Patents by Inventor Michael Trommsdorff

Michael Trommsdorff has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 8548141
    Abstract: Techniques for transfer error recovery are described. A system may comprise a context generator module operative to record context information for a first call session between a first call terminal and a call system resource, and store the context information with a context identifier in a context table. The system may include a transfer error context module to couple to the context generator module, the transfer error context module operative to generate transfer error context information having the context identifier. The system may include a call transfer module to couple to the transfer error context module, the call transfer module operative to send the transfer error context information to the first call terminal for use in case of a transfer failure event. Other embodiments are described and claimed.
    Type: Grant
    Filed: September 7, 2012
    Date of Patent: October 1, 2013
    Assignee: Microsoft Corporation
    Inventors: Amritansh Raghav, Michael Trommsdorff, Rajesh Ramanathan, Andreas Strebel
  • Patent number: 8490160
    Abstract: Open federation security techniques with rate limits are described. An apparatus may include a network interface operative to communicate messages, and a secure open federation (SOF) module operative to manage a message rate between multiple federated networks. The SOF module may comprise a peer authentication module operative to determine whether a peer making the message is an untrusted peer. The SOF module may comprise a peer rate tracking module operative to retrieve a message rate value and a message rate limit value associated with the untrusted peer, and compare the message rate value with the message rate limit value to form a threat status indicator value. The SOF module may comprise a peer authorization module operative to authorize communication of the message based on the threat status indicator value. Other embodiments are described and claimed.
    Type: Grant
    Filed: October 4, 2007
    Date of Patent: July 16, 2013
    Assignee: Microsoft Corporation
    Inventors: Jeremy T. Buch, Michael Trommsdorff, James Undery
  • Patent number: 8347358
    Abstract: Techniques to protect from open enhanced federation user enumeration are described. An apparatus may include a network interface operative to establish connections. The access edge server may further include an open enhanced federation (OEF) module communicatively coupled to the network interface. The OEF module may be operative to manage connections between multiple federated networks. In one embodiment, for example, the OEF module may comprise a peer authentication module operative to determine whether a peer making the request is an untrusted peer domain. The OEF module may further comprise a peer tracking module operative to retrieve a total request number and a total limit number associated with the untrusted peer, and compare the total request number with the total limit number to form a threat status indicator value. The OEF module may also comprise a peer authorization module operative to authorize the request based on the threat status indicator value. Other embodiments are described and claimed.
    Type: Grant
    Filed: June 25, 2007
    Date of Patent: January 1, 2013
    Assignee: Microsoft Corporation
    Inventors: Jeremy T. Buch, Michael Trommsdorff, James Undery
  • Publication number: 20120328084
    Abstract: Techniques for transfer error recovery are described. A system may comprise a context generator module operative to record context information for a first call session between a first call terminal and a call system resource, and store the context information with a context identifier in a context table. The system may include a transfer error context module to couple to the context generator module, the transfer error context module operative to generate transfer error context information having the context identifier. The system may include a call transfer module to couple to the transfer error context module, the call transfer module operative to send the transfer error context information to the first call terminal for use in case of a transfer failure event. Other embodiments are described and claimed.
    Type: Application
    Filed: September 7, 2012
    Publication date: December 27, 2012
    Applicant: MICROSOFT CORPORATION
    Inventors: Amritansh Raghav, Michael Trommsdorff, Rajesh Ramanathan, Andreas Strebel
  • Patent number: 8265248
    Abstract: Techniques for transfer error recovery are described. A system may comprise a context generator module operative to record context information for a first call session between a first call terminal and a call system resource, and store the context information with a context identifier in a context table. The system may include a transfer error context module to couple to the context generator module, the transfer error context module operative to generate transfer error context information having the context identifier. The system may include a call transfer module to couple to the transfer error context module, the call transfer module operative to send the transfer error context information to the first call terminal for use in case of a transfer failure event. Other embodiments are described and claimed.
    Type: Grant
    Filed: February 7, 2008
    Date of Patent: September 11, 2012
    Assignee: Microsoft Corporation
    Inventors: Amritansh Raghav, Michael Trommsdorff, Rajesh Ramanathan, Andreas Strebel
  • Publication number: 20110055402
    Abstract: Architecture that exposes automaton information of an automaton based on aggregation of a set of member information and according to aggregation logic. The aggregation logic can include presence state, supported communications modalities, and time availability (e.g., business hours). The aggregation logic for presence state member information can be defined by the most available presence state of all persons the automaton it is hiding. The aggregation logic for capabilities member information can be the capabilities of the most available person the automaton is hiding. The aggregation logic for business hours member information can be defined by the largest interval possible covered by the persons hidden by the automaton. Other types of member information can be considered.
    Type: Application
    Filed: August 27, 2009
    Publication date: March 3, 2011
    Inventors: Stéphane Cavin, Michael Trommsdorff
  • Publication number: 20090202056
    Abstract: Techniques for transfer error recovery are described. A system may comprise a context generator module operative to record context information for a first call session between a first call terminal and a call system resource, and store the context information with a context identifier in a context table. The system may include a transfer error context module to couple to the context generator module, the transfer error context module operative to generate transfer error context information having the context identifier. The system may include a call transfer module to couple to the transfer error context module, the call transfer module operative to send the transfer error context information to the first call terminal for use in case of a transfer failure event. Other embodiments are described and claimed.
    Type: Application
    Filed: February 7, 2008
    Publication date: August 13, 2009
    Applicant: MICROSOFT CORPORATION
    Inventors: Amritansh Raghav, Michael Trommsdorff, Rajesh Ramanathan, Andreas Strebel
  • Publication number: 20090092050
    Abstract: Open federation security techniques with rate limits are described. An apparatus may include a network interface operative to communicate messages, and a secure open federation (SOF) module operative to manage a message rate between multiple federated networks. The SOF module may comprise a peer authentication module operative to determine whether a peer making the message is an untrusted peer. The SOF module may comprise a peer rate tracking module operative to retrieve a message rate value and a message rate limit value associated with the untrusted peer, and compare the message rate value with the message rate limit value to form a threat status indicator value. The SOF module may comprise a peer authorization module operative to authorize communication of the message based on the threat status indicator value. Other embodiments are described and claimed.
    Type: Application
    Filed: October 4, 2007
    Publication date: April 9, 2009
    Applicant: Microsoft Corporation
    Inventors: Jeremy T. Buch, Michael Trommsdorff, James Undery
  • Publication number: 20090003309
    Abstract: The claimed subject matter provides a system and/or a method that facilitates enhancing incoming data communication connectivity within a network. An analyzer component can evaluate a portion of an incoming data communication targeted for a network to identify a context associated with the data communication. A transfer component can direct the incoming data communication to a cluster within the network based at least in part upon the identified context, wherein the cluster includes a physical entity with pre-existing knowledge of the identified context.
    Type: Application
    Filed: June 29, 2007
    Publication date: January 1, 2009
    Applicant: MICROSOFT CORPORATION
    Inventors: Anthony J. Bawcutt, Scott C. Forbes, Kalyan Basu, Jeremy T. Buch, Anoop Gupta, Warren Vincent Barkley, Ross Cutler, Timothy M. Moore, Michael Trommsdorff
  • Publication number: 20080320565
    Abstract: Techniques to protect from open enhanced federation user enumeration are described. An apparatus may include a network interface operative to establish connections. The access edge server may further include an open enhanced federation (OEF) module communicatively coupled to the network interface. The OEF module may be operative to manage connections between multiple federated networks. In one embodiment, for example, the OEF module may comprise a peer authentication module operative to determine whether a peer making the request is an untrusted peer domain. The OEF module may further comprise a peer tracking module operative to retrieve a total request number and a total limit number associated with the untrusted peer, and compare the total request number with the total limit number to form a threat status indicator value. The OEF module may also comprise a peer authorization module operative to authorize the request based on the threat status indicator value. Other embodiments are described and claimed.
    Type: Application
    Filed: June 25, 2007
    Publication date: December 25, 2008
    Applicant: Microsoft Corporation
    Inventors: Jeremy T. Buch, Michael Trommsdorff, James Undery