Patents by Inventor Malcolm Erik Pearson
Malcolm Erik Pearson has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 8077699Abstract: Multiple independent MTAs transmit messages such that if one of the MTAs fails, the other MTAs may continue to transmit messages. Multiple independent message stores are provided such that if one of the message stores fails, messages on the other message stores may continue to be transmitted. Multiple notification agents monitor the message stores for new messages and notify one of the MTAs when a new message is available for transmission.Type: GrantFiled: November 7, 2005Date of Patent: December 13, 2011Assignee: Microsoft CorporationInventors: Malcolm Erik Pearson, Bruce A. McMillan, Leon R. Warman, Loren T. Curtis
-
Publication number: 20110288975Abstract: Scalable handling of billing events that affect one or more accounts. A computing system partitions received events into a number of channels, perhaps by account identifier. The channels receive the events, and perform de-duplication of the events to help reduce the risk of double billing. The channel then assigns the event a channel specific sequence number. The sequenced events may perhaps then be aggregated by account to allow for easier computation of a bill.Type: ApplicationFiled: May 21, 2010Publication date: November 24, 2011Applicant: MICROSOFT CORPORATIONInventors: Malcolm Erik Pearson, Matthew Charles Setzer
-
Publication number: 20110289102Abstract: Scalable handling of billing events that affect one or more accounts. A computing system partitions received events into a number of channels, perhaps by account identifier. The channels receive the events, and perform de-duplication of the events. This de-duplication may be performed using a Bloom filter that is updated to reflect the receipt of any original event. The Bloom filter may be used to either determine that the event is not a duplicate of another, or to determine that the event cannot be ruled out as being a duplicate of another. In the latter case, further processing may be performed to for definitively determine whether the event is truly a duplication, or in the alternative, the event may be immediately treated as a duplicate.Type: ApplicationFiled: May 21, 2010Publication date: November 24, 2011Applicant: MICROSOFT CORPORATIONInventors: Malcolm Erik Pearson, Matthew Charles Setzer
-
Publication number: 20110288974Abstract: Scalable handling of billing events that affect one or more accounts. A computing system partitions received events into a number of channels, perhaps by account identifier. The channels receive the events, process the events, and forwards the events to an aggregator to allow the events to be aggregated by account to allow for easier computation of a bill. The aggregator also performs de-duplication of events to help reduce the risk of double billing.Type: ApplicationFiled: May 21, 2010Publication date: November 24, 2011Applicant: MICROSOFT CORPORATIONInventors: Malcolm Erik Pearson, Matthew Charles Setzer
-
Publication number: 20110185281Abstract: A workflow manager application transfers message data received from an originating device via a communication network to a target application for processing. A graphical user interface displays the received message data and allows the user to view and designate one or more target applications for processing the message data. The workflow manger application is responsive to user input to transfer message data to the designated one or more target applications for processing the message data. Alternatively, the workflow manager application analyzes received message data to identify one or more target applications, and transfers the message data to the identified one or more target applications for processing.Type: ApplicationFiled: April 5, 2011Publication date: July 28, 2011Applicant: MICROSOFT CORPORATIONInventors: Malcolm Erik Pearson, Leon R. Warman
-
Publication number: 20110185027Abstract: A workflow manager application transfers message data received from an originating device via a communication network to a target application for processing. A graphical user interface displays the received message data and allows the user to view and designate one or more target applications for processing the message data. The workflow manger application is responsive to user input to transfer message data to the designated one or more target applications for processing the message data. Alternatively, the workflow manager application analyzes received message data to identify one or more target applications, and transfers the message data to the identified one or more target applications for processing.Type: ApplicationFiled: April 5, 2011Publication date: July 28, 2011Applicant: MICROSOFT CORPORATIONInventors: Malcolm Erik Pearson, Leon R. Warman
-
Patent number: 7941492Abstract: A workflow manager application transfers message data received from an originating device via a communication network to a target application for processing. A graphical user interface displays the received message data and allows the user to view and designate one or more target applications for processing the message data. The workflow manger application is responsive to user input to transfer message data to the designated one or more target applications for processing the message data. Alternatively, the workflow manager application analyzes received message data to identify one or more target applications, and transfers the message data to the identified one or more target applications for processing.Type: GrantFiled: February 15, 2006Date of Patent: May 10, 2011Assignee: Microsoft CorporationInventors: Malcolm Erik Pearson, Leon R. Warman
-
Patent number: 7899870Abstract: Sources of spam, such as botnets, are detected by analyzing message traffic for behavioral patterns and indications of suspicious content. The content of a known malicious source is analyzed. Message traffic associated with the known malicious source is analyzed. Associated message traffic includes messages sent directly from the known malicious source to recipients, and messages sent from the recipients to subsequent direct and indirect recipients. Portions of the content of the known malicious source are selected and content of associated message traffic is analyzed for an indication of the selected content. If the selected content is found in the content of a message, the source of the message is determined to be a source of spam. Associated message traffic is additionally analyzed for behavioral patterns, such as anomalies and/or flurries of activity, to determine a potential malicious source.Type: GrantFiled: June 25, 2007Date of Patent: March 1, 2011Assignee: Microsoft CorporationInventors: Malcolm Erik Pearson, Mihai Costea
-
Patent number: 7613778Abstract: Provided is a messaging system capable of detecting and processing at least a portion of a malformed message, e.g., a message that previously failed to process. An identifier and state information for the message can be logged. Based on the stored information, a determination can be made that the message previously failed to process. The message can then progressively be de-featured until the message can be processed or until the message is determined to be poisonous, whereupon it can be deleted or otherwise removed from the message stream permanently or temporarily—including moving the message to storage for operator inspection or for delayed delivery.Type: GrantFiled: April 12, 2004Date of Patent: November 3, 2009Assignee: Microsoft CorporationInventors: Malcolm Erik Pearson, Robert George Atkinson, David Richard Reed, Steven Douglas White, Alexander Robert Norton Wetmore
-
Publication number: 20080320095Abstract: Sources of spam, such as botnets, are detected by analyzing message traffic for behavioral patterns and indications of suspicious content. The content of a known malicious source is analyzed. Message traffic associated with the known malicious source is analyzed. Associated message traffic includes messages sent directly from the known malicious source to recipients, and messages sent from the recipients to subsequent direct and indirect recipients. Portions of the content of the known malicious source are selected and content of associated message traffic is analyzed for an indication of the selected content. If the selected content is found in the content of a message, the source of the message is determined to be a source of spam. Associated message traffic is additionally analyzed for behavioral patterns, such as anomalies and/or flurries of activity, to determine a potential malicious source.Type: ApplicationFiled: June 25, 2007Publication date: December 25, 2008Applicant: Microsoft CorporationInventors: Malcolm Erik Pearson, Mihai Costea
-
Publication number: 20080141346Abstract: In a distributed electronic messaging system authorized information comprising metadata concerning a message is passed along from one mail server to another mail server. A receiving computer determines if the sending computer has the necessary authorizations to pass along the metadata. If so, the authorized information is passed along with the message body, enabling repetitious actions to be eliminated. If the sending computer is not authorized to pass along the metadata, the metadata is stripped off the message, changed or annotated.Type: ApplicationFiled: December 11, 2006Publication date: June 12, 2008Applicant: Microsoft CorporationInventors: Jeffrey B. Kay, Trevor W. Freeman, Malcolm Erik Pearson, Eric D. Tribble, Hao Zhang
-
Publication number: 20080140826Abstract: A method for controlling a message distribution process comprising a series of coordinated processes by monitoring the performance of each process, determining that a monitored process is not processing properly, and skipping the process not processing properly. Another method for controlling the load of message traffic by determining the performance of a message server and altering the flow of messages based upon the determined performance of the message server. Another method for routing messages by identifying the addresses of senders of received messages, assigning a portion of the addresses to a category, and routing messages from the identified addresses according to their assigned category.Type: ApplicationFiled: March 12, 2007Publication date: June 12, 2008Applicant: MICROSOFT CORPORATIONInventors: Charles McColgan, Marc Levy, Lance Galey, Stephen Bolinger, Amit Jhawar, Todd Roman, Malcolm Erik Pearson, Yi Liao
-
Publication number: 20080140802Abstract: A server adapted to provide client functionality may include an offsite centralized data center and a local client functionality component that may be stored in the offsite centralized data center. The offsite centralized data center may remotely host the local client functionality component such that information stored in the local client functionality component appears local to a client. The server may further include a client interface that receives local client information from the client. The local client information may be replicated by the client before being received by the client interface and remotely hosted by the offsite centralized data center.Type: ApplicationFiled: December 8, 2006Publication date: June 12, 2008Applicant: Microsoft CorporationInventors: Marc Levy, Malcolm Erik Pearson, Margaret Elisabeth Rottsolk, Jonathan Robert LeCroy, Charles McColgan