Patents by Inventor Jeffrey B. Kay

Jeffrey B. Kay has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20240090927
    Abstract: An orthopedic plate is specifically configured for use in osteotomies, in which part of the plate extends into a portion of a first bone segment and part is external to the cortical surface of an adjacent bone segment to fix the segments to allow them to fuse. The plate has a first end and a second end where the end which is inserted into the bone has a chamfer and a through hole having a hole axis optionally at an oblique angle to the longitudinal axis of the plate, and which can receive a screw, peg or pin. The second end of the plate includes a locking screw hole and optionally including a compression slot extending in a direction toward a screw hole in the opposing end. Optionally, the non-locking hole has a shroud that forms an arc or portion of a cylinder over the hole. A plate driver having a recess that holds the plate is used to insert the plate into the bone.
    Type: Application
    Filed: November 28, 2023
    Publication date: March 21, 2024
    Applicant: OrthoHelix Surgical Designs, Inc.
    Inventors: Jeffrey JOHNSON, David B. KAY, Jackson R. HEAVENER
  • Patent number: 10511579
    Abstract: A method for confidential electronic communication between a sender workstation and a receiver workstation is provided, whereby privacy is guaranteed for the electronic communications transmitted over the public Internet. The method of confidential communication is equipped with message tracking and message receipt verification. The system for implementing the method includes a sender server that creates a session content encryption key along with a message envelope that includes a content encryption key encrypted message and a confidential mail token. The content encryption key is stored securely inside the sender organization's system which transmits the message envelope to an intended recipient. The intended recipient processes the message envelope in order to generate a message receipt verification, which is transmitted to the sender. The message receipt verification is processed by the sender server to verify that the message envelope reached the intended recipient.
    Type: Grant
    Filed: November 28, 2017
    Date of Patent: December 17, 2019
    Assignee: MICROSOFT TECHNOLOGY LICENSING, LLC
    Inventors: Trevor W. Freeman, Mayank Mehta, Jeremy de Souza, Jeffrey B. Kay
  • Publication number: 20180083934
    Abstract: A method for confidential electronic communication between a sender workstation and a receiver workstation is provided, whereby privacy is guaranteed for the electronic communications transmitted over the public Internet. The method of confidential communication is equipped with message tracking and message receipt verification. The system for implementing the method includes a sender server that creates a session content encryption key along with a message envelope that includes a content encryption key encrypted message and a confidential mail token. The content encryption key is stored securely inside the sender organization's system which transmits the message envelope to an intended recipient. The intended recipient processes the message envelope in order to generate a message receipt verification, which is transmitted to the sender. The message receipt verification is processed by the sender server to verify that the message envelope reached the intended recipient.
    Type: Application
    Filed: November 28, 2017
    Publication date: March 22, 2018
    Applicant: Microsoft Technology Licensing, LLC
    Inventors: Trevor W. Freeman, Mayank Mehta, Jeremy de Souza, Jeffrey B. Kay
  • Patent number: 9847977
    Abstract: A method for confidential electronic communication between a sender workstation and a receiver workstation is provided, whereby privacy is guaranteed for the electronic communications transmitted over the public Internet. The method of confidential communication is equipped with message tracking and message receipt verification. The system for implementing the method includes a sender server that creates a session content encryption key along with a message envelope that includes a content encryption key encrypted message and a confidential mail token. The content encryption key is stored securely inside the sender organization's system which transmits the message envelope to an intended recipient. The intended recipient processes the message envelope in order to generate a message receipt verification, which is transmitted to the sender. The message receipt verification is processed by the sender server to verify that the message envelope reached the intended recipient.
