Patents by Inventor Douglas A. Walter
Douglas A. Walter has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 8051469Abstract: A cryptographic session key is utilized to maintain security of a digital identity. The session key is valid only for a limited period of time. Additional security is provided via a bimodal credential allowing different levels of access to the digital identify. An identity token contains pertinent information associated with the digital identity. The identity token is encrypted utilizing public-key cryptography. An identifier utilized to verify the validity of the digital identity is encrypted with the cryptographic session key. The encrypted identity token and the encrypted identifier are provided to a service for example. The service decrypts the encrypted identity token utilizing public key cryptography, and decrypts, with the cryptographic session key obtained from the identity token, the encrypted identifier. If the identifier is determined to be valid, the transaction proceeds normally. If the identifier is determined to be invalid, the transaction is halted.Type: GrantFiled: November 17, 2009Date of Patent: November 1, 2011Assignee: Microsoft CorporationInventors: John P. Shewchuk, Arun K. Nanda, Donald F. Box, Douglas A. Walter, Hervey O. Wilson
-
Patent number: 8036414Abstract: This invention provides an audio speaker with improved physical safety isolation between a voice coil and other electrically live elements.Type: GrantFiled: December 21, 2007Date of Patent: October 11, 2011Inventors: John B. French, Douglas Walter Hansen
-
Patent number: 7860989Abstract: In a computerized system, a sending computer system and recipient computer system exchange an interchange format message in a resource-efficient manner. For example, a transformation writer at the sending computer system selects and transforms only one or few of a plurality of units of the message at the time. The transformed message units are then streamed to the recipient computer system in accordance with a relevant transformation standard, such as the canonicalization standard in the case of XML messages. A transformation reader at the recipient computer system transforms the messages using a buffer big enough for received message units, and passes the transformed units to a file. Thus, the transformation writer acts as a stream writer to pass a message, and the transformation reader acts as a stream reader at the recipient computer system.Type: GrantFiled: February 2, 2005Date of Patent: December 28, 2010Assignee: Microsoft CorporationInventors: Vaithialingam B. Balayoghan, Douglas A. Walter, Giovanni Della-Libera
-
Patent number: 7836489Abstract: The present invention extends to methods, systems, and computer program products for selecting policy for compatible communication. Hierarchical policy document data structures represent communication (e.g., security) aspects and options such that lower aspects and options are accessed in the context of corresponding higher aspects and options to define applicable scope. Use of a hierarchical description also facilitates separation of what is being protected from how it is being protected thereby allowing security policy to be considered at different locations of a description document.Type: GrantFiled: June 15, 2006Date of Patent: November 16, 2010Assignee: Microsoft CorporationInventors: Christopher G. Kaler, Douglas A. Walter, Martin Gudgin
-
Publication number: 20100162275Abstract: The present invention extends to methods, systems, and computer program products for controlling applications through inter-process communication. Applications are extended with application specific extensibility points. The application specific extensibility points permit applications that natively lack inter-process communication capabilities to participate in inter-process communication. Application specific extensibility points can provide an application with a Web based interface thereby making the functionality of the application available to other Web services and other extended applications. Accordingly, application specific extensibility points extend the functionality of applications to interoperate and be integrated with other Web services and other extended applications.Type: ApplicationFiled: December 19, 2008Publication date: June 24, 2010Applicant: Microsoft Corporation WayInventors: Quetzalcoatl Bradley, Lui Lui Wong, Douglas A. Walter
-
Publication number: 20100088672Abstract: The subject disclosure relates to a syntax for a scripting language that allows data intensive applications to be written in a compact, human friendly, textual format. The scripting language can be a declarative programming language, such as the “D” programming language, which is well suited to the authoring of data intensive programs. A compact query syntax is provided for D that simplifies the expression of complex and data intensive programs. In another non-limiting aspect, conventional operator precedence is modified to accommodate the compact syntax and other unique features of a general purpose declarative programming language.Type: ApplicationFiled: October 3, 2008Publication date: April 8, 2010Applicant: MICROSOFT CORPORATIONInventors: David E. Langworthy, Bradford H. Lovering, Donald F. Box, Douglas A. Walter, Giovanni M. Della-Libera, Jeffrey S. Pinkston, John D. Doty, John L. Hamby
