Patents by Inventor Dave Dopson

Dave Dopson has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 11392596
    Abstract: A systems and method for providing various improvements in the computing time and accuracy for finding items using a hybrid vector space inner-product search are described.
    Type: Grant
    Filed: May 14, 2019
    Date of Patent: July 19, 2022
    Assignee: Google LLC
    Inventors: Xiang Wu, Dave Dopson, David Morris Simcha, Sanjiv Kumar, Ruiqi Guo
  • Publication number: 20190347256
    Abstract: A systems and method for providing various improvements in the computing time and accuracy for finding items using a hybrid vector space inner-product search are described.
    Type: Application
    Filed: May 14, 2019
    Publication date: November 14, 2019
    Inventors: Xiang Wu, Dave Dopson, David Morris Simcha, Sanjiv Kumar, Ruiqi Guo
  • Patent number: 8370689
    Abstract: A method and system for verifying memory device integrity includes identifying at least one memory block corresponding to at least one memory location within a memory device. The memory block is associated with a portion of a file and a checksum representing data within the memory block at a first time. Based at least in part on determining that the memory block is mapped to the same portion of the same file at a second time, it is indicated that the checksum represents expected data within the memory block. A system for verifying memory device integrity is also disclosed.
    Type: Grant
    Filed: May 6, 2010
    Date of Patent: February 5, 2013
    Assignee: UTC Fire & Security Americas Corporation, Inc.
    Inventors: Timothy Steven Potter, Donald Becker, Bruce Montgomery, Jr., Dave Dopson
  • Patent number: 8335951
    Abstract: A method for verifying memory device integrity includes identifying at least one memory block corresponding to at least one memory location within a memory device. The memory block is associated with a prior checksum. It is determined whether the first memory block is designated read-only. A current checksum is calculated based at least in part on data within the memory block. When the first memory block is designated read-only, and the prior checksum represents expected data within the first memory block, it is determined whether the current checksum is equal to the prior checksum. When the current checksum is not equal to the prior checksum, a verification failure for the first memory block is indicated via a notification interface. A system for verifying memory device integrity is also disclosed.
    Type: Grant
    Filed: May 6, 2010
    Date of Patent: December 18, 2012
    Assignee: UTC Fire & Security Americas Corporation, Inc.
    Inventors: Donald Becker, Timothy Steven Potter, Bruce Montgomery, Jr., Dave Dopson
  • Patent number: 8291481
    Abstract: Embodiments described herein are directed to establishing a terminal services (TS) session between a TS server and the client without creating a temporary session. In one embodiment, a computer system receives a user request indicating that a TS session with a first TS server is to be initiated. The request includes an indication that the user is authenticated and authorized to use the first TS server. The computer system searches for any prior TS sessions previously initiated by the user with other TS servers and determines, based on the search, that at least one prior TS session was initiated with a second TS server. The computer system also sends redirection data to the user indicating that the user request is to be redirected to the second TS server to reestablish the prior TS session with the second TS server.
    Type: Grant
    Filed: June 27, 2008
    Date of Patent: October 16, 2012
    Assignee: Microsoft Corporation
    Inventors: Munindra N. Das, Sriram Sampath, Huei Chung Wong, Rouslan Beletski, Dave Dopson
  • Publication number: 20120159085
    Abstract: A method for validating an eligibility for verification of a memory device within an embedded demand paged memory operating system environment is provided. The method includes receiving a request from an application being executed by a processor coupled to the memory device, the request to utilize at least one memory location. The method includes identifying, by the processor, at least one memory block corresponding to at least one memory location within the memory device, determining, by the processor, whether the at least one memory block is eligible for verification, and producing an eligibility result based on the determination by the processor. A system for validating an eligibility for verifying memory device integrity is also disclosed.
