Patents by Inventor Malcolm Davis
Malcolm Davis has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Publication number: 20140051520Abstract: A gaming system and method relate to game tournaments and in particular, to a quasi-tournament wherein a tournament between multiple human players playing casino type games against each other is simulated with a plurality of electronic game machines whereby winners of the quasi-tournament are determined based on the outcome of games played by individual players against the game machines.Type: ApplicationFiled: March 15, 2013Publication date: February 20, 2014Applicant: BRAIN GAMES, L.C.Inventor: MALCOLM DAVIS
-
Publication number: 20100069134Abstract: A method of operating an electronic gaming system includes receiving value from a human user of an electronic gaming machine, initiating a machine-implemented game on the electronic gaming machine, displaying indicia representative of a game state on a display, receiving input from the human user via a user interface associated with the electronic gaming machine, determining an outcome of the game, determining an estimate of the human user's probability of winning the game, the estimate having reduced variance compared to a simple average of the human user's outcomes, taking a set, predetermined action if the estimate is outside of the predetermined limits.Type: ApplicationFiled: September 14, 2009Publication date: March 18, 2010Applicant: BRAIN GAMES, L.C.Inventors: MALCOLM DAVIS, FREDRIK DAHL
-
Publication number: 20080195871Abstract: A new ((n)th) black box is produced for a digital rights management (DRM) system. The (n)th black box is for being installed in and for performing decryption and encryption functions in the DRM system. The (n)th black box is produced and delivered to the DRM system upon request and includes a new ((n)th) executable and a new ((n)th) key file. The (n)th key file has a new ((n)th) set of black box keys and a number of old sets of black box keys. The request includes an old ((n-1)th) key file having the old sets of black box keys. A code optimizer/randomizer receives a master executable and randomized optimization parameters as inputs and produces the (n)th executable as an output. A key manager receives the (n-1)th key file and the (n)th set of black box keys as inputs, extracts the old sets of black box keys from the (n-1)th key file, and produces the (n)th key file including the (n)th set of black box keys and the old sets of black box keys as an output.Type: ApplicationFiled: January 14, 2008Publication date: August 14, 2008Inventors: Marcus Peinado, Ramarathnam Venkatesan, Malcolm Davis
-
Patent number: 7319759Abstract: A new ((n)th) black box is produced for a digital rights management (DRM) system. The (n)th black box is for being installed in and for performing decryption and encryption functions in the DRM system. The (n)th black box is produced and delivered to the DRM system upon request and includes a new ((n)th) executable and a new ((n)th) key file. The (n)th key file has a new ((n)th) set of black box keys and a number of old sets of black box keys. The request includes an old ((n?1)th) key file having the old sets of black box keys. A code optimizer/randomizer receives a master executable and randomized optimization parameters as inputs and produces the (n)th executable as an output. A key manager receives the (n?1)th key file and the (n)th set of black box keys as inputs, extracts the old sets of black box keys from the (n?1)th key file, and produces the (n)th key file including the (n)th set of black box keys and the old sets of black box keys as an output.Type: GrantFiled: March 15, 2000Date of Patent: January 15, 2008Assignee: Microsoft CorporationInventors: Marcus Peinado, Ramarathnam Venkatesan, Malcolm Davis
-
Patent number: 7293171Abstract: Encrypted email message structures can contain recipient information that can reveal, to any recipient, all of the other recipients of an email message. Because some recipients, such as recipients to whom the message was “blind carbon-copied”, should remain hidden from the other recipients, individual encrypted messages can be created. One encrypted message can be created for all of the recipients who are intended to be revealed, such as the recipients listed in the TO and CC fields of an email header. A second encrypted message can be created for all of the recipients of the message who are intended to be hidden, such as the recipient listed in the BCC field of an email header. Alternatively, multiple encrypted messages can be created individually for each recipient in the BCC field, if the BCC recipients are to be hidden even from other BCC recipients.Type: GrantFiled: January 21, 2004Date of Patent: November 6, 2007Assignee: Microsoft CorporationInventors: Karim Batthish, Malcolm Davis, Roy Williams, Jean Wu
-
Publication number: 20070067406Abstract: A recipient computer system submits an anonymous electronic message address to a source computing system for use when the source computing system is to send electronic messages to the recipient. When the electronic message server receives an electronic message, it reads the electronic message address and determines that the address corresponds to the recipient, but only if the electronic message originated from the source. If the electronic message were to originate from a different source computing system, the same electronic message address would not be respected for delivery to the recipient. Accordingly, the electronic message address is specific to a source, and thus sharing the electronic message address has little avail. The association between the address and the recipient may be revoked when the recipient no longer desires to receive messages from the source.Type: ApplicationFiled: November 8, 2006Publication date: March 22, 2007Applicant: Microsoft CorporationInventors: Kristian Andaker, Malcolm Davis, David Fulmer, John Gibbon
-
Publication number: 20070011750Abstract: The present invention provides the ability to compare and enforce policies between trusted entities within a rights management system. For example, policies between the two entities may be received by either entity. They may then be compared to determine the compatibility of the two policies. If compatible, or maybe even without the comparison, other embodiments provide for message server use license, which allows access to the protected portion of a message, thereby permitting an entity to enforce its message policies.Type: ApplicationFiled: September 14, 2006Publication date: January 11, 2007Applicant: Microsoft CorporationInventors: Malcolm Davis, Peter Waxman, John Speare, Roy Williams
-
Patent number: 7139825Abstract: A recipient computer system submits an anonymous electronic message address to a source computing system for use when the source computing system is to send electronic messages to the recipient. When the electronic message server receives an electronic message, it reads the electronic message address and determines that the address corresponds to the recipient, but only if the electronic message originated from the source. If the electronic message were to originate from a different source computing system, the same electronic message address would not be respected for delivery to the recipient. Accordingly, the electronic message address is specific to a source, and thus sharing the electronic message address has little avail. The association between the address and the recipient may be revoked when the recipient no longer desires to receive messages from the source.Type: GrantFiled: September 30, 2002Date of Patent: November 21, 2006Assignee: Microsoft CorporationInventors: Kristian L. M. Andaker, Malcolm Davis, David R. Fulmer, John L. Gibbon
-
Publication number: 20050216418Abstract: The present invention provides the ability to compare and enforce policies between trusted entities within a rights management system. For example, policies between the two entities may be received by either entity. They may then be compared to determine the compatibility of the two policies. If compatible, or maybe even without the comparison, other embodiments provide for message server use license, which allows access to the protected portion of a message, thereby permitting an entity to enforce its message policies.Type: ApplicationFiled: March 26, 2004Publication date: September 29, 2005Inventors: Malcolm Davis, Peter Waxman, John Speare, Roy Williams
-
Publication number: 20050160292Abstract: Encrypted email message structures can contain recipient information that can reveal, to any recipient, all of the other recipients of an email message. Because some recipients, such as recipients to whom the message was “blind carbon-copied”, should remain hidden from the other recipients, individual encrypted messages can be created. One encrypted message can be created for all of the recipients who are intended to be revealed, such as the recipients listed in the TO and CC fields of an email header. A second encrypted message can be created for all of the recipients of the message who are intended to be hidden, such as the recipient listed in the BCC field of an email header. Alternatively, multiple encrypted messages can be created individually for each recipient in the BCC field, if the BCC recipients are to be hidden even from other BCC recipients.Type: ApplicationFiled: January 21, 2004Publication date: July 21, 2005Applicant: Microsoft CorporationInventors: Karim Batthish, Malcolm Davis, Roy Williams, Jean Wu
-
Publication number: 20040064513Abstract: A recipient computer system submits an anonymous electronic message address to a source computing system for use when the source computing system is to send electronic messages to the recipient. When the electronic message server receives an electronic message, it reads the electronic message address and determines that the address corresponds to the recipient, but only if the electronic message originated from the source. If the electronic message were to originate from a different source computing system, the same electronic message address would not be respected for delivery to the recipient. Accordingly, the electronic message address is specific to a source, and thus sharing the electronic message address has little avail. The association between the address and the recipient may be revoked when the recipient no longer desires to receive messages from the source.Type: ApplicationFiled: September 30, 2002Publication date: April 1, 2004Inventors: Kristian L.M. Andaker, Malcolm Davis, David R. Fulmer, John L. Gibbon