Patents by Inventor James M. Lyon

James M. Lyon has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 7398315
    Abstract: The present invention provides for generating inputs that can be provided to a message classification module to facilitate more reliable classification of electronic messages, such as, for example, as unwanted and/or unsolicited. In one embodiment, a sending messaging server provides an appropriate response to address verification data thereby indicating a reduced likelihood of the sending messaging server using a forged network address. In another embodiment, it is determined if a messaging server is authorized to send electronic messages for a domain. In yet another embodiment, electronic message transmission policies adhered to by a domain are identified. In yet a further embodiment, a sending computer system expends computational resources to solve a computational puzzle and includes an answer document in an electronic message. A receiving computer system receives the electronic message and verifies the answer document.
    Type: Grant
    Filed: October 10, 2003
    Date of Patent: July 8, 2008
    Assignee: Workman Nydegger
    Inventors: Robert George Atkinson, Joshua T. Goodman, James M. Lyon, Roy Williams, Khaja E. Ahmed, Harry Simon Katz, Robert L. Rounthwaite
  • Publication number: 20040181571
    Abstract: The present invention provides for generating inputs that can be provided to a message classification module to facilitate more reliable classification of electronic messages, such as, for example, as unwanted and/or unsolicited. In one embodiment, a sending messaging server provides an appropriate response to address verification data thereby indicating a reduced likelihood of the sending messaging server using a forged network address. In another embodiment, it is determined if a messaging server is authorized to send electronic messages for a domain. In yet another embodiment, electronic message transmission policies adhered to by a domain are identified. In yet a further embodiment, a sending computer system expends computational resources to solve a computational puzzle and includes an answer document in an electronic message. A receiving computer system receives the electronic message and verifies the answer document.
    Type: Application
    Filed: October 10, 2003
    Publication date: September 16, 2004
    Inventors: Robert George Atkinson, Joshua T. Goodman, James M. Lyon, Roy Williams, Khaja E. Ahmed, Harry Simon Katz, Robert L. Rounthwaite
  • Publication number: 20040181585
    Abstract: The present invention provides for generating inputs that can be provided to a message classification module to facilitate more reliable classification of electronic messages, such as, for example, as unwanted and/or unsolicited. In one embodiment, a sending messaging server provides an appropriate response to address verification data thereby indicating a reduced likelihood of the sending messaging server using a forged network address. In another embodiment, it is determined if a messaging server is authorized to send electronic messages for a domain. In yet another embodiment, electronic message transmission policies adhered to by a domain are identified. In yet a further embodiment, a sending computer system expends computational resources to solve a computational puzzle and includes an answer document in an electronic message. A receiving computer system receives the electronic message and verifies the answer document.
    Type: Application
    Filed: October 10, 2003
    Publication date: September 16, 2004
    Inventors: Robert George Atkinson, Joshua T. Goodman, James M. Lyon, Roy Williams, Khaja E. Ahmed, Harry Simon Katz, Robert L. Rounthwaite, Andrew V. Goldberg, Cynthia Dwork
  • Publication number: 20040068732
    Abstract: Communication among agile objects and context-bound objects within object-oriented programming environments, including communication across contextual boundaries, is disclosed. In one embodiment, a reference to a second object within a second context is wrapped in a proxy wrapper. A first object within a first context calls the second object via the wrapped reference. No direct reference is held by the first object to the second object. Other embodiments relate to agile objects. Agile objects called by context-bound objects execute in the contexts of their callers. The context of a calling context-bound object becomes the context of an agile object for calling of the agile object by the calling context-bound object. Direct reference to the agile object by the context-bound object is thus permitted.
    Type: Application
    Filed: August 4, 2003
    Publication date: April 8, 2004
    Applicant: Microsoft Corporation
    Inventors: Christopher W. Brumme, James M. Lyon, Michael J. Toutonghi, Satish R. Thatte, Gopal Krishna R. Kakivaya, Richard D. Hill, Jans S. Gray, Craig H. Wittenberg, Rebecca A. Norlander, Scott G. Robinson, Eric W. Johnson
  • Publication number: 20030074413
    Abstract: A routing protocol is provided for exchanging messages between an initial sender and an ultimate receiver, potentially via a set of intermediaries. The routing protocol provides an optional reverse message path that enables two-way message exchange patterns. The routing protocol can be expressed as a header entry within a message envelope, is independent of the underlying protocol, and can be generated at the application layer of a protocol stack. The routing protocol may allow each intermediary to process the message and dynamically alter the message path en route to the intended recipient.
