Patents by Inventor Barry Clayton BOND

Barry Clayton BOND has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20230052789
    Abstract: A unique embedded system is disclosed that locally operates an application virtual machine (VM) and a system VM in isolation from each other. The application VM executes application-specific code for a given purpose of the embedded system. The system VM executes a host operating system (OS) and various security, compatibility, and updating functions independent of the application VM. Each VM is connected to its own unique hardware on the embedded system to ensure that changes to the application code or the system code do not impact the other.
    Type: Application
    Filed: August 12, 2021
    Publication date: February 16, 2023
    Inventors: Ryan James FAIRFAX, Galen Clyde HUNT, Barry Clayton BOND, Kevin Thomas WESTON, JR.
  • Patent number: 10055242
    Abstract: Systems and methods for virtualizing audio decoding hardware of a guest audio decoder are disclosed. A method may include storing received encoded audio in main memory of a host computing device. An operation to access a register or memory of the audio decoding hardware of the guest audio decoder may be intercepted. The register or memory has an associated address in the main memory of the host computing device. The intercepted operation can include a register WRITE operation, and can be translated into an operation associated with accessing dedicated decoder memory of a host audio decoder of the host computing device.
    Type: Grant
    Filed: October 16, 2015
    Date of Patent: August 21, 2018
    Assignee: Microsoft Technology Licensing, LLC
    Inventors: Spencer Dean Perreault, Barry Clayton Bond, Jonathan David Morrison, Robert Binneweg Francis
  • Publication number: 20170110138
    Abstract: Systems and methods for virtualizing audio decoding hardware of a guest audio decoder are disclosed. A method may include storing received encoded audio in main memory of a host computing device. An operation to access a register or memory of the audio decoding hardware of the guest audio decoder may be intercepted. The register or memory has an associated address in the main memory of the host computing device. The intercepted operation can include a register WRITE operation, and can be translated into an operation associated with accessing dedicated decoder memory of a host audio decoder of the host computing device.
    Type: Application
    Filed: October 16, 2015
    Publication date: April 20, 2017
    Applicant: MICROSOFT TECHNOLOGY LICENSING, LLC
    Inventors: Spencer Dean Perreault, Barry Clayton Bond, Jonathan David Morrison, Robert Binneweg Francis
  • Patent number: 9544280
    Abstract: Various technologies pertaining to authenticating a password in a manner that prevents offline dictionary attacks are described. A protected module, which can be a hardware security module, a trusted platform module, or the like, is in communication with an authentication server. The protected module comprises a key that is restricted to the protected module. The key is employed in connection with authenticating the password on the protected module.
    Type: Grant
    Filed: February 19, 2016
    Date of Patent: January 10, 2017
    Assignee: Microsoft Technology Licensing, LLC
    Inventors: Stuart Edward Schechter, David Alexander Molnar, Jacob Rubin Lorch, Barry Clayton Bond, Bryan Jeffrey Parno
  • Patent number: 9424081
    Abstract: Examples of the disclosure enable callback operations, such as interrupts, Asynchronous Procedure Calls (APCs), and Deferred Procedure Calls (DPCs), to be efficiently managed. In some examples, an emulated thread includes a request for a callback operation. When the request is detected, the emulated thread and/or a cooperating thread associated with the callback operation is executed based on an execution mode associated with the callback operation. Examples of the disclosure manage callback operations while efficiently managing system resources, including processor load, by providing at least one cooperating thread that consumes little or no processing power until the callback operation is ready to be executed.
    Type: Grant
    Filed: December 15, 2014
    Date of Patent: August 23, 2016
    Assignee: Microsoft Technology Licensing, LLC
    Inventor: Barry Clayton Bond
  • Publication number: 20160173461
    Abstract: Various technologies pertaining to authenticating a password in a manner that prevents offline dictionary attacks are described. A protected module, which can be a hardware security module, a trusted platform module, or the like, is in communication with an authentication server. The protected module comprises a key that is restricted to the protected module. The key is employed in connection with authenticating the password on the protected module.
    Type: Application
    Filed: February 19, 2016
    Publication date: June 16, 2016
    Inventors: Stuart Edward Schechter, David Alexander Molnar, Jacob Rubin Lorch, Barry Clayton Bond, Bryan Jeffrey Parno
  • Publication number: 20160170797
    Abstract: Examples of the disclosure enable callback operations, such as interrupts, Asynchronous Procedure Calls (APCs), and Deferred Procedure Calls (DPCs), to be efficiently managed. In some examples, an emulated thread includes a request for a callback operation. When the request is detected, the emulated thread and/or a cooperating thread associated with the callback operation is executed based on an execution mode associated with the callback operation. Examples of the disclosure manage callback operations while efficiently managing system resources, including processor load, by providing at least one cooperating thread that consumes little or no processing power until the callback operation is ready to be executed.
    Type: Application
    Filed: December 15, 2014
    Publication date: June 16, 2016
    Inventor: Barry Clayton Bond
  • Patent number: 9294281
    Abstract: Various technologies pertaining to authenticating a password in a manner that prevents offline dictionary attacks are described. A protected module, which can be a hardware security module, a trusted platform module, or the like, is in communication with an authentication server. The protected module comprises a key that is restricted to the protected module. The key is employed in connection with authenticating the password on the protected module.
