1
Mark H Lucovsky, Shaun Douglas Pierce, Steven D White, Ramu Movva, Jagadeesh Kalki, David Benjamin Auerbach, Peter Sewall Ford, Jay Christopher Jacobs, Paul Andrew Steckler, Walter C Hsueh, Kendall D Keil, Burra Gopal, Suresh Kannan, Yi Wen Guu, Samuel John George, William Raymond Hoffman, Philip Michael Smoot, Lijiang Fang, Michael B Taylor, Winnie C Wu, Paul J Leach, Richard B Ward, Yun Qi Yuan: Schema-based services for identity-based data access. Microsoft Corporation, November 27, 2007: US07302634 (187 worldwide citation)

A schema-based service for Internet access to per-user services data, wherein access to data is based on each user's identity. The service includes a schema that defines rules and a structure for each user's data, and also includes methods that provide access to the data in a defined way. The servic ...


2
Alexander Vaschillo, Ilker Cengiz, Bertan Ari, Srinivasa R Burugapalli, Luca Bolognese, Avner Y Aharoni, Steven D White, Alex Laskos, Andrew J Conrad, Todd F Pfleiger, Jason Z Zhu, Chris Suver, David Schach, Adam J Wiener: Mapping architecture for arbitrary data models. Microsoft Corporation, Workman Nydegger, June 15, 2010: US07739223 (29 worldwide citation)

A data mapping architecture for mapping between two or more data sources without modifying the metadata or structure of the data sources themselves. Data mapping also supports updates. The architecture also supports at least the case where data sources that are being mapped, are given, their schemas ...


3
Malcolm E Pearson, David R Reed, Robert G Atkinson, Steven D White: Enforcing rights management through edge email servers. Microsoft Corporation, Workman Nydegger, November 18, 2008: US07454778 (22 worldwide citation)

The present invention provides for methods, systems, and computer program products for ensuring that sensitive subject matter within electronic messages is not inappropriately transferred between domains with differing security rights. The present invention utilizes the appropriate placement of mess ...


4
Mark H Lucovsky, Shaun Douglas Pierce, Ramu Movva, Jagadeesh Kalki, David Benjamin Auerbach, Peter Sewall Ford, Yun Qi Yuan, Yi Wen Guu, Samuel John George, William Raymond Hoffman, Jay Christopher Jacobs, Paul Andrew Steckler, Walter C Hsueh, Kendall D Keil, Burra Gopal, Steven D White, Paul J Leach, Richard B Ward, Philip Michael Smoot, Lijiang Fang, Michael B Taylor, Suresh Kannan, Winnie C Wu: Schema-based services for identity-based data access. Microsoft Corporation, L Alan Collins, February 16, 2010: US07664724 (20 worldwide citation)

A schema-based service for Internet access to per-user services data, wherein access to data is based on each user's identity. The service includes a schema that defines rules and a structure for each user's data, and also includes methods that provide access to the data in a defined way. The servic ...


5
Zoltan L Libertini, Alan R Duly, Steven D White: Electrode structure for a high temperature capacitance probe for sensing turbine speed. Avco Corporation, Ralph D Gelling, May 11, 1982: US04329644 (18 worldwide citation)

A probe is constructed for placement in the hot turbine section of a gas turbine engine. A housing containing two electrodes extends through the turbine shroud into the tip clearance area of the turbine rotor. A voltage impressed across the electrodes will generate an electric field in the vicinity ...


6
Roberta L Cascone, Steven D White: Biofeedback device. Bachman & LaPointe P C, June 17, 2003: US06579248 (8 worldwide citation)

The present invention relates to a biofeedback device for providing a wearer with instantaneous and continuous information about their posture. The device comprises a sensor unit affixed to the wearer, an attachment element affixed to the wearer, an elastic cord extending between the sensor unit and ...


7
Malcolm E Pearson, Leon R Warman, Robert G Atkinson, David R Reed, Steven D White, Bradford R Clark: Central console for monitoring configuration status for remote devices. Microsoft Corporation, Workman Nydegger, March 24, 2009: US07509678 (6 worldwide citation)

The present invention allows for remotely and securely configuring settings for targeted devices within a network with multiple security-trust boundaries. Configuration information is encoded in messages that are digitally signed to ensure the integrity of the configuration information and sent in a ...


8
Malcolm E Pearson, Leon R Warman, Robert G Atkinson, David R Reed, Steven D White, Bradford R Clark: Secure remote configuration of targeted devices using a standard message transport protocol. Microsoft Corporation, Workman Nydegger, April 7, 2009: US07516480 (4 worldwide citation)

The present invention allows for remotely and securely configuring settings for targeted devices within a network with multiple security-trust boundaries. Configuration information is encoded in messages that are digitally signed to ensure the integrity of the configuration information and sent in a ...


9
David A Braun, Daniel D Longley, Malcolm E Pearson, Steven D White: Bifurcation of messages in an extensible message transfer system. Microsoft Corporation, Woodcock Washburn, June 1, 2010: US07730140 (4 worldwide citation)

Within a mail transfer agent of a message transfer system, a message is received and if the recipient entity resolves to a number of recipients exceeding a specified quantity, the original message is not processed. Instead, at least two messages are created, with each of the created messages address ...


10
David A Braun, Daniel D Longley, Malcolm E Pearson, Steven D White: Reprocessing of messages in an extensible message transfer system. Microsoft Corporation, Woodstock Washburn, November 9, 2010: US07831669 (3 worldwide citation)

Within a mail transfer agent of a message transfer system, a message is received and if the recipient entity resolves to a number of recipients exceeding a specified quantity, the original message is not processed. Instead, at least two messages are created, with each of the created messages address ...