Patents by Inventor Karim Batthish
Karim Batthish has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 10504066Abstract: As described herein, a client system is automatically configured to access message objects in a plurality of mailboxes stored at a server system. The client system sends an autodiscover request to the server system. In response, the server system sends to the client system an autodiscover response that contains an autodiscover response document that comprises a primary mailbox element and at least one alternate mailbox element. The client system uses a first set of mailbox identification data specified by the primary mailbox element to access message objects in a primary mailbox stored at the server system and uses sets of mailbox identification data specified by the alternate mailbox elements to access message objects in alternate mailboxes stored at the server system. Email messages are one example type of message objects. The alternate mailbox may be an archive mailbox used to store message objects for occasional reference.Type: GrantFiled: December 4, 2008Date of Patent: December 10, 2019Assignee: MICROSOFT TECHNOLOGY LICENSING, LLCInventors: Harvey Rook, Ashish Consul, Karim Batthish
-
Publication number: 20100145932Abstract: As described herein, a client system is automatically configured to access message objects in a plurality of mailboxes stored at a server system. The client system sends an autodiscover request to the server system. In response, the server system sends to the client system an autodiscover response that contains an autodiscover response document that comprises a primary mailbox element and at least one alternate mailbox element. The client system uses a first set of mailbox identification data specified by the primary mailbox element to access message objects in a primary mailbox stored at the server system and uses sets of mailbox identification data specified by the alternate mailbox elements to access message objects in alternate mailboxes stored at the server system. Email messages are one example type of message objects. The alternate mailbox may be an archive mailbox used to store message objects for occasional reference.Type: ApplicationFiled: December 4, 2008Publication date: June 10, 2010Applicant: MICROSOFT CORPORATIONInventors: Harvey Rook, Ashish Consul, Karim Batthish
-
Patent number: 7293171Abstract: Encrypted email message structures can contain recipient information that can reveal, to any recipient, all of the other recipients of an email message. Because some recipients, such as recipients to whom the message was “blind carbon-copied”, should remain hidden from the other recipients, individual encrypted messages can be created. One encrypted message can be created for all of the recipients who are intended to be revealed, such as the recipients listed in the TO and CC fields of an email header. A second encrypted message can be created for all of the recipients of the message who are intended to be hidden, such as the recipient listed in the BCC field of an email header. Alternatively, multiple encrypted messages can be created individually for each recipient in the BCC field, if the BCC recipients are to be hidden even from other BCC recipients.Type: GrantFiled: January 21, 2004Date of Patent: November 6, 2007Assignee: Microsoft CorporationInventors: Karim Batthish, Malcolm Davis, Roy Williams, Jean Wu
-
Publication number: 20070088798Abstract: A complex business logic encapsulation system and method are provided. The system can encapsulate complex business logic, for example, for workflow application(s). The system includes a common business logic layer component that encapsulates the business logic of objects in a store. The common business logic layer can employ response objects which encapsulate the business logic of complex objects in the store. The response object provides one or more suitable responses. The client can then identify the appropriate response, populate the response and send it back to the common business logic layer component. Each response object can embed an invariant identifier of the store item to which it corresponds, and, when sent or saved through a web service, causes the store to behave as if it had been processed by system.Type: ApplicationFiled: January 11, 2006Publication date: April 19, 2007Applicant: Microsoft CorporationInventors: John Merrill, Karim Batthish, Huw Upshall
-
Publication number: 20060242124Abstract: Maintaining a plurality of application component catalogs describing user experiences associated with particular application programs. The invention includes an extensible schema for the application component catalogs and a method for matching user experiences within the application component catalogs to particular user requests. The invention provides an extensible and scalable infrastructure for customizing a user interface experience.Type: ApplicationFiled: April 25, 2005Publication date: October 26, 2006Applicant: Microsoft CorporationInventors: Brendan Fields, Karim Batthish, Russell Simpson
-
Publication number: 20050160292Abstract: Encrypted email message structures can contain recipient information that can reveal, to any recipient, all of the other recipients of an email message. Because some recipients, such as recipients to whom the message was “blind carbon-copied”, should remain hidden from the other recipients, individual encrypted messages can be created. One encrypted message can be created for all of the recipients who are intended to be revealed, such as the recipients listed in the TO and CC fields of an email header. A second encrypted message can be created for all of the recipients of the message who are intended to be hidden, such as the recipient listed in the BCC field of an email header. Alternatively, multiple encrypted messages can be created individually for each recipient in the BCC field, if the BCC recipients are to be hidden even from other BCC recipients.Type: ApplicationFiled: January 21, 2004Publication date: July 21, 2005Applicant: Microsoft CorporationInventors: Karim Batthish, Malcolm Davis, Roy Williams, Jean Wu
-
Publication number: 20050108639Abstract: Disclosed is a policy based method for blocking the automatic dereferencing of web beacon links in an e-mail message sent in HTML format with a minimum sacrifice in the HTML body rendering quality. HTML content that potentially contains web beacons is replaced with non-dereferencing elements prior to HTML rendering by the e-mail browser so that the remaining HTML can be rendered as complete as possible without rendering the potential web beacons. Additionally, the present invention also provides a method for removing the HTTP Referer header from referenced external links and activated images. An HTTP redirector service is implemented as a server-based link redirection evaluator application which serves to eliminate the Referer header for the URL requested. Embodiments of the present invention provide for blocking web beacons and removing HTTP Referer headers in both a “down-level” e-mail client and a client which can make programmatic use of an HTML rendering engine.Type: ApplicationFiled: November 19, 2003Publication date: May 19, 2005Applicant: Microsoft CorporationInventors: Brendan Fields, Karim Batthish, Yuriy Inglikov, Jorge Pereira
-
Publication number: 20050021969Abstract: The principles of the present invention provide for delegating certificate validation. A client computer system sends a certificate validation request to a server computer system over a trusted link. The certificate validation request includes at least enough certificate information for a certificate authority to identify a digital certificate that binds a sending entity to a private key. The server computer system checks a validation path to determine if the digital certificate is valid and at least one certificate revocation list to determine if the certificate has been compromised. The server computer system sends a certificate status indication to the client computer system over the trusted link. Accordingly, the resources of the server computer system, instead of the client computer system, are utilized to validate a digital certificate. Further, digital certificate validation can be delegated to a server computer system that attempts to pre-validate a digital certificate.Type: ApplicationFiled: July 1, 2003Publication date: January 27, 2005Inventors: Roy Williams, Karim Batthish, Jorge Pereira