Patents by Inventor James Undery

James Undery has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 10043309
    Abstract: An input mesh can be decomposed into component meshes that can be independently simplified. A computing device can calculate costs of performing candidate edge collapses for a component mesh. The candidate edge collapses can include boundary edge collapses and interior edge collapses. To simplify a component mesh, the execution of boundary edge collapses and the execution of interior edge collapses are interleaved in an order based on the costs of performing the candidate edge collapses. The position of a vertex resulting from a boundary edge collapse can be calculated independently of the interior of the component mesh. When component meshes are simplified in parallel, a boundary that is common to the component meshes can be simplified identically.
    Type: Grant
    Filed: December 14, 2015
    Date of Patent: August 7, 2018
    Assignee: MICROSOFT TECHNOLOGY LICENSING, LLC
    Inventors: Philip Starhill, Christopher Messer, James Undery, Keith Seifert, David Simons, Maksim Lepikhin
  • Publication number: 20170169608
    Abstract: An input mesh can be decomposed into component meshes that can be independently simplified. A computing device can calculate costs of performing candidate edge collapses for a component mesh. The candidate edge collapses can include boundary edge collapses and interior edge collapses. To simplify a component mesh, the execution of boundary edge collapses and the execution of interior edge collapses are interleaved in an order based on the costs of performing the candidate edge collapses. The position of a vertex resulting from a boundary edge collapse can be calculated independently of the interior of the component mesh. When component meshes are simplified in parallel, a boundary that is common to the component meshes can be simplified identically.
    Type: Application
    Filed: December 14, 2015
    Publication date: June 15, 2017
    Inventors: Philip Starhill, Christopher Messer, James Undery, Keith Seifert, David Simons, Maksim Lepikhin
  • Patent number: 8490160
    Abstract: Open federation security techniques with rate limits are described. An apparatus may include a network interface operative to communicate messages, and a secure open federation (SOF) module operative to manage a message rate between multiple federated networks. The SOF module may comprise a peer authentication module operative to determine whether a peer making the message is an untrusted peer. The SOF module may comprise a peer rate tracking module operative to retrieve a message rate value and a message rate limit value associated with the untrusted peer, and compare the message rate value with the message rate limit value to form a threat status indicator value. The SOF module may comprise a peer authorization module operative to authorize communication of the message based on the threat status indicator value. Other embodiments are described and claimed.
    Type: Grant
    Filed: October 4, 2007
    Date of Patent: July 16, 2013
    Assignee: Microsoft Corporation
    Inventors: Jeremy T. Buch, Michael Trommsdorff, James Undery
  • Patent number: 8364774
    Abstract: In an embodiment, techniques for sustaining session connections are provided. The techniques send heartbeat messages when not sending a message may cause the session connection to close because of a timeout condition. Heartbeat messages are valid transport layer messages that will be ignored by protocols at higher levels of a data communications stack. As an example, the techniques may send a TCP message containing only a carriage return and line feed (“CRLF”) in its payload. Because the TCP layer considers a message containing only a CRLF to be a valid TCP message, intermediary computing devices such as proxy servers may not interpret heartbeat messages as “keep alive” messages, and may sustain session connections.
    Type: Grant
    Filed: June 13, 2011
    Date of Patent: January 29, 2013
    Assignee: Microsoft Corporation
    Inventors: James Undery, Mark Markaryan
  • Patent number: 8347358
    Abstract: Techniques to protect from open enhanced federation user enumeration are described. An apparatus may include a network interface operative to establish connections. The access edge server may further include an open enhanced federation (OEF) module communicatively coupled to the network interface. The OEF module may be operative to manage connections between multiple federated networks. In one embodiment, for example, the OEF module may comprise a peer authentication module operative to determine whether a peer making the request is an untrusted peer domain. The OEF module may further comprise a peer tracking module operative to retrieve a total request number and a total limit number associated with the untrusted peer, and compare the total request number with the total limit number to form a threat status indicator value. The OEF module may also comprise a peer authorization module operative to authorize the request based on the threat status indicator value. Other embodiments are described and claimed.
    Type: Grant
    Filed: June 25, 2007
    Date of Patent: January 1, 2013
    Assignee: Microsoft Corporation
    Inventors: Jeremy T. Buch, Michael Trommsdorff, James Undery
  • Publication number: 20090092050
    Abstract: Open federation security techniques with rate limits are described. An apparatus may include a network interface operative to communicate messages, and a secure open federation (SOF) module operative to manage a message rate between multiple federated networks. The SOF module may comprise a peer authentication module operative to determine whether a peer making the message is an untrusted peer. The SOF module may comprise a peer rate tracking module operative to retrieve a message rate value and a message rate limit value associated with the untrusted peer, and compare the message rate value with the message rate limit value to form a threat status indicator value. The SOF module may comprise a peer authorization module operative to authorize communication of the message based on the threat status indicator value. Other embodiments are described and claimed.
    Type: Application
    Filed: October 4, 2007
    Publication date: April 9, 2009
    Applicant: Microsoft Corporation
    Inventors: Jeremy T. Buch, Michael Trommsdorff, James Undery
  • Publication number: 20080320565
    Abstract: Techniques to protect from open enhanced federation user enumeration are described. An apparatus may include a network interface operative to establish connections. The access edge server may further include an open enhanced federation (OEF) module communicatively coupled to the network interface. The OEF module may be operative to manage connections between multiple federated networks. In one embodiment, for example, the OEF module may comprise a peer authentication module operative to determine whether a peer making the request is an untrusted peer domain. The OEF module may further comprise a peer tracking module operative to retrieve a total request number and a total limit number associated with the untrusted peer, and compare the total request number with the total limit number to form a threat status indicator value. The OEF module may also comprise a peer authorization module operative to authorize the request based on the threat status indicator value. Other embodiments are described and claimed.
    Type: Application
    Filed: June 25, 2007
    Publication date: December 25, 2008
    Applicant: Microsoft Corporation
    Inventors: Jeremy T. Buch, Michael Trommsdorff, James Undery
  • Publication number: 20070005773
    Abstract: A method and system for establishing a connection with a server after a connection has been broken is provided. A connection system in a service layer of a client detects that a connection between the client and the server has been broken. Upon detecting the broken connection, the connection system of the service layer automatically attempts to re-establish an application-level connection to the server. If the connection system can re-establish an application-level connection to the server, then it need not notify the application layer of the broken connection.
    Type: Application
    Filed: May 31, 2005
    Publication date: January 4, 2007
    Applicant: Microsoft Corporation
    Inventors: Elena Apreutesei, James Undery, Nagendra Kolluru, Radu Ionescu
  • Publication number: 20060020707
    Abstract: In an embodiment, techniques for sustaining session connections are provided. The techniques send heartbeat messages when not sending a message may cause the session connection to close because of a timeout condition. Heartbeat messages are valid transport layer messages that will be ignored by protocols at higher levels of a data communications stack. As an example, the techniques may send a TCP message containing only a carriage return and line feed (“CRLF”) in its payload. Because the TCP layer considers a message containing only a CRLF to be a valid TCP message, intermediary computing devices such as proxy servers may not interpret heartbeat messages as “keep alive” messages, and may sustain session connections.
    Type: Application
    Filed: June 30, 2004
    Publication date: January 26, 2006
    Applicant: Microsoft Corpotation
    Inventors: James Undery, Mark Markaryan