Patents by Inventor Michael Trommsdorff
Michael Trommsdorff has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 8548141Abstract: Techniques for transfer error recovery are described. A system may comprise a context generator module operative to record context information for a first call session between a first call terminal and a call system resource, and store the context information with a context identifier in a context table. The system may include a transfer error context module to couple to the context generator module, the transfer error context module operative to generate transfer error context information having the context identifier. The system may include a call transfer module to couple to the transfer error context module, the call transfer module operative to send the transfer error context information to the first call terminal for use in case of a transfer failure event. Other embodiments are described and claimed.Type: GrantFiled: September 7, 2012Date of Patent: October 1, 2013Assignee: Microsoft CorporationInventors: Amritansh Raghav, Michael Trommsdorff, Rajesh Ramanathan, Andreas Strebel
-
Patent number: 8490160Abstract: Open federation security techniques with rate limits are described. An apparatus may include a network interface operative to communicate messages, and a secure open federation (SOF) module operative to manage a message rate between multiple federated networks. The SOF module may comprise a peer authentication module operative to determine whether a peer making the message is an untrusted peer. The SOF module may comprise a peer rate tracking module operative to retrieve a message rate value and a message rate limit value associated with the untrusted peer, and compare the message rate value with the message rate limit value to form a threat status indicator value. The SOF module may comprise a peer authorization module operative to authorize communication of the message based on the threat status indicator value. Other embodiments are described and claimed.Type: GrantFiled: October 4, 2007Date of Patent: July 16, 2013Assignee: Microsoft CorporationInventors: Jeremy T. Buch, Michael Trommsdorff, James Undery
-
Patent number: 8347358Abstract: Techniques to protect from open enhanced federation user enumeration are described. An apparatus may include a network interface operative to establish connections. The access edge server may further include an open enhanced federation (OEF) module communicatively coupled to the network interface. The OEF module may be operative to manage connections between multiple federated networks. In one embodiment, for example, the OEF module may comprise a peer authentication module operative to determine whether a peer making the request is an untrusted peer domain. The OEF module may further comprise a peer tracking module operative to retrieve a total request number and a total limit number associated with the untrusted peer, and compare the total request number with the total limit number to form a threat status indicator value. The OEF module may also comprise a peer authorization module operative to authorize the request based on the threat status indicator value. Other embodiments are described and claimed.Type: GrantFiled: June 25, 2007Date of Patent: January 1, 2013Assignee: Microsoft CorporationInventors: Jeremy T. Buch, Michael Trommsdorff, James Undery
-
Publication number: 20120328084Abstract: Techniques for transfer error recovery are described. A system may comprise a context generator module operative to record context information for a first call session between a first call terminal and a call system resource, and store the context information with a context identifier in a context table. The system may include a transfer error context module to couple to the context generator module, the transfer error context module operative to generate transfer error context information having the context identifier. The system may include a call transfer module to couple to the transfer error context module, the call transfer module operative to send the transfer error context information to the first call terminal for use in case of a transfer failure event. Other embodiments are described and claimed.Type: ApplicationFiled: September 7, 2012Publication date: December 27, 2012Applicant: MICROSOFT CORPORATIONInventors: Amritansh Raghav, Michael Trommsdorff, Rajesh Ramanathan, Andreas Strebel
-
Patent number: 8265248Abstract: Techniques for transfer error recovery are described. A system may comprise a context generator module operative to record context information for a first call session between a first call terminal and a call system resource, and store the context information with a context identifier in a context table. The system may include a transfer error context module to couple to the context generator module, the transfer error context module operative to generate transfer error context information having the context identifier. The system may include a call transfer module to couple to the transfer error context module, the call transfer module operative to send the transfer error context information to the first call terminal for use in case of a transfer failure event. Other embodiments are described and claimed.Type: GrantFiled: February 7, 2008Date of Patent: September 11, 2012Assignee: Microsoft CorporationInventors: Amritansh Raghav, Michael Trommsdorff, Rajesh Ramanathan, Andreas Strebel
