Patents by Inventor Malcolm Pearson
Malcolm Pearson has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 10009179Abstract: Example apparatus and methods provide a device (e.g., smartphone) that is more secure for electronic commerce. An example device includes a trusted platform module (TPM) that stores a public key and a private key. The device is provisioned with account information, user information, and device information. The TPM uses the account, user, and device information to acquire attestation credentials and endorsement credentials. The device uses the account, user and device information along with the attestation credentials and endorsement credentials to acquire limited use keys (LUKs) that are encrypted with the public key. The LUKs will only be decrypted as needed to support an actual transaction at the time of the transaction. Before decrypting an LUK, the TPM will authenticate a user of the device at the time of the transaction using. for example, a personal identification number (PIN), fingerprint, or other personal information.Type: GrantFiled: November 30, 2015Date of Patent: June 26, 2018Assignee: Microsoft Technology Licensing, LLCInventors: Tolga Acar, Matt Pisut, Doug Barlow, Michael Stark, Trent Byfield, Alex McKelvey, Malcolm Pearson
-
Publication number: 20170155513Abstract: Example apparatus and methods provide a device (e.g., smartphone) that is more secure for electronic commerce. An example device includes a trusted platform module (TPM) that stores a public key and a private key. The device is provisioned with account information, user information, and device information. The TPM uses the account, user, and device information to acquire attestation credentials and endorsement credentials. The device uses the account, user and device information along with the attestation credentials and endorsement credentials to acquire limited use keys (LUKs) that are encrypted with the public key. The LUKs will only be decrypted as needed to support an actual transaction at the time of the transaction. Before decrypting an LUK, the TPM will authenticate a user of the device at the time of the transaction using. for example, a personal identification number (PIN), fingerprint, or other personal information.Type: ApplicationFiled: November 30, 2015Publication date: June 1, 2017Inventors: Tolga Acar, Matt Pisut, Doug Barlow, Michael Stark, Trent Byfield, Alex McKelvey, Malcolm Pearson
-
Patent number: 9468223Abstract: For producing an aerated confectionery mass, a raw confectionery mass is fed at a feed rate from a supply to an aeration unit for introducing gas into the confectionery mass and wherein the aerated confectionery mass is fed to a production line for the production of confectionery or tablets. The feed rate of the raw confectionery mass is controlled such that it corresponds to the demand of the production line, the amount of introduced gas is controlled in response to the feed rate of the confectionery mass so that the aeration level of the confectionery mass remains substantially constant and the temperature of the aeration mass within the aeration unit is controlled such that it remains substantially constant and independent from the feed rate.Type: GrantFiled: December 19, 2005Date of Patent: October 18, 2016Assignee: Kraft Foods R&D, Inc.Inventors: Stephan Simbuerger, Stephen Malcolm Pearson, Egidijus Bizys
-
Patent number: 9295268Abstract: For producing an aerated confectionery mass, a raw confectionery mass is fed at a feed rate from a supply to an aeration unit for introducing gas into the confectionery mass and wherein the aerated confectionery mass is fed to a production line for the production of confectionery or tablets. The feed rate of the raw confectionery mass is controlled such that it corresponds to the demand of the production line, the amount of introduced gas is controlled in response to the feed rate of the confectionery mass so that the aeration level of the confectionery mass remains substantially constant and the temperature of the aeration mass within the aeration unit is controlled such that it remains substantially constant and independent from the feed rate.Type: GrantFiled: June 22, 2011Date of Patent: March 29, 2016Assignee: Kraft Foods R & D, Inc.Inventors: Stephan Simbuerger, Stephen Malcolm Pearson, Egidijus Bizys
-
Publication number: 20150118352Abstract: Disclosed is a method for manufacturing chewing gum, the method including feeding one or more gum ingredients including at least an elastomer into a continuous extruder including a plurality of screws, rotating screws and mixing the one or more ingredients via the rotating of the screws within the continuous extruder, forming a partial chewing gum base via the mixing of the one or more ingredients, creating a flow of the partial chewing gum base including the one or more ingredients through the continuous extruder towards a downstream extent of the plurality of screws via the rotating, and conveying the flow of the partial chewing gum base to a region of the continuous extruder that is proximate the downstream extent of the plurality of screws, wherein the flow includes a temperature of less than 90 degrees Celsius when the flow reaches the downstream extent of the plurality of screws. Some independent claims relate to a flow reaching two different temperatures that are within 20 degrees Celsius.Type: ApplicationFiled: March 15, 2013Publication date: April 30, 2015Inventors: Glenn Thompson Visscher, Mandeep Bindra, Jesse John Kiefer, Deiter Stephan Simbuerger, Stephen Malcolm Pearson, Dieter Lutz, Philip Moore
-