    Type: Grant
    Filed: February 10, 2012
    Date of Patent: March 22, 2016
    Assignee: Microsoft Technology Licensing, LLC
    Inventors: Stuart Edward Schechter, David Alexander Molnar, Jacob Rubin Lorch, Barry Clayton Bond, Bryan Jeffrey Parno
  • Patent number: 9262228
    Abstract: A method that can be used in a distributed workflow system that uses loosely coupled computation of stateless nodes to bring computation tasks to the compute nodes is disclosed. The method can be employed in a computing system, such as cloud computing system, that can generate a computing task separable into work units and performed by a set of distributed and decentralized workers. In one example, the method arranges the work units into a directed acyclic graph representing execution priorities between the work units. The plurality of distributed and decentralized workers query the directed acyclic graph for work units ready for execution based upon the directed acyclic graph. In one example, the method is included in a computer readable storage medium as a software program.
    Type: Grant
    Filed: September 23, 2010
    Date of Patent: February 16, 2016
    Assignee: Microsoft Technology Licensing, LLC
    Inventors: Barry Clayton Bond, Savas Parastatidas
  • Patent number: 8549464
    Abstract: A reusable expression graph system and method that generates reusable expression graphs that can be used with potentially different input parameters in order to achieve computational efficiency and ease of programming. Reusable expression graph mitigate the need to rebuild an expression for each new value. This is achieved in part by creating a node called a “parameter node.” The parameter node acts as a generic placeholder for a leaf node in the expression graph. In addition, the parameter node acts as a proxy for a bindable term of the leaf node, and the bindable term can be either a value or one or more additional expressions. The parameter node then is bound to the bindable term and the expression is evaluated with that bindable term instead of the placeholder. The parameter node created by embodiments of the reusable expression graph system and method works across many different programming languages.
    Type: Grant
    Filed: November 22, 2010
    Date of Patent: October 1, 2013
    Assignee: Microsoft Corporation
    Inventors: Barry Clayton Bond, Vivian Sewelson, Daniel Johannes Pieter Leijin, Lubomir Boyanov Litchev
  • Publication number: 20130212385
    Abstract: Various technologies pertaining to authenticating a password in a manner that prevents offline dictionary attacks are described. A protected module, which can be a hardware security module, a trusted platform module, or the like, is in communication with an authentication server. The protected module comprises a key that is restricted to the protected module. The key is employed in connection with authenticating the password on the protected module.
    Type: Application
    Filed: February 10, 2012
    Publication date: August 15, 2013
    Applicant: MICROSOFT CORPORATION
    Inventors: Stuart Edward Schechter, David Alexander Molnar, Jacob Rubin Lorch, Barry Clayton Bond, Bryan Jeffrey Parno
  • Publication number: 20130054734
    Abstract: Architecture that facilitates seamless migration of server-hosted code to the client machine and back. Migration is of a running instance of a process by communicating only a small amount of state data, which makes this feasible over current network connection speeds. The web browsing experience for applications is retained. The migration capabilities are facilitated by an operating construction, referred to as the library OS (operating system) system in a context of state and execution migration between server and client. An application binary interface is provided that resides below the library OS to provide the state and execution mobility.
    Type: Application
    Filed: August 23, 2011
    Publication date: February 28, 2013
    Applicant: Microsoft Corporation
    Inventors: Barry Clayton Bond, Reuben R. Olinsky, Galen C. Hunt
  • Publication number: 20120131537
    Abstract: A reusable expression graph system and method that generates reusable expression graphs that can be used with potentially different input parameters in order to achieve computational efficiency and ease of programming. Reusable expression graph mitigate the need to rebuild an expression for each new value. This is achieved in part by creating a node called a “parameter node.” The parameter node acts as a generic placeholder for a leaf node in the expression graph. In addition, the parameter node acts as a proxy for a bindable term of the leaf node, and the bindable term can be either a value or one or more additional expressions. The parameter node then is bound to the bindable term and the expression is evaluated with that bindable term instead of the placeholder. The parameter node created by embodiments of the reusable expression graph system and method works across many different programming languages.
    Type: Application
    Filed: November 22, 2010
    Publication date: May 24, 2012
    Applicant: Microsoft Corporation
    Inventors: Barry Clayton Bond, Vivian Sewelson, Daniel Johannes Pieter Leijin, Lubomir Boyanov Litchev
  • Publication number: 20120079490
    Abstract: A method that can be used in a distributed workflow system that uses loosely coupled computation of stateless nodes to bring computation tasks to the compute nodes is disclosed. The method can be employed in a computing system, such as cloud computing system, that can generate a computing task separable into work units and performed by a set of distributed and decentralized workers. In one example, the method arranges the work units into a directed acyclic graph representing execution priorities between the work units. The plurality of distributed and decentralized workers query the directed acyclic graph for work units ready for execution based upon the directed acyclic graph. In one example, the method is included in a computer readable storage medium as a software program.
    Type: Application
    Filed: September 23, 2010
    Publication date: March 29, 2012
    Applicant: MICROSOFT CORPORATION
    Inventors: Barry Clayton BOND, Savas PARASTATIDAS