Patents by Inventor Zachariah Morgan

Zachariah Morgan has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 9769121
    Abstract: Proxy networks enable a source to send traffic to one or more targets through a set of nodes operating as proxies. However, proxy networks are typically nonselective (often by design), and do not enable a source to specify properties of the nodes selected as proxies to send traffic to the target. Presented herein are proxy network techniques that enable sources to specify node properties in a target request, and that utilize a set of node managers for respective subsets of nodes. For a target request specifying selected node properties, the node managers may select as proxies nodes having the node properties specified in the target request. Additionally, the techniques presented herein promote the flexibility of the proxy network (e.g., adding groups of nodes, expanding the variety of nodes and node properties, and sending various forms of traffic using any protocol to various topics on behalf of many and various sources).
    Type: Grant
    Filed: September 12, 2011
    Date of Patent: September 19, 2017
    Assignee: Microsoft Technology Licensing, LLC
    Inventors: Jon Joy, Derk Adair Benisch, Tom Janes, James Boerner, Michael Sitler, Anthony Paul Penta, Zachariah Morgan
  • Publication number: 20130067023
    Abstract: Proxy networks enable a source to send traffic to one or more targets through a set of nodes operating as proxies. However, proxy networks are typically nonselective (often by design), and do not enable a source to specify properties of the nodes selected as proxies to send traffic to the target. Presented herein are proxy network techniques that enable sources to specify node properties in a target request, and that utilize a set of node managers for respective subsets of nodes. For a target request specifying selected node properties, the node managers may select as proxies nodes having the node properties specified in the target request. Additionally, the techniques presented herein promote the flexibility of the proxy network (e.g., adding groups of nodes, expanding the variety of nodes and node properties, and sending various forms of traffic using any protocol to various topics on behalf of many and various sources).
    Type: Application
    Filed: September 12, 2011
    Publication date: March 14, 2013
    Applicant: Microsoft Corporation
    Inventors: Jon Joy, Derk Adair Benisch, Tom Janes, James Boerner, Michael Sitler, Anthony Paul Penta, Zachariah Morgan
  • Publication number: 20040034779
    Abstract: A method and apparatus to verify the authenticity of the recording is provided. An authentication code is calculated based on the contents of the recording and information describing the context of the recording. The authentication code provides assurance to a user of the recording that no elements of the recording have been altered. Recordings that are made for legal evidence purposes may include, but are not limited to audio and visual (image) information including motion pictures. Context information includes, but is not limited to date, time, longitude, latitude, camera or recorder serial number, camera orientation, camera optical parameters, and information about the recorder operator. When using such recordings for legal evidence, the authenticity of the recorded information is crucial, and also the authenticity of the parameters surrounding the recording is crucial.
    Type: Application
    Filed: June 11, 2003
    Publication date: February 19, 2004
    Applicant: Accurate Automation Corporation of Chattanooga, Te
    Inventors: Thomas Paine Wood, Chadwick James Cox, Zachariah Morgan Gibson, Stephen Ralph Hayton, Robert Michael Pap