Patents by Inventor Boyd Multerer
Boyd Multerer has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Publication number: 20240028691Abstract: Systems and methods are directed to capability-restricted system control. In some embodiments, during the instantiation of a requesting entity in a system, the requesting entity is granted a specific set of capabilities. In these examples, capabilities used by a responding entity to fulfil a request from a requesting entity are limited to the capabilities granted the responding entity by the requesting entity. When granting the capabilities to the responding entity, the granted capabilities are restricted from use by the requesting entity. Once the request is fulfilled by the responding entity, the restrictions on the capabilities are removed, allowing the requesting entity to use those capabilities in a further request.Type: ApplicationFiled: July 25, 2022Publication date: January 25, 2024Applicant: KRY10 Ltd.Inventors: Boyd Multerer, Kent McLeod, Matthew Brecknell, Ihor Kuz
-
Publication number: 20070220031Abstract: A data provider application programming interface (API) is configured for use with a game content editing application. An asset relationship management file, which is generated with the data provider API, includes information such as relationship references and annotations and is updated by the data provider API when a digital asset is edited. The asset relationship management file is then stored in a data store. An asset relationship graph is generated, based on the asset relationship management file in the data store. The asset relationship graph includes asset graph nodes that map dependency relationships between asset files. A graph API is also described. The graph API is configured for accessing the relationship graph through a server process to expose dependency relationships and annotations to a client process, such as an application. Thus, the effect of changes to one asset on other assets can readily be evaluated.Type: ApplicationFiled: January 31, 2006Publication date: September 20, 2007Applicant: Microsoft CorporationInventors: Mel MacMahon, Boyd Multerer, Frank Savage, Josefa Nalewabau, Nicolas Gauvin, Shawn Hargreaves
-
Publication number: 20070178968Abstract: Methods, systems, and software products are described that display relationships between game assets in a game development environment. In one implementation, a selection of a particular game asset is received, and a selection of a particular type of relationship is received to display for the selected game asset. The type of relationship may be a parent relationship, a child relationship, a category relationship, etc. Other game assets are then identified that have the selected relationship with the selected game asset. The other game assets that are identified are displayed to a user.Type: ApplicationFiled: January 31, 2006Publication date: August 2, 2007Applicant: Microsoft CorporationInventors: Rejean Cote-Charpentier, Nicolas Gauvin, Shawn Hargreaves, Mel MacMahon, Boyd Multerer, Frank Savage
-
Publication number: 20070173324Abstract: Groups are formed, in a computer-based (e.g., on-line) gaming environment, based on social relationships between players. The group is assigned an identity. The identity of the group is maintained within a single game title, across multiple sessions of a game title, and across multiple game titles. The group can interact within the gaming environment much like an individual user can interact. Group interaction provides a mechanism for social and cooperative game play. Groups can play games with other groups. Group members can play games with each other. Group statistics and achievements can be accumulated and aggregated. Group profiles provide information about the group, such as a list of the members of the group. Via group profiles, a member of a group can see information about other members of the group, such as other groups to which they belong. Group members can send and receive intra-group messages.Type: ApplicationFiled: January 20, 2006Publication date: July 26, 2007Applicant: Microsoft CorporationInventors: Boyd Multerer, Jerry Johnson, Johan Hansen, Michal Bortnik, Patrick O'Kelley
-
Publication number: 20070123352Abstract: Executable content for use is preemptively loaded in order to allow the content to be used when requested by a user without the significant download delay which would otherwise be required. The executable content is downloaded without the user's specific request. When the content is to be used, additional data, such as license data or a password which may be purchased, may be required to access the full functionality of the executable content. Where the executable content is a game, the preemptive loading may be to a personal computer rather than a game console, in order to take advantage of the storage space traditionally available in such a personal computer. Content is loaded based on system information, which may include, without limitation, information about the system, the user of the system, and/or community information regarding a community the user belongs to or users similar to the user, among other information.Type: ApplicationFiled: November 30, 2005Publication date: May 31, 2007Applicant: Microsoft CorporationInventors: Boyd Multerer, Dax Hawkins, Megan Tedesco, Jeffrey Bernhardt
-
Publication number: 20070010334Abstract: A console-based multi-user authentication process allows multiple users of a game console to be authenticated together in a single request/reply exchange with an authentication entity. The results of which is the possession of a single ticket that can be used to prove authenticity of multiple authentication principals to one or more online services. Also described is a handshake process that can be used to initially establish an authentication account for each game console, in which the account creation server can trust that a genuine game console is making the request.Type: ApplicationFiled: September 8, 2006Publication date: January 11, 2007Applicant: Microsoft CorporationInventors: Boyd Multerer, Ling Chen, Darren Anderson
-
Publication number: 20060206596Abstract: Systems and methods are provided for an extensive content build pipeline. The exemplary content build pipeline is based on a code build process using a standard XIF file format containing reference to game content produced using various game content editors and tools. This standardized file format is capable of containing the information required by the content build as metadata, thus enabling a standard content build pipeline. This is opposed to being based on a number of game-specific formats and thus requiring the use of exporters. However, game engine developers can then optimize the XIF files to their particular game engine format.Type: ApplicationFiled: March 9, 2005Publication date: September 14, 2006Inventors: Boyd Multerer, Frank Savage, Josefa Nalewabau
-
Publication number: 20060085641Abstract: A console-based multi-user authentication process allows multiple users of a game console to be authenticated together in a single request/reply exchange with an authentication entity. The results of which is the possession of a single ticket that can be used to prove authenticity of multiple authentication principals to one or more online services. Also described is a handshake process that can be used to initially establish an authentication account for each game console, in which the account creation server can trust that a genuine game console is making the request.Type: ApplicationFiled: November 30, 2005Publication date: April 20, 2006Applicant: Microsoft CorporationInventors: Boyd Multerer, Ling Chen, Darren Anderson
-
Publication number: 20060085642Abstract: A console-based multi-user authentication process allows multiple users of a game console to be authenticated together in a single request/reply exchange with an authentication entity. The results of which is the possession of a single ticket that can be used to prove authenticity of multiple authentication principals to one or more online services. Also described is a handshake process that can be used to initially establish an authentication account for each game console, in which the account creation server can trust that a genuine game console is making the request.Type: ApplicationFiled: November 30, 2005Publication date: April 20, 2006Applicant: Microsoft CorporationInventors: Boyd Multerer, Ling Chen, Darren Anderson
-
Publication number: 20060064761Abstract: The use of software is licensed on a particular central processing unit (CPU) residing on a computing device. A code is generated at a central service and provided to a third party publisher, such as a third party website, a vending machine, a retailer, or a phone service provider, for example. The third party publisher then provides the code to a user, who provides it to the computing device, which in turn, unlocks the appropriate software (or features of software) residing on, or being used in conjunction with, the computing device. The unlocking code may be provided to a storage device such as a memory unit that is plugged into or otherwise attached to the computing device running the software, or may be provided to the user who enters the code manually. The unlocking code may unlock the entire software application, or just particular features of the software, such as a higher level of a game or a working version of an application that was otherwise provided as a demo version.Type: ApplicationFiled: September 22, 2004Publication date: March 23, 2006Applicant: Microsoft CorporationInventors: Boyd Multerer, Ling Chen
-
Publication number: 20060064349Abstract: A system and method for rewarding sellers of computing devices involves receiving information that authorization to use a software product on a computing device has been obtained by a user of the computing device. The received information includes a unique identifier of the computing device. An identity of a seller of the computing device is then determined based at least in part on the received unique identifier. Remuneration is then provided to the seller of the computing device.Type: ApplicationFiled: September 22, 2004Publication date: March 23, 2006Applicant: Microsoft CorporationInventors: Boyd Multerer, Cameron Ferroni
-
Publication number: 20060048236Abstract: The use of software is licensed to a particular user, regardless of the computing device on which the software has been launched. A computing device is logged onto a central service. The central service either directly approves the launching of the software or it provides a code to the computing device, which in turn, unlocks the appropriate software (or features of software) residing on, or being used in conjunction with, the computing device. The approval or unlocking code may be provided after payment or another condition is satisfied. The software is usable on any computing device that is logged onto a central server, via a user's valid account. The central service may unlock the software for the entire time a user is logged in to the central service, or there may be a time limit that the user is able to access the software.Type: ApplicationFiled: September 1, 2004Publication date: March 2, 2006Applicant: Microsoft CorporationInventors: Boyd Multerer, Ling Chen
-
Publication number: 20060048132Abstract: Software is licensed for use on a particular computing device, such as a gaming console or a multimedia console. An unlocking code is provided from a distribution service to the computing device (either directly or via a user), which in turn, unlocks the appropriate software or portion of software for use with the associated computing device. The software may reside on a computer-readable medium, such as a CD-ROM or DVD disk, that is being used in conjunction with the computing device. The unlocking code may be provided directly to the user in private (e.g., via email or a mobile phone) or in public (e.g., published on a website). Portions of the software that may be unlocked include a particular level of a game or other features (such as additional characters or weapons), or a working or more advanced version of an application that was otherwise provided as a demo or older version.Type: ApplicationFiled: September 1, 2004Publication date: March 2, 2006Applicant: Microsoft CorporationInventors: Ling Chen, Boyd Multerer
-
Publication number: 20050262173Abstract: A virtual applications architecture is provided according to the present invention. The architecture includes a topology manager for managing applications across a plurality of members, and a virtual applications manager for defining a plurality of resources comprising the applications. The topology manager communicates with the plurality of members to initiate scaling of the applications associated with the virtual applications manager to the members. The architecture may also include a replication system for deploying the applications to the members.Type: ApplicationFiled: July 20, 2005Publication date: November 24, 2005Applicant: Microsoft CorporationInventors: Philippe Choquier, Quentin Clark, William Devlin, Lara Dillingham, Cameron Ferroni, Justin Grant, Rodney Limprecht, John Ludeman, Alexander Mallet, Boyd Multerer, Martin Sleeman, Michael Thomas
-
Publication number: 20050256845Abstract: A system and method provides for managing data accessible by multimedia consoles that execute a multimedia application. The system includes a database that stores data for the multimedia consoles. The system also includes a storage manager that communicates between the multimedia consoles and the database. The system further includes a storage configuration database that stores access permission information for the database. In determining whether to grant the request, the system uses the access permission information from the storage configuration database. This abstraction of access permission information from the databases themselves to the storage configuration database may provide flexibility in managing the databases.Type: ApplicationFiled: May 10, 2004Publication date: November 17, 2005Applicant: Microsoft CorporationInventors: James Jen, Gary Thompson, Daniel Caiafa, Brent Curtis, Boyd Multerer
-
Publication number: 20050251531Abstract: The invention is directed to a system and method for managing data accessible by multimedia consoles that execute a multimedia application. The system includes databases that store data for the multimedia consoles. Each database may have a different permission access associated with it, such that, multimedia titles, users, publishers, team members, and the like, each have an associated database with appropriate access permissions.Type: ApplicationFiled: May 10, 2004Publication date: November 10, 2005Applicant: Microsoft CorporationInventors: James Jen, Gary Thompson, Daniel Caiafa, Brent Curtis, Boyd Multerer
-
Publication number: 20050235273Abstract: A system and method is provided that facilitates the administration of an application in accordance with the present invention. The system includes a resource identifier that identifies resources associated with the application and a manifest that logs the resources. An aggregator is provided that aggregates a subset of the resources into the manifest to facilitate administration of the application. The aggregator can be provided by a user interface and/or an automated builder. A graphical user interface is also provided to facilitate deployment, creation and enumeration of the application.Type: ApplicationFiled: February 22, 2005Publication date: October 20, 2005Applicant: Microsoft CorporationInventors: Daniel Travison, Kent Schliiter, Martin Sleeman, Lara Dillingham, Boyd Multerer, Roger Sprague
-
Publication number: 20050152552Abstract: An architecture is described to manufacture console-based gaming systems in a manner that allows them to be authenticated to a remote entity for online participation. The architecture involves placing pre-established secrets on the game console during console manufacturing that may be subsequently used to guarantee the authenticity of the game console during registration time.Type: ApplicationFiled: January 31, 2005Publication date: July 14, 2005Applicant: Microsoft CorporationInventors: Boyd Multerer, Ling Chen
-
Publication number: 20050129238Abstract: An architecture is described to manufacture console-based gaming systems in a manner that allows them to be authenticated to a remote entity for online participation. The architecture involves placing pre-established secrets on the game console during console manufacturing that may be subsequently used to guarantee the authenticity of the game console during registration time.Type: ApplicationFiled: January 31, 2005Publication date: June 16, 2005Applicant: Microsoft CorporationInventors: Boyd Multerer, Ling Chen
-
Publication number: 20050129237Abstract: An architecture is described to manufacture console-based gaming systems in a manner that allows them to be authenticated to a remote entity for online participation. The architecture involves placing pre-established secrets on the game console during console manufacturing that may be subsequently used to guarantee the authenticity of the game console during registration time.Type: ApplicationFiled: January 31, 2005Publication date: June 16, 2005Applicant: Microsoft CorporationInventors: Boyd Multerer, Ling Chen