-
Publication number: 20100064361Abstract: A cryptographic session key is utilized to maintain security of a digital identity. The session key is valid only for a limited period of time. Additional security is provided via a bimodal credential allowing different levels of access to the digital identify. An identity token contains pertinent information associated with the digital identity. The identity token is encrypted utilizing public-key cryptography. An identifier utilized to verify the validity of the digital identity is encrypted with the cryptographic session key. The encrypted identity token and the encrypted identifier are provided to a service for example. The service decrypts the encrypted identity token utilizing public key cryptography, and decrypts, with the cryptographic session key obtained from the identity token, the encrypted identifier. If the identifier is determined to be valid, the transaction proceeds normally. If the identifier is determined to be invalid, the transaction is halted.Type: ApplicationFiled: November 17, 2009Publication date: March 11, 2010Applicant: Microsoft CorporationInventors: John P. Shewchuk, Arun K. Nanda, Donald F. Box, Douglas A. Walter, Hervey O. Wilson
-
Patent number: 7640579Abstract: A cryptographic session key is utilized to maintain security of a digital identity. The session key is valid only for a limited period of time. Additional security is provided via a bimodal credential allowing different levels of access to the digital identify. An identity token contains pertinent information associated with the digital identity. The identity token is encrypted utilizing public-key cryptography. An identifier utilized to verify the validity of the digital identity is encrypted with the cryptographic session key. The encrypted identity token and the encrypted identifier are provided to a service for example. The service decrypts the encrypted identity token utilizing public key cryptography, and decrypts, with the cryptographic session key obtained from the identity token, the encrypted identifier. If the identifier is determined to be valid, the transaction proceeds normally. If the identifier is determined to be invalid, the transaction is halted.Type: GrantFiled: September 9, 2005Date of Patent: December 29, 2009Assignee: Microsoft CorporationInventors: John P. Shewchuk, Arun K. Nanda, Donald F. Box, Douglas A. Walter, Hervey O. Wilson
-
Patent number: 7636939Abstract: A data structure with endpoint address and security information. The data structure includes an address field that includes one or more endpoint addresses for an entity. The data structure further includes a security field that includes one or more keys for facilitating secure communications with the entity. The data structure may also be such that the contents of the address field and the security field are serialized in the data structure. The data structure may be extensible such that new address fields and security fields may be added.Type: GrantFiled: December 10, 2004Date of Patent: December 22, 2009Assignee: Microsoft CorporationInventors: Christopher G. Kaler, Douglas A. Walter, Giovanni M. Della-Libera, Melissa W. Dunn, Richard L. Hasha, Tomasz Janczuk
-
Publication number: 20090217383Abstract: Well-defined messages may be transmitted from a sending device to a recipient device in order to reduce the processing and resource requirements imposed by the security semantics of general message standards. The well-defined messages may include an expression of a collective intent of the security semantics included in the message. The expression of the security semantics within the message simplifies the discovery process for devices processing the message. The well-defined message may also require that any intermediary devices that process the well-defined message as it is transmitted from the sender device to the receiver device follow the expressed collective intent of the security semantics. If an intermediary device cannot understand or adhere to the expressed intent, the well-defined message must be rejected.Type: ApplicationFiled: February 26, 2008Publication date: August 27, 2009Applicant: Microsoft CorporationInventors: Douglas A. Walter, Christopher G. Kaler, John P. Shewchuk, Arun K. Nanda
-
