Patents by Inventor Eric D. Tribble
Eric D. Tribble has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 9160740Abstract: Establishing secure, mutually authenticated communication between a trusted network and a perimeter network. Servers on the perimeter network may be securely and automatically configured to communicate with the trusted network. Servers not functioning properly may be stopped from communicating with the other servers. Credential information relating to a perimeter server may be automatically, and regularly, updated without intervention.Type: GrantFiled: September 4, 2013Date of Patent: October 13, 2015Assignee: Microsoft Technology Licensing, LLCInventors: Hao Zhang, Jeffrey B. Kay, Malcolm E. Pearson, Eric D. Tribble
-
Patent number: 8726020Abstract: Automatically sending configuration information from a trusted network to a perimeter network. Master servers residing in the trusted network are adapted for administering a distributed directory service containing configuration information. Edge servers residing in the perimeter network are adapted for using a local directory service local to each edge server. Edge-connected bridgehead servers residing in the trusted network are adapted for replicating the configuration information from the trusted network to the perimeter network. Replicating the configuration information to the perimeter network by trusted servers acquiring leases on edge servers is also disclosed.Type: GrantFiled: May 31, 2006Date of Patent: May 13, 2014Assignee: Microsoft CorporationInventors: Leon Warman, Malcolm E. Pearson, Andrei Kuznetsov, Nathan F. Waddoups, Eric D. Tribble
-
Patent number: 8640201Abstract: In a distributed electronic messaging system authorized information comprising metadata concerning a message is passed along from one mail server to another mail server. A receiving computer determines if the sending computer has the necessary authorizations to pass along the metadata. If so, the authorized information is passed along with the message body, enabling repetitious actions to be eliminated. If the sending computer is not authorized to pass along the metadata, the metadata is stripped off the message, changed or annotated.Type: GrantFiled: December 11, 2006Date of Patent: January 28, 2014Assignee: Microsoft CorporationInventors: Jeffrey B. Kay, Trevor W. Freeman, Malcolm Erik Pearson, Eric D. Tribble, Hao Zhang
-
Publication number: 20140006783Abstract: Establishing secure, mutually authenticated communication between a trusted network and a perimeter network. Servers on the perimeter network may be securely and automatically configured to communicate with the trusted network. Servers not functioning properly may be stopped from communicating with the other servers. Credential information relating to a perimeter server may be automatically, and regularly, updated without intervention.Type: ApplicationFiled: September 4, 2013Publication date: January 2, 2014Applicant: Microsoft CorporationInventors: Hao Zhang, Jeffrey B. Kay, Malcolm E. Pearson, Eric D. Tribble
-
Patent number: 8549295Abstract: Establishing secure, mutually authenticated communication between a trusted network and a perimeter network. Servers on the perimeter network may be securely and automatically configured to communicate with the trusted network. Servers not functioning properly may be stopped from communicating with the other servers. Credential information relating to a perimeter server may be automatically, and regularly, updated without intervention.Type: GrantFiled: May 31, 2006Date of Patent: October 1, 2013Assignee: Microsoft CorporationInventors: Hao Zhang, Jeffrey B. Kay, Malcolm E. Pearson, Eric D. Tribble
-
Patent number: 8135645Abstract: A transmitting gateway may utilize a retrieved domain-specific key to secure an outbound message, and a receiving gateway may utilize another retrieved domain-specific key to authenticate and validate the secured message.Type: GrantFiled: March 3, 2006Date of Patent: March 13, 2012Assignee: Microsoft CorporationInventors: Jeffrey B. Kay, Eric D. Tribble, Roy Williams, Trevor W. Freeman, Malcolm E. Pearson
-
Patent number: 8028026Abstract: Propagating messaging preferences of one or more users from a recipient mailbox to a perimeter network administering e-mail content blocking and routing. A content filtering application located outside a trusted network receives messaging preferences information from within the trusted network regarding the mail recipients. This messaging preferences information may be utilized to allow certain pre-authorized messages from particular senders to bypass content filtering. Moreover, the messaging preferences information may be hashed to further protect the information on the perimeter network and to speed in review and comparison of the messaging preferences information. In addition, other types of user-specific information may be propagated to the perimeter network for use with other applications other than messaging.Type: GrantFiled: May 31, 2006Date of Patent: September 27, 2011Assignee: Microsoft CorporationInventors: Chandresh K. Jain, Malcolm E. Pearson, Nathan F. Waddoups, Mihai Costea, Eric D. Tribble
-