Patent number: 8645524Abstract: Techniques to allocate virtual network addresses are described. An apparatus may include a virtual network address management module. The virtual network address management module may be capable of determining an approximate age for a virtual network address, referred to herein as a virtual network address age value. The virtual network address management module may include a virtual network address assignment module, a virtual network address age generator and a message filter module. The virtual network address assignment module may be arranged to assign a virtual network address to a device at a virtual network address assignment time. The virtual network address age generator may be arranged to receive a message arrival time for a message with the virtual network address, and determine a virtual network address age value for the virtual network address with the virtual network address assignment time and the message arrival time.Type: GrantFiled: September 10, 2007Date of Patent: February 4, 2014Assignee: Microsoft CorporationInventors: Malcolm Pearson, Charles McColgan
-
Publication number: 20110311673Abstract: For producing an aerated confectionery mass, a raw confectionery mass is fed at a feed rate from a supply to an aeration unit for introducing gas into the confectionery mass and wherein the aerated confectionery mass is fed to a production line for the production of confectionery or tablets. The feed rate of the raw confectionery mass is controlled such that it corresponds to the demand of the production line, the amount of introduced gas is controlled in response to the feed rate of the confectionery mass so that the aeration level of the confectionery mass remains substantially constant and the temperature of the aeration mass within the aeration unit is controlled such that it remains substantially constant and independent from the feed rate.Type: ApplicationFiled: June 22, 2011Publication date: December 22, 2011Inventors: Stephan Simbuerger, Stephen Malcolm Pearson, Egidijus Bizys
-
Publication number: 20110052778Abstract: The present disclosure relates to a method of producing aerated food products comprising the steps of introducing gas through at least one porous diffuser into a stream of food process medium so as to obtain a gas/food mixture and subjecting said gas/food process medium mixture to a blending operation in a static mixer. It also relates to products obtainable by this method.Type: ApplicationFiled: August 26, 2010Publication date: March 3, 2011Inventors: Melis Abylov, Tadeusz Klaus, Szymon Macura, Stephen Malcolm Pearson, Julie Ann Simonson
-
Publication number: 20100205257Abstract: Architecture that facilitates transport high availability for messaging services by providing the ability of a receiving entity (e.g., receiving message transfer agent (MTA)) to detect if a sending entity (e.g., sending MTA or client) is a legacy sending entity. When the receiving entity detects that the sending entity is a legacy system, by advertising transport high availability capability to the sending entity, if the sending entity does not opt-in to this capability, the receiving entity keeps the sending entity client “on hold”, that is, waiting for an acknowledgement (ACK) until the receiving entity delivers the message to the next hops (immediate destinations). This approach maintains at least two copies of the message until the message is successfully delivered (to the next hop(s)). Hence, if the legacy sending entity or the receiving entity fails, the message is still delivered successfully.Type: ApplicationFiled: February 10, 2009Publication date: August 12, 2010Applicant: Microsoft CorporationInventors: Victor Boctor, Todd C. Luttinen, Jeffrey B. Kay, Jesse M. Dougherty, Malcolm Pearson
-
Patent number: 7681074Abstract: Failover systems and methods for providing redundant backup of data transmitted over a network to provide transport high availability of electronic data. The present invention relates to creating redundant backup copies of electronic data as well as transmission of the backup copies over a network in the event of a failure of a network component.Type: GrantFiled: April 29, 2005Date of Patent: March 16, 2010Assignee: Microsoft CorporationInventors: Leon Warman, Eric D. Tribble, Malcolm Pearson
-
Publication number: 20090285954Abstract: For producing an aerated confectionery mass, a raw confectionery mass is fed at a feed rate from a supply to an aeration unit for introducing gas into the confectionery mass and wherein the aerated confectionery mass is fed to a production line for the production of confectionery or tablets. The feed rate of the raw confectionery mass is controlled such that it corresponds to the demand of the production line, the amount of introduced gas is controlled in response to the feed rate of the confectionery mass so that the aeration level of the confectionery mass remains substantially constant and the temperature of the aeration mass within the aeration unit is controlled such that it remains substantially constant and independent from the feed rate.Type: ApplicationFiled: December 19, 2005Publication date: November 19, 2009Inventors: Stephan Simbuerger, Stephen Malcolm Pearson, Egidius Bizys
-
Publication number: 20090070448Abstract: Techniques to allocate virtual network addresses are described. An apparatus may include a virtual network address management module. The virtual network address management module may be capable of determining an approximate age for a virtual network address, referred to herein as a virtual network address age value. The virtual network address management module may include a virtual network address assignment module, a virtual network address age generator and a message filter module. The virtual network address assignment module may be arranged to assign a virtual network address to a device at a virtual network address assignment time. The virtual network address age generator may be arranged to receive a message arrival time for a message with the virtual network address, and determine a virtual network address age value for the virtual network address with the virtual network address assignment time and the message arrival time.Type: ApplicationFiled: September 10, 2007Publication date: March 12, 2009Applicant: Microsoft CorporationInventors: Malcolm Pearson, Charles McColgan
