Patents by Inventor Jeffrey B. Kay
Jeffrey B. Kay has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Publication number: 20240090927Abstract: An orthopedic plate is specifically configured for use in osteotomies, in which part of the plate extends into a portion of a first bone segment and part is external to the cortical surface of an adjacent bone segment to fix the segments to allow them to fuse. The plate has a first end and a second end where the end which is inserted into the bone has a chamfer and a through hole having a hole axis optionally at an oblique angle to the longitudinal axis of the plate, and which can receive a screw, peg or pin. The second end of the plate includes a locking screw hole and optionally including a compression slot extending in a direction toward a screw hole in the opposing end. Optionally, the non-locking hole has a shroud that forms an arc or portion of a cylinder over the hole. A plate driver having a recess that holds the plate is used to insert the plate into the bone.Type: ApplicationFiled: November 28, 2023Publication date: March 21, 2024Applicant: OrthoHelix Surgical Designs, Inc.Inventors: Jeffrey JOHNSON, David B. KAY, Jackson R. HEAVENER
-
Patent number: 10511579Abstract: A method for confidential electronic communication between a sender workstation and a receiver workstation is provided, whereby privacy is guaranteed for the electronic communications transmitted over the public Internet. The method of confidential communication is equipped with message tracking and message receipt verification. The system for implementing the method includes a sender server that creates a session content encryption key along with a message envelope that includes a content encryption key encrypted message and a confidential mail token. The content encryption key is stored securely inside the sender organization's system which transmits the message envelope to an intended recipient. The intended recipient processes the message envelope in order to generate a message receipt verification, which is transmitted to the sender. The message receipt verification is processed by the sender server to verify that the message envelope reached the intended recipient.Type: GrantFiled: November 28, 2017Date of Patent: December 17, 2019Assignee: MICROSOFT TECHNOLOGY LICENSING, LLCInventors: Trevor W. Freeman, Mayank Mehta, Jeremy de Souza, Jeffrey B. Kay
-
Publication number: 20180083934Abstract: A method for confidential electronic communication between a sender workstation and a receiver workstation is provided, whereby privacy is guaranteed for the electronic communications transmitted over the public Internet. The method of confidential communication is equipped with message tracking and message receipt verification. The system for implementing the method includes a sender server that creates a session content encryption key along with a message envelope that includes a content encryption key encrypted message and a confidential mail token. The content encryption key is stored securely inside the sender organization's system which transmits the message envelope to an intended recipient. The intended recipient processes the message envelope in order to generate a message receipt verification, which is transmitted to the sender. The message receipt verification is processed by the sender server to verify that the message envelope reached the intended recipient.Type: ApplicationFiled: November 28, 2017Publication date: March 22, 2018Applicant: Microsoft Technology Licensing, LLCInventors: Trevor W. Freeman, Mayank Mehta, Jeremy de Souza, Jeffrey B. Kay
-
Patent number: 9847977Abstract: A method for confidential electronic communication between a sender workstation and a receiver workstation is provided, whereby privacy is guaranteed for the electronic communications transmitted over the public Internet. The method of confidential communication is equipped with message tracking and message receipt verification. The system for implementing the method includes a sender server that creates a session content encryption key along with a message envelope that includes a content encryption key encrypted message and a confidential mail token. The content encryption key is stored securely inside the sender organization's system which transmits the message envelope to an intended recipient. The intended recipient processes the message envelope in order to generate a message receipt verification, which is transmitted to the sender. The message receipt verification is processed by the sender server to verify that the message envelope reached the intended recipient.Type: GrantFiled: June 29, 2007Date of Patent: December 19, 2017Assignee: Microsoft Technology Licensing, LLCInventors: Trevor W. Freeman, Mayank Mehta, Jeremy de Souza, Jeffrey B. Kay
