Patents by Inventor Dennis A. Morgan

Dennis A. Morgan has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 8250641
    Abstract: In some embodiments, the invention involves securing network traffic to and from a host processor. A system and method is disclosed which utilizes a second processor on a virtualization technology platform to send/receive and triage messages. The second processor is to forward suspect messages to a virtual appliance for further investigation before routing the suspect messages to one of a plurality of virtual machines running on the host processor. When messages are not suspect, use of the virtual appliance is avoided and messages are routed to one of a plurality of virtual machines via a virtual machine manager running on the host processor. Other embodiments are described and claimed.
    Type: Grant
    Filed: September 17, 2007
    Date of Patent: August 21, 2012
    Assignee: Intel Corporation
    Inventors: Dennis Morgan, Alan D. Ross
  • Patent number: 8210405
    Abstract: The invention is a versatile, but simple, rifle sling for carrying a rifle, shotgun, or other long gun over one shoulder. The sling can be attached to the rifle by use of studs or swivels in a conventional manner or can be attached directly to the firearm by using the adjustable loops at each end of the sling. It is constructed from a single strip of leather without the use of any hardware such as buckles, clasps, clamps, hooks, rivets, screws or other devices. Each of the adjustable loops are formed from slide-lock knots.
    Type: Grant
    Filed: October 13, 2009
    Date of Patent: July 3, 2012
    Inventor: Dennis Morgan Pritchard
  • Patent number: 8108670
    Abstract: In some embodiments, an apparatus comprises a certificate store to store a current certificate associated with a key pair including a current public key and a current private key; a policy decision point (PDP) module to monitor the certificate store and to ascertain whether the current certificate has expired or is expiring; and a key manager, based at least in part on the PDP module determining that the current certificate has expired or is expiring, being adapted to identify encrypted information encrypted with an encrypting key of the key pair and to decrypt the encrypted information with a decrypting key of the key pair to obtain unencrypted information.
    Type: Grant
    Filed: July 13, 2006
    Date of Patent: January 31, 2012
    Assignee: Intel Corporation
    Inventors: Dennis Morgan, Alan D. Ross
  • Publication number: 20110302658
    Abstract: A method, apparatus, and system enable a secure location-aware platform. Specifically, embodiments of the present invention may utilize a secure processing partition on the platform to determine a location of the platform and dynamically apply and/or change security controls accordingly.
    Type: Application
    Filed: August 19, 2011
    Publication date: December 8, 2011
    Inventor: Dennis Morgan
  • Patent number: 8024806
    Abstract: A method, apparatus and system enable a secure location-aware platform. Specifically, embodiments of the present invention may utilize a secure processing partition on the platform to determine a location of the platform and dynamically apply and/or change security controls accordingly.
    Type: Grant
    Filed: October 17, 2006
    Date of Patent: September 20, 2011
    Assignee: Intel Corporation
    Inventor: Dennis Morgan
  • Patent number: 7818673
    Abstract: The claimed method and system provides a graphical user interface that illustrates network topology information, including connection paths between devices on the local network and an external network such as the Internet. The claimed method and system may use a three column format for presenting the topology that is more intuitive for a user. Also, the claimed method and system may aggregate context and connection information from multiple different protocols to provide the topology display. Further, the claimed method and system may use a device registry to enable customized and extensible representations of the network devices.
    Type: Grant
    Filed: August 27, 2009
    Date of Patent: October 19, 2010
    Assignee: Microsoft Corporation
    Inventors: Aaron Cunningham, Marieke I. Watson, Patrice L. Miner, Alexandru Gavrilescu, Haiyong Wang, Dennis Morgan
  • Patent number: 7693838
    Abstract: A security manager receives a request for data that is subject to data security management. The security manager operates independently of a host partition and is not directly accessible or detectable by the host partition. The security manager determines whether to grant or deny access to the requested data based at least in part on a requesting user's authentication credentials. If the data request is approved, a security policy associated with the data is determined. In addition, instructions are sent to a system hypervisor to create a secure partition. The hypervisor loads the requested data and a verified version of an application necessary to access the data into the secure partition creating a secure environment for accessing the data.
    Type: Grant
    Filed: November 12, 2005
    Date of Patent: April 6, 2010
    Assignee: Intel Corporation
    Inventors: Dennis Morgan, Alan D. Ross
  • Publication number: 20100064225
    Abstract: The claimed method and system provides a graphical user interface that illustrates network topology information, including connection paths between devices on the local network and an external network such as the Internet. The claimed method and system may use a three column format for presenting the topology that is more intuitive for a user. Also, the claimed method and system may aggregate context and connection information from multiple different protocols to provide the topology display. Further, the claimed method and system may use a device registry to enable customized and extensible representations of the network devices.
