Patents by Inventor Harry S. Pyle
Harry S. Pyle has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 9344472Abstract: A computer-implemented method for seamlessly playing a composite media presentation, includes receiving, by a sequencer, a sequential playlist provided by a scheduler. The sequential playlist refers to a sequence of one or more streaming media content items. The sequencer receives calls from a native player application at regular intervals, and sends playback segments and seekbar update information to the native player application based on the sequential playlist in response to the calls. The native player application is configured to play the composite media presentation using at least one core player and generate a corresponding seekbar for the presentation based on the playback segments and the seekbar update information sent by the sequencer.Type: GrantFiled: December 28, 2012Date of Patent: May 17, 2016Assignee: Microsoft Technology Licensing, LLCInventors: Raymond W. C. Cheng, Harry S. Pyle, Hui Jin, Vishal Sood
-
Publication number: 20140189139Abstract: A computer-implemented method for seamlessly playing a composite media presentation, includes receiving, by a sequencer, a sequential playlist provided by a scheduler. The sequential playlist refers to a sequence of one or more streaming media content items. The sequencer receives calls from a native player application at regular intervals, and sends playback segments and seekbar update information to the native player application based on the sequential playlist in response to the calls. The native player application is configured to play the composite media presentation using at least one core player and generate a corresponding seekbar for the presentation based on the playback segments and the seekbar update information sent by the sequencer.Type: ApplicationFiled: December 28, 2012Publication date: July 3, 2014Applicant: MICROSOFT CORPORATIONInventors: Raymond W.C. Cheng, Harry S. Pyle, Hui Jin, Vishal Sood
-
Patent number: 8725947Abstract: An adaptive stream player that has control over whether a retrieved stream is cached in a local stream cache. For at least some of the stream portions requested by the player, before going out over the network, a cache control component first determines whether or not an acceptable version of the stream portion is present in a stream cache. If there is an acceptable version in the stream cache, that version is provided rather than having to request the stream portion of the network. For stream portions received over the network, the cache control component decides whether or not to cache that stream portion. Thus, the cache control component allows the adaptive stream player to work in offline scenarios and also allows the adaptive stream player to have rewind, pause, and other controls that use cached content.Type: GrantFiled: May 28, 2010Date of Patent: May 13, 2014Assignee: Microsoft CorporationInventors: Vishal Sood, Raymond Cheng, Harry S. Pyle
-
Patent number: 8473612Abstract: Systems and methods for use in connection with the trusted transmission and reception of content, such as encryption key information, from one computing device in a network to a second computing device are provided. In one embodiment, the invention provides a way to trust or validate the transfer of a public key using a very short code entered out of band of the network that is easy for end-users to remember, or write down.Type: GrantFiled: January 26, 2010Date of Patent: June 25, 2013Assignee: Microsoft CorporationInventors: Christian R. Lehew, Harry S. Pyle, Nicholas Jie Fang
-
Patent number: 8332643Abstract: A process for establishing secure mutual trust includes generating a one-time-password. The one-time-password is transferred between the devices in a communication occurring off of the network. Each device generates a set of authenticators by hashing a plurality of sub-strings of the password and the device's authentication certificate with a respective set of nonces. The devices exchange the respective sets of authenticators. Each device then alternates revealing its respective set of nonces and its authentication certificate in a multi-stage process. The devices re-calculate the authenticators based upon the respective set of nonces and authentication certificate revealed by the other device along with the one-time-password sub-strings that it posses. If each device determines that the authenticators re-calculated by the given device matches the authenticators previously received from the other device, secure mutual trust is established.Type: GrantFiled: October 19, 2010Date of Patent: December 11, 2012Assignee: Microsoft CorporationInventors: Harry S. Pyle, Bruce Louis Lieberman, Daniel R. Simon, Guillaume Simonnet, William Dollar
-
Publication number: 20110296109Abstract: An adaptive stream player that has control over whether a retrieved stream is cached in a local stream cache. For at least some of the stream portions requested by the player, before going out over the network, a cache control component first determines whether or not an acceptable version of the stream portion is present in a stream cache. If there is an acceptable version in the stream cache, that version is provided rather than having to request the stream portion of the network. For stream portions received over the network, the cache control component decides whether or not to cache that stream portion. Thus, the cache control component allows the adaptive stream player to work in offline scenarios and also allows the adaptive stream player to have rewind, pause, and other controls that use cached content.Type: ApplicationFiled: May 28, 2010Publication date: December 1, 2011Applicant: Microsoft CorporationInventors: Vishal Sood, Raymond Cheng, Harry S. Pyle
-
Patent number: 7940686Abstract: Described herein are techniques to facilitate the improvement of network throughput. An implementation described herein measures throughput over a data-communications network and between at least two endpoints on the network. This implementation also displays a graphical representation depicting the present throughput of the network as it is measured. The graphical representation has an identified target throughput threshold, and that threshold is indicative of an acceptable level of throughput for the usage being targeted, such as high-quality video streaming.Type: GrantFiled: February 9, 2005Date of Patent: May 10, 2011Assignee: Microsoft CorporationInventors: Christian R. Lehew, Harry S. Pyle