-
Publication number: 20110055402Abstract: Architecture that exposes automaton information of an automaton based on aggregation of a set of member information and according to aggregation logic. The aggregation logic can include presence state, supported communications modalities, and time availability (e.g., business hours). The aggregation logic for presence state member information can be defined by the most available presence state of all persons the automaton it is hiding. The aggregation logic for capabilities member information can be the capabilities of the most available person the automaton is hiding. The aggregation logic for business hours member information can be defined by the largest interval possible covered by the persons hidden by the automaton. Other types of member information can be considered.Type: ApplicationFiled: August 27, 2009Publication date: March 3, 2011Inventors: Stéphane Cavin, Michael Trommsdorff
-
Publication number: 20090202056Abstract: Techniques for transfer error recovery are described. A system may comprise a context generator module operative to record context information for a first call session between a first call terminal and a call system resource, and store the context information with a context identifier in a context table. The system may include a transfer error context module to couple to the context generator module, the transfer error context module operative to generate transfer error context information having the context identifier. The system may include a call transfer module to couple to the transfer error context module, the call transfer module operative to send the transfer error context information to the first call terminal for use in case of a transfer failure event. Other embodiments are described and claimed.Type: ApplicationFiled: February 7, 2008Publication date: August 13, 2009Applicant: MICROSOFT CORPORATIONInventors: Amritansh Raghav, Michael Trommsdorff, Rajesh Ramanathan, Andreas Strebel
-
Publication number: 20090092050Abstract: Open federation security techniques with rate limits are described. An apparatus may include a network interface operative to communicate messages, and a secure open federation (SOF) module operative to manage a message rate between multiple federated networks. The SOF module may comprise a peer authentication module operative to determine whether a peer making the message is an untrusted peer. The SOF module may comprise a peer rate tracking module operative to retrieve a message rate value and a message rate limit value associated with the untrusted peer, and compare the message rate value with the message rate limit value to form a threat status indicator value. The SOF module may comprise a peer authorization module operative to authorize communication of the message based on the threat status indicator value. Other embodiments are described and claimed.Type: ApplicationFiled: October 4, 2007Publication date: April 9, 2009Applicant: Microsoft CorporationInventors: Jeremy T. Buch, Michael Trommsdorff, James Undery
-
Publication number: 20090003309Abstract: The claimed subject matter provides a system and/or a method that facilitates enhancing incoming data communication connectivity within a network. An analyzer component can evaluate a portion of an incoming data communication targeted for a network to identify a context associated with the data communication. A transfer component can direct the incoming data communication to a cluster within the network based at least in part upon the identified context, wherein the cluster includes a physical entity with pre-existing knowledge of the identified context.Type: ApplicationFiled: June 29, 2007Publication date: January 1, 2009Applicant: MICROSOFT CORPORATIONInventors: Anthony J. Bawcutt, Scott C. Forbes, Kalyan Basu, Jeremy T. Buch, Anoop Gupta, Warren Vincent Barkley, Ross Cutler, Timothy M. Moore, Michael Trommsdorff
-
Publication number: 20080320565Abstract: Techniques to protect from open enhanced federation user enumeration are described. An apparatus may include a network interface operative to establish connections. The access edge server may further include an open enhanced federation (OEF) module communicatively coupled to the network interface. The OEF module may be operative to manage connections between multiple federated networks. In one embodiment, for example, the OEF module may comprise a peer authentication module operative to determine whether a peer making the request is an untrusted peer domain. The OEF module may further comprise a peer tracking module operative to retrieve a total request number and a total limit number associated with the untrusted peer, and compare the total request number with the total limit number to form a threat status indicator value. The OEF module may also comprise a peer authorization module operative to authorize the request based on the threat status indicator value. Other embodiments are described and claimed.Type: ApplicationFiled: June 25, 2007Publication date: December 25, 2008Applicant: Microsoft CorporationInventors: Jeremy T. Buch, Michael Trommsdorff, James Undery