Patents by Inventor Khaja E. Ahmed

Khaja E. Ahmed has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 7552176
    Abstract: The present invention provides for generating inputs that can be provided to a message classification module to facilitate more reliable classification of electronic messages, such as, for example, as unwanted and/or unsolicited. In one embodiment, a sending messaging server provides an appropriate response to address verification data thereby indicating a reduced likelihood of the sending messaging server using a forged network address. In another embodiment, it is determined if a messaging server is authorized to send electronic messages for a domain. In yet another embodiment, electronic message transmission policies adhered to by a domain are identified. In yet a further embodiment, a sending computer system expends computational resources to solve a computational puzzle and includes an answer document in an electronic message. A receiving computer system receives the electronic message and verifies the answer document.
    Type: Grant
    Filed: October 10, 2003
    Date of Patent: June 23, 2009
    Assignee: Microsoft Corporation
    Inventors: Robert George Atkinson, Joshua T. Goodman, James M. Lyon, Roy Williams, Khaja E. Ahmed, Harry Simon Katz, Robert L. Rounthwaite, Andrew V. Goldberg, Cynthia Dwork
  • Patent number: 7398315
    Abstract: The present invention provides for generating inputs that can be provided to a message classification module to facilitate more reliable classification of electronic messages, such as, for example, as unwanted and/or unsolicited. In one embodiment, a sending messaging server provides an appropriate response to address verification data thereby indicating a reduced likelihood of the sending messaging server using a forged network address. In another embodiment, it is determined if a messaging server is authorized to send electronic messages for a domain. In yet another embodiment, electronic message transmission policies adhered to by a domain are identified. In yet a further embodiment, a sending computer system expends computational resources to solve a computational puzzle and includes an answer document in an electronic message. A receiving computer system receives the electronic message and verifies the answer document.
    Type: Grant
    Filed: October 10, 2003
    Date of Patent: July 8, 2008
    Assignee: Workman Nydegger
    Inventors: Robert George Atkinson, Joshua T. Goodman, James M. Lyon, Roy Williams, Khaja E. Ahmed, Harry Simon Katz, Robert L. Rounthwaite
  • Publication number: 20080082648
    Abstract: A system, apparatus, method, and computer-readable medium are provided for secure P2P caching. In one method, a requesting peer obtains a hash of requested data from a server. The requesting peer then transmits a request for the data to other peers. The request proves that the requesting peer has the hash. If a caching peer has the data, it generates a reply to the request that proves that it has the requested data. If the requesting peer receives a reply from a caching peer, the requesting peer establishes a connection to the caching peer and retrieves the data from the caching peer. If the requesting peer does not receive a reply to the request from any other peer, the requesting peer establishes a connection to the server and retrieves the data from the server. The requesting peer stores the data for use in responding to requests from other peers.
    Type: Application
    Filed: September 29, 2006
    Publication date: April 3, 2008
    Applicant: Microsoft Corporation
    Inventors: Khaja E. Ahmed, Daniel R. Simon
  • Publication number: 20080052509
    Abstract: A networked computer system in which a trusted intermediary device is allowed access to packets transmitted through a secured connection. An endpoint to a secured connection identifies a trusted intermediary device, such as by certificate provided by the intermediary device or by using identification information provided by a trusted server. The endpoint shares with the trusted intermediary device connection information that enables the intermediary device to access packets transmitted through the secured connection. Using the connection information, the intermediary device may modify authenticated packets, such as to perform network address translation, without disrupting the underlying secured connection. Similarly, the intermediary device may use the security information to read encrypted information and perform functions such as network traffic monitoring or filtering of unwanted network traffic.
    Type: Application
    Filed: August 24, 2006
    Publication date: February 28, 2008
    Applicant: Microsoft Corporation
    Inventor: Khaja E. Ahmed
  • Patent number: 7240203
    Abstract: A method and apparatus for processing security operations are described. In one embodiment, a processor includes a number of execution units to process a number of requests for security operations. The number of execution units are to output the results of the number of requests to a number of output data structures associated with the number of requests within a remote memory based on pointers stored in the number of requests. The number of execution units can output the results in an order that is different from the order of the requests in a request queue. The processor also includes a request unit coupled to the number of execution units. The request unit is to retrieve a portion of the number of requests from the request queue within the remote memory and associated input data structures for the portion of the number of requests from the remote memory.