-
Publication number: 20110035593Abstract: A process for establishing secure mutual trust includes generating a one-time-password. The one-time-password is transferred between the devices in a communication occurring off of the network. Each device generates a set of authenticators by hashing a plurality of sub-strings of the password and the device's authentication certificate with a respective set of nonces. The devices exchange the respective sets of authenticators. Each device then alternates revealing its respective set of nonces and its authentication certificate in a multi-stage process. The devices re-calculate the authenticators based upon the respective set of nonces and authentication certificate revealed by the other device along with the one-time-password sub-strings that it posses. If each device determines that the authenticators re-calculated by the given device matches the authenticators previously received from the other device, secure mutual trust is established.Type: ApplicationFiled: October 19, 2010Publication date: February 10, 2011Applicant: Microsoft CorporationInventors: Harry S. Pyle, Bruce Louis Lieberman, Daniel R. Simon, Guillaume Simonnet, William Dollar
-
Patent number: 7836306Abstract: A process for establishing secure mutual trust includes generating a one-time-password. The one-time-password is transferred between the devices in a communication occurring off of the network. Each device generates a set of authenticators by hashing a plurality of sub-strings of the password and the device's authentication certificate with a respective set of nonces. The devices exchange the respective sets of authenticators. Each device then alternates revealing its respective set of nonces and its authentication certificate in a multi-stage process. The devices re-calculate the authenticators based upon the respective set of nonces and authentication certificate revealed by the other device along with the one-time-password sub-strings that it posses. If each device determines that the authenticators re-calculated by the given device matches the authenticators previously received from the other device, secure mutual trust is established.Type: GrantFiled: June 29, 2005Date of Patent: November 16, 2010Assignee: Microsoft CorporationInventors: Harry S. Pyle, Bruce Louis Lieberman, Daniel R. Simon, Guillaume Simonnet, William Dollar
-
Publication number: 20100125896Abstract: Systems and methods for use in connection with the trusted transmission and reception of content, such as encryption key information, from one computing device in a network to a second computing device are provided. In one embodiment, the invention provides a way to trust or validate the transfer of a public key using a very short code entered out of band of the network that is easy for end-users to remember, or write down.Type: ApplicationFiled: January 26, 2010Publication date: May 20, 2010Applicant: Microsoft CorporationInventors: Christian R. Lehew, Harry S. Pyle, Nicholas Jie Fang
-
Patent number: 7673046Abstract: Systems and methods for use in connection with the trusted transmission and reception of content, such as encryption key information, from one computing device in a network to a second computing device are provided. In one embodiment, the invention provides a way to trust or validate the transfer of a public key using a very short code entered out of band of the network that is easy for end-users to remember, or write down.Type: GrantFiled: July 9, 2004Date of Patent: March 2, 2010Assignee: Microsoft CorporationInventors: Christian R. Lehew, Harry S. Pyle, Nicholas Jie Fang
-
Patent number: 7617453Abstract: A method and system for generating a user interface for controlling software components through a user control point device. The user interface system provides multiple software components that each can provide a user interface component. Each user interface component provides a user interface for the corresponding software component. A user control point component requests each software component to provide its user interface component. The user control point component then displays an indication of each software component. In response to the selection of a software component, the user control point component requests the user interface component for that software component to display its user interface through the control point device. When a user interacts with that user interface, the user interface component notifies the corresponding software component of the interaction.Type: GrantFiled: May 28, 1999Date of Patent: November 10, 2009Assignee: Microsoft CorporationInventors: Richard Hasha, Harry S. Pyle
-
Patent number: 7546373Abstract: Systems and methods for enabling secure dynamic credential distribution to a machine over a network are provided. In various embodiments, a computer, into which logging or access is sought, distributes logon credentials automatically to a requestor over the network before logon. Based on pre-existing trust, the computer self-generates and self-distributes logon credentials to the requestor, whereby the logon credentials are not stored on the requestor device.Type: GrantFiled: July 9, 2004Date of Patent: June 9, 2009Assignee: Microsoft CorporationInventors: Christian R. Lehew, Harry S. Pyle, Nicholas Jie Fang
-
Patent number: 7453906Abstract: Systems and methods for automatic network optimization with application variables are provided. Operation of a protocol stack, such as an SCP stack, relies upon a number of persistent variables, which are remembered over power and reset cycles, used in connection with controlling protocol timing and behavior. These application variables are handled at the network layer of the protocol and may be assigned values by an address space arbitrator, which is an entity responsible for managing the logical network. Each node member of a logical network maintains a set of values for its application variables. This set can be handled by the protocol's network layer, and can be saved in persisