1
Mario C Goertzel, Susi E Strom, Praerit Garg, Bharat Shah: Method and system of security location discrimination. Microsoft Corporation, Michalik & Wylie PLLC, October 23, 2001: US06308273 (419 worldwide citation)


An improved computer network security system and method wherein access to network resources is based on information that includes the location of the connecting user. In general, the less trusted the location of the user, the more the access rights assigned to the user are restricted. A discriminati ...


2
Shannon Chan, Gregory Jensenworth, Mario C Goertzel, Bharat Shah, Michael M Swift, Richard B Ward: Method and system for secure running of untrusted content. Microsoft Corporation, Law Offices of Albert S Michalik PLLC, January 7, 2003: US06505300 (254 worldwide citation)


Restricted execution contexts are provided for untrusted content, such as computer code or other data downloaded from websites, electronic mail messages and any attachments thereto, and scripts or client processes run on a server. A restricted process is set up for the untrusted content, and any act ...


3
Gregory Jensenworth, Praerit Garg, Michael M Swift, Mario C Goertzel, Shannon J Chan: Security model using restricted tokens. Microsoft Corporation, Michalik & Wylie PLLC, August 21, 2001: US06279111 (125 worldwide citation)


A restrict ed access token is created from an existing token, and provides less access than that token. A restricted token may be created by changing an attribute of one or more security identifiers allowing access in the parent token to a setting that denies access in the restricted token and/or re ...


4
Gopal Parupudi, Edward F Reus, Stephen S Evans, Mario C Goertzel: Identity-based context aware computing systems and methods. Microsoft Corporation, Lee & Hayes PLLC, June 15, 2004: US06750883 (94 worldwide citation)


Context-aware computing systems and methods are described. In some embodiments the context of a computing device is determined by assigning privacy levels to one or more applications that are configured to call a context service module on the computing device to obtain context information from the c ...


5
Gopal Parupudi, Mario C Goertzel, Murthy Srinivas: Method and mechanism for providing computer programs with computer system events. Microsoft, February 22, 2005: US06859829 (45 worldwide citation)


A method and system for providing system event notifications to clients such as applications. Clients register for notification of one or more types of events with a registration mechanism, and a System Event Notification Service, (SENS), receives system event information and fires event notificatio ...


6
Bharat Shah, Mario C Goertzel, Mazhar N Mohammed: Method and system for migrating connections between receive-any and receive-direct threads. Microsoft Corporation, Michalik & Wylie PLLC, January 16, 2001: US06175879 (43 worldwide citation)


A method and mechanism for efficiently handling connections in a computer system between client sockets and data sockets of a server. The server includes a receive-any thread having a socket mask associated therewith to listen for new connection requests and for activity on data sockets handled ther ...


7
Mario C Goertzel, Richard D Hill, Alexander A Mitchell, Bharat Shah: Method and system for delayed registration of protocols. Microsoft Corporation, Klarquist Sparkman Campbell Leigh & Whinston, March 27, 2001: US06208952 (34 worldwide citation)


A method and system for delayed registration of a remote protocol for communicating between a client computer system and a server computer system. The server computer system has a communications process that registers a plurality of protocols. When the client process needs to communicate with the se ...


8
Bharat Shah, Mario C Goertzel, Mazhar N Mohammed: Method and mechanism for interprocess communication using client and server listening threads. Microsoft Corporation, Michalik & Wylie PLLC, May 1, 2001: US06226689 (29 worldwide citation)


A method and mechanism for interprocess communication between a thread of a client application and a thread of a server application. The mechanism includes a server listening thread and a client listening thread. The client thread sends a request to a server listening thread, and the server listenin ...


9
Terry Kennedy, Christopher Gustav Ewbank, Dietmar Gaertner, Mario C Goertzel, Ryszard K Kott, Nathaniel S Brown: Remote procedure calling with marshaling and unmarshaling of arbitrary non-conformant pointer sizes. Microsoft Corporation, Klarquist Sparkman, October 2, 2001: US06298391 (18 worldwide citation)


A remote procedure call marshaling architecture provides remote procedure call interoperability between computers having arbitrary native data format pointer sizes not conforming to an on-wire multicanonical data representation of the remote procedure calls. The architecture includes an interface de ...


10
Mario C Goertzel, Alexander A Mitchell, Richard D Hill: Secure decentralized object exporter. Microsoft Corporation, Michalik & Wylie PLLC, October 31, 2000: US06141696 (16 worldwide citation)


A method and system for preventing incorrect information from corrupting server object information maintained by a client machine. A DCOM client machine is provided with object reference information for accessing remote objects. DCOM unmarshals the information into server object information, includi ...



Click the thumbnails below to visualize the patent trend.