Patents by Inventor Malcolm Davis

Malcolm Davis has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20140051520
    Abstract: A gaming system and method relate to game tournaments and in particular, to a quasi-tournament wherein a tournament between multiple human players playing casino type games against each other is simulated with a plurality of electronic game machines whereby winners of the quasi-tournament are determined based on the outcome of games played by individual players against the game machines.
    Type: Application
    Filed: March 15, 2013
    Publication date: February 20, 2014
    Applicant: BRAIN GAMES, L.C.
    Inventor: MALCOLM DAVIS
  • Publication number: 20100069134
    Abstract: A method of operating an electronic gaming system includes receiving value from a human user of an electronic gaming machine, initiating a machine-implemented game on the electronic gaming machine, displaying indicia representative of a game state on a display, receiving input from the human user via a user interface associated with the electronic gaming machine, determining an outcome of the game, determining an estimate of the human user's probability of winning the game, the estimate having reduced variance compared to a simple average of the human user's outcomes, taking a set, predetermined action if the estimate is outside of the predetermined limits.
    Type: Application
    Filed: September 14, 2009
    Publication date: March 18, 2010
    Applicant: BRAIN GAMES, L.C.
    Inventors: MALCOLM DAVIS, FREDRIK DAHL
  • Publication number: 20080195871
    Abstract: A new ((n)th) black box is produced for a digital rights management (DRM) system. The (n)th black box is for being installed in and for performing decryption and encryption functions in the DRM system. The (n)th black box is produced and delivered to the DRM system upon request and includes a new ((n)th) executable and a new ((n)th) key file. The (n)th key file has a new ((n)th) set of black box keys and a number of old sets of black box keys. The request includes an old ((n-1)th) key file having the old sets of black box keys. A code optimizer/randomizer receives a master executable and randomized optimization parameters as inputs and produces the (n)th executable as an output. A key manager receives the (n-1)th key file and the (n)th set of black box keys as inputs, extracts the old sets of black box keys from the (n-1)th key file, and produces the (n)th key file including the (n)th set of black box keys and the old sets of black box keys as an output.
    Type: Application
    Filed: January 14, 2008
    Publication date: August 14, 2008
    Inventors: Marcus Peinado, Ramarathnam Venkatesan, Malcolm Davis
  • Patent number: 7319759
    Abstract: A new ((n)th) black box is produced for a digital rights management (DRM) system. The (n)th black box is for being installed in and for performing decryption and encryption functions in the DRM system. The (n)th black box is produced and delivered to the DRM system upon request and includes a new ((n)th) executable and a new ((n)th) key file. The (n)th key file has a new ((n)th) set of black box keys and a number of old sets of black box keys. The request includes an old ((n?1)th) key file having the old sets of black box keys. A code optimizer/randomizer receives a master executable and randomized optimization parameters as inputs and produces the (n)th executable as an output. A key manager receives the (n?1)th key file and the (n)th set of black box keys as inputs, extracts the old sets of black box keys from the (n?1)th key file, and produces the (n)th key file including the (n)th set of black box keys and the old sets of black box keys as an output.
    Type: Grant
    Filed: March 15, 2000
    Date of Patent: January 15, 2008
    Assignee: Microsoft Corporation
    Inventors: Marcus Peinado, Ramarathnam Venkatesan, Malcolm Davis
  • Patent number: 7293171
    Abstract: Encrypted email message structures can contain recipient information that can reveal, to any recipient, all of the other recipients of an email message. Because some recipients, such as recipients to whom the message was “blind carbon-copied”, should remain hidden from the other recipients, individual encrypted messages can be created. One encrypted message can be created for all of the recipients who are intended to be revealed, such as the recipients listed in the TO and CC fields of an email header. A second encrypted message can be created for all of the recipients of the message who are intended to be hidden, such as the recipient listed in the BCC field of an email header. Alternatively, multiple encrypted messages can be created individually for each recipient in the BCC field, if the BCC recipients are to be hidden even from other BCC recipients.
