento
  • Patent number: 8261071
    Abstract: Stateless human detection for real-time systems allows a real-time message system to challenge incoming messages suspected of being generated by an automated application. When a suspect message is detected, a challenge is presented to a sender of the message. The challenge is designed to require human intervention to provide a correct answer to the challenge. A challenge packet is sent with the challenge and includes a challenge answer and, possibly, a server identifier, a challenge identifier and/or a time stamp that can be used to prevent attacks on the challenge. The challenge packet is encrypted so that the sender cannot access the contents thereof. When the sender provides a response to the challenge, the sender returns the challenge packet. The challenge packet is decrypted and the challenge answer is compared to a sender answer. If the answers match, the sender is allowed subsequent access to the messaging system.
    Type: Grant
    Filed: January 31, 2006
    Date of Patent: September 4, 2012
    Assignee: Microsoft Corporation
    Inventors: Jeremy T. Buch, Vladimir Eminovici
  • Patent number: 8255451
    Abstract: Technologies for enabling a continuation based runtime to accept or reject external stimulus and, in addition, to determine if an external stimulus may be valid for processing at a later point in execution.
    Type: Grant
    Filed: September 17, 2008
    Date of Patent: August 28, 2012
    Assignee: Microsoft Corporation
    Inventors: Kenneth David Wolf, Justin David Brown, Karthik Raman, Nathan Christopher Talbert, Edmund Samuel Victor Pinto
  • Patent number: 8255387
    Abstract: Technologies for forming logical indexes and utilizing such indexes so as to abstract many of the complexities resulting from referencing partitioned database tables. Included are technologies for making use of order-preserving properties of table metadata, for adding a partition equality predicate to an explicit predicate in merge-join processing on partitioned tables, and for selecting execution of a logical skip scan on a partitioned table when a query predicate does not reference a specific partition. Such technologies generally abstract from the query writer and processing systems explicit referencing of table partitions.
    Type: Grant
    Filed: July 9, 2010
    Date of Patent: August 28, 2012
    Assignee: Microsoft Corporation
    Inventors: Cesar A. Galindo-Legaria, Craig S. Freedman, Milind M. Joshi
  • Patent number: 8245534
    Abstract: Various application-centric user interface techniques are described. A user can easily launch, add, or update applications. An application-centric activity center can be presented as part of a user interface for an operating system shell. A file defining metadata for an application can be defined. The techniques can be applied to game-related software.
    Type: Grant
    Filed: March 30, 2010
    Date of Patent: August 21, 2012
    Assignee: Microsoft Corporation
    Inventors: C. Shane Evans, Roderick M. Toll, G. Andrew Johnston, II
  • Patent number: 8244862
    Abstract: A method of measuring, for communication paths between a networked computer and at least one other networked computer connected via a network performance, network information to detect network performance degradation and diagnose source(s) of the performance degradation. The diagnosis may be performed by a progressive elimination of possible sources. Network performance degradation may be attributed to problems at a local network or the Internet. The problem sources on the Internet may comprise, for example, an internet server provider (ISP) or a single remote server in communication with the networked computer. A network performance baseline established and maintained for each path may be employed in diagnosing the network performance degradation.
    Type: Grant
    Filed: July 15, 2011
    Date of Patent: August 14, 2012
    Assignee: Microsoft Corporation
    Inventors: Tin Qian, Aravind Ramarathinam, Michael Bishop
  • Patent number: 8244057
    Abstract: Removal of the effects of dust or other impurities on image data is described. In one example, a model of artifact formation from sensor dust is determined. From the model of artifact formation, contextual information in the image and a color consistency constraint may be applied on the dust to remove the dust artifacts. Artifacts may also be removed from multiple images from the same or different cameras or camera settings.
    Type: Grant
    Filed: October 30, 2007
    Date of Patent: August 14, 2012
    Assignee: Microsoft Corporation
    Inventors: Stephen Lin, Baining Guo, Changyin Zhou
  • Patent number: 8245051
    Abstract: Systems and methods directed at enhancing the capability of a federated authentication system by configuring the system with extensibility points for adding new account stores and customizing claim transformations. The federated authentication system includes accounts stores, a security token service (STS), and custom claim transformation modules. The account stores are configured to maintain data associated with accounts and to provide security claims in an intermediate format. The STS is configured to retrieve the security claims provided by the account stores and includes built-in transformations for transforming each security claim from the intermediate format to formats associated with resource providers. The STS is further configured to provide extensibility points for custom claim transformations that are not available from the built-in transformations. The custom claim transformation modules are configured to perform at least one custom claim transformation.
    Type: Grant
    Filed: May 13, 2005
    Date of Patent: August 14, 2012
    Assignee: Microsoft Corporation
    Inventors: Ryan D. Johnson, Donald E. Schmidt, Jeffrey F. Spelman, Kahren Tevosyan, Vijayavani Nori