Patents by Inventor Khaja E. Ahmed
Khaja E. Ahmed has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 7552176Abstract: The present invention provides for generating inputs that can be provided to a message classification module to facilitate more reliable classification of electronic messages, such as, for example, as unwanted and/or unsolicited. In one embodiment, a sending messaging server provides an appropriate response to address verification data thereby indicating a reduced likelihood of the sending messaging server using a forged network address. In another embodiment, it is determined if a messaging server is authorized to send electronic messages for a domain. In yet another embodiment, electronic message transmission policies adhered to by a domain are identified. In yet a further embodiment, a sending computer system expends computational resources to solve a computational puzzle and includes an answer document in an electronic message. A receiving computer system receives the electronic message and verifies the answer document.Type: GrantFiled: October 10, 2003Date of Patent: June 23, 2009Assignee: Microsoft CorporationInventors: Robert George Atkinson, Joshua T. Goodman, James M. Lyon, Roy Williams, Khaja E. Ahmed, Harry Simon Katz, Robert L. Rounthwaite, Andrew V. Goldberg, Cynthia Dwork
-
Patent number: 7398315Abstract: The present invention provides for generating inputs that can be provided to a message classification module to facilitate more reliable classification of electronic messages, such as, for example, as unwanted and/or unsolicited. In one embodiment, a sending messaging server provides an appropriate response to address verification data thereby indicating a reduced likelihood of the sending messaging server using a forged network address. In another embodiment, it is determined if a messaging server is authorized to send electronic messages for a domain. In yet another embodiment, electronic message transmission policies adhered to by a domain are identified. In yet a further embodiment, a sending computer system expends computational resources to solve a computational puzzle and includes an answer document in an electronic message. A receiving computer system receives the electronic message and verifies the answer document.Type: GrantFiled: October 10, 2003Date of Patent: July 8, 2008Assignee: Workman NydeggerInventors: Robert George Atkinson, Joshua T. Goodman, James M. Lyon, Roy Williams, Khaja E. Ahmed, Harry Simon Katz, Robert L. Rounthwaite
-
Publication number: 20080082648Abstract: A system, apparatus, method, and computer-readable medium are provided for secure P2P caching. In one method, a requesting peer obtains a hash of requested data from a server. The requesting peer then transmits a request for the data to other peers. The request proves that the requesting peer has the hash. If a caching peer has the data, it generates a reply to the request that proves that it has the requested data. If the requesting peer receives a reply from a caching peer, the requesting peer establishes a connection to the caching peer and retrieves the data from the caching peer. If the requesting peer does not receive a reply to the request from any other peer, the requesting peer establishes a connection to the server and retrieves the data from the server. The requesting peer stores the data for use in responding to requests from other peers.Type: ApplicationFiled: September 29, 2006Publication date: April 3, 2008Applicant: Microsoft CorporationInventors: Khaja E. Ahmed, Daniel R. Simon
-
Publication number: 20080052509Abstract: A networked computer system in which a trusted intermediary device is allowed access to packets transmitted through a secured connection. An endpoint to a secured connection identifies a trusted intermediary device, such as by certificate provided by the intermediary device or by using identification information provided by a trusted server. The endpoint shares with the trusted intermediary device connection information that enables the intermediary device to access packets transmitted through the secured connection. Using the connection information, the intermediary device may modify authenticated packets, such as to perform network address translation, without disrupting the underlying secured connection. Similarly, the intermediary device may use the security information to read encrypted information and perform functions such as network traffic monitoring or filtering of unwanted network traffic.Type: ApplicationFiled: August 24, 2006Publication date: February 28, 2008Applicant: Microsoft CorporationInventor: Khaja E. Ahmed
-
Patent number: 7240203Abstract: A method and apparatus for processing security operations are described. In one embodiment, a processor includes a number of execution units to process a number of requests for security operations. The number of execution units are to output the results of the number of requests to a number of output data structures associated with the number of requests within a remote memory based on pointers stored in the number of requests. The number of execution units can output the results in an order that is different from the order of the requests in a request queue. The processor also includes a request unit coupled to the number of execution units. The request unit is to retrieve a portion of the number of requests from the request queue within the remote memory and associated input data structures for the portion of the number of requests from the remote memory.Type: GrantFiled: December 19, 2001Date of Patent: July 3, 2007Assignee: Cavium Networks, Inc.Inventors: Richard E. Kessler, David A. Carlson, Muhammad Raghib Hussain, Robert A. Sanzone, Khaja E. Ahmed, Michael D. Varga
-
Patent number: 7200573Abstract: A system and method for providing warranties that financially guarantee one or more facts associated with an electronic transaction. In a preferred embodiment, warranties issued to the present system comprise a contract between a first party and a second party in which the first party: (1) warrants one or more warranted facts (2) for damages up to a warranted amount (3) if claimed by a relying customer within a claim period. The warranty is preferably issued by a participant in response to a request received from a customer that specifies a desired warranted amount and claim period. The participant and root entity evaluate the request in light of a plurality of factors and determine whether or not the warranty should be issued. In a preferred embodiment, the warranty comprises a contract between the buyer and its issuing participant. The seller is preferably a third-party beneficiary of this contract.Type: GrantFiled: October 23, 2003Date of Patent: April 3, 2007Assignee: IdenTrust, Inc.Inventors: Lawrence R. Miller, Khaja E. Ahmed, Navin Vasanthakumar, Mark Robinson, Jeffrey F. Boyd, Deborah Goldstein, Peter Cerra
-
Patent number: 7000105Abstract: A system and method are disclosed for transparently providing certificate validation and other services without requiring a separate service request by either a relying customer or subscribing customer. In a preferred embodiment, after the subscribing customer digitally signs a document (e.g., a commercial document such as a purchase order), it forwards the document to a trusted messaging entity which validates the certificates of both the subscribing customer and relying customer and the respective system participants of which they are customers. If the certificates are valid, the trusted messaging entity appends a validation message to the digitally-signed document and forwards the document to the relying customer. A validation message is also preferably appended to a digitally-signed receipt from the relying customer and transmitted to the subscribing customer. In this way, both the relying customer and subscribing customer obtain certification of their respective counterparty to the transaction.Type: GrantFiled: September 10, 2001Date of Patent: February 14, 2006Assignee: Identrus, LLCInventors: Guy S. Tallent, Jr., Lawrence R. Miller, Khaja E. Ahmed
-
Publication number: 20040181571Abstract: The present invention provides for generating inputs that can be provided to a message classification module to facilitate more reliable classification of electronic messages, such as, for example, as unwanted and/or unsolicited. In one embodiment, a sending messaging server provides an appropriate response to address verification data thereby indicating a reduced likelihood of the sending messaging server using a forged network address. In another embodiment, it is determined if a messaging server is authorized to send electronic messages for a domain. In yet another embodiment, electronic message transmission policies adhered to by a domain are identified. In yet a further embodiment, a sending computer system expends computational resources to solve a computational puzzle and includes an answer document in an electronic message. A receiving computer system receives the electronic message and verifies the answer document.Type: ApplicationFiled: October 10, 2003Publication date: September 16, 2004Inventors: Robert George Atkinson, Joshua T. Goodman, James M. Lyon, Roy Williams, Khaja E. Ahmed, Harry Simon Katz, Robert L. Rounthwaite
-
Publication number: 20040181585Abstract: The present invention provides for generating inputs that can be provided to a message classification module to facilitate more reliable classification of electronic messages, such as, for example, as unwanted and/or unsolicited. In one embodiment, a sending messaging server provides an appropriate response to address verification data thereby indicating a reduced likelihood of the sending messaging server using a forged network address. In another embodiment, it is determined if a messaging server is authorized to send electronic messages for a domain. In yet another embodiment, electronic message transmission policies adhered to by a domain are identified. In yet a further embodiment, a sending computer system expends computational resources to solve a computational puzzle and includes an answer document in an electronic message. A receiving computer system receives the electronic message and verifies the answer document.Type: ApplicationFiled: October 10, 2003Publication date: September 16, 2004Inventors: Robert George Atkinson, Joshua T. Goodman, James M. Lyon, Roy Williams, Khaja E. Ahmed, Harry Simon Katz, Robert L. Rounthwaite, Andrew V. Goldberg, Cynthia Dwork