Patent number: 7693071Abstract: Systems and methods are described which provide enhanced stability, increased predictability, reduced transmission costs, and which conserve bandwidth in routing messages over computer networks. The systems and methods further include providing improved transmission of messages wherein the messages are transmitted to nodes closest to a target delivery node. If delivery is possible to a target node, the message transmission stops at the point of failure in the network, wherein delivery to the target node is accomplished at a later time or the message is returned to the sender.Type: GrantFiled: May 27, 2005Date of Patent: April 6, 2010Assignee: Microsoft CorporationInventors: Demetrios Achlioptas, Eric D. Tribble, Malcolm E. Pearson, Leon Warman
-
Patent number: 7681074Abstract: Failover systems and methods for providing redundant backup of data transmitted over a network to provide transport high availability of electronic data. The present invention relates to creating redundant backup copies of electronic data as well as transmission of the backup copies over a network in the event of a failure of a network component.Type: GrantFiled: April 29, 2005Date of Patent: March 16, 2010Assignee: Microsoft CorporationInventors: Leon Warman, Eric D. Tribble, Malcolm Pearson
-
Patent number: 7529937Abstract: A discovery secret is transmitted from the source domain to the correspondent domain. The discovery secret includes a data element specific to the correspondent domain and. The discovery secret includes a source domain address to which the correspondent domain is permitted send a message in order to determine that a potential correspondent has compatible secure email technology so that a link between the source domain and the correspondent domain may be established. The discovery secret is received by the correspondent domain including receiving the data element and the source domain address. An invitation is transmitted from the correspondent domain to the source domain address. The invitation includes the data element or an element corresponding to the data element. The source domain initiates a process to establish a link with the correspondent domain upon receipt by the source domain of the invitation.Type: GrantFiled: April 15, 2005Date of Patent: May 5, 2009Assignee: Microsoft CorporationInventors: Eric D. Tribble, Trevor W. Freeman
-
Publication number: 20080141346Abstract: In a distributed electronic messaging system authorized information comprising metadata concerning a message is passed along from one mail server to another mail server. A receiving computer determines if the sending computer has the necessary authorizations to pass along the metadata. If so, the authorized information is passed along with the message body, enabling repetitious actions to be eliminated. If the sending computer is not authorized to pass along the metadata, the metadata is stripped off the message, changed or annotated.Type: ApplicationFiled: December 11, 2006Publication date: June 12, 2008Applicant: Microsoft CorporationInventors: Jeffrey B. Kay, Trevor W. Freeman, Malcolm Erik Pearson, Eric D. Tribble, Hao Zhang
-
Publication number: 20070283148Abstract: Automatically sending configuration information from a trusted network to a perimeter network. Master servers residing in the trusted network are adapted for administering a distributed directory service containing configuration information. Edge servers residing in the perimeter network are adapted for using a local directory service local to each edge server. Edge-connected bridgehead servers residing in the trusted network are adapted for replicating the configuration information from the trusted network to the perimeter network. Replicating the configuration information to the perimeter network by trusted servers acquiring leases on edge servers is also disclosed.Type: ApplicationFiled: May 31, 2006Publication date: December 6, 2007Applicant: MICROSOFT CORPORATIONInventors: Leon Warman, Malcolm E. Pearson, Andrei Kuznetsov, Nathan F. Waddoups, Eric D. Tribble
-
Publication number: 20070282953Abstract: Propagating messaging preferences of one or more users from a recipient mailbox to a perimeter network administering e-mail content blocking and routing. A content filtering application located outside a trusted network receives messaging preferences information from within the trusted network regarding the mail recipients. This messaging preferences information may be utilized to allow certain pre-authorized messages from particular senders to bypass content filtering. Moreover, the messaging preferences information may be hashed to further protect the information on the perimeter network and to speed in review and comparison of the messaging preferences information. In addition, other types of user-specific information may be propagated to the perimeter network for use with other applications other than messaging.Type: ApplicationFiled: May 31, 2006Publication date: December 6, 2007Applicant: MICROSOFT CORPORATIONInventors: Chandresh K. Jain, Malcolm E. Pearson, Nathan F. Waddoups, Mihai Costea, Eric D. Tribble
-
Publication number: 20070283154Abstract: Establishing secure, mutually authenticated communication between a trusted network and a perimeter network. Servers on the perimeter network may be securely and automatically configured to communicate with the trusted network. Servers not functioning properly may be stopped from communicating with the other servers. Credential information relating to a perimeter server may be automatically, and regularly, updated without intervention.Type: ApplicationFiled: May 31, 2006Publication date: December 6, 2007Applicant: Microsoft CorporationInventors: Hao Zhang, Jeffrey B. Kay, Malcolm E. Pearson, Eric D. Tribble