Patents by Inventor Michael R. Surkan
Michael R. Surkan has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 8838807Abstract: A system maintains a dormant state in the host, in which no beacons (or “bubbles”) are transmitted from the host when no application or service (collectively, “processes”) of the host is accepting unsolicited traffic via the edge traversal service. When at least one application or service begins to accept unsolicited traffic via the edge traversal service, the host enters a qualified state and begins transmitting the beacons. As each additional application or service begins to accept such traffic, the number of accepting applications and services is maintained. As applications and services terminate acceptance of such traffic, the number of accepting applications and services is decremented. When the last application or service terminates acceptance of unsolicited traffic via the edge traversal service, the host re-enters the dormant state and ceases transmission of its beacons.Type: GrantFiled: August 16, 2011Date of Patent: September 16, 2014Assignee: Microsoft CorporationInventors: David Abzarian, Michael R. Surkan, Salahuddin C. J. Khan, Amit A. Sehgal, Mohit Talwar
-
Patent number: 8370919Abstract: A host firewall can determine and consider whether unsolicited traffic is inbound from beyond the edge of the network and allow or block such traffic based at least in part upon this characteristic. In one implementation, an edge traversal parameter can be set on a host firewall rule, which typically includes other parameters such as port, protocol, etc. If the unsolicited traffic received via an edge traversal interface matches a host firewall rule that has the edge traversal criterion, then the firewall does not block the traffic. On the other hand, if the unsolicited traffic received via an edge traversal interface fails to satisfy the edge traversal criterion on any firewall rule, then the firewall blocks the traffic.Type: GrantFiled: June 26, 2007Date of Patent: February 5, 2013Assignee: Microsoft CorporationInventors: David Abzarian, Michael R. Surkan, Salahuddin C. J. Khan, Amit A. Sehgal, Eran Yariv, Emanuel Paleologu, Gerardo Diaz Cuellar
-
Publication number: 20110302314Abstract: A system maintains a dormant state in the host, in which no beacons (or “bubbles”) are transmitted from the host when no application or service (collectively, “processes”) of the host is accepting unsolicited traffic via the edge traversal service. When at least one application or service begins to accept unsolicited traffic via the edge traversal service, the host enters a qualified state and begins transmitting the beacons. As each additional application or service begins to accept such traffic, the number of accepting applications and services is maintained. As applications and services terminate acceptance of such traffic, the number of accepting applications and services is decremented. When the last application or service terminates acceptance of unsolicited traffic via the edge traversal service, the host re-enters the dormant state and ceases transmission of its beacons.Type: ApplicationFiled: August 16, 2011Publication date: December 8, 2011Applicant: Microsoft CorporationInventors: David Abzarian, Michael R. Surkan, Salahuddin C.J. Khan, Amit A. Sehgal, Mohit Talwar
-
Patent number: 8028076Abstract: A system maintains a dormant state in the host, in which no beacons (or “bubbles”) are transmitted from the host when no application or service (collectively, “processes”) of the host is accepting unsolicited traffic via the edge traversal service. When at least one application or service begins to accept unsolicited traffic via the edge traversal service, the host enters a qualified state and begins transmitting the beacons. As each additional application or service begins to accept such traffic, the number of accepting applications and services is maintained. As applications and services terminate acceptance of such traffic, the number of accepting applications and services is decremented. When the last application or service terminates acceptance of unsolicited traffic via the edge traversal service, the host re-enters the dormant state and ceases transmission of its beacons.Type: GrantFiled: December 7, 2009Date of Patent: September 27, 2011Assignee: Microsoft CorporationInventors: David Abzarian, Michael R. Surkan, Salahuddin C. J. Khan, Amit A. Sehgal, Mohit Talwar
-
Patent number: 7707294Abstract: A system maintains a dormant state in the host, in which no beacons (or “bubbles”) are transmitted from the host when no application or service (collectively, “processes”) of the host is accepting unsolicited traffic via the edge traversal service. When at least one application or service begins to accept unsolicited traffic via the edge traversal service, the host enters a qualified state and begins transmitting the beacons. As each additional application or service begins to accept such traffic, the number of accepting applications and services is maintained. As applications and services terminate acceptance of such traffic, the number of accepting applications and services is decremented. When the last application or service terminates acceptance of unsolicited traffic via the edge traversal service, the host re-enters the dormant state and ceases transmission of its beacons.Type: GrantFiled: June 26, 2007Date of Patent: April 27, 2010Assignee: Microsoft CorporationInventors: David Abzarian, Michael R. Surkan, Salahuddin C. J. Khan, Amit A. Sehgal, Mohit Talwar
-
Publication number: 20100088418Abstract: A system maintains a dormant state in the host, in which no beacons (or “bubbles”) are transmitted from the host when no application or service (collectively, “processes”) of the host is accepting unsolicited traffic via the edge traversal service. When at least one application or service begins to accept unsolicited traffic via the edge traversal service, the host enters a qualified state and begins transmitting the beacons. As each additional application or service begins to accept such traffic, the number of accepting applications and services is maintained. As applications and services terminate acceptance of such traffic, the number of accepting applications and services is decremented. When the last application or service terminates acceptance of unsolicited traffic via the edge traversal service, the host re-enters the dormant state and ceases transmission of its beacons.Type: ApplicationFiled: December 7, 2009Publication date: April 8, 2010Applicant: Microsoft CorporationInventors: David Abzarian, Michael R. Surkan, Salahuddin C.J. Khan, Amit A. Sehgal, Mohit Talwar
-
Publication number: 20090007251Abstract: A host firewall can determine and consider whether unsolicited traffic is inbound from beyond the edge of the network and allow or block such traffic based at least in part upon this characteristic. In one implementation, an edge traversal parameter can be set on a host firewall rule, which typically includes other parameters such as port, protocol, etc. If the unsolicited traffic received via an edge traversal interface matches a host firewall rule that has the edge traversal criterion, then the firewall does not block the traffic. On the other hand, if the unsolicited traffic received via an edge traversal interface fails to satisfy the edge traversal criterion on any firewall rule, then the firewall blocks the traffic.Type: ApplicationFiled: June 26, 2007Publication date: January 1, 2009Applicant: Microsoft CorporationInventors: David Abzarian, Michael R. Surkan, Salahuddin C.J. Khan, Amit A. Sehgal, Eran Yariv, Emanuel Paleologu, Gerardo Diaz Cuellar
-
Publication number: 20090006595Abstract: A system maintains a dormant state in the host, in which no beacons (or “bubbles”) are transmitted from the host when no application or service (collectively, “processes”) of the host is accepting unsolicited traffic via the edge traversal service. When at least one application or service begins to accept unsolicited traffic via the edge traversal service, the host enters a qualified state and begins transmitting the beacons. As each additional application or service begins to accept such traffic, the number of accepting applications and services is maintained. As applications and services terminate acceptance of such traffic, the number of accepting applications and services is decremented. When the last application or service terminates acceptance of unsolicited traffic via the edge traversal service, the host re-enters the dormant state and ceases transmission of its beacons.Type: ApplicationFiled: June 26, 2007Publication date: January 1, 2009Applicant: Microsoft CorporationInventors: David Abzarian, Michael R. Surkan, Salahuddin C. J. Khan, Amit A. Sehgal, Mohit Talwar