    Type: Application
    Filed: December 21, 2010
    Publication date: June 21, 2012
    Inventors: Timothy Steven Potter, Donald Becker, Bruce Montgomery, JR., Dave Dopson
  • Patent number: 8176200
    Abstract: The present invention extends to methods, systems, and computer program products for distributed aggregation on an overlay network. Embodiments of the invention utilize tiers of nodes that are cascaded in a layered system. Each tier reduces the size of data by orders of magnitude through pre-aggregation. Thus, high volume streams of messages can be reduced to lower volume streams at large scales, such as, for example, the Internet. No central coordination is used; thus there is no central point of failure or bottleneck. When a node fails, other nodes in the same tier as the failing node automatically take over the responsibilities of the failed node.
    Type: Grant
    Filed: April 21, 2009
    Date of Patent: May 8, 2012
    Assignee: Microsoft Corporation
    Inventors: Gueorgui Chkodrov, Richard D. Hill, Michael J. Marucheck, Dave Dopson, Mansoor Mohsin
  • Publication number: 20110276837
    Abstract: A method and system for verifying memory device integrity includes identifying at least one memory block corresponding to at least one memory location within a memory device. The memory block is associated with a portion of a file and a checksum representing data within the memory block at a first time. Based at least in part on determining that the memory block is mapped to the same portion of the same file at a second time, it is indicated that the checksum represents expected data within the memory block. A system for verifying memory device integrity is also disclosed.
    Type: Application
    Filed: May 6, 2010
    Publication date: November 10, 2011
    Inventors: Timothy Steven Potter, Donald Becker, Bruce Montgomery, JR., Dave Dopson
  • Publication number: 20110276844
    Abstract: A method for verifying memory device integrity includes identifying at least one memory block corresponding to at least one memory location within a memory device. The memory block is associated with a prior checksum. It is determined whether the first memory block is designated read-only. A current checksum is calculated based at least in part on data within the memory block. When the first memory block is designated read-only, and the prior checksum represents expected data within the first memory block, it is determined whether the current checksum is equal to the prior checksum. When the current checksum is not equal to the prior checksum, a verification failure for the first memory block is indicated via a notification interface. A system for verifying memory device integrity is also disclosed.
    Type: Application
    Filed: May 6, 2010
    Publication date: November 10, 2011
    Inventors: Timothy Steven Potter, Donald Becker, Bruce Montgomery, JR., Dave Dopson
  • Publication number: 20100268808
    Abstract: The present invention extends to methods, systems, and computer program products for distributed aggregation on an overlay network. Embodiments of the invention utilize tiers of nodes that are cascaded in a layered system. Each tier reduces the size of data by orders of magnitude through pre-aggregation. Thus, high volume streams of messages can be reduced to lower volume streams at large scales, such as, for example, the Internet. No central coordination is used; thus there is no central point of failure or bottleneck. When a node fails, other nodes in the same tier as the failing node automatically take over the responsibilities of the failed node.
    Type: Application
    Filed: April 21, 2009
    Publication date: October 21, 2010
    Applicant: Microsoft Corporation
    Inventors: Gueorgui Chkodrov, Richard D. Hill, Michael J. Marucheck, Dave Dopson, Mansoor Mohsin
  • Publication number: 20090328172
    Abstract: Embodiments described herein are directed to establishing a terminal services (TS) session between a TS server and the client without creating a temporary session. In one embodiment, a computer system receives a user request indicating that a TS session with a first TS server is to be initiated. The request includes an indication that the user is authenticated and authorized to use the first TS server. The computer system searches for any prior TS sessions previously initiated by the user with other TS servers and determines, based on the search, that at least one prior TS session was initiated with a second TS server. The computer system also sends redirection data to the user indicating that the user request is to be redirected to the second TS server to reestablish the prior TS session with the second TS server.
    Type: Application
    Filed: June 27, 2008
    Publication date: December 31, 2009
    Applicant: Microsoft Corporation
    Inventors: Munindra N. Das, Sriram Sampath, Huei Chung Wong, Rouslan Beletski, Dave Dopson