Patents by Inventor Christopher Brumme

Christopher Brumme has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20060075383
    Abstract: Described herein is an implementation for exposing an “execution context” to a logical execution flow of procedures as it executes.
    Type: Application
    Filed: October 6, 2004
    Publication date: April 6, 2006
    Applicant: Microsoft Corporation
    Inventors: Arun Moorthy, Christopher Brumme, Jonathan Hawkins, Raja Krishnaswamy
  • Publication number: 20060070853
    Abstract: Methods and apparatus for conveying a stack (22) of paper products by the use of rollers (50, 150, 250 or 350) that include lobed outer surfaces for contacting the stack of paper.
    Type: Application
    Filed: December 30, 2003
    Publication date: April 6, 2006
    Inventor: Christopher Brumm
  • Publication number: 20060070041
    Abstract: Authored code may include a notification that no tolerance for failure or corruption is expected for an identified sub-set of the code. Any potential failure point, which may be induced by a runtime environment routine or sub-routine, that is associated with the identified sub-set of code may then be identified and hoisted to a point apart from the identified sub-set of code.
    Type: Application
    Filed: September 29, 2004
    Publication date: March 30, 2006
    Applicant: Microsoft Corporation
    Inventors: Christopher Brumme, Sean Trowbridge, Rudi Martin, WeiWen Liu, Brian Grunkemeyer, Mahesh Prakriya
  • Publication number: 20060053138
    Abstract: The subject disclosure pertains to systems and methods for supporting null capabilities for general purpose programming languages. Low level, runtime support for a nullable type is provided to ensure consistency and coherency. An execution component restricts support of the nullable type to programming language types that lack a null capability. The execution component may also provide support for conversion between the nullable type and a reference type.
    Type: Application
    Filed: August 29, 2005
    Publication date: March 9, 2006
    Applicant: Microsoft Corporation
    Inventors: Henricus Meijer, Anders Hejisberg, Dinesh Kulkarni, Vance Morrison, John Duffy, Christopher Brumme, Matthew Warren, Luca Bolognese, Peter Hallam, Gary Katzenberger
  • Publication number: 20060004805
    Abstract: Enabling secure and efficient marshaling, utilization, and releasing of handles in either of an operating system or runtime environment includes wrapping a handle with a counter to tabulate a number of threads using currently using the handle. Thus, handle administration is implemented to circumvent potential security risks, avoid correctness problems, and foster more efficient handle releasing.
    Type: Application
    Filed: May 25, 2004
    Publication date: January 5, 2006
    Applicant: Microsoft Corporation
    Inventors: Brian Grunkemeyer, David Mortenson, Rudi Martin, Sonja Keserovic, Mahesh Prakriya, Christopher Brumme
  • Publication number: 20050273764
    Abstract: Reliability contracts declare an intent of executable code, and may be associated with at least a portion of the executable code. The intent of the executable code in the face of particular conditions may be declared for the use in any one of a programming, execution, or testing environment.
    Type: Application
    Filed: May 14, 2004
    Publication date: December 8, 2005
    Applicant: Microsoft Corporation
    Inventors: Rudi Martin, Mahesh Prakriya, Brian Grunkemeyer, Christopher Brumme, Sean Trowbridge, Weiwen Liu
  • Publication number: 20050268309
    Abstract: A system and method for interacting with an object is provided. The system includes a method call interceptor that intercepts a method call made on an object and that routes the method call to a proxy. The method call interceptor is accessible to application code. The system also includes an application code generic proxy that after overriding a base class invocation method can receive intercepted method calls, can invoke methods on the object that the proxy images, can receive results from the object that the proxy images and can pass results to the entity that generated the intercepted method call.
    Type: Application
    Filed: July 13, 2005
    Publication date: December 1, 2005
    Applicant: Microsoft Corporation
    Inventors: Raja Krishnaswamy, Tarun Anand, Christopher Brumme, Gopala Kakivaya
  • Publication number: 20050246716
    Abstract: An application program interface (API) provides a set of functions, including a set of base classes and types that are used in substantially all applications accessing the API, for application developers who build Web applications on Microsoft Corporation's .NET™ platform.
    Type: Application
    Filed: June 23, 2005
    Publication date: November 3, 2005
    Applicant: Microsoft Corporation
    Inventors: Adam Smith, Anthony Moore, Brian LaMacchia, Anders Hejlsberg, Brian Grunkemeyer, Caleb Doise, Christopher Brumme, Christopher Anderson, Corina Feuerstein, Craig Sinclair, Daniel Takacs, David Ebbo, David Driver, David Mortenson, Erik Christensen, Erik Olson, Fabio Yeon, Gopala Kakivaya, Gregory Fee, Hany Ramadan, Henry Sanders, Jayanth Rajan, Jeffrey Cooperstein, Jonathan Hawkins, James Hogg, Joe Long, John McConnell, Jesus Ruiz-Scougall, James Miller, Julie Bennett, Krzysztof Cwalina, Lance Olson, Loren Kohnfelder, Michael Magruder, Manish Prabhu, Radu Palanca, Raja Krishnaswamy, Shawn Burke, Sean Trowbridge, Seth Demsey, Shajan Dasan, Stefan Pharies, Suzanne Cook, Tarun Anand, Travis Muhlestein, Yann Christensen, Yung-shin Lin, Ramasamy Krishnaswamy, Joseph Roxe, Alan Boshier, David Bau
  • Publication number: 20050240943
    Abstract: An application program interface (API) provides a set of functions, including a set of base classes and types that are used in substantially all applications accessing the API, for application developers who build Web applications on Microsoft Corporation's .NET™ platform.
    Type: Application
    Filed: June 23, 2005
    Publication date: October 27, 2005
    Applicant: Microsoft Corporation
    Inventors: Adam Smith, Anthony Moore, Brian LaMacchia, Anders Hejlsberg, Biran Grunkemeyer, Caleb Doise, Christopher Brumme, Christopher Anderson, Corina Feuerstein, Craig Sinclair, Daniel Takacs, David Ebbo, David Driver, David Mortenson, Erik Christensen, Erik Olson, Fabio Yeon, Gopala Kakivaya, George Fee, Hany Ramadan, Henry Sanders, Jayanth Rajan, Jeffrey Cooperstein, Jonathan Hawkins, James Hogg, Joe Long, John McConnell, Jesus Ruiz-Scougall, James Miller, Julie Bennett, Krzysztof Cwalina, Lance Olson, Loren Kohnfelder, Michael Magruder, Manish Prabhu, Radu Palanca, Raja Krishnaswamy, Shawn Burke, Sean Trowbridge, Seth Demsey, Shajan Dasan, Stefan Pharies, Suzanne Cook, Tarun Anand, Travis Muhlestein, Yann Christensen, Yung-shin Lin, Ramasamy Krishnaswamy, Joseph Roxe, Alan Boshier, David Bau
  • Publication number: 20050193369
    Abstract: Systems and methods provide for the rewriting and transformation of a code unit through an extensible, composable, set of code rewriters that can be implemented at various phases throughout the development, deployment, and execution of the code unit. The described systems and methods provide a powerful way for program developers and system administrators to implement code transformations at different stages throughout the development, deployment, and execution of programs that is largely independent of such programs and does not significantly increase the complexity of the source programs, compilers, or execution environments.
    Type: Application
    Filed: February 27, 2004
    Publication date: September 1, 2005
    Inventors: Christopher Brumme, Jan Gray, Jonathan Hawkins, Alan Shi, Sean Trowbridge
  • Publication number: 20050188346
    Abstract: A strategy is described for associating an InternalsVisibleTo (IVT) attribute with a non-public resource of a first assembly. The IVT attribute names a second assembly. By virtue of the IVT attribute, during runtime, the non-public resource in the first assembly is made visible to the second assembly. In addition to naming the second assembly, the IVT attribute can include a number of optional arguments, such as arguments which specify the version, culture, and public key token associated with the second assembly.
    Type: Application
    Filed: February 20, 2004
    Publication date: August 25, 2005
    Inventors: James Hogg, Christopher Brumme, James Miller, William Evans
  • Publication number: 20050172133
    Abstract: A host intercepts calls between two executables and determines whether the calls are permissible according to the host's security model which can be identify based, such as user identity based—for instance, mapping access rights within a specific data base user context to database object access. Such an identity security model differs from a common language runtime security model where managed code uses Code Access Security to prevent managed assemblies from performing certain operations. Managed assemblies registered with the host are host objects from the host's perspective for which access rights can be defined via security rules, such as are defined for individual user identities. A host can decide access between managed executables based on the host's identity based access rules by trapping any cross assembly calls and deciding whether such calls should proceed or be blocked from taking place based on the corresponding identity security settings.
    Type: Application
    Filed: February 3, 2004
    Publication date: August 4, 2005
    Inventors: Christopher Brumme, Vance Morrison, Sebastian Lange, Gregory Fee, Dario Russi, Simon Hall, Mahesh Prakriya, Brian Sullivan
  • Publication number: 20050172286
    Abstract: A host operating in a managed environment intercepts a call from a managed caller to a particular callee and determines whether the call is permissible according to the host's prior configuration of a plurality of callees. The particular callee, which provides access to a resource that the host can be protecting, can have been previously configured by the host to always allow the call to be made, to never allow the call to be made, or to allow the call to be made based upon the degree to which the host trusts the managed caller.
    Type: Application
    Filed: February 3, 2004
    Publication date: August 4, 2005
    Inventors: Christopher Brumme, Sebastian Lange, Gregory Fee, Michael Gashler, Mahesh Prakriya
  • Publication number: 20050015753
    Abstract: Performing validation of a derived virtual method includes receiving program code where the derived virtual method is derived from a virtual method of the program language used to generate the program code, compiling the program code to an intermediate language expression, generating metadata descriptive of the compiled program code, validating the use of the derived virtual method by accessing the metadata, and permitting the use of the derived virtual method if the metadata grants override permissions concerning the virtual method of the programming language. The metadata indicating access and override permissions may be generated while compiling the program code in the common language infrastructure. Alternately, the flag may use pre-existing values indicative of the access and override permissions concerning the virtual method of the programming language.
    Type: Application
    Filed: July 18, 2003
    Publication date: January 20, 2005
    Inventors: Erik Meijer, Craig Sinclair, James Hogg, Peter Golde, Sergey Lidin, Christopher Brumme
  • Patent number: 6134559
    Abstract: A uniform object model integrates objects defined by foreign type systems into a single integrated object oriented system. The type system for the integrated object oriented system supports a superset of features from foreign object systems. The uniform object model approach converts foreign objects into uniform object model objects defined by the integrated type system and layers onto the uniform object model objects additional members supported by the integrated type system. Adapters integrate foreign objects and data sources into the integrated object oriented system by implementing foreign objects as full fledged objects of the system. The foreign object adapters are bi-directional such that objects, registered in the system, are exposed to foreign object systems. During run time, clients obtain a connection to the data source adapter, which supports the target data source, to execute transactions in the target data source.
    Type: Grant
    Filed: April 27, 1998
    Date of Patent: October 17, 2000
    Assignee: Oracle Corporation
    Inventors: Christopher Brumme, Michael De Groot, Ralph Lemke, Frank Dancs, Priscilla Fung
  • Patent number: 5842220
    Abstract: A class signature interface exposes members of an object class in an object oriented software system by exposing access information to the member. The class signature interface has application for use with object models that require client objects to utilize the functionality of server objects through interfaces, such as required by the Component Object Model (COM). Class signature interfaces expose interfaces supported by the object class to provide time constant access to the interfaces of the object class. The class signature interfaces also expose attributes and methods, defined directly on the class level. The class signature interface has further application for use in an object oriented software system to add additional class members to an object class without adding the class members to a separate interface.
    Type: Grant
    Filed: May 2, 1997
    Date of Patent: November 24, 1998
    Assignee: Oracle Corporation
    Inventors: Michael De Groot, Christopher Brumme