-
Patent number: 9591514Abstract: Methods and apparatus for executing a client-based, over-the-top (OTT) application, the client-based OTT application for maintaining communications with a second communication device, comprising, in one embodiment, a first transceiver for transmitting and receiving user traffic, a memory for storing processor-executable instructions, and a processor, coupled to the transceiver and the memory, for executing the processor-executable instructions that cause the wireless communication device to establish a first control plane connection, establish a second control plane connection, establish a first data plane for transporting the user traffic, the first data plane connection relating to the first control plane connection, establish a second data plane connection for transporting the user traffic if at least one predetermined event has occurred, the second data plane connection related to the second control plane connection, and to transmit and receive the user traffic over the second data plane connection via thType: GrantFiled: August 9, 2013Date of Patent: March 7, 2017Assignee: Microsoft Technology Licensing, LLCInventors: John D. Bruner, Rod G. Fleck, Jeffrey B. Kay, Gursharan Singh Sidhu
-
Publication number: 20160321116Abstract: Various systems and methods for translating operating system processes are described herein. In one example, a method includes intercepting a process of a foreign operating system through a proxy driver. The method can also include translating the process to a native operating system within which the foreign operating system is operating. Furthermore, the method can include sharing memory between the native operating system and the foreign operating system for translation.Type: ApplicationFiled: June 26, 2015Publication date: November 3, 2016Applicant: Microsoft Technology Licensing, LLCInventors: James A. Schwartz, Jr., Arun Kishan, Nicholas S. Judge, Stephen Hufnagel, Yevgeniy M. Bak, Mehmet Iyigun, Jeffrey B. Kay, Cory Hendrixson, Jonathan Wiswall, Edward S. Miller
-
Patent number: 9160740Abstract: Establishing secure, mutually authenticated communication between a trusted network and a perimeter network. Servers on the perimeter network may be securely and automatically configured to communicate with the trusted network. Servers not functioning properly may be stopped from communicating with the other servers. Credential information relating to a perimeter server may be automatically, and regularly, updated without intervention.Type: GrantFiled: September 4, 2013Date of Patent: October 13, 2015Assignee: Microsoft Technology Licensing, LLCInventors: Hao Zhang, Jeffrey B. Kay, Malcolm E. Pearson, Eric D. Tribble
-
Patent number: 9047477Abstract: Architecture that stores specific passwords on behalf of users, and encrypts the passwords using encryption keys managed by a distributed key management system. The encryption keys are stored in a directory service (e.g., hierarchical) in an area that is inaccessible by selected entities (e.g., administrative users) having superior permissions such as supervisory administrators, but accessible to the account components that need to access the unencrypted passwords. The distributed key management system makes the encryption key stored in the directory service available to all hardware/software components that need the key to encrypt or decrypt the passwords.Type: GrantFiled: May 26, 2009Date of Patent: June 2, 2015Assignee: Microsoft Technology Licensing, LLCInventors: Fabian Nunez-Tejerina, Jeffrey B. Kay, Robert C. Fruth, Naveen A. Palavalli, Ramesh Chinta, Tolga Acar
-
Publication number: 20140313902Abstract: Methods and apparatus for executing a client-based, over-the-top (OTT) application, the client-based OTT application for maintaining communications with a second communication device, comprising, in one embodiment, a first transceiver for transmitting and receiving user traffic, a memory for storing processor-executable instructions, and a processor, coupled to the transceiver and the memory, for executing the processor-executable instructions that cause the wireless communication device to establish a first control plane connection, establish a second control plane connection, establish a first data plane for transporting the user traffic, the first data plane connection relating to the first control plane connection, establish a second data plane connection for transporting the user traffic if at least one predetermined event has occurred, the second data plane connection related to the second control plane connection, and to transmit and receive the user traffic over the second data plane connection via thType: ApplicationFiled: August 9, 2013Publication date: October 23, 2014Inventors: John D. Bruner, Rod G. Fleck, Jeffrey B. Kay, Gursharan Singh Sidhu
