Patents by Inventor Edward Wobber

Edward Wobber has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20070094495
    Abstract: Described herein are one or more implementations of an operating system that provides for statically verifiable inter-process communication between isolated processes. Also, described herein are one or more implementations of programming tools that facilitate the development of statically verifiable isolated processes having inter-process communication.
    Type: Application
    Filed: June 30, 2006
    Publication date: April 26, 2007
    Applicant: Microsoft Corporation
    Inventors: Galen Hunt, James Larus, Martin Abadi, Mark Aiken, Paul Barham, Manuel Fahndrich, Chris Hawblitzel, Orion Hodson, Steven Levi, Nicholas Murphy, Bjarne Steensgaard, David Tarditi, Edward Wobber, Brian Zill
  • Publication number: 20070083697
    Abstract: Flash memory is managed utilizing memory management data structures residing in volatile memory of a flash memory device. The memory management data structures are created and updated each time power is supplied to the memory device. During write operations to the flash memory, specific locations in the flash memory are updated to reflect the current status of the flash memory. When power is interrupted, the memory management data structures are recreated upon reapplication of power. The flash memory is scanned and the information obtained from the specific locations in the flash memory is utilized to construct the memory management data structures. No bad block tables are required. Flash memory is managed to provide relatively good random write performance and to accommodate power interruptions. Applications include the use of flash memory for general purpose computing and devices in which power can fail at any time (due to being unplugged for example).
    Type: Application
    Filed: October 7, 2005
    Publication date: April 12, 2007
    Applicant: Microsoft Corporation
    Inventors: Andrew Birrell, Charles Thacker, Edward Wobber, Michael Isard
  • Publication number: 20060265754
    Abstract: Systems and methods are provided for resource access control in computer systems. Our approach includes new techniques for composing and authenticating principals in an access control system. Our principals may comprise information that identifies the role of the user of a computer system, the mechanism by which the user was authenticated, and program execution history. Thus, when a principal makes a request, access control determinations can be made based on the principal's identity. Access control lists may provide patterns that are used to recognize principals, thereby ensuring a level of security without enumerating precise identifiers for all of the possible principles that may request a particular resource.
    Type: Application
    Filed: May 19, 2005
    Publication date: November 23, 2006
    Applicant: Microsoft Corporation
    Inventors: Andrew Birrell, Edward Wobber, Martin Abadi
  • Publication number: 20060265759
    Abstract: Systems and methods are provided for resource access control in computer systems. Our approach includes new techniques for composing and authenticating principals in an access control system. Our principals may comprise information that identifies the role of the user of a computer system, the mechanism by which the user was authenticated, and program execution history. Thus, when a principal makes a request, access control determinations can be made based on the principal's identity. Access control lists may provide patterns that are used to recognize principals, thereby ensuring a level of security without enumerating precise identifiers for all of the possible principles that may request a particular resource.
    Type: Application
    Filed: May 19, 2005
    Publication date: November 23, 2006
    Applicant: Microsoft Corporation
    Inventors: Andrew Birrell, Edward Wobber, Martin Abadi
  • Publication number: 20060233367
    Abstract: A system is provided for reading and writing sectors which may be realized as either a disk device to the local operating system, or as a virtual disk device to a virtual machine. A user's computing environment is stored in the network in the form of a disk image, which may be a virtual disk image, for example. The virtual disk is realized on host computers through host-resident virtual machine monitors such as MICROSOFT VIRTUAL PC®. Portable memory devices, such as flash devices, buffer virtual disk writes and cache reads, greatly reducing the performance degradation associated with remote disk access. The cache is mobile so that it can be travel with the user. The flash device remembers commonly used virtual disk content fingerprints so that the host machine's local disk can be used to satisfy many common disk reads when ubiquitous static content is involved. Standard, frequently used software images might be distributed in advance to host machines.
    Type: Application
    Filed: February 15, 2005
    Publication date: October 19, 2006
    Applicant: Microsoft Corporation
    Inventors: Andrew Birrell, Edward Wobber, Muthukaruppan Annamalai, Ulfar Erlingsson
  • Publication number: 20060155931
    Abstract: A system is provided for reading and writing sectors which may be realized as either a disk device to the local operating system, or as a virtual disk device to a virtual machine. A user's computing environment is stored in the network in the form of a disk image, which may be a virtual disk image, for example. The virtual disk is realized on host computers through host-resident virtual machine monitors such as MICROSOFT VIRTUAL PC®. Portable memory devices, such as flash devices, buffer virtual disk writes and cache reads, greatly reducing the performance degradation associated with remote disk access. The cache is mobile so that it can be travel with the user. The flash device remembers commonly used virtual disk content fingerprints so that the host machine's local disk can be used to satisfy many common disk reads when ubiquitous static content is involved. Standard, frequently used software images might be distributed in advance to host machines.
    Type: Application
    Filed: January 10, 2005
    Publication date: July 13, 2006
    Applicant: Microsoft Corporation
    Inventors: Andrew Birrell, Edward Wobber, Muthukaruppan Annamalai, Ulfar Erlingsson
  • Publication number: 20060155930
    Abstract: A lifting and shaping system for a bra is disclosed. The system uses lift platforms shaped to fit into the cups of the bra and formed from thin material such as plastic. The lift platforms are attached to the bra toward the center of the bra. Connectors having one end attached to the lift platform and the other end attached to a slide on the shoulder strap adjust the lift of the lift platform when the slide is moved. Flexible shaping members distribute the lift of the lift platforms and maintain the natural shape of the breasts as they are lifted. Smoothing shields ease the movement of the lift platforms and connectors within the cloth confines of the breast cups. The flexible shaping members may also perform some of the functions of a smoothing shield.
    Type: Application
    Filed: February 15, 2005
    Publication date: July 13, 2006
    Applicant: Microsoft Corporation
    Inventors: Andrew Birrell, Edward Wobber, Muthukaruppan Annamalai, Ulfar Erlingsson
  • Publication number: 20060123418
    Abstract: Described herein is an implementation of a technology for the construction, identification, and/or optimization of operating-system processes. At least one implementation, described herein, constructs an operating-system process having the contents as defined by a process manifest. Once constructed, the operating-system process is unalterable.
    Type: Application
    Filed: April 29, 2005
    Publication date: June 8, 2006
    Applicant: Microsoft Corporation
    Inventors: Galen Hunt, James Larus, John DeTreville, Edward Wobber, Martin Abadi, Michael Jones, Trishul Chilimbi
  • Publication number: 20060123417
    Abstract: Described herein is an implementation of a technology for the construction, identity, and/or optimization of operating-system processes. At least one implementation, described herein, constructs an operating-system process having the contents as defined by a process manifest. Once constructed, the operating-system process is unalterable.
    Type: Application
    Filed: December 6, 2004
    Publication date: June 8, 2006
    Applicant: Microsoft Corporation
    Inventors: Galen Hunt, James Larus, John DeTreville, Edward Wobber, Martin Abadi, Michael Jones, Trishul Chilimbi
  • Publication number: 20060123430
    Abstract: Described herein is an implementation of a technology for the construction, identification, and/or optimization of operating-system processes. At least one implementation, described herein, constructs an operating-system process having the contents as defined by a process manifest. Once constructed, the operating-system process is unalterable.
    Type: Application
    Filed: April 29, 2005
    Publication date: June 8, 2006
    Applicant: Microsoft Corporation
    Inventors: Galen Hunt, James Larus, John DeTreville, Edward Wobber, Martin Abadi, Michael Jones, Trishul Chilimbi
  • Publication number: 20060123424
    Abstract: Described herein is an implementation of an inter-process communications technology. One or more implementations, described herein, facilitate creation of a bi-directional message conduit having exactly two endpoints. A first endpoint is owned by a first software process and a second endpoint is owned by a second software process. One or more implementations, described herein, maintain the bi-directional message conduit for passing multiple messages via the bi-directional message conduit from the first process to the second process, according to established rules that can be checked.