    Type: Application
    Filed: August 27, 2009
    Publication date: March 11, 2010
    Applicant: MICROSOFT CORPORATION
    Inventors: Aaron Cunningham, Marieke I. Watson, Patrice L. Miner, Alexandru Gavrilescu, Haiyong Wang, Dennis Morgan
  • Patent number: 7616633
    Abstract: A software network bridge which allows connected network segments to be presented as a single network unit to the host computer. The software bridge can be implemented as an intermediate network driver, abstracting multiple network segments into a single network interface for higher level protocols and applications. The intermediate network driver can simultaneously send the same data packet through multiple network interfaces by creating multiple packet descriptors, each pointing to the same data, but each given individually to the underlying network interfaces to control during their transmission.
    Type: Grant
    Filed: June 29, 2005
    Date of Patent: November 10, 2009
    Assignee: Microsoft Corporation
    Inventors: Mark A. Aiken, Gurdeep S. Pall, Dennis A. Morgan
  • Patent number: 7587675
    Abstract: The claimed method and system provides a graphical user interface that illustrates network topology information, including connection paths between devices on the local network and an external network such as the Internet. The claimed method and system may use a three column format for presenting the topology that is more intuitive for a user. Also, the claimed method and system may aggregate context and connection information from multiple different protocols to provide the topology display. Further, the claimed method and system may use a device registry to enable customized and extensible representations of the network devices.
    Type: Grant
    Filed: February 28, 2006
    Date of Patent: September 8, 2009
    Assignee: Microsoft Corporation
    Inventors: Aaron Cunningham, Marieke I. Watson, Patrice L. Miner, Alexandru Gavrilescu, Haiyong Wang, Dennis Morgan
  • Patent number: 7565685
    Abstract: Apparatuses and methods provide operating system independent digital rights management. A request can be made for data, which can be monitored by a security module. The security module is independent of a host operating system and manages digital rights for the requested data. Thus, digital rights management occurs outside the context of a host operating system. The security module may classify the data and determine a security policy based on the data classification. Policy may be stored locally or remotely, and may be associated with the data subject to the policy.
    Type: Grant
    Filed: November 12, 2005
    Date of Patent: July 21, 2009
    Assignee: Intel Corporation
    Inventors: Alan D. Ross, Dennis Morgan
  • Patent number: 7559082
    Abstract: A method for a firewall-aware application to communicate its expectations to a firewall without requiring the firewall to change its policy or compromise network security. An application API is provided for applications to inform a firewall or firewalls of the application's needs, and a firewall API is provided that informs the firewall or firewalls of the application's needs. An interception module watches for connect and listen attempts by applications and services to the network stack on the local computer. The interception module traps these attempts and determines what user is making the attempt, what application or service is making the attempt, and conducts a firewall policy look-up to determine whether the user and/or application or service are allowed to connect to the network. If so, the interception module may instruct the host and/or edge firewall to configure itself for the connection being requested.
    Type: Grant
    Filed: June 25, 2003
    Date of Patent: July 7, 2009
    Assignee: Microsoft Corporation
    Inventors: Dennis Morgan, Alexandru Gavrilescu, Jonathan L. Burstein, Art Shelest, David LeBlanc
  • Publication number: 20090172799
    Abstract: Methods, systems, and articles to receive, by a fail-over computing device, a request to instantiate a virtual-machine in response to a virtual-machine failure on a separate physical device. The request includes a minimum security rating. The fail-over computing device then compares the minimum security rating against an assigned security rating of the fail-over computing device and instantiates the virtual-machine if the assigned security rating meets or exceeds the minimum security rating.
    Type: Application
    Filed: December 31, 2007
    Publication date: July 2, 2009
    Inventor: Dennis Morgan
  • Publication number: 20090073895
    Abstract: In some embodiments, the invention involves securing network traffic to and from a host processor. A system and method is disclosed which utilizes a second processor on a virtualization technology platform to send/receive and triage messages. The second processor is to forward suspect messages to a virtual appliance for further investigation before routing the suspect messages to one of a plurality of virtual machines running on the host processor. When messages are not suspect, use of the virtual appliance is avoided and messages are routed to one of a plurality of virtual machines via a virtual machine manager running on the host processor. Other embodiments are described and claimed.
