Patents by Inventor Nathan Muggli
Nathan Muggli has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 7774310Abstract: A data store is distributed between a server and a client. The distributed data store includes global data. A transformation is applied to the global data to generate client-specific data based on the global data. The client-specific data is stored on the client which uses the client-specific data to perform tasks relating to the client-specific data.Type: GrantFiled: April 27, 2007Date of Patent: August 10, 2010Assignee: Microsoft CorporationInventors: Dmitri Gavrilov, Xin He, Sanjeev Balarajan, Nathan Muggli
-
Publication number: 20080270413Abstract: A data store is distributed between a server and a client. The distributed data store includes global data. A transformation is applied to the global data to generate client-specific data based on the global data. The client-specific data is stored on the client which uses the client-specific data to perform tasks relating to the client-specific data.Type: ApplicationFiled: April 27, 2007Publication date: October 30, 2008Inventors: Dmitri Gavrilov, Xin He, Sanjeev Balarajan, Nathan Muggli
-
Publication number: 20070130615Abstract: Accessing a data set with secret and non-secret data. A method includes accessing a data set image. The data set image comprises secret data. The data set image is derived from an authorized data set associated with a master key that authorizes access to the secret data. The master key is not provided with the data set image. The method further comprises restoring the data set image to a computing system to create a degraded data set. Data in the degraded data set other than the secret data is accessed without restoring the master key.Type: ApplicationFiled: December 6, 2005Publication date: June 7, 2007Applicant: Microsoft CorporationInventors: Colin Brace, Nathan Muggli, William Lees
-
Publication number: 20070130304Abstract: Registering a client with a distributed service. A method may be practiced, for example, in a network computing environment including a client at a local site and a number of distributed services at a number of remote sites. The method includes pinging one or more distributed services at one or more remote sites. A message is received from a distributed service from among the one or more distributed services. The message specifies an optimal remote site. The method further includes registering with a distributed service at the optimal remote site.Type: ApplicationFiled: December 2, 2005Publication date: June 7, 2007Applicant: Microsoft CorporationInventors: Billy Fuller, Nathan Muggli, Weiqing Tu, William Lees
-
Publication number: 20070041393Abstract: Maintaining DNS records. A computing network system includes a local Domain Name Service (DNS) server connected to one or more local clients or resources at a local branch office in an enterprise network. The local DNS server advertises to the local clients or resources at the local branch office that the DNS server is authoritative. The DNS server receives record information for the local clients or resources. An attempt is made to forward the record information to an enterprise hub DNS server. The record information is stored persistently in a cache. Storing the record information persistently in cache may be performed selectively or non-selectively. When performed selectively, the record information is stored or not stored depending on some result or other action. For example, the result may be stored or not stored depending on the results of attempting to forward to an enterprise hub DNS server.Type: ApplicationFiled: August 19, 2005Publication date: February 22, 2007Applicant: Microsoft CorporationInventors: Jeffrey Westhead, Levon Esibov, Nathan Muggli
-
Publication number: 20060282881Abstract: A domain controller hierarchy includes one or more hub domain controllers in communication with one or more local domain controllers, such as local domain controllers at a branch office. The hub domain controller(s) is writable, while the local domain controller(s) is typically read-only. Non-secure and secure information is partitioned to specific local domain controllers at the one or more hub domain controllers. The non-secure and secure information is then passed from the hub domain controller only to the local domain controller associated with the given partition at the hub domain controller on request. For example, a user requests a logon at a client computer system at a local branch office, and the logon is passed from the local domain controller to the hub domain controller. If authenticated, the user logon account is passed to the local domain controller, where it can be cached to authenticate subsequent requests.Type: ApplicationFiled: June 10, 2005Publication date: December 14, 2006Applicant: Microsoft CorporationInventors: Gregory Johnson, Nathan Muggli, William Lees, William Jack
-
Publication number: 20060280139Abstract: A domain controller hierarchy in accordance with implementations of the present invention involves one or more local domain controllers, such as one or more read-only local domain controllers in communication with one or more writable hub domain controllers. The local domain controllers includes a resource manager, such as a Security Account Manager (“SAM”), that manages resources and/or other accounts information received from the writable hub domain controller. When a local user attempts to change the resource at the local domain controller, however, the resource manager chains the request, along with any appropriate identifiers for the request, to the writable hub domain controller, where the request is processed. If appropriate, the hub domain controller sends a response that the resource has been updated as requested and also sends a copy of the updated resource to be cached at the local domain controller.Type: ApplicationFiled: June 10, 2005Publication date: December 14, 2006Applicant: Microsoft CorporationInventors: Colin Brace, William Jack, Nathan Muggli
-
Publication number: 20060282879Abstract: A domain controller hierarchy includes one or more hub domain controllers in communication with one or more local domain controllers, such as local domain controllers at a branch office. The hub domain controller(s) is writable, while the local domain controller(s) is typically read-only. Non-secure and secure information is partitioned to specific local domain controllers at the one or more hub domain controllers. The non-secure and secure information is then passed from the hub domain controller only to the local domain controller associated with the given partition at the hub domain controller on request. For example, a user requests a logon at a client computer system at a local branch office, and the logon is passed from the local domain controller to the hub domain controller. If authenticated, the user logon account is passed to the local domain controller, where it can be cached to authenticate subsequent requests.Type: ApplicationFiled: September 30, 2005Publication date: December 14, 2006Applicant: Microsoft CorporationInventors: Gregory Johnson, Nathan Muggli, William Lees, William Jack
-
Publication number: 20060282900Abstract: Resources in a computerized environment can be organized into objects and resource groups, which are, in turn, managed by one or more resource control lists. For example, a computer system (i.e., an accessor) can be represented by an object at a managing computer system. The computer system object includes a resource control list that indicates what groups of objects can be accessed, and/or what groups of objects cannot be accessed. A request by the computer system for a resource, such as a user object, can involve the managing computer system identifying the computer system object, reviewing the resource control list for the computer system object, and then reviewing whether the requested resource is found in an accessible group. Additional implementations relate to ensuring that resources are accessed appropriately, such as at a point when all resource updates have been sent, received, and implemented for the given resource.Type: ApplicationFiled: June 10, 2005Publication date: December 14, 2006Applicant: Microsoft CorporationInventors: Gregory Johnson, Nathan Muggli, Pranay Sadarangani, William Lees