    Type: Application
    Filed: December 7, 2004
    Publication date: June 8, 2006
    Applicant: Microsoft Corporation
    Inventors: Galen Hunt, James Larus, Manuel Fahndrich, Edward Wobber, Martin Abadi, John DeTreville
  • Publication number: 20050246718
    Abstract: Extensions to operating systems or software applications can be hosted in virtual environments to fault isolate the extension. A generic proxy extension invoked by a host process can coordinate the invocation of an appropriate extension in a virtual process that can provide the same support APIs as the host process. Furthermore, a user mode context can be provided to the extension in the virtual process through memory copying or page table modifications. In addition, the virtual process, especially a virtual operating system process running on a virtual machine, can be efficiently started by cloning a coherent state. A coherent state can be created when a virtual machine starts up, or when the computing device starts up and the appropriate parameters are observed and saved. Alternatively, the operating system can create a coherent state by believing there is an additional CPU during the boot process.
    Type: Application
    Filed: April 30, 2004
    Publication date: November 3, 2005
    Applicant: Microsoft Corporation
    Inventors: Ulfar Erlingsson, Edward Wobber, Paul Barham, Thomas Roeder
  • Publication number: 20050246453
    Abstract: Extensions or other software applications can have direct access to hardware from within a virtual machine environment. The physical addresses of hardware can be mapped into the process space of the virtual machine environment. Similarly, I/O ports can be allowed to pass through into the virtual environment. The virtual machine can detect an upcoming Direct Memory Access (DMA), and can provide the correct addresses for the DMA, while the necessary memory can be pinned. If the virtual machine is executing when a hardware interrupt arrives, it can emulate the interrupt line inside its process. Conversely, if the host operating system is executing, it can disable interrupts and track temporary interrupts, and subsequently transfer control to the virtual machine process, emulate the temporary interrupts and reenable interrupts. Alternatively, the host operating system can immediately transfer control, or it can execute the interrupt servicing routines in its own process.
    Type: Application
    Filed: April 30, 2004
    Publication date: November 3, 2005
    Applicant: Microsoft Corporation
    Inventors: Ulfar Erlingsson, Edward Wobber, Thomas Roeder
  • Publication number: 20050210258
    Abstract: Methods and systems are provided for a cancellation server maintaining a database of identifiers of cryptographic puzzles. A cryptographic puzzle is created from a unique identifier and a timestamp, and is attached to an electronic mail message, along with the puzzle's solution. The recipient verifies that the solution is correct and that the timestamp is current, and further queries the cancellation server with the puzzle identifier. If the identifier does not exist in the database, then the recipient knows the received message is legitimate. If the identifier already appears in the database, the received message can be automatically removed from the recipient's computer.
    Type: Application
    Filed: March 22, 2004
    Publication date: September 22, 2005
    Applicant: Microsoft Corporation
    Inventors: Andrew Birrell, Michael Burrows, Edward Wobber
  • Patent number: 5235642
    Abstract: A distributed computer system has a number of computers coupled thereto at distinct nodes. The computer at each node of the distributed system has a trusted computing base that includes an authentication agent for authenticating requests received from principals at other nodes in the system. Requests are transmitted to servers as messages that include a first identifier provided by the requester and a second identifier provided by the authentication agent of the requester node. Each server process is provided with a local cache of authentication data that identifies requesters whose previous request messages have been authenticated. When a request is received, the server checks the request's first and second identifiers against the entries in its local cache. If there is a match, then the request is known to be authentic. Otherwise, the server node's authentication agent is called to obtain authentication credentials from the requester's node to authenticate the request message.
    Type: Grant
    Filed: July 21, 1992
    Date of Patent: August 10, 1993
    Assignee: Digital Equipment Corporation
    Inventors: Edward Wobber, Martin Abadi, Andrew Birrell, Butler Lampson