    Type: Application
    Filed: September 17, 2007
    Publication date: March 19, 2009
    Inventors: Dennis Morgan, Alan D. Ross
  • Publication number: 20080163204
    Abstract: Methods, apparatuses, articles, and systems for an inventory agent and/or a policy agent of a computing device are described herein. In various embodiments, the inventory agent may be adapted to determine a count of a plurality of virtual machines on the computing device and notify an inventory server of the determined count. The policy agent, in some embodiments, may be adapted to receive an instruction to instantiate or shut down a virtual machine of the plurality of virtual machines of the apparatus, and conditionally disallow the instruction if the instruction does not meet criteria specified by a policy. The computing device may have either or both of the inventory agent or policy agent, either or both of the agents residing on either or both of a management controller of the computing device or a service operating system of the computing device.
    Type: Application
    Filed: December 29, 2006
    Publication date: July 3, 2008
    Inventors: Dennis Morgan, Alan D. Ross
  • Publication number: 20080092236
    Abstract: A method, apparatus and system enable a secure location-aware platform. Specifically, embodiments of the present invention may utilize a secure processing partition on the platform to determine a location of the platform and dynamically apply and/or change security controls accordingly.
    Type: Application
    Filed: October 17, 2006
    Publication date: April 17, 2008
    Inventor: Dennis Morgan
  • Publication number: 20080016337
    Abstract: In some embodiments, an apparatus comprises a certificate store to store a current certificate associated with a key pair including a current public key and a current private key; a policy decision point (PDP) module to monitor the certificate store and to ascertain whether the current certificate has expired or is expiring; and a key manager, based at least in part on the PDP module determining that the current certificate has expired or is expiring, being adapted to identify encrypted information encrypted with an encrypting key of the key pair and to decrypt the encrypted information with a decrypting key of the key pair to obtain unencrypted information.
    Type: Application
    Filed: July 13, 2006
    Publication date: January 17, 2008
    Inventors: Dennis Morgan, Alan D. Ross
  • Patent number: 7320092
    Abstract: A software tool and method are provided which allow an unsophisticated user to easily determine or identify problems in a networked computer system. The software tool comprises a diagnostic component adapted to determine at least one attribute associated with the computer system, and a user interface component adapted to launch the diagnostic component and to render the attribute to a user. The diagnostic component may obtain first information related to a local host computer, and selectively perform one or more tests associated with the local host computer according to the first information. The diagnostic component then determines the attribute according to the first information and/or the test results. A self-healing networked computer system is also disclosed, comprising the diagnostic component and a remedial object adapted to perform one or more remedial actions according to the attribute.
    Type: Grant
    Filed: August 21, 2006
    Date of Patent: January 15, 2008
    Assignee: Microsoft Corporation
    Inventors: Dennis A. Morgan, David V. Gunter, Benjamin E. Nick, Sherwood H. Lawrence
  • Publication number: 20070204231
    Abstract: The claimed method and system provides a graphical user interface that illustrates network topology information, including connection paths between devices on the local network and an external network such as the Internet. The claimed method and system may use a three column format for presenting the topology that is more intuitive for a user. Also, the claimed method and system may aggregate context and connection information from multiple different protocols to provide the topology display. Further, the claimed method and system may use a device registry to enable customized and extensible representations of the network devices.
    Type: Application
    Filed: February 28, 2006
    Publication date: August 30, 2007
    Applicant: MICROSOFT CORPORATION
    Inventors: Aaron Cunningham, Marieke Watson, Patrice Miner, Alexandru Gavrilescu, Haiyong Wang, Dennis Morgan
  • Patent number: 7254136
    Abstract: A system and method is provided for detecting, monitoring and maintaining an Internet Connection Sharing Device (ICSD). An ICSD may be connected to one or more devices, and/or applications associated with a Local Area Network (LAN), which devices, and/or applications, may attempt to detect, monitor and maintain the ICSD. Thus, a broadcast protocol for advertising status and services and a unicast request/response protocol are provided to facilitate such detection, monitoring and maintenance.
    Type: Grant
    Filed: February 27, 2001
    Date of Patent: August 7, 2007
    Assignee: Microsoft Corporation
    Inventors: David V. Gunter, Dennis A. Morgan, Kenneth L. Crocker, Eduard Guzovsky, Richard H. Lamb, Bruce Johnson