-
Patent number: 8805944Abstract: Architecture that facilitates transport high availability for messaging services by providing the ability of a receiving entity (e.g., receiving message transfer agent (MTA)) to detect if a sending entity (e.g., sending MTA or client) is a legacy sending entity. When the receiving entity detects that the sending entity is a legacy system, by advertising transport high availability capability to the sending entity, if the sending entity does not opt-in to this capability, the receiving entity keeps the sending entity client “on hold”, that is, waiting for an acknowledgement (ACK) until the receiving entity delivers the message to the next hops (immediate destinations). This approach maintains at least two copies of the message until the message is successfully delivered (to the next hop(s)). Hence, if the legacy sending entity or the receiving entity fails, the message is still delivered successfully.Type: GrantFiled: December 10, 2012Date of Patent: August 12, 2014Assignee: Microsoft CorporationInventors: Victor Boctor, Todd C. Luttinen, Jeffrey B Kay, Jesse M. Dougherty, Malcom Pearson
-
Patent number: 8640201Abstract: In a distributed electronic messaging system authorized information comprising metadata concerning a message is passed along from one mail server to another mail server. A receiving computer determines if the sending computer has the necessary authorizations to pass along the metadata. If so, the authorized information is passed along with the message body, enabling repetitious actions to be eliminated. If the sending computer is not authorized to pass along the metadata, the metadata is stripped off the message, changed or annotated.Type: GrantFiled: December 11, 2006Date of Patent: January 28, 2014Assignee: Microsoft CorporationInventors: Jeffrey B. Kay, Trevor W. Freeman, Malcolm Erik Pearson, Eric D. Tribble, Hao Zhang
-
Publication number: 20140006783Abstract: Establishing secure, mutually authenticated communication between a trusted network and a perimeter network. Servers on the perimeter network may be securely and automatically configured to communicate with the trusted network. Servers not functioning properly may be stopped from communicating with the other servers. Credential information relating to a perimeter server may be automatically, and regularly, updated without intervention.Type: ApplicationFiled: September 4, 2013Publication date: January 2, 2014Applicant: Microsoft CorporationInventors: Hao Zhang, Jeffrey B. Kay, Malcolm E. Pearson, Eric D. Tribble
-
Patent number: 8549295Abstract: Establishing secure, mutually authenticated communication between a trusted network and a perimeter network. Servers on the perimeter network may be securely and automatically configured to communicate with the trusted network. Servers not functioning properly may be stopped from communicating with the other servers. Credential information relating to a perimeter server may be automatically, and regularly, updated without intervention.Type: GrantFiled: May 31, 2006Date of Patent: October 1, 2013Assignee: Microsoft CorporationInventors: Hao Zhang, Jeffrey B. Kay, Malcolm E. Pearson, Eric D. Tribble
-
Patent number: 8352558Abstract: Architecture that facilitates transport high availability for messaging services by providing the ability of a receiving entity (e.g., receiving message transfer agent (MTA)) to detect if a sending entity (e.g., sending MTA or client) is a legacy sending entity. When the receiving entity detects that the sending entity is a legacy system, by advertising transport high availability capability to the sending entity, if the sending entity does not opt-in to this capability, the receiving entity keeps the sending entity client “on hold”, that is, waiting for an acknowledgement (ACK) until the receiving entity delivers the message to the next hops (immediate destinations). This approach maintains at least two copies of the message until the message is successfully delivered (to the next hop(s)). Hence, if the legacy sending entity or the receiving entity fails, the message is still delivered successfully.Type: GrantFiled: February 10, 2009Date of Patent: January 8, 2013Assignee: Microsoft CorporationInventors: Victor Boctor, Todd C. Luttinen, Jeffrey B. Kay, Jesse M. Dougherty, Malcom Pearson
-
Patent number: 8135645Abstract: A transmitting gateway may utilize a retrieved domain-specific key to secure an outbound message, and a receiving gateway may utilize another retrieved domain-specific key to authenticate and validate the secured message.Type: GrantFiled: March 3, 2006Date of Patent: March 13, 2012Assignee: Microsoft CorporationInventors: Jeffrey B. Kay, Eric D. Tribble, Roy Williams, Trevor W. Freeman, Malcolm E. Pearson
