Patents by Inventor Matthew R. Cox
Matthew R. Cox has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Publication number: 20240118487Abstract: Polymeric coated optical elements are described herein, which exhibit good optical properties, e.g., low attenuation. Some such coated optical elements comprise an optical element (e.g., an optical fiber) having an outer surface and a thermoplastic polymeric tight buffer coating on at least a portion of the outer surface of the optical element, wherein the polymer-coated optical element exhibits a first attenuation at room temperature of plus or minus about 50% the attenuation of a comparable optical element with no thermoplastic polymeric tight buffer coating thereon, and a second attenuation at room temperature after thermal cycling to a temperature of at least 170° C. that is about 2 times the first attenuation or less.Type: ApplicationFiled: August 4, 2023Publication date: April 11, 2024Inventors: Brian R. Tomblin, Shannon M. Giovannini, Matthew W. Cox, Aaron E. Hydrick
-
Patent number: 10313399Abstract: Techniques described herein enable a client to store information indicating whether various hosts (e.g., servers, web domains) support a preferred security protocol, such as a False Start-modified TLS or SSL protocol. The client may then use this information to dynamically determine whether to use the preferred protocol when connecting to a particular host. When the client attempts a handshake to establish a secure connection with a host for the first time, the client does so using the preferred protocol. If the handshake fails, the client locally stores domain or other identifying information for the host so that the client may employ a non-preferred protocol in subsequent connection attempts. Thus, a client may avoid performance degradation caused by attempting a preferred-protocol connection with a host that does not support the preferred protocol. Stored information may include a time stamp enable periodic checks for host capability updates.Type: GrantFiled: December 28, 2016Date of Patent: June 4, 2019Assignee: Microsoft Technology Licensing, LLCInventors: Matthew R. Cox, Ivan D. Pashov, Billy Anders, Jonathan A. Silvera
-
Publication number: 20180152484Abstract: Techniques described herein enable a client to store information indicating whether various hosts (e.g., servers, web domains) support a preferred security protocol, such as a False Start-modified TLS or SSL protocol. The client may then use this information to dynamically determine whether to use the preferred protocol when connecting to a particular host. When the client attempts a handshake to establish a secure connection with a host for the first time, the client does so using the preferred protocol. If the handshake fails, the client locally stores domain or other identifying information for the host so that the client may employ a non-preferred protocol in subsequent connection attempts. Thus, a client may avoid performance degradation caused by attempting a preferred-protocol connection with a host that does not support the preferred protocol. Stored information may include a time stamp enable periodic checks for host capability updates.Type: ApplicationFiled: December 28, 2016Publication date: May 31, 2018Inventors: Matthew R. Cox, Ivan D. Pashov, Billy Anders, Jonathan A. Silvera
-
Patent number: 9537899Abstract: Techniques described herein enable a client to store information indicating whether various hosts (e.g., servers, web domains) support a preferred security protocol, such as a False Start-modified TLS or SSL protocol. The client may then use this information to dynamically determine whether to use the preferred protocol when connecting to a particular host. When the client attempts a handshake to establish a secure connection with a host for the first time, the client does so using the preferred protocol. If the handshake fails, the client locally stores domain or other identifying information for the host so that the client may employ a non-preferred protocol in subsequent connection attempts. Thus, a client may avoid performance degradation caused by attempting a preferred-protocol connection with a host that does not support the preferred protocol. Stored information may include a time stamp enable periodic checks for host capability updates.Type: GrantFiled: February 29, 2012Date of Patent: January 3, 2017Assignee: Microsoft Technology Licensing, LLCInventors: Matthew R. Cox, Ivan D. Pashov, Billy Anders, Jonathan A. Silvera
-
Patent number: 9449113Abstract: Browser storage management techniques are described. In one or more implementations, inputs are received at a computing device that specify maximum aggregate sizes of application and database caches, respectively, of browser storage to be used to locally store data at the computing device. For example, the inputs may be provided using a policy, by an administrator of the computing device, and so on. The maximum aggregate sizes are set of application and database caches, respectively, of browser storage at the computing device to the sizes specified by the inputs.Type: GrantFiled: June 28, 2011Date of Patent: September 20, 2016Assignee: Microsoft Technology Licensing, LLCInventors: Israel Hilerio, David J. Sheldon, David Vaughn Winkler, Matthew R. Cox, Jonathan A. Silvera, Ivan D. Pashov, Martin A. Chisholm, Dany Joly, Victor Ngo, Adam U. Herchenroether, Katerina V. Sedova, Kedar Sanjeev Hirve, Karen Elizabeth Parker Anderson
-
Patent number: 9158331Abstract: Various embodiments enable on-demand scaling of a timer wheel. Some embodiments dynamically start and stop a timer wheel based, at least in part, on whether the timer wheel has any associated active timers. In some cases, the timer wheel is suspended when all associated active timers have been serviced. Alternately or additionally, the timer wheel is re-activated upon associating one or more active timers in need of service to the timer wheel. Various embodiments enable addition and removal of timer(s) to the timer wheel and/or various time slots associated with the timer wheel without using a global lock associated with the timer wheel.Type: GrantFiled: March 28, 2013Date of Patent: October 13, 2015Assignee: Microsoft Technology Licensing, LLCInventors: Ziyan Zhou, Ivan D. Pashov, Jonathan A. Silvera, Matthew R. Cox
-
