Patents by Inventor Michael A. Wilde

Michael A. Wilde has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20180255099
    Abstract: Correlated signals associated with one or more of stored content, content metadata, and activities associated with the stored content of a tenant may be analyzed and alert(s) determined based on alert threshold(s) or broader “abnormal” pattern detection. Different recipients for different alerts or alert levels may be designated and the alert(s) transmitted to the designated recipients. Alerts may also be displayed through an alert management dashboard of a protection service. The alert(s) and the results of the analysis may also be provided to a policy engine for use in adjusting or creating rules within a policy, alert thresholds, and signal collection/analysis. Post-fact investigations may also be initiated upon alerts.
    Type: Application
    Filed: March 2, 2017
    Publication date: September 6, 2018
    Applicant: MICROSOFT TECHNOLOGY LICENSING, LLC
    Inventors: Binyan Chen, Ben Appleby, Anupama Janardhan, Rui Chen, Krishna Kumar Parthasarathy, Suresh C. Palani, Puhazholi Vetrivel, Philip K. Newman, Michael A. Wilde
  • Publication number: 20180191781
    Abstract: A multi-purpose platform may collect different types of signals such as metadata, documents, activities, etc. and correlate in a multi-stage evaluation framework in order to allow simple queries from components and clients of a compliance and security environment to be converted into rich analyses on available data. Various signals may be collected from tenant environment and correlated at multiple levels based on their content and context. Queries from components such as a threat intelligence manager, a data explorer module, or even clients of the system may be executed on the correlated data by focusing and/or filtering the queries based on the context, effectively converting a simple query to a comprehensive analysis. The platform may have intelligence to decide which type of data to run a query on based on the request and allow data investigations performing a chain-linked investigation that can go multiple levels deep.
    Type: Application
    Filed: March 30, 2017
    Publication date: July 5, 2018
    Applicant: MICROSOFT TECHNOLOGY LICENSING, LLC
    Inventors: Suresh C. Palani, Ben Appleby, Rui Chen, Binyan Chen, Puhazholi Vetrivel, Michael A. Wilde
  • Patent number: 8335933
    Abstract: A secure storage system secures information of a client by first encrypting the information with a first key to generate first-key encrypted data. The secure storage system then encrypts with a second key the first-key encrypted data and the first key to generate second-key encrypted data. The system provides the client with a first portion of the second-key encrypted data. The system stores a second portion of the second-key encrypted data and the second key. When the confidential information is needed, the client provides the first portion. The system retrieves the second portion. The system then decrypts with the second key the first portion and the second portion to generate the first-key encrypted data and the first key. The system then decrypts with the first key the first-key encrypted data to generate the unsecure confidential information.
    Type: Grant
    Filed: February 13, 2009
    Date of Patent: December 18, 2012
    Assignee: Microsoft Corporation
    Inventors: Matthew G. Humphrey, Ashvin J. Mathew, Michael A. Wilde, Costel Radu
  • Publication number: 20100208889
    Abstract: A secure storage system secures information of a client by first encrypting the information with a first key to generate first-key encrypted data. The secure storage system then encrypts with a second key the first-key encrypted data and the first key to generate second-key encrypted data. The system provides the client with a first portion of the second-key encrypted data. The system stores a second portion of the second-key encrypted data and the second key. When the confidential information is needed, the client provides the first portion. The system retrieves the second portion. The system then decrypts with the second key the first portion and the second portion to generate the first-key encrypted data and the first key. The system then decrypts with the first key the first-key encrypted data to generate the unsecure confidential information.
    Type: Application
    Filed: February 13, 2009
    Publication date: August 19, 2010
    Applicant: Microsoft Corporation
    Inventors: Matthew G. Humphrey, Ashvin J. Mathew, Michael A. Wilde, Costel Radu
  • Patent number: 4131500
    Abstract: This invention is a tire building drum for building the stage - I carcass of a tire corresponding to the initial part of the carcass before breaker belts and the tread are subsequentially applied. The invention is in a drum and a method of using it whereby the components for making the stage - I carcass can be expanded substantially radially say between 25% and 35% of the drum radius to ensure that the side wall components extend generally in planes perpendicular to the drum axis during crowning and includes fillers fitted to or attached to the beads which can be substantially undistorted in those planes and will be similarly substantially undistorted in use at the vital area where a tire is in contact with the wheel rim.
    Type: Grant
    Filed: August 3, 1977
    Date of Patent: December 26, 1978
    Assignee: Avon Tyres Limited
    Inventors: Michael A. Wilde, David J. Lucas