    Type: Application
    Filed: October 15, 2002
    Publication date: April 17, 2003
    Applicant: Microsoft Corporation
    Inventors: Henrik F. Nielsen, John P. Shewchuk, Erik B. Christensen, Alfred M. Lee, Christian Huitema, James M. Lyon, Mark H. Lukovsky, Andrew J. Layman, Satish R. Thatte, Christopher Kaler
  • Patent number: 6546443
    Abstract: Synchronization services provide a concurrency-safe reader/writer lock supporting a time out feature. The lock can be implemented using lockless data structures to provide efficient synchronization services. Various features such as lock nesting and auto-transformation address common scenarios arising in componentized programs. The lock supports upgrading and suspension, and the time out feature can support an efficient, low-cost optimistic deadlock avoidance scheme. Peculiarities of the reader/writer scenario are addressed in an efficient way to maintain lock stability and consistency, thus providing synchronization services suitable for implementation at the kernel level. In one implementation using event objects, the events are managed for high efficiency and stability of the lock. For multiprocessor machines, a hybrid lock avoids a context switch by behaving as a spin lock before waiting for the lock to become available.
    Type: Grant
    Filed: December 15, 1999
    Date of Patent: April 8, 2003
    Assignee: Microsoft Corporation
    Inventors: Gopala Krishna R. Kakivaya, David N. Cutler, James M. Lyon
  • Publication number: 20020163109
    Abstract: A procedure is provided for bringing an incompletely densified cast radome to a desired final or near final shape through the use of one or more conformal tools during a high temperature firing operation. A conformal firing tool is defined in this case as a mandrel or mold made from a high temperature material, such as a graphite composite, that represents the desired shape of the finished radome. The process consists of firing the cast radome body over a mandrel, or inside a mold, or in combination with the two, such that the tools impart a desired dimensionality to the cast part as it densities and flows at high temperature.
    Type: Application
    Filed: March 26, 2002
    Publication date: November 7, 2002
    Applicant: RAYTHEON COMPANY
    Inventors: Kevin W. Kirby, Anthony T. Jankiewicz, James M. Lyon, Joseph W. Barber
  • Patent number: 6442620
    Abstract: An object system provides composable object execution environment extensions with an object model that defines a framework with contexts, policies, policy makers and activators that act as object creation-time, reference creation-time and call-time event sinks to provide processing of effects specific to the environment extensions. At object creation time, an object instantiation service of the object system delegates to the activators to establish a context in which the object is created. The context contains context properties that represent particular of the composable environment extensions in which the object is to execute. The context properties also can act as policy makers that contribute policies to an optimized policy set for references that cross context boundaries. The policies in such optimized sets are issued policy events on calls across the context boundary to process effects of switching between the environment extensions of the two contexts.
    Type: Grant
    Filed: August 17, 1998
    Date of Patent: August 27, 2002
    Assignee: Microsoft Corporation
    Inventors: Satish R. Thatte, Richard D. Hill, Jan S. Gray, Gopal Krishna R. Kakivaya, Craig H. Wittenberg, James M. Lyon, Rebecca A. Norlander, Eric W. Johnson, Scott G. Robinson
  • Patent number: 6041420
    Abstract: A fault tolerant computer system distributes audit trail files containing audit records, across an arbitrary number of disk volumes. After one audit trail file becomes full, audit records are directed toward a next audit trail file stored on a different disk volume. Storage of newly generated audit rotates through the disk volumes in round-robin fashion. Full audit trail files are eventually archived and their space becomes available again for renaming and storage of newly generated audit records. The number of audit records available for on-line recovery after a failure is not limited to the storage capacity of any single disk volume. Furthermore, there is no contention for disk access between archiving of full audit trail files and storage of newly generated audit records.