    Type: Grant
    Filed: December 19, 2001
    Date of Patent: July 3, 2007
    Assignee: Cavium Networks, Inc.
    Inventors: Richard E. Kessler, David A. Carlson, Muhammad Raghib Hussain, Robert A. Sanzone, Khaja E. Ahmed, Michael D. Varga
  • Patent number: 7200573
    Abstract: A system and method for providing warranties that financially guarantee one or more facts associated with an electronic transaction. In a preferred embodiment, warranties issued to the present system comprise a contract between a first party and a second party in which the first party: (1) warrants one or more warranted facts (2) for damages up to a warranted amount (3) if claimed by a relying customer within a claim period. The warranty is preferably issued by a participant in response to a request received from a customer that specifies a desired warranted amount and claim period. The participant and root entity evaluate the request in light of a plurality of factors and determine whether or not the warranty should be issued. In a preferred embodiment, the warranty comprises a contract between the buyer and its issuing participant. The seller is preferably a third-party beneficiary of this contract.
    Type: Grant
    Filed: October 23, 2003
    Date of Patent: April 3, 2007
    Assignee: IdenTrust, Inc.
    Inventors: Lawrence R. Miller, Khaja E. Ahmed, Navin Vasanthakumar, Mark Robinson, Jeffrey F. Boyd, Deborah Goldstein, Peter Cerra
  • Patent number: 7000105
    Abstract: A system and method are disclosed for transparently providing certificate validation and other services without requiring a separate service request by either a relying customer or subscribing customer. In a preferred embodiment, after the subscribing customer digitally signs a document (e.g., a commercial document such as a purchase order), it forwards the document to a trusted messaging entity which validates the certificates of both the subscribing customer and relying customer and the respective system participants of which they are customers. If the certificates are valid, the trusted messaging entity appends a validation message to the digitally-signed document and forwards the document to the relying customer. A validation message is also preferably appended to a digitally-signed receipt from the relying customer and transmitted to the subscribing customer. In this way, both the relying customer and subscribing customer obtain certification of their respective counterparty to the transaction.
    Type: Grant
    Filed: September 10, 2001
    Date of Patent: February 14, 2006
    Assignee: Identrus, LLC
    Inventors: Guy S. Tallent, Jr., Lawrence R. Miller, Khaja E. Ahmed
  • Publication number: 20040181571
    Abstract: The present invention provides for generating inputs that can be provided to a message classification module to facilitate more reliable classification of electronic messages, such as, for example, as unwanted and/or unsolicited. In one embodiment, a sending messaging server provides an appropriate response to address verification data thereby indicating a reduced likelihood of the sending messaging server using a forged network address. In another embodiment, it is determined if a messaging server is authorized to send electronic messages for a domain. In yet another embodiment, electronic message transmission policies adhered to by a domain are identified. In yet a further embodiment, a sending computer system expends computational resources to solve a computational puzzle and includes an answer document in an electronic message. A receiving computer system receives the electronic message and verifies the answer document.
    Type: Application
    Filed: October 10, 2003
    Publication date: September 16, 2004
    Inventors: Robert George Atkinson, Joshua T. Goodman, James M. Lyon, Roy Williams, Khaja E. Ahmed, Harry Simon Katz, Robert L. Rounthwaite
  • Publication number: 20040181585
    Abstract: The present invention provides for generating inputs that can be provided to a message classification module to facilitate more reliable classification of electronic messages, such as, for example, as unwanted and/or unsolicited. In one embodiment, a sending messaging server provides an appropriate response to address verification data thereby indicating a reduced likelihood of the sending messaging server using a forged network address. In another embodiment, it is determined if a messaging server is authorized to send electronic messages for a domain. In yet another embodiment, electronic message transmission policies adhered to by a domain are identified. In yet a further embodiment, a sending computer system expends computational resources to solve a computational puzzle and includes an answer document in an electronic message. A receiving computer system receives the electronic message and verifies the answer document.
