Patents by Inventor Donald J. McNamara
Donald J. McNamara has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Publication number: 20110208927Abstract: This document describes techniques and apparatuses enabling virtual memory for network-enabled computing devices. These techniques and apparatuses may enable network-enabled computing devices to avoid, or reduce the chances of, having little or no available memory.Type: ApplicationFiled: February 23, 2010Publication date: August 25, 2011Inventors: Donald J. McNamara, Alexander F. Nagy
-
Publication number: 20100017798Abstract: Software programs, such as an operating system or other application programs, are automatically customized to a specific user(s) based on data corresponding to the specific user(s) that is maintained in a user information store. In one embodiment, the information store is a unified store that is accessible by multiple programs including the operating system. Thus, new information or information changes can be made available to multiple programs by the user adding (or changing) the information only once. In another embodiment, the operating system image to be installed on a computer is pre-populated with user-specific information at the factory. The user-specific information can be integrated into the operating system at the factory or alternatively upon an initial boot of the computer by the user.Type: ApplicationFiled: September 24, 2009Publication date: January 21, 2010Applicant: Microsoft CorporationInventors: Ryan Burkhardt, Tom G. Yaryan, Seetharaman Harikrishnan, Donald J. McNamara, David J. D'Souza, Nicholas R. Legget, David Scott Johnson, Seung-Yup Chai
-
Patent number: 7596785Abstract: Software programs, such as an operating system or other application programs, are automatically customized to a specific user(s) based on data corresponding to the specific user(s) that is maintained in a user information store. In one embodiment, the information store is a unified store that is accessible by multiple programs including the operating system. Thus, new information or information changes can be made available to multiple programs by the user adding (or changing) the information only once. In another embodiment, the operating system image to be installed on a computer is pre-populated with user-specific information at the factory. The user-specific information can be integrated into the operating system at the factory or alternatively upon an initial boot of the computer by the user.Type: GrantFiled: October 8, 2004Date of Patent: September 29, 2009Assignee: Microsoft CorporationInventors: Ryan Burkhardt, Tom G. Yaryan, Seetharaman Harikrishnnan, Donald J. McNamara, David J. D'Souza, Nicholas R. Legget, David Scott Johnson, Seung-Yup Chai
-
Patent number: 7463879Abstract: A wireless device and a receiving computing system communicate over a carrier network. The wireless device submits a request for service to the receiving computing system, which then returns an authentication key. The authentication key is routed using the telephone number stated in the request for service as being associated with the wireless device. However, the authentication key is dispatched over a different data transport mechanism. For example, the request may be submitted using an IP data transport mechanism, while the authentication key is returned using an SMS data transport mechanism. The wireless device then evidences, through appropriate communication, that the wireless device both submitted the request and received the response. Accordingly, the telephone number is verified as being associated with the telephone number.Type: GrantFiled: October 12, 2005Date of Patent: December 9, 2008Assignee: Microsoft CorporationInventors: Quentin S. Miller, Donald J. McNamara
-
Patent number: 7379971Abstract: A wireless device constructs a message that includes a representation of a time-to-disconnect, and then transmits the message over a carrier network to a receiving computing system. The time-to-disconnect indicates a time beyond which the receiving computing system should not send a response to the message (or any other message) using the temporary network address that was assigned to the wireless device at the time the message was transmitted. The wireless device attempts to stay connected to thereby retain that address until the time-to-disconnect expires. When the response is ready to send back, if the time-to-disconnect has not yet expired, the response is sent to the wireless device using the same network address that the wireless device had at the time the original message was sent. Otherwise, if the time-to-disconnect is exceeded, then the receiving computing system does not attempt transmission of the response using that network address.Type: GrantFiled: November 19, 2002Date of Patent: May 27, 2008Assignee: Microsoft CorporationInventors: Quentin S. Miller, Donald J. McNamara
-
Patent number: 7337239Abstract: Synchronizing a client and server version of a hierarchical data structure having several atomically-editable components. At synchronization time, the server identifies all of the changes that need to occur to the client version in order to properly synchronize the client version of the hierarchical document with the server version. Each of the changes involves edits of one or more of the atomically-editable components of the data structure. The server fragments the synchronization information into multiple messages, and then individually sends the message to the client computing system. The client atomically processes each of the messages. For each change to be made as identified within a single message, the client computing system identifies the atomically-editable components that are involved by the change, and then edits (e.g., inserts, changes, or deletes) the atomically-editable components in a specified manner.Type: GrantFiled: November 19, 2002Date of Patent: February 26, 2008Assignee: Microsoft CorporationInventors: Quentin S. Miller, Donald J. McNamara, Avner Sander
-