    Type: Grant
    Filed: March 3, 1998
    Date of Patent: March 21, 2000
    Assignee: Tandem Computers Incorporated
    Inventors: Michael J. Skarpelos, Robbert van der Linden, William J. Carley, James M. Lyon, Matthew C. McCline
  • Patent number: 5978914
    Abstract: System-critical files are protected from being inadvertently modified or deleted by placing them in a Reserve name space of storage that requires any process seeking modifying access to the Reserve name space to have a "Right" to do so. The right to modifying access is garnered by a process first making a call to a system library procedure that causes a memory-stored data structure associated with the calling process to be modified, identifying the process as one with a Right to make modifying access to the Reserve name space. Any attempt to modify, delete, or create any file residing in the Reserve name space without the Right will be refused.
    Type: Grant
    Filed: January 23, 1995
    Date of Patent: November 2, 1999
    Assignee: Tandem Computers Incorporated
    Inventors: William J. Carley, James M. Lyon, Matthew C. McCline, Michael J. Skarpelos
  • Patent number: 5832203
    Abstract: An improved recovery method utilizes sequence numbers to order log records and reduce the excess compensating actions due to a failure during recovery. Next undo records are written to the log after a preset number of compensating actions which include the sequence number of the record currently being scanned. After a failure, all records between the next undo record and the record having the sequence number included in the next undo record are ignored during when the log is scanned backwards.
    Type: Grant
    Filed: January 23, 1995
    Date of Patent: November 3, 1998
    Assignee: Tandem Computers Incorporated
    Inventors: Franco Putzolu, Steven R. Pearson, James M. Lyon, Malcolm Mosher, Jr.
  • Patent number: 5590274
    Abstract: A fault tolerant computer system distributes audit trail files containing audit records, across an arbitrary number of disk volumes. After one audit trail file becomes full, audit records are directed toward a next audit trail file stored on a different disk volume. Storage of newly generated audit rotates through the disk volumes in round-robin fashion. Full audit trail files are eventually archived and their space becomes available again for renaming and storage of newly generated audit records. The number of audit records available for on-line recovery after a failure is not limited to the storage capacity of any single disk volume. Furthermore, there is no contention for disk access between archiving of full audit trail files and storage of newly generated audit records.
    Type: Grant
    Filed: January 23, 1995
    Date of Patent: December 31, 1996
    Assignee: Tandem Computers Incorporated
    Inventors: Michael J. Skarpelos, Robbert van der Linden, William J. Carley, James M. Lyon, Matthew C. McCline
  • Patent number: 5576945
    Abstract: A multiple processor system includes at least one process pair each including a plurality of modules. The modules perform functions related to multiple independent threads, and are arranged in a predetermined order such that higher modules are dependent upon lower modules, and lower modules are independent from higher modules. Each process pair is initially unaware of the number and order of the modules. The order of the modules is related to dependency and interdependency between the modules so that there is a portion of higher modules and a portion of lower modules. Multiple independent threads process the modules to cause activities in the portions of higher modules to take place before activities in the portions of lower modules.
    Type: Grant
    Filed: January 23, 1995
    Date of Patent: November 19, 1996
    Assignee: Tandem Computers Incorporated
    Inventors: Matthew C. McCline, James M. Lyon
  • Patent number: 4819267
    Abstract: A semiconductor device that functions as a key to control access to a computer or a software program resident in a computer or provides for secure communications is disclosed. The device executes an algorithm that combines a root and a seed to produce a password. The password is input to the computer. The computer uses an equivalent algorithm to produce a password within the computer. Comparison or other methods are employed to allow access to the computer or computer program or to allow for secure communications. The computer can be coded to produce on a video display thereof a time-space stimulus pattern which can be received by sensors of the key. Alternatively, a keypad can be employed to input the stimulus output from the computer into the access key. Further the present system allows for secure communication using algorithms between different computers and between distant locations.
    Type: Grant
    Filed: June 9, 1987
    Date of Patent: April 4, 1989
    Assignee: Thumbscan, Inc.
    Inventors: William P. Cargile, Richard D. Freeman, James M. Lyon