Publication number: 20090198630Abstract: The present invention provides unique systems and methods for investors to invest in a new start-up, potential high growth or other company or business entity, and potentially make a substantial return on their investment while minimizing the risk of a loss of invested capital (i.e., having a maximized risk/investment return ratio), using a unique combination of various investment vehicles and insurance and annuity products, including in force non-variable (or other) life insurance policies held on individuals preferably ranging in age from about 70 to about 80 years, Single Premium Immediate Annuities, and LIBACSM distributions, to provide the assurance of return of invested capital. Additionally, these systems and methods advantageously may generate assets and revenue that may help a new start-up or potential high growth company to “go public.Type: ApplicationFiled: January 30, 2009Publication date: August 6, 2009Inventors: William Bennett Treitler, Mark Edward Stutzman, Douglas Walter Miller, Jerrold Robin Sexton
-
Patent number: 7512957Abstract: A web services namespace pertains to an infrastructure for enabling creation of a wide variety of applications. The infrastructure provides a foundation for building message-based applications of various scale and complexity. The infrastructure or framework provides APIs for basic messaging, secure messaging, reliable messaging and transacted messaging. In some embodiments, the associated APIs are factored into a hierarchy of namespaces in a manner that balances utility, usability, extensibility and versionability.Type: GrantFiled: December 3, 2004Date of Patent: March 31, 2009Assignee: Microsoft CorporationInventors: Shy Cohen, Geary L. Eppley, Douglas M. Purdy, James E. Johnson, Stephen J. Millet, Stephen T. Swartz, Vijay K. Gajjala, Aaron Abraham Stern, Alexander Martin DeJarnatt, Alfred M. Lee, IV, Anand Rjagopalan, Anastasios Kasiolas, Chaitanya D. Upadhyay, Christopher G. Kaler, Craig Andrew Critchley, David Edwin Levin, David Owen Driver, David Wortendyke, Douglas A. Walter, Elliot Lee Waingold, Erik Bo Christensen, Erin P. Honeycutt, Eugene Shvets, Evgeny Osovetsky, Giovanni M. Della-Libera, Jesus Ruiz-Scougall, John David Doty, Jonathan T. Wheeler, Kapil Gupta, Kenneth David Wolf, Krishnan Srinivasan, Lance E. Olson, Matthew Thomas Tavis, Mauro Ottaviani, Max Attar Feingold, Michael James Coulson, Michael Jon Marucheck, Michael Steven Vernal, Michael Thomas Dice, Mohamed-Hany Essam Ramadan, Mohammad Makarechian, Natasha Harish Jethanandani, Richard Dievendorff, Richard Douglas Hill, Ryan Thomas Sturgell, Saurab Nog, Scott Christopher Seely, Serge Sverdlov, Siddhartha Puri, Sowmyanarayanan K. Srinivasan, Stefan Batres, Stefan Harrington Pharies, Tirunelveli Vishwanath, Tomasz Janczuk, Uday S. Hegde, Umesh Madan, Vaithialingam B. Balayogan, Vipul Arunkant Modi, Yaniv Pessach, Yasser Shohoud
-
Publication number: 20080118097Abstract: This invention provides an audio speaker with improved physical safety isolation between a voice coil and other electrically live elements.Type: ApplicationFiled: December 21, 2007Publication date: May 22, 2008Inventors: John B. French, Douglas Walter Hansen
-
Patent number: 7362168Abstract: In a first aspect, the invention provides an audio amplifier. A regulator reference signal corresponding to an input audio signal is generated by regulator reference generator. A power signal is generated corresponding to the regulator reference signal by a voltage regulator. A compensation block also uses the input signal, or a delayed version of the input signal to generate a modulation control signal. A modulator generates a modulated signal in response to the modulation control signal. An output stage combines the power signal and the modulation signal to provide an output audio signal corresponding to the input audio signal. The compensation block may be a forward compensation block configured to compensate for characteristics of the regulator reference generator or the voltage regulator or both, and possibly other components of the amplifier. In other embodiments, the compensation block may be part of a feedback compensation loop.Type: GrantFiled: November 3, 2006Date of Patent: April 22, 2008Assignee: Audera International Sales Inc.Inventors: John B. French, Douglas Walter Hansen
-
Publication number: 20080082626Abstract: Requesting security tokens with typed information. A method includes accessing at a client, information to allow the client to request a token for accessing functionality of a service. The method further includes sending a client request from the client to a token issuer in a token request. The client request includes the information and at least one of information defining the source of the information, proof of the source of the information; or usage information specifying how the information should be used.Type: ApplicationFiled: September 29, 2006Publication date: April 3, 2008Applicant: MICROSOFT CORPORATIONInventors: Christopher G. Kaler, Douglas A. Walter, Arun K. Nanda, Hervey O. Wilson
-