Patent number: 7155713Abstract: A componentized operating system is separated into multiple different components. In certain embodiments, a bill of materials (BOM) identifies at least one component that is installed (or is to be installed) for an operating system image on a computer. Each component includes one or more files and has a corresponding manifest that identifies which other components (if any) the component is dependent on. During an installation or upgrading process, the manifest for a component can be accessed to determine which additional components (if any) are to be installed even if they are not explicitly identified in the BOM.Type: GrantFiled: April 27, 2000Date of Patent: December 26, 2006Assignee: Microsoft CorporationInventors: Ryan Burkhardt, Tom G. Yaryan, Seetharaman Harikrishnnan, Donald J. McNamara, David J. D'Souza, Seung-Yup Chai, Sanjay Shenoy
-
Patent number: 6968177Abstract: A wireless device and a receiving computing system communicate over a carrier network. The wireless device submits a request for service to the receiving computing system, which then returns an authentication key. The authentication key is routed using the telephone number stated in the request for service as being associated with the wireless device. However, the authentication key is dispatched over a different data transport mechanism. For example, the request may be submitted using an IP data transport mechanism, while the authentication key is returned using an SMS data transport mechanism. The wireless device then evidences, through appropriate communication, that the wireless device both submitted the request and received the response. Accordingly, the telephone number is verified as being associated with the telephone number.Type: GrantFiled: November 19, 2002Date of Patent: November 22, 2005Assignee: Microsoft CorporationInventors: Quentin S. Miller, Donald J. McNamara
-
Patent number: 6823508Abstract: Software programs, such as an operating system or other application programs, are automatically customized to a specific user(s) based on data corresponding to the specific user(s) that is maintained in a user information store. In one embodiment, the information store is a unified store that is accessible by multiple programs including the operating system. Thus, new information or information changes can be made available to multiple programs by the user adding (or changing) the information only once. In another embodiment, the operating system image to be installed on a computer is pre-populated with user-specific information at the factory. The user-specific information can be integrated into the operating system at the factory or alternatively upon an initial boot of the computer by the user.Type: GrantFiled: April 27, 2000Date of Patent: November 23, 2004Assignee: Microsoft CorporationInventors: Ryan Burkhardt, Tom G. Yaryan, Seetharaman Harikrishnnan, Donald J. McNamara, David J. D'Souza, Nicholas R. Legget, David Scott Johnson, Seung-Yup Chai
-
Publication number: 20040203599Abstract: A wireless device and a receiving computing system communicate over a carrier network. The wireless device submits a request for service to the receiving computing system, which then returns an authentication key. The authentication key is routed using the telephone number stated in the request for service as being associated with the wireless device. However, the authentication key is dispatched over a different data transport mechanism. For example, the request may be submitted using an IP data transport mechanism, while the authentication key is returned using an SMS data transport mechanism. The wireless device then evidences, through appropriate communication, that the wireless device both submitted the request and received the response. Accordingly, the telephone number is verified as being associated with the telephone number.Type: ApplicationFiled: November 19, 2002Publication date: October 14, 2004Inventors: Quentin S. Miller, Donald J. McNamara
-
Publication number: 20040103141Abstract: Synchronizing a client and server version of a hierarchical data structure having several atomically-editable components. At synchronization time, the server identifies all of the changes that need to occur to the client version in order to properly synchronize the client version of the hierarchical document with the server version. Each of the changes involves edits of one or more of the atomically-editable components of the data structure. The server fragments the synchronization information into multiple messages, and then individually sends the message to the client computing system. The client atomically processes each of the messages. For each change to be made as identified within a single message, the client computing system identifies the atomically-editable components that are involved by the change, and then edits (e.g., inserts, changes, or deletes) the atomically-editable components in a specified manner.Type: ApplicationFiled: November 19, 2002Publication date: May 27, 2004Inventors: Quentin S. Miller, Donald J. McNamara, Avner Sander
-
Publication number: 20040098487Abstract: A wireless device constructs a message that includes a representation of a time-to-disconnect, and then transmits the message over a carrier network to a receiving computing system. The time-to-disconnect indicates a time beyond which the receiving computing system should not send a response to the message (or any other message) using the temporary network address that was assigned to the wireless device at the time the message was transmitted. The wireless device attempts to stay connected to thereby retain that address until the time-to-disconnect expires. When the response is ready to send back, if the time-to-disconnect has not yet expired, the response is sent to the wireless device using the same network address that the wireless device had at the time the original message was sent. Otherwise, if the time-to-disconnect is exceeded, then the receiving computing system does not attempt transmission of the response using that network address.Type: ApplicationFiled: November 19, 2002Publication date: May 20, 2004Inventors: Quentin S. Miller, Donald J. McNamara