Patents by Inventor Barry Clayton BOND
Barry Clayton BOND has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Publication number: 20230052789Abstract: A unique embedded system is disclosed that locally operates an application virtual machine (VM) and a system VM in isolation from each other. The application VM executes application-specific code for a given purpose of the embedded system. The system VM executes a host operating system (OS) and various security, compatibility, and updating functions independent of the application VM. Each VM is connected to its own unique hardware on the embedded system to ensure that changes to the application code or the system code do not impact the other.Type: ApplicationFiled: August 12, 2021Publication date: February 16, 2023Inventors: Ryan James FAIRFAX, Galen Clyde HUNT, Barry Clayton BOND, Kevin Thomas WESTON, JR.
-
Patent number: 10055242Abstract: Systems and methods for virtualizing audio decoding hardware of a guest audio decoder are disclosed. A method may include storing received encoded audio in main memory of a host computing device. An operation to access a register or memory of the audio decoding hardware of the guest audio decoder may be intercepted. The register or memory has an associated address in the main memory of the host computing device. The intercepted operation can include a register WRITE operation, and can be translated into an operation associated with accessing dedicated decoder memory of a host audio decoder of the host computing device.Type: GrantFiled: October 16, 2015Date of Patent: August 21, 2018Assignee: Microsoft Technology Licensing, LLCInventors: Spencer Dean Perreault, Barry Clayton Bond, Jonathan David Morrison, Robert Binneweg Francis
-
Publication number: 20170110138Abstract: Systems and methods for virtualizing audio decoding hardware of a guest audio decoder are disclosed. A method may include storing received encoded audio in main memory of a host computing device. An operation to access a register or memory of the audio decoding hardware of the guest audio decoder may be intercepted. The register or memory has an associated address in the main memory of the host computing device. The intercepted operation can include a register WRITE operation, and can be translated into an operation associated with accessing dedicated decoder memory of a host audio decoder of the host computing device.Type: ApplicationFiled: October 16, 2015Publication date: April 20, 2017Applicant: MICROSOFT TECHNOLOGY LICENSING, LLCInventors: Spencer Dean Perreault, Barry Clayton Bond, Jonathan David Morrison, Robert Binneweg Francis
-
Patent number: 9544280Abstract: Various technologies pertaining to authenticating a password in a manner that prevents offline dictionary attacks are described. A protected module, which can be a hardware security module, a trusted platform module, or the like, is in communication with an authentication server. The protected module comprises a key that is restricted to the protected module. The key is employed in connection with authenticating the password on the protected module.Type: GrantFiled: February 19, 2016Date of Patent: January 10, 2017Assignee: Microsoft Technology Licensing, LLCInventors: Stuart Edward Schechter, David Alexander Molnar, Jacob Rubin Lorch, Barry Clayton Bond, Bryan Jeffrey Parno
-
Patent number: 9424081Abstract: Examples of the disclosure enable callback operations, such as interrupts, Asynchronous Procedure Calls (APCs), and Deferred Procedure Calls (DPCs), to be efficiently managed. In some examples, an emulated thread includes a request for a callback operation. When the request is detected, the emulated thread and/or a cooperating thread associated with the callback operation is executed based on an execution mode associated with the callback operation. Examples of the disclosure manage callback operations while efficiently managing system resources, including processor load, by providing at least one cooperating thread that consumes little or no processing power until the callback operation is ready to be executed.Type: GrantFiled: December 15, 2014Date of Patent: August 23, 2016Assignee: Microsoft Technology Licensing, LLCInventor: Barry Clayton Bond
-
Publication number: 20160173461Abstract: Various technologies pertaining to authenticating a password in a manner that prevents offline dictionary attacks are described. A protected module, which can be a hardware security module, a trusted platform module, or the like, is in communication with an authentication server. The protected module comprises a key that is restricted to the protected module. The key is employed in connection with authenticating the password on the protected module.Type: ApplicationFiled: February 19, 2016Publication date: June 16, 2016Inventors: Stuart Edward Schechter, David Alexander Molnar, Jacob Rubin Lorch, Barry Clayton Bond, Bryan Jeffrey Parno
-
Publication number: 20160170797Abstract: Examples of the disclosure enable callback operations, such as interrupts, Asynchronous Procedure Calls (APCs), and Deferred Procedure Calls (DPCs), to be efficiently managed. In some examples, an emulated thread includes a request for a callback operation. When the request is detected, the emulated thread and/or a cooperating thread associated with the callback operation is executed based on an execution mode associated with the callback operation. Examples of the disclosure manage callback operations while efficiently managing system resources, including processor load, by providing at least one cooperating thread that consumes little or no processing power until the callback operation is ready to be executed.Type: ApplicationFiled: December 15, 2014Publication date: June 16, 2016Inventor: Barry Clayton Bond
-
Patent number: 9294281Abstract: Various technologies pertaining to authenticating a password in a manner that prevents offline dictionary attacks are described. A protected module, which can be a hardware security module, a trusted platform module, or the like, is in communication with an authentication server. The protected module comprises a key that is restricted to the protected module. The key is employed in connection with authenticating the password on the protected module.Type: GrantFiled: February 10, 2012Date of Patent: March 22, 2016Assignee: Microsoft Technology Licensing, LLCInventors: Stuart Edward Schechter, David Alexander Molnar, Jacob Rubin Lorch, Barry Clayton Bond, Bryan Jeffrey Parno
-
Patent number: 9262228Abstract: A method that can be used in a distributed workflow system that uses loosely coupled computation of stateless nodes to bring computation tasks to the compute nodes is disclosed. The method can be employed in a computing system, such as cloud computing system, that can generate a computing task separable into work units and performed by a set of distributed and decentralized workers. In one example, the method arranges the work units into a directed acyclic graph representing execution priorities between the work units. The plurality of distributed and decentralized workers query the directed acyclic graph for work units ready for execution based upon the directed acyclic graph. In one example, the method is included in a computer readable storage medium as a software program.Type: GrantFiled: September 23, 2010Date of Patent: February 16, 2016Assignee: Microsoft Technology Licensing, LLCInventors: Barry Clayton Bond, Savas Parastatidas
-
Patent number: 8549464Abstract: A reusable expression graph system and method that generates reusable expression graphs that can be used with potentially different input parameters in order to achieve computational efficiency and ease of programming. Reusable expression graph mitigate the need to rebuild an expression for each new value. This is achieved in part by creating a node called a “parameter node.” The parameter node acts as a generic placeholder for a leaf node in the expression graph. In addition, the parameter node acts as a proxy for a bindable term of the leaf node, and the bindable term can be either a value or one or more additional expressions. The parameter node then is bound to the bindable term and the expression is evaluated with that bindable term instead of the placeholder. The parameter node created by embodiments of the reusable expression graph system and method works across many different programming languages.Type: GrantFiled: November 22, 2010Date of Patent: October 1, 2013Assignee: Microsoft CorporationInventors: Barry Clayton Bond, Vivian Sewelson, Daniel Johannes Pieter Leijin, Lubomir Boyanov Litchev
-
Publication number: 20130212385Abstract: Various technologies pertaining to authenticating a password in a manner that prevents offline dictionary attacks are described. A protected module, which can be a hardware security module, a trusted platform module, or the like, is in communication with an authentication server. The protected module comprises a key that is restricted to the protected module. The key is employed in connection with authenticating the password on the protected module.Type: ApplicationFiled: February 10, 2012Publication date: August 15, 2013Applicant: MICROSOFT CORPORATIONInventors: Stuart Edward Schechter, David Alexander Molnar, Jacob Rubin Lorch, Barry Clayton Bond, Bryan Jeffrey Parno
-
Publication number: 20130054734Abstract: Architecture that facilitates seamless migration of server-hosted code to the client machine and back. Migration is of a running instance of a process by communicating only a small amount of state data, which makes this feasible over current network connection speeds. The web browsing experience for applications is retained. The migration capabilities are facilitated by an operating construction, referred to as the library OS (operating system) system in a context of state and execution migration between server and client. An application binary interface is provided that resides below the library OS to provide the state and execution mobility.Type: ApplicationFiled: August 23, 2011Publication date: February 28, 2013Applicant: Microsoft CorporationInventors: Barry Clayton Bond, Reuben R. Olinsky, Galen C. Hunt
-
Publication number: 20120131537Abstract: A reusable expression graph system and method that generates reusable expression graphs that can be used with potentially different input parameters in order to achieve computational efficiency and ease of programming. Reusable expression graph mitigate the need to rebuild an expression for each new value. This is achieved in part by creating a node called a “parameter node.” The parameter node acts as a generic placeholder for a leaf node in the expression graph. In addition, the parameter node acts as a proxy for a bindable term of the leaf node, and the bindable term can be either a value or one or more additional expressions. The parameter node then is bound to the bindable term and the expression is evaluated with that bindable term instead of the placeholder. The parameter node created by embodiments of the reusable expression graph system and method works across many different programming languages.Type: ApplicationFiled: November 22, 2010Publication date: May 24, 2012Applicant: Microsoft CorporationInventors: Barry Clayton Bond, Vivian Sewelson, Daniel Johannes Pieter Leijin, Lubomir Boyanov Litchev
-
Publication number: 20120079490Abstract: A method that can be used in a distributed workflow system that uses loosely coupled computation of stateless nodes to bring computation tasks to the compute nodes is disclosed. The method can be employed in a computing system, such as cloud computing system, that can generate a computing task separable into work units and performed by a set of distributed and decentralized workers. In one example, the method arranges the work units into a directed acyclic graph representing execution priorities between the work units. The plurality of distributed and decentralized workers query the directed acyclic graph for work units ready for execution based upon the directed acyclic graph. In one example, the method is included in a computer readable storage medium as a software program.Type: ApplicationFiled: September 23, 2010Publication date: March 29, 2012Applicant: MICROSOFT CORPORATIONInventors: Barry Clayton BOND, Savas PARASTATIDAS