    Type: Grant
    Filed: June 29, 2007
    Date of Patent: December 19, 2017
    Assignee: Microsoft Technology Licensing, LLC
    Inventors: Trevor W. Freeman, Mayank Mehta, Jeremy de Souza, Jeffrey B. Kay
  • Patent number: 9591514
    Abstract: Methods and apparatus for executing a client-based, over-the-top (OTT) application, the client-based OTT application for maintaining communications with a second communication device, comprising, in one embodiment, a first transceiver for transmitting and receiving user traffic, a memory for storing processor-executable instructions, and a processor, coupled to the transceiver and the memory, for executing the processor-executable instructions that cause the wireless communication device to establish a first control plane connection, establish a second control plane connection, establish a first data plane for transporting the user traffic, the first data plane connection relating to the first control plane connection, establish a second data plane connection for transporting the user traffic if at least one predetermined event has occurred, the second data plane connection related to the second control plane connection, and to transmit and receive the user traffic over the second data plane connection via th
    Type: Grant
    Filed: August 9, 2013
    Date of Patent: March 7, 2017
    Assignee: Microsoft Technology Licensing, LLC
    Inventors: John D. Bruner, Rod G. Fleck, Jeffrey B. Kay, Gursharan Singh Sidhu
  • Publication number: 20160321116
    Abstract: Various systems and methods for translating operating system processes are described herein. In one example, a method includes intercepting a process of a foreign operating system through a proxy driver. The method can also include translating the process to a native operating system within which the foreign operating system is operating. Furthermore, the method can include sharing memory between the native operating system and the foreign operating system for translation.
    Type: Application
    Filed: June 26, 2015
    Publication date: November 3, 2016
    Applicant: Microsoft Technology Licensing, LLC
    Inventors: James A. Schwartz, Jr., Arun Kishan, Nicholas S. Judge, Stephen Hufnagel, Yevgeniy M. Bak, Mehmet Iyigun, Jeffrey B. Kay, Cory Hendrixson, Jonathan Wiswall, Edward S. Miller
  • Patent number: 9160740
    Abstract: Establishing secure, mutually authenticated communication between a trusted network and a perimeter network. Servers on the perimeter network may be securely and automatically configured to communicate with the trusted network. Servers not functioning properly may be stopped from communicating with the other servers. Credential information relating to a perimeter server may be automatically, and regularly, updated without intervention.
    Type: Grant
    Filed: September 4, 2013
    Date of Patent: October 13, 2015
    Assignee: Microsoft Technology Licensing, LLC
    Inventors: Hao Zhang, Jeffrey B. Kay, Malcolm E. Pearson, Eric D. Tribble
  • Patent number: 9047477
    Abstract: Architecture that stores specific passwords on behalf of users, and encrypts the passwords using encryption keys managed by a distributed key management system. The encryption keys are stored in a directory service (e.g., hierarchical) in an area that is inaccessible by selected entities (e.g., administrative users) having superior permissions such as supervisory administrators, but accessible to the account components that need to access the unencrypted passwords. The distributed key management system makes the encryption key stored in the directory service available to all hardware/software components that need the key to encrypt or decrypt the passwords.
    Type: Grant
    Filed: May 26, 2009
    Date of Patent: June 2, 2015
    Assignee: Microsoft Technology Licensing, LLC
    Inventors: Fabian Nunez-Tejerina, Jeffrey B. Kay, Robert C. Fruth, Naveen A. Palavalli, Ramesh Chinta, Tolga Acar
  • Publication number: 20140313902
    Abstract: Methods and apparatus for executing a client-based, over-the-top (OTT) application, the client-based OTT application for maintaining communications with a second communication device, comprising, in one embodiment, a first transceiver for transmitting and receiving user traffic, a memory for storing processor-executable instructions, and a processor, coupled to the transceiver and the memory, for executing the processor-executable instructions that cause the wireless communication device to establish a first control plane connection, establish a second control plane connection, establish a first data plane for transporting the user traffic, the first data plane connection relating to the first control plane connection, establish a second data plane connection for transporting the user traffic if at least one predetermined event has occurred, the second data plane connection related to the second control plane connection, and to transmit and receive the user traffic over the second data plane connection via th
    Type: Application
    Filed: August 9, 2013
    Publication date: October 23, 2014
    Inventors: John D. Bruner, Rod G. Fleck, Jeffrey B. Kay, Gursharan Singh Sidhu
  • Patent number: 8805944
    Abstract: Architecture that facilitates transport high availability for messaging services by providing the ability of a receiving entity (e.g., receiving message transfer agent (MTA)) to detect if a sending entity (e.g., sending MTA or client) is a legacy sending entity. When the receiving entity detects that the sending entity is a legacy system, by advertising transport high availability capability to the sending entity, if the sending entity does not opt-in to this capability, the receiving entity keeps the sending entity client “on hold”, that is, waiting for an acknowledgement (ACK) until the receiving entity delivers the message to the next hops (immediate destinations). This approach maintains at least two copies of the message until the message is successfully delivered (to the next hop(s)). Hence, if the legacy sending entity or the receiving entity fails, the message is still delivered successfully.