Patent number: 9021157Abstract: Various embodiments initialize a communication link associated with data transfer to a connected state between participants in the communication link. In some cases, the communication link is paired with a first Input/Output (I/O) completion port effective to enable the data transfer. Some embodiments disassociate the communication link with the first I/O completion port and re-initialize the communication link while retaining the connected state. Alternately or additionally, the communication link is paired with at least a second I/O completion port. In some cases, the second I/O completion port utilizes an I/O model that differs from an I/O model associated with the first I/O completion port. Alternately or additionally, the communication link can be reconfigured to follow a IO model that does not utilize an IO completion port at all.Type: GrantFiled: March 28, 2013Date of Patent: April 28, 2015Assignee: Microsoft Technology Licensing, LLCInventors: Matthew R. Cox, Ivan D. Pashov, Jonathan A. Silvera, Paul Sliwowicz
-
Publication number: 20140297903Abstract: Various embodiments initialize a communication link associated with data transfer to a connected state between participants in the communication link. In some cases, the communication link is paired with a first Input/Output (I/O) completion port effective to enable the data transfer. Some embodiments disassociate the communication link with the first I/O completion port and re-initialize the communication link while retaining the connected state. Alternately or additionally, the communication link is paired with at least a second I/O completion port. In some cases, the second I/O completion port utilizes an I/O model that differs from an I/O model associated with the first I/O completion port. Alternately or additionally, the communication link can be reconfigured to follow a IO model that does not utilize an IO completion port at all.Type: ApplicationFiled: March 28, 2013Publication date: October 2, 2014Applicant: Microsoft CorporationInventors: Matthew R. Cox, Ivan D. Pashov, Jonathan A. Silvera, Paul Sliwowicz
-
Publication number: 20140298073Abstract: Various embodiments enable on-demand scaling of a timer wheel. Some embodiments dynamically start and stop a timer wheel based, at least in part, on whether the timer wheel has any associated active timers. In some cases, the timer wheel is suspended when all associated active timers have been serviced. Alternately or additionally, the timer wheel is re-activated upon associating one or more active timers in need of service to the timer wheel. Various embodiments enable addition and removal of timer(s) to the timer wheel and/or various time slots associated with the timer wheel without using a global lock associated with the timer wheel.Type: ApplicationFiled: March 28, 2013Publication date: October 2, 2014Applicant: MICROSOFT CORPORATIONInventors: Ziyan Zhou, Ivan D. Pashov, Jonathan A. Silvera, Matthew R. Cox
-
Publication number: 20140013001Abstract: In one or more embodiments, clients in various networks can proactively probe multiple proxies that are returned to the client. Clients can sort the proxies based on various parameters, such as connection time parameters as well as other parameters, and utilize the fastest or one of the fastest proxies available, or select a proxy based on other parameters that indicate the proxy is reliable. In this manner, slow or unreliable proxies can be avoided.Type: ApplicationFiled: July 6, 2012Publication date: January 9, 2014Applicant: MICROSOFT CORPORATIONInventors: Matthew R. Cox, Eric N. Loewenthal, Ritika Virmani, Ivan D. Pashov, Jonathan A. Silvera, Rishi Maker
-
Publication number: 20130227272Abstract: Techniques described herein enable a client to store information indicating whether various hosts (e.g., servers, web domains) support a preferred security protocol, such as a False Start-modified TLS or SSL protocol. The client may then use this information to dynamically determine whether to use the preferred protocol when connecting to a particular host. When the client attempts a handshake to establish a secure connection with a host for the first time, the client does so using the preferred protocol. If the handshake fails, the client locally stores domain or other identifying information for the host so that the client may employ a non-preferred protocol in subsequent connection attempts. Thus, a client may avoid performance degradation caused by attempting a preferred-protocol connection with a host that does not support the preferred protocol. Stored information may include a time stamp enable periodic checks for host capability updates.Type: ApplicationFiled: February 29, 2012Publication date: August 29, 2013Applicant: MICROSOFT CORPORATIONInventors: Matthew R. Cox, Ivan D. Pashov, Billy Anders, Jonathan A. Silvera
-
Publication number: 20130219383Abstract: Various embodiments enable installable applications that are to be used on a local client machine to utilize an application cache manifest file that resides remotely, on the web, to define various resources that are to be updated and available offline after the installable application has been deployed on the local client machine Whenever the content of the manifest file is updated on the web, the installed application automatically updates its local application cache resources and allows the installed application to use those resources offline. This is done without having to install a new update of the application or burden the user with having to navigate to a location to obtain the updated content.Type: ApplicationFiled: February 16, 2012Publication date: August 22, 2013Inventors: Israel Hilerio, David Vaughn Winkler, Daniel R. Thornton, Matthew R. Cox, Karen Elizabeth Parker Anderson, Jesse D. McGatha, Adrian Robert Bateman
-
Publication number: 20130007371Abstract: Browser storage management techniques are described. In one or more implementations, inputs are received at a computing device that specify maximum aggregate sizes of application and database caches, respectively, of browser storage to be used to locally store data at the computing device. For example, the inputs may be provided using a policy, by an administrator of the computing device, and so on. The maximum aggregate sizes are set of application and database caches, respectively, of browser storage at the computing device to the sizes specified by the inputs.Type: ApplicationFiled: June 28, 2011Publication date: January 3, 2013Inventors: Israel Hilerio, David J. Sheldon, David Vaughn Winkler, Matthew R. Cox, Jonathan A. Silvera, Ivan D. Pashov, Martin A. Chisholm, Dany Joly, Victor Ngo, Adam U. Herchenroether, Katerina V. Sedova, Kedar Sanjeev Hirve, Karen Elizabeth Parker Anderson