Patents by Inventor Jeffrey B. Kay

Jeffrey B. Kay has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20100205257
    Abstract: Architecture that facilitates transport high availability for messaging services by providing the ability of a receiving entity (e.g., receiving message transfer agent (MTA)) to detect if a sending entity (e.g., sending MTA or client) is a legacy sending entity. When the receiving entity detects that the sending entity is a legacy system, by advertising transport high availability capability to the sending entity, if the sending entity does not opt-in to this capability, the receiving entity keeps the sending entity client “on hold”, that is, waiting for an acknowledgement (ACK) until the receiving entity delivers the message to the next hops (immediate destinations). This approach maintains at least two copies of the message until the message is successfully delivered (to the next hop(s)). Hence, if the legacy sending entity or the receiving entity fails, the message is still delivered successfully.
    Type: Application
    Filed: February 10, 2009
    Publication date: August 12, 2010
    Applicant: Microsoft Corporation
    Inventors: Victor Boctor, Todd C. Luttinen, Jeffrey B. Kay, Jesse M. Dougherty, Malcolm Pearson
  • Publication number: 20100191810
    Abstract: Architecture that protects side effect messages by associating the side effect messages with a primary (redundant) message that was received by a transport mechanism (e.g., a message transport agent). Side effect messages are considered “side effects” of a primary message that caused generation of the side effect messages. The primary message is only considered fully delivered after the primary message and all associated side effect messages are delivered, after which the source of the primary message is ACK'd (sent an “ACKnowledgement” message). Hence, in case of hardware failures after the primary message was delivered, but before delivery of side effect messages, the redundancy approach used triggers re-delivery of the primary message and re-generation and delivery of the side effect messages.
    Type: Application
    Filed: January 23, 2009
    Publication date: July 29, 2010
    Applicant: Microsoft Corporation
    Inventors: Victor Boctor, Todd C. Luttinen, Jeffrey B. Kay
  • Publication number: 20100185735
    Abstract: Architecture for messaging server extensibility without the need to update or make changes to the messaging server by routing selected messages to a remote location for processing by custom code or third-party code. The messaging server routes the selected messages based server analysis of the messages and in view of configuration data (or conditions) for routing messages. The remote location processes the message and can instruct the messaging server to accept, reject, or redirect the message. Additionally, the remote location can modify the message and instruct the messaging server to process the modified message. The hosted organization can configure triggers to have the messaging server call to a web service with the messages, which extends the functionality of the messaging server.
    Type: Application
    Filed: January 21, 2009
    Publication date: July 22, 2010
    Applicant: Microsoft Corporation
    Inventors: Wilbert De Graaf, Jeffrey B. Kay, Khalid Razzag, Saeed Noursalehi, Victor Boctor
  • Publication number: 20090006851
    Abstract: A method for confidential electronic communication between a sender workstation and a receiver workstation is provided, whereby privacy is guaranteed for the electronic communications transmitted over the public Internet. The method of confidential communication is equipped with message tracking and message receipt verification. The system for implementing the method includes a sender server that creates a session content encryption key along with a message envelope that includes a content encryption key encrypted message and a confidential mail token. The content encryption key is stored securely inside the sender organization's system which transmits the message envelope to an intended recipient. The intended recipient processes the message envelope in order to generate a message receipt verification, which is transmitted to the sender. The message receipt verification is processed by the sender server to verify that the message envelope reached the intended recipient.
    Type: Application
    Filed: June 29, 2007
    Publication date: January 1, 2009
    Applicant: Microsoft Corporation
    Inventors: Trevor W. Freeman, Mayank Mehta, Jeremy De Souza, Jeffrey B. Kay
  • Publication number: 20080317228
    Abstract: Email messages are recalled in accordance with restrictions attached to the message. Use of the message is limited per the restrictions. Example restrictions include printing restrictions, forwarding restrictions, exporting restrictions, copying restrictions, reading restrictions, and a expiration time of the message.
    Type: Application
    Filed: June 20, 2007
    Publication date: December 25, 2008
    Applicant: Microsoft Corporation
    Inventors: Jeffrey B. Kay, Frank D. Byrum, Steven Michael Clagg, Sara L. Manning
  • Publication number: 20080263156
    Abstract: Systems for providing sign-up email addresses are disclosed herein. A user may set up a sign-up email address for receiving emails from a trusted, Internet-based enterprise. The user may set up a dedicated mailbox folder associated with the sign-up email address or enterprise. The email server may automatically direct emails coming from that enterprise into that folder. To “unsubscribe,” the user needs only to delete the folder or the sign-up address. Emails from the enterprise to the sign-up address may be highlighted in the user's main inbox. Thus, the user may be assured that any such email is truly from the enterprise, and not a phishing expedition or spam. Such systems also provide the user with effective tools to recognize phish or spam emails that appear to be from the trusted enterprise and not to act on them.
    Type: Application
    Filed: April 17, 2007
    Publication date: October 23, 2008
    Applicant: Microsoft Corporation
    Inventors: Mihai Costea, Jeffrey B. Kay, Jesse Dougherty, Mayerber Carvalho Neto, Jain Chandresh, Mayank Mehta
  • Publication number: 20080141346
    Abstract: In a distributed electronic messaging system authorized information comprising metadata concerning a message is passed along from one mail server to another mail server. A receiving computer determines if the sending computer has the necessary authorizations to pass along the metadata. If so, the authorized information is passed along with the message body, enabling repetitious actions to be eliminated. If the sending computer is not authorized to pass along the metadata, the metadata is stripped off the message, changed or annotated.
    Type: Application
    Filed: December 11, 2006
    Publication date: June 12, 2008
    Applicant: Microsoft Corporation
    Inventors: Jeffrey B. Kay, Trevor W. Freeman, Malcolm Erik Pearson, Eric D. Tribble, Hao Zhang
  • Publication number: 20070283154
    Abstract: Establishing secure, mutually authenticated communication between a trusted network and a perimeter network. Servers on the perimeter network may be securely and automatically configured to communicate with the trusted network. Servers not functioning properly may be stopped from communicating with the other servers. Credential information relating to a perimeter server may be automatically, and regularly, updated without intervention.
    Type: Application
    Filed: May 31, 2006
    Publication date: December 6, 2007
    Applicant: Microsoft Corporation
    Inventors: Hao Zhang, Jeffrey B. Kay, Malcolm E. Pearson, Eric D. Tribble
  • Patent number: 6223166
    Abstract: A cryptographic encoded, ticket issuing and collection system for real-time purchase of tickets by purchasers at remote user stations in an information network that includes a plurality of remote user stations coupled to a server in an information network, e.g., the Internet, for purchase of services, products, or tickets to an event. An operator of the remote user station selects a ticket for purchase to an event using standard protocols of information network. An electronic ticket is transmitted to the operator and includes a cypher code created using a public key cryptography system. The operator displays the electronic ticket for verification purposes and proceeds to print out the ticket at the station. The ticket is presented to a ticket collector whereupon the ticket is scanned by a portable terminal for decoding the cypher code using a public key reloaded into the terminal by the producers of the event.
    Type: Grant
    Filed: November 26, 1997
    Date of Patent: April 24, 2001
    Assignee: International Business Machines Corporation
    Inventor: Jeffrey B. Kay