-
Patent number: 8073122Abstract: Email messages are recalled in accordance with restrictions attached to the message. Use of the message is limited per the restrictions. Example restrictions include printing restrictions, forwarding restrictions, exporting restrictions, copying restrictions, reading restrictions, and a expiration time of the message.Type: GrantFiled: June 20, 2007Date of Patent: December 6, 2011Assignee: Microsoft CorporationInventors: Jeffrey B. Kay, Frank D. Byrum, Steven Michael Clagg, Sara L. Manning
-
Patent number: 8069211Abstract: Architecture that protects side effect messages by associating the side effect messages with a primary (redundant) message that was received by a transport mechanism (e.g., a message transport agent). Side effect messages are considered “side effects” of a primary message that caused generation of the side effect messages. The primary message is only considered fully delivered after the primary message and all associated side effect messages are delivered, after which the source of the primary message is ACK'd (sent an “ACKnowledgement” message). Hence, in case of hardware failures after the primary message was delivered, but before delivery of side effect messages, the redundancy approach used triggers re-delivery of the primary message and re-generation and delivery of the side effect messages.Type: GrantFiled: January 23, 2009Date of Patent: November 29, 2011Assignee: Microsoft CorporationInventors: Victor Boctor, Todd C. Luttinen, Jeffrey B. Kay
-
Patent number: 8010612Abstract: Systems for providing sign-up email addresses are disclosed herein. A user may set up a sign-up email address for receiving emails from a trusted, Internet-based enterprise. The user may set up a dedicated mailbox folder associated with the sign-up email address or enterprise. The email server may automatically direct emails coming from that enterprise into that folder. To “unsubscribe,” the user needs only to delete the folder or the sign-up address. Emails from the enterprise to the sign-up address may be highlighted in the user's main inbox. Thus, the user may be assured that any such email is truly from the enterprise, and not a phishing expedition or spam. Such systems also provide the user with effective tools to recognize phish or spam emails that appear to be from the trusted enterprise and not to act on them.Type: GrantFiled: April 17, 2007Date of Patent: August 30, 2011Assignee: Microsoft CorporationInventors: Mihai Costea, Jeffrey B. Kay, Jesse Dougherty, Mayerber Carvalho Neto, Jain Chandresh, Mayank Mehta
-
Publication number: 20100325215Abstract: Architecture for enabling messages to be routed between network servers based on message requirements related to version, capabilities, and features, for example. The message requirements designate delivery over a transport path compatible with the message requirements. The message requirements can include a particular version or other features related to different software applications that require compatibility in message handling. Routing information is maintained related to a transport server or other network transport entity compatible with the message requirements and through which the message can be routed. The message is routed to the compatible transport server for delivery to the destination while avoiding delivery to transport servers incompatible with the message requirements.Type: ApplicationFiled: June 19, 2009Publication date: December 23, 2010Applicant: Microsoft CorporationInventors: Jeremy de Souza, Wilbert De Graaf, Gregory Gourevitch, Victor Boctor, Jeffrey B. Kay, Todd C. Luttinen, Shubhankar Sanyal
-
Publication number: 20100306554Abstract: Architecture that stores specific passwords on behalf of users, and encrypts the passwords using encryption keys managed by a distributed key management system. The encryption keys are stored in a directory service (e.g., hierarchical) in an area that is inaccessible by selected entities (e.g., administrative users) having superior permissions such as supervisory administrators, but accessible to the account components that need to access the unencrypted passwords. The distributed key management system makes the encryption key stored in the directory service available to all hardware/software components that need the key to encrypt or decrypt the passwords.Type: ApplicationFiled: May 26, 2009Publication date: December 2, 2010Applicant: Microsoft CorporationInventors: Fabian Nunez-Tejerina, Jeffrey B. Kay, Robert C. Fruth, Naveen A. Palavalli, Ramesh Chinta, Tolga Acar