-
Publication number: 20070150253Abstract: A method for reviewing effectiveness of a rules system applying one or more rules to communication traffic of a group of users. The method analyzes a log containing one or more communications reviewed by the rules system to determine if the communications in the log conforms to the communications policy. The method also identifies one or more of the rules of the rules system violated by the communications when the analyzing the log determines that at least one of the communications in the log does not conform to the communications policy. Other methods determine the effectiveness of planned modifications to a rules system.Type: ApplicationFiled: December 28, 2005Publication date: June 28, 2007Applicant: Microsoft CorporationInventors: Jesse Dougherty, Malcolm Pearson, Shawn Thomas
-
Publication number: 20070130084Abstract: A transmitting gateway may utilize a retrieved domain-specific key to secure an outbound message, and a receiving gateway may utilize another retrieved domain-specific key to authenticate and validate the secured message.Type: ApplicationFiled: March 3, 2006Publication date: June 7, 2007Applicant: Microsoft CorporationInventors: Jeffrey Kay, Eric Tribble, Roy Williams, Malcolm Pearson, Trevor Freeman
-
Publication number: 20070130069Abstract: A transmitting node may utilize a shared secret to secure at least an encapsulated address component of an outbound message, and a receiving gateway may utilize the shared secret to authenticate and validate the secured addressed component of the received message.Type: ApplicationFiled: March 3, 2006Publication date: June 7, 2007Applicant: Microsoft CorporationInventors: Jeffrey Kay, Eric Tribble, Roy Williams, Malcolm Pearson, Trevor Freeman
-
Publication number: 20070124484Abstract: A processor 104 executes computer-executable instructions to receive messages 302; store 304 the received messages in a foreground memory 108; process 306 the stored messages in the foreground memory 108; send 306 the processed messages; move 308 the sent messages to a background memory 110; evaluate 310, 312 the messages in the background memory with respect to a parameter; and delete 314 selected messages in the background memory as a function of the evaluating. Alternatively, a message queue may be used to track lost messages.Type: ApplicationFiled: November 30, 2005Publication date: May 31, 2007Applicant: Microsoft CorporationInventors: Malcolm Pearson, Narasimhan Sundararajan, Greg Thiel
-
Publication number: 20070106783Abstract: Multiple independent MTAs transmit messages such that if one of the MTAs fails, the other MTAs may continue to transmit messages. Multiple independent message stores are provided such that if one of the message stores fails, messages on the other message stores may continue to be transmitted. Multiple notification agents monitor the message stores for new messages and notify one of the MTAs when a new message is available for transmission.Type: ApplicationFiled: November 7, 2005Publication date: May 10, 2007Applicant: Microsoft CorporationInventors: Malcolm Pearson, Bruce McMillan, Leon Warman, Loren Curtis
-
Publication number: 20070094336Abstract: An asynchronous conversation state machine asynchronously sends and asynchronously receives messages for storing in batches in an intermediate storage. A synchronous storage engine receives the batches of messages from the intermediate storage. Particular batches of messages are stored in the storage engine based on their parameters.Type: ApplicationFiled: October 24, 2005Publication date: April 26, 2007Applicant: Microsoft CorporationInventor: Malcolm Pearson
-
Publication number: 20070050444Abstract: Techniques for eliminating duplicate/redundant scanning of email messages while the email message traverses the various servers within an email infrastructure are provided. Some techniques utilize a message hygiene stamp that is transported with the email message as the email message enters an enterprise and is routed within the enterprise until the email message reaches the end user inbox. The filters comprise logic that enables the filters to annotate the result of their filtering or other processing in corresponding message hygiene stamps. The message hygiene stamps allow the filters to determine whether the email message has already been processed by the filter within the email infrastructure.Type: ApplicationFiled: August 30, 2005Publication date: March 1, 2007Applicant: Microsoft CorporationInventors: Mihai Costea, Daniel Longley, Malcolm Pearson
-
Publication number: 20060268722Abstract: Systems and methods are described which provide enhanced stability, increased predictability, reduced transmission costs, and which conserve bandwidth in routing messages over computer networks. The systems and methods further include providing improved transmission of messages wherein the messages are transmitted to nodes closest to a target delivery node. If delivery is possible to a target node, the message transmission stops at the point of failure in the network, wherein delivery to the target node is accomplished at a later time or the message is returned to the sender.Type: ApplicationFiled: May 27, 2005Publication date: November 30, 2006Applicant: Microsoft CorporationInventors: Demetrios Achlioptas, Eric Tribble, Malcolm Pearson, Leon Warman