Publication number: 20080083009Abstract: Communicating and requesting specialized policy information. A message is sent by a client to a service which provides the services requested by the message or a specialized processor that evaluates messages. The message is evaluated for compliance with a policy particular to the message. If the message does not comply with a policy particular to the message, policy information is sent, where the policy information indicates the correct policy particular to the message. In one embodiment, if the message complies with a policy particular to the message, policy information is sent, where the policy information indicates that the message complies with a policy particular to the message.Type: ApplicationFiled: September 29, 2006Publication date: April 3, 2008Applicant: MICROSOFT CORPORATIONInventors: Christopher G. Kaler, Douglas A. Walter
-
Publication number: 20070294743Abstract: The present invention extends to methods, systems, and computer program products for selecting policy for compatible communication. Hierarchical policy document data structures represent communication (e.g., security) aspects and options such that lower aspects and options are accessed in the context of corresponding higher aspects and options to define applicable scope. Use of a hierarchical description also facilitates separation of what is being protected from how it is being protected thereby allowing security policy to be considered at different locations of a description document.Type: ApplicationFiled: June 15, 2006Publication date: December 20, 2007Applicant: Microsoft CorporationInventors: Christopher G. Kaler, Douglas A. Walter, Martin Gudgin
-
Publication number: 20070061873Abstract: A cryptographic session key is utilized to maintain security of a digital identity. The session key is valid only for a limited period of time. Additional security is provided via a bimodal credential allowing different levels of access to the digital identify. An identity token contains pertinent information associated with the digital identity. The identity token is encrypted utilizing public-key cryptography. An identifier utilized to verify the validity of the digital identity is encrypted with the cryptographic session key. The encrypted identity token and the encrypted identifier are provided to a service for example. The service decrypts the encrypted identity token utilizing public key cryptography, and decrypts, with the cryptographic session key obtained from the identity token, the encrypted identifier. If the identifier is determined to be valid, the transaction proceeds normally. If the identifier is determined to be invalid, the transaction is halted.Type: ApplicationFiled: September 9, 2005Publication date: March 15, 2007Applicant: Microsoft CorporationInventors: John Shewchuk, Arun Nanda, Donald Box, Douglas Walter, Hervey Wilson
-
Patent number: 7185060Abstract: Methods, systems, and computer program products that reduce buffer requirements in a messaging system so that the messaging system can send or receive relatively larger messages using a given buffer size. Message handlers are provided, each identifying a corresponding processing operation to perform on a message object having a streamed portion with a stream oriented interface. Pipelines comprising ordered collections of the message handlers are provided as well. The message object is processed by the message handlers in the message pipelines, such that at least one message handler encapsulates the streamed portion of the message object with its corresponding processing operation. The corresponding processing operation is to be performed at a future time, and encapsulates the streamed portion of the message object without materializing the stream portion in a buffer. The messaging system may be an intermediary for routing a message object or an endpoint.Type: GrantFiled: March 26, 2003Date of Patent: February 27, 2007Assignee: Microsoft CorporationInventors: Erik B. Christensen, Douglas A. Walter, Michael J. Coulson, Kenneth D. Wolf
-
Patent number: 7120628Abstract: A system, method, and computer readable medium for providing a system user with information updates from web-based or non-web-based computer sources. The system enables a user to subscribe from a computer application (e.g., an electronic mail or calendar application) to information sources. The system presents the user with a subscription view that the user may use to create the subscription through the use of selectable criteria displayed in the subscription view. The user may input search criteria for performing a search of one or more databases. The system searches the databases accessed, and then retrieves the objects matching the search criteria. The system may then notify the user that objects matching the search criteria have been discovered, and store or present the objects.Type: GrantFiled: July 1, 1999Date of Patent: October 10, 2006Assignee: International Business Machines CorporationInventors: Douglas Walter Conmy, Gail Elaine Strait, Damien Frederick Katz, Robert Shaver