1
David Matthew Pepe, Lisa B Blitzer, James Joseph Brockman, William Cruz, Dwight Omar Hakim, Michael Kramer, Dawn Diane Petr, Josefa Ramaroson, Gerardo Ramirez, Yang Wei Wang, Robert G White: Personal communications internetworking. Bell Communications Research, Loria B Yeadon, Joseph Giordano, April 21, 1998: US05742905 (1471 worldwide citation)

A person communications internetworking provides a network subscriber with the ability to remotely control the receipt and delivery of wireless and wireline voice and text messages. The network operates as an interfaces between various wireless and wireline networks, and also performs media translat ...


2
David Mathew Pepe, Lisa B Blitzer, James Joseph Brockman, William Cruz, Dwight Omar Hakim, Richard Reid Hovey, Michael Kramer, Dawn Diane Petr, Josefa Ramaroson, Gerardo Ramirez, Yang Wei Wang, Robert G White: System and method for providing protocol translation and filtering to access the world wide web from wireless or low-bandwidth networks. Bell Communications Research, James W Falk, Joseph Giordano, September 30, 1997: US05673322 (672 worldwide citation)

An interface between a protected computer or computer network and the World Wide Web (WWW). The interface comprises a split proxy system that encapsulates TCP/IP transmissions into a script transmission, which is not subject to problems in high latency systems, thereby greatly improving WWW access, ...


3
David Matthew Pepe, Lisa B Blitzer, James Joseph Brockman, William Cruz, Dwight Omar Hakim, Michael Kramer, Dawn Diane Petr, Josefa Ramaroson, Gerardo Ramirez, Yang Wei Wang, Robert G White: Electronic massaging network. Bell Communications Research, Loria B Yeadon, Joseph Giordano, April 21, 1998: US05742668 (635 worldwide citation)

A personal communications internetwork provides a personal communications internetwork providing a network subscriber with the ability to remotely control the receipt and delivery of wireless and wireline electronic text messages. The network operates as an interface between wireless and wireline ne ...


4
Richard S Wolff, Warren S Gifford, Michael Kramer, David S Miller, Gerardo Ramirez, David L Turock: Method and system for managing telecommunications such as telephone calls. Bell Communications Research, Leonard Charles Suchyta, July 5, 1994: US05327486 (603 worldwide citation)

A method and system for managing telephone calls includes a personal telephone manager (PTM) (12) and uses out-of-band, wireless, two-way signaling, messaging and alerting to screen, control, route and respond to incoming telephone calls and to communicate called party text messages in auditory form ...


5
Ravi Kumar Jain, Michael Kramer: Communications network having a multicast capability. Telcordia Technologies, Joseph Giordano, July 4, 2000: US06085101 (98 worldwide citation)

A communications network simultaneously transmits a single message to a number of recipients. This is called a "multicast" transmission. The communications network should have a recipient list database (1302) to receive a list of recipient addresses, a message database (1304) to receive and store th ...


6
Donald J Kadyk, Neil S Fishman, Marc E Seinfeld, Michael Kramer: Negotiating secure connections through a proxy server. Microsoft Corporation, Workman Nydegger, February 7, 2006: US06996841 (87 worldwide citation)

Methods, systems, and computer program products for negotiating a secure end-to-end connection using a proxy server as an intermediary. The client first negotiates a secure connection between the client and the proxy so that any credentials exchanged will be encrypted. After the exchange of authenti ...


7
Benjamin Armstrong, Paul England, Scott A Field, Jason Garms, Michael Kramer, Kenneth D Ray: Computer security management, such as in a virtual machine or hardened operating system. Microsoft Corporation, Woodcock Washburn, August 5, 2008: US07409719 (68 worldwide citation)

A security scheme provides security to one or more self-contained operating environment instances executing on a computer. The security scheme may include implementing a set of security applications that may be controlled by a supervisory process, or the like. Both the set of security applications a ...


8
Kenneth D Ray, Michael Kramer, Paul England, Scott A Field: On-access scan of memory for malware. Microsoft Corporation, Workman Nydegger, November 16, 2010: US07836504 (66 worldwide citation)

The present invention provides a system, method, and computer-readable medium for identifying malware that is loaded in the memory of a computing device. Software routines implemented by the present invention track the state of pages loaded in memory using page table access bits available from a cen ...


9
Donald J Kadyk, Neil S Fishman, Marc E Seinfeld, Michael Kramer: Negotiating secure connections through a proxy server. Microsoft Corporation, Workman Nydegger, February 6, 2007: US07174565 (53 worldwide citation)

Methods, systems, and computer program products for negotiating a secure end-to-end connection using a proxy server as an intermediary. The client first negotiates a secure connection between the client and the proxy so that any credentials exchanged will be encrypted. After the exchange of authenti ...


10
Neil S Fishman, Michael Kramer: Credential authentication for mobile users. Microsoft Corporation, Workman Nydegger, May 16, 2006: US07047560 (52 worldwide citation)

Methods, systems, and computer program products for authenticating a mobile client that may have an input system optimized for numeric input. A mobile gateway receives authentication credentials from a mobile client and uses an authentication filter to map the authentication credentials according to ...



Click the thumbnails below to visualize the patent trend.