    Type: Application
    Filed: October 10, 2003
    Publication date: September 16, 2004
    Inventors: Robert George Atkinson, Joshua T. Goodman, James M. Lyon, Roy Williams, Khaja E. Ahmed, Harry Simon Katz, Robert L. Rounthwaite, Andrew V. Goldberg, Cynthia Dwork
  • Patent number: 6789147
    Abstract: A method and apparatus for processing security operations are described. In one embodiment, a processor includes a number of execution units to process a number of requests for security operations. The number of execution units are to output the results of the number of requests to a number of output data structures associated with the number of requests within a remote memory based on pointers stored in the number of requests. The number of execution units can output the results in an order that is different from the order of the requests in a request queue. The processor also includes a request unit coupled to the number of execution units. The request unit is to retrieve a portion of the number of requests from the request queue within the remote memory and associated input data structures for the portion of the number of requests from the remote memory.
    Type: Grant
    Filed: December 19, 2001
    Date of Patent: September 7, 2004
    Assignee: Cavium Networks
    Inventors: Richard E. Kessler, David A. Carlson, Muhammad Raghib Hussain, Robert A. Sanzone, Khaja E. Ahmed, Michael D. Varga
  • Publication number: 20040088263
    Abstract: A system and method are disclosed for providing warranties that financially guarantee one or more facts associated with an electronic transaction. In a preferred embodiment, warranties issued in the present system comprise a contract between a first party and a second party in which the first party: (1) warrants one or more warranted facts (2) for damages up to a warranted amount (3) if claimed by a relying customer within a claim period. The warranty is preferably issued by a participant in response to a request received from a customer that specifies a desired warranted amount and claim period. The participant and root entity evaluate the request in light of a plurality of factors and determine whether or not the warranty should be issued. In a preferred embodiment, the warranty comprises a contract between the buyer and its issuing participant. The seller is preferably a third-party beneficiary of this contract.
    Type: Application
    Filed: October 23, 2003
    Publication date: May 6, 2004
    Inventors: Lawrence R. Miller, Khaja E. Ahmed, Navin Vasanthakumar, Mark Robinson, Jeffrey F. Boyd, Deborah Goldstein, Peter Cerra
  • Publication number: 20030167210
    Abstract: A system and method are disclosed for providing warranties that financially guarantee one or more facts associated with an electronic transaction. In a preferred embodiment, warranties issued in the present system comprise a contract between a first party and a second party in which the first party: (1) warrants one or more warranted facts (2) for damages up to a warranted amount (3) if claimed by a relying customer within a claim period. The warranty is preferably issued by a participant in response to a request received from a customer that specifies a desired warranted amount and claim period. The participant and root entity evaluate the request in light of a plurality of factors and determine whether or not the warranty should be issued. In a preferred embodiment, the warranty comprises a contract between the buyer and its issuing participant. The seller is preferably a third-party beneficiary of this contract.
    Type: Application
    Filed: January 4, 2002
    Publication date: September 4, 2003
    Inventors: Lawrence R. Miller, Khaja E. Ahmed, Deborah Goldstein, Peter Cerra, Navin Vasanthakumar, Mark Robinson, Jeffrey F. Boyd
  • Publication number: 20030020621
    Abstract: A method and apparatus for processing security operations are described. In one embodiment, a processor includes a number of execution units to process a number of requests for security operations. The number of execution units are to output the results of the number of requests to a number of output data structures associated with the number of requests within a remote memory based on pointers stored in the number of requests. The number of execution units can output the results in an order that is different from the order of the requests in a request queue. The processor also includes a request unit coupled to the number of execution units. The request unit is to retrieve a portion of the number of requests from the request queue within the remote memory and associated input data structures for the portion of the number of requests from the remote memory.
    Type: Application
    Filed: December 19, 2001
    Publication date: January 30, 2003
    Inventors: Richard E. Kessler, David A. Carlson, Muhammad Raghib Hussain, Robert A. Sanzone, Khaja E. Ahmed, Michael D. Varga