    Type: Grant
    Filed: January 21, 2004
    Date of Patent: November 6, 2007
    Assignee: Microsoft Corporation
    Inventors: Karim Batthish, Malcolm Davis, Roy Williams, Jean Wu
  • Publication number: 20070067406
    Abstract: A recipient computer system submits an anonymous electronic message address to a source computing system for use when the source computing system is to send electronic messages to the recipient. When the electronic message server receives an electronic message, it reads the electronic message address and determines that the address corresponds to the recipient, but only if the electronic message originated from the source. If the electronic message were to originate from a different source computing system, the same electronic message address would not be respected for delivery to the recipient. Accordingly, the electronic message address is specific to a source, and thus sharing the electronic message address has little avail. The association between the address and the recipient may be revoked when the recipient no longer desires to receive messages from the source.
    Type: Application
    Filed: November 8, 2006
    Publication date: March 22, 2007
    Applicant: Microsoft Corporation
    Inventors: Kristian Andaker, Malcolm Davis, David Fulmer, John Gibbon
  • Publication number: 20070011750
    Abstract: The present invention provides the ability to compare and enforce policies between trusted entities within a rights management system. For example, policies between the two entities may be received by either entity. They may then be compared to determine the compatibility of the two policies. If compatible, or maybe even without the comparison, other embodiments provide for message server use license, which allows access to the protected portion of a message, thereby permitting an entity to enforce its message policies.
    Type: Application
    Filed: September 14, 2006
    Publication date: January 11, 2007
    Applicant: Microsoft Corporation
    Inventors: Malcolm Davis, Peter Waxman, John Speare, Roy Williams
  • Patent number: 7139825
    Abstract: A recipient computer system submits an anonymous electronic message address to a source computing system for use when the source computing system is to send electronic messages to the recipient. When the electronic message server receives an electronic message, it reads the electronic message address and determines that the address corresponds to the recipient, but only if the electronic message originated from the source. If the electronic message were to originate from a different source computing system, the same electronic message address would not be respected for delivery to the recipient. Accordingly, the electronic message address is specific to a source, and thus sharing the electronic message address has little avail. The association between the address and the recipient may be revoked when the recipient no longer desires to receive messages from the source.
    Type: Grant
    Filed: September 30, 2002
    Date of Patent: November 21, 2006
    Assignee: Microsoft Corporation
    Inventors: Kristian L. M. Andaker, Malcolm Davis, David R. Fulmer, John L. Gibbon
  • Publication number: 20050216418
    Abstract: The present invention provides the ability to compare and enforce policies between trusted entities within a rights management system. For example, policies between the two entities may be received by either entity. They may then be compared to determine the compatibility of the two policies. If compatible, or maybe even without the comparison, other embodiments provide for message server use license, which allows access to the protected portion of a message, thereby permitting an entity to enforce its message policies.
    Type: Application
    Filed: March 26, 2004
    Publication date: September 29, 2005
    Inventors: Malcolm Davis, Peter Waxman, John Speare, Roy Williams
  • Publication number: 20050160292
    Abstract: Encrypted email message structures can contain recipient information that can reveal, to any recipient, all of the other recipients of an email message. Because some recipients, such as recipients to whom the message was “blind carbon-copied”, should remain hidden from the other recipients, individual encrypted messages can be created. One encrypted message can be created for all of the recipients who are intended to be revealed, such as the recipients listed in the TO and CC fields of an email header. A second encrypted message can be created for all of the recipients of the message who are intended to be hidden, such as the recipient listed in the BCC field of an email header. Alternatively, multiple encrypted messages can be created individually for each recipient in the BCC field, if the BCC recipients are to be hidden even from other BCC recipients.
    Type: Application
    Filed: January 21, 2004
    Publication date: July 21, 2005
    Applicant: Microsoft Corporation
    Inventors: Karim Batthish, Malcolm Davis, Roy Williams, Jean Wu
  • Publication number: 20040064513
    Abstract: A recipient computer system submits an anonymous electronic message address to a source computing system for use when the source computing system is to send electronic messages to the recipient. When the electronic message server receives an electronic message, it reads the electronic message address and determines that the address corresponds to the recipient, but only if the electronic message originated from the source. If the electronic message were to originate from a different source computing system, the same electronic message address would not be respected for delivery to the recipient. Accordingly, the electronic message address is specific to a source, and thus sharing the electronic message address has little avail. The association between the address and the recipient may be revoked when the recipient no longer desires to receive messages from the source.
    Type: Application
    Filed: September 30, 2002
    Publication date: April 1, 2004
    Inventors: Kristian L.M. Andaker, Malcolm Davis, David R. Fulmer, John L. Gibbon