-
Patent number: 6789147Abstract: A method and apparatus for processing security operations are described. In one embodiment, a processor includes a number of execution units to process a number of requests for security operations. The number of execution units are to output the results of the number of requests to a number of output data structures associated with the number of requests within a remote memory based on pointers stored in the number of requests. The number of execution units can output the results in an order that is different from the order of the requests in a request queue. The processor also includes a request unit coupled to the number of execution units. The request unit is to retrieve a portion of the number of requests from the request queue within the remote memory and associated input data structures for the portion of the number of requests from the remote memory.Type: GrantFiled: December 19, 2001Date of Patent: September 7, 2004Assignee: Cavium NetworksInventors: Richard E. Kessler, David A. Carlson, Muhammad Raghib Hussain, Robert A. Sanzone, Khaja E. Ahmed, Michael D. Varga
-
Publication number: 20040088263Abstract: A system and method are disclosed for providing warranties that financially guarantee one or more facts associated with an electronic transaction. In a preferred embodiment, warranties issued in the present system comprise a contract between a first party and a second party in which the first party: (1) warrants one or more warranted facts (2) for damages up to a warranted amount (3) if claimed by a relying customer within a claim period. The warranty is preferably issued by a participant in response to a request received from a customer that specifies a desired warranted amount and claim period. The participant and root entity evaluate the request in light of a plurality of factors and determine whether or not the warranty should be issued. In a preferred embodiment, the warranty comprises a contract between the buyer and its issuing participant. The seller is preferably a third-party beneficiary of this contract.Type: ApplicationFiled: October 23, 2003Publication date: May 6, 2004Inventors: Lawrence R. Miller, Khaja E. Ahmed, Navin Vasanthakumar, Mark Robinson, Jeffrey F. Boyd, Deborah Goldstein, Peter Cerra
-
Publication number: 20030167210Abstract: A system and method are disclosed for providing warranties that financially guarantee one or more facts associated with an electronic transaction. In a preferred embodiment, warranties issued in the present system comprise a contract between a first party and a second party in which the first party: (1) warrants one or more warranted facts (2) for damages up to a warranted amount (3) if claimed by a relying customer within a claim period. The warranty is preferably issued by a participant in response to a request received from a customer that specifies a desired warranted amount and claim period. The participant and root entity evaluate the request in light of a plurality of factors and determine whether or not the warranty should be issued. In a preferred embodiment, the warranty comprises a contract between the buyer and its issuing participant. The seller is preferably a third-party beneficiary of this contract.Type: ApplicationFiled: January 4, 2002Publication date: September 4, 2003Inventors: Lawrence R. Miller, Khaja E. Ahmed, Deborah Goldstein, Peter Cerra, Navin Vasanthakumar, Mark Robinson, Jeffrey F. Boyd
-
Publication number: 20030020621Abstract: A method and apparatus for processing security operations are described. In one embodiment, a processor includes a number of execution units to process a number of requests for security operations. The number of execution units are to output the results of the number of requests to a number of output data structures associated with the number of requests within a remote memory based on pointers stored in the number of requests. The number of execution units can output the results in an order that is different from the order of the requests in a request queue. The processor also includes a request unit coupled to the number of execution units. The request unit is to retrieve a portion of the number of requests from the request queue within the remote memory and associated input data structures for the portion of the number of requests from the remote memory.Type: ApplicationFiled: December 19, 2001Publication date: January 30, 2003Inventors: Richard E. Kessler, David A. Carlson, Muhammad Raghib Hussain, Robert A. Sanzone, Khaja E. Ahmed, Michael D. Varga