    Type: Grant
    Filed: December 10, 2012
    Date of Patent: August 12, 2014
    Assignee: Microsoft Corporation
    Inventors: Victor Boctor, Todd C. Luttinen, Jeffrey B Kay, Jesse M. Dougherty, Malcom Pearson
  • Patent number: 8640201
    Abstract: In a distributed electronic messaging system authorized information comprising metadata concerning a message is passed along from one mail server to another mail server. A receiving computer determines if the sending computer has the necessary authorizations to pass along the metadata. If so, the authorized information is passed along with the message body, enabling repetitious actions to be eliminated. If the sending computer is not authorized to pass along the metadata, the metadata is stripped off the message, changed or annotated.
    Type: Grant
    Filed: December 11, 2006
    Date of Patent: January 28, 2014
    Assignee: Microsoft Corporation
    Inventors: Jeffrey B. Kay, Trevor W. Freeman, Malcolm Erik Pearson, Eric D. Tribble, Hao Zhang
  • Publication number: 20140006783
    Abstract: Establishing secure, mutually authenticated communication between a trusted network and a perimeter network. Servers on the perimeter network may be securely and automatically configured to communicate with the trusted network. Servers not functioning properly may be stopped from communicating with the other servers. Credential information relating to a perimeter server may be automatically, and regularly, updated without intervention.
    Type: Application
    Filed: September 4, 2013
    Publication date: January 2, 2014
    Applicant: Microsoft Corporation
    Inventors: Hao Zhang, Jeffrey B. Kay, Malcolm E. Pearson, Eric D. Tribble
  • Patent number: 8549295
    Abstract: Establishing secure, mutually authenticated communication between a trusted network and a perimeter network. Servers on the perimeter network may be securely and automatically configured to communicate with the trusted network. Servers not functioning properly may be stopped from communicating with the other servers. Credential information relating to a perimeter server may be automatically, and regularly, updated without intervention.
    Type: Grant
    Filed: May 31, 2006
    Date of Patent: October 1, 2013
    Assignee: Microsoft Corporation
    Inventors: Hao Zhang, Jeffrey B. Kay, Malcolm E. Pearson, Eric D. Tribble
  • Patent number: 8352558
    Abstract: Architecture that facilitates transport high availability for messaging services by providing the ability of a receiving entity (e.g., receiving message transfer agent (MTA)) to detect if a sending entity (e.g., sending MTA or client) is a legacy sending entity. When the receiving entity detects that the sending entity is a legacy system, by advertising transport high availability capability to the sending entity, if the sending entity does not opt-in to this capability, the receiving entity keeps the sending entity client “on hold”, that is, waiting for an acknowledgement (ACK) until the receiving entity delivers the message to the next hops (immediate destinations). This approach maintains at least two copies of the message until the message is successfully delivered (to the next hop(s)). Hence, if the legacy sending entity or the receiving entity fails, the message is still delivered successfully.
    Type: Grant
    Filed: February 10, 2009
    Date of Patent: January 8, 2013
    Assignee: Microsoft Corporation
    Inventors: Victor Boctor, Todd C. Luttinen, Jeffrey B. Kay, Jesse M. Dougherty, Malcom Pearson
  • Patent number: 8135645
    Abstract: A transmitting gateway may utilize a retrieved domain-specific key to secure an outbound message, and a receiving gateway may utilize another retrieved domain-specific key to authenticate and validate the secured message.
    Type: Grant
    Filed: March 3, 2006
    Date of Patent: March 13, 2012
    Assignee: Microsoft Corporation
    Inventors: Jeffrey B. Kay, Eric D. Tribble, Roy Williams, Trevor W. Freeman, Malcolm E. Pearson
  • Patent number: 8073122
    Abstract: Email messages are recalled in accordance with restrictions attached to the message. Use of the message is limited per the restrictions. Example restrictions include printing restrictions, forwarding restrictions, exporting restrictions, copying restrictions, reading restrictions, and a expiration time of the message.
    Type: Grant
    Filed: June 20, 2007
    Date of Patent: December 6, 2011
    Assignee: Microsoft Corporation
    Inventors: Jeffrey B. Kay, Frank D. Byrum, Steven Michael Clagg, Sara L. Manning
  • Patent number: 8069211
    Abstract: Architecture that protects side effect messages by associating the side effect messages with a primary (redundant) message that was received by a transport mechanism (e.g., a message transport agent). Side effect messages are considered “side effects” of a primary message that caused generation of the side effect messages. The primary message is only considered fully delivered after the primary message and all associated side effect messages are delivered, after which the source of the primary message is ACK'd (sent an “ACKnowledgement” message). Hence, in case of hardware failures after the primary message was delivered, but before delivery of side effect messages, the redundancy approach used triggers re-delivery of the primary message and re-generation and delivery of the side effect messages.
    Type: Grant
    Filed: January 23, 2009
    Date of Patent: November 29, 2011
    Assignee: Microsoft Corporation
    Inventors: Victor Boctor, Todd C. Luttinen, Jeffrey B. Kay
  • Patent number: 8010612
    Abstract: Systems for providing sign-up email addresses are disclosed herein. A user may set up a sign-up email address for receiving emails from a trusted, Internet-based enterprise. The user may set up a dedicated mailbox folder associated with the sign-up email address or enterprise. The email server may automatically direct emails coming from that enterprise into that folder. To “unsubscribe,” the user needs only to delete the folder or the sign-up address. Emails from the enterprise to the sign-up address may be highlighted in the user's main inbox. Thus, the user may be assured that any such email is truly from the enterprise, and not a phishing expedition or spam. Such systems also provide the user with effective tools to recognize phish or spam emails that appear to be from the trusted enterprise and not to act on them.
    Type: Grant
    Filed: April 17, 2007
    Date of Patent: August 30, 2011
    Assignee: Microsoft Corporation
    Inventors: Mihai Costea, Jeffrey B. Kay, Jesse Dougherty, Mayerber Carvalho Neto, Jain Chandresh, Mayank Mehta
  • Publication number: 20100325215
    Abstract: Architecture for enabling messages to be routed between network servers based on message requirements related to version, capabilities, and features, for example. The message requirements designate delivery over a transport path compatible with the message requirements. The message requirements can include a particular version or other features related to different software applications that require compatibility in message handling. Routing information is maintained related to a transport server or other network transport entity compatible with the message requirements and through which the message can be routed. The message is routed to the compatible transport server for delivery to the destination while avoiding delivery to transport servers incompatible with the message requirements.
    Type: Application
    Filed: June 19, 2009
    Publication date: December 23, 2010
    Applicant: Microsoft Corporation
    Inventors: Jeremy de Souza, Wilbert De Graaf, Gregory Gourevitch, Victor Boctor, Jeffrey B. Kay, Todd C. Luttinen, Shubhankar Sanyal
  • Publication number: 20100306554
    Abstract: Architecture that stores specific passwords on behalf of users, and encrypts the passwords using encryption keys managed by a distributed key management system. The encryption keys are stored in a directory service (e.g., hierarchical) in an area that is inaccessible by selected entities (e.g., administrative users) having superior permissions such as supervisory administrators, but accessible to the account components that need to access the unencrypted passwords. The distributed key management system makes the encryption key stored in the directory service available to all hardware/software components that need the key to encrypt or decrypt the passwords.
    Type: Application
    Filed: May 26, 2009
    Publication date: December 2, 2010
    Applicant: Microsoft Corporation
    Inventors: Fabian Nunez-Tejerina, Jeffrey B. Kay, Robert C. Fruth, Naveen A. Palavalli, Ramesh Chinta, Tolga Acar