Patents by Inventor Nathan Muggli

Nathan Muggli has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 7774310
    Abstract: A data store is distributed between a server and a client. The distributed data store includes global data. A transformation is applied to the global data to generate client-specific data based on the global data. The client-specific data is stored on the client which uses the client-specific data to perform tasks relating to the client-specific data.
    Type: Grant
    Filed: April 27, 2007
    Date of Patent: August 10, 2010
    Assignee: Microsoft Corporation
    Inventors: Dmitri Gavrilov, Xin He, Sanjeev Balarajan, Nathan Muggli
  • Publication number: 20080270413
    Abstract: A data store is distributed between a server and a client. The distributed data store includes global data. A transformation is applied to the global data to generate client-specific data based on the global data. The client-specific data is stored on the client which uses the client-specific data to perform tasks relating to the client-specific data.
    Type: Application
    Filed: April 27, 2007
    Publication date: October 30, 2008
    Inventors: Dmitri Gavrilov, Xin He, Sanjeev Balarajan, Nathan Muggli
  • Publication number: 20070130615
    Abstract: Accessing a data set with secret and non-secret data. A method includes accessing a data set image. The data set image comprises secret data. The data set image is derived from an authorized data set associated with a master key that authorizes access to the secret data. The master key is not provided with the data set image. The method further comprises restoring the data set image to a computing system to create a degraded data set. Data in the degraded data set other than the secret data is accessed without restoring the master key.
    Type: Application
    Filed: December 6, 2005
    Publication date: June 7, 2007
    Applicant: Microsoft Corporation
    Inventors: Colin Brace, Nathan Muggli, William Lees
  • Publication number: 20070130304
    Abstract: Registering a client with a distributed service. A method may be practiced, for example, in a network computing environment including a client at a local site and a number of distributed services at a number of remote sites. The method includes pinging one or more distributed services at one or more remote sites. A message is received from a distributed service from among the one or more distributed services. The message specifies an optimal remote site. The method further includes registering with a distributed service at the optimal remote site.
    Type: Application
    Filed: December 2, 2005
    Publication date: June 7, 2007
    Applicant: Microsoft Corporation
    Inventors: Billy Fuller, Nathan Muggli, Weiqing Tu, William Lees
  • Publication number: 20070041393
    Abstract: Maintaining DNS records. A computing network system includes a local Domain Name Service (DNS) server connected to one or more local clients or resources at a local branch office in an enterprise network. The local DNS server advertises to the local clients or resources at the local branch office that the DNS server is authoritative. The DNS server receives record information for the local clients or resources. An attempt is made to forward the record information to an enterprise hub DNS server. The record information is stored persistently in a cache. Storing the record information persistently in cache may be performed selectively or non-selectively. When performed selectively, the record information is stored or not stored depending on some result or other action. For example, the result may be stored or not stored depending on the results of attempting to forward to an enterprise hub DNS server.
    Type: Application
    Filed: August 19, 2005
    Publication date: February 22, 2007
    Applicant: Microsoft Corporation
    Inventors: Jeffrey Westhead, Levon Esibov, Nathan Muggli
  • Publication number: 20060282881
    Abstract: A domain controller hierarchy includes one or more hub domain controllers in communication with one or more local domain controllers, such as local domain controllers at a branch office. The hub domain controller(s) is writable, while the local domain controller(s) is typically read-only. Non-secure and secure information is partitioned to specific local domain controllers at the one or more hub domain controllers. The non-secure and secure information is then passed from the hub domain controller only to the local domain controller associated with the given partition at the hub domain controller on request. For example, a user requests a logon at a client computer system at a local branch office, and the logon is passed from the local domain controller to the hub domain controller. If authenticated, the user logon account is passed to the local domain controller, where it can be cached to authenticate subsequent requests.
    Type: Application
    Filed: June 10, 2005
    Publication date: December 14, 2006
    Applicant: Microsoft Corporation
    Inventors: Gregory Johnson, Nathan Muggli, William Lees, William Jack
  • Publication number: 20060280139
    Abstract: A domain controller hierarchy in accordance with implementations of the present invention involves one or more local domain controllers, such as one or more read-only local domain controllers in communication with one or more writable hub domain controllers. The local domain controllers includes a resource manager, such as a Security Account Manager (“SAM”), that manages resources and/or other accounts information received from the writable hub domain controller. When a local user attempts to change the resource at the local domain controller, however, the resource manager chains the request, along with any appropriate identifiers for the request, to the writable hub domain controller, where the request is processed. If appropriate, the hub domain controller sends a response that the resource has been updated as requested and also sends a copy of the updated resource to be cached at the local domain controller.
    Type: Application
    Filed: June 10, 2005
    Publication date: December 14, 2006
    Applicant: Microsoft Corporation
    Inventors: Colin Brace, William Jack, Nathan Muggli
  • Publication number: 20060282879
    Abstract: A domain controller hierarchy includes one or more hub domain controllers in communication with one or more local domain controllers, such as local domain controllers at a branch office. The hub domain controller(s) is writable, while the local domain controller(s) is typically read-only. Non-secure and secure information is partitioned to specific local domain controllers at the one or more hub domain controllers. The non-secure and secure information is then passed from the hub domain controller only to the local domain controller associated with the given partition at the hub domain controller on request. For example, a user requests a logon at a client computer system at a local branch office, and the logon is passed from the local domain controller to the hub domain controller. If authenticated, the user logon account is passed to the local domain controller, where it can be cached to authenticate subsequent requests.
    Type: Application
    Filed: September 30, 2005
    Publication date: December 14, 2006
    Applicant: Microsoft Corporation
    Inventors: Gregory Johnson, Nathan Muggli, William Lees, William Jack
  • Publication number: 20060282900
    Abstract: Resources in a computerized environment can be organized into objects and resource groups, which are, in turn, managed by one or more resource control lists. For example, a computer system (i.e., an accessor) can be represented by an object at a managing computer system. The computer system object includes a resource control list that indicates what groups of objects can be accessed, and/or what groups of objects cannot be accessed. A request by the computer system for a resource, such as a user object, can involve the managing computer system identifying the computer system object, reviewing the resource control list for the computer system object, and then reviewing whether the requested resource is found in an accessible group. Additional implementations relate to ensuring that resources are accessed appropriately, such as at a point when all resource updates have been sent, received, and implemented for the given resource.
    Type: Application
    Filed: June 10, 2005
    Publication date: December 14, 2006
    Applicant: Microsoft Corporation
    Inventors: Gregory Johnson, Nathan Muggli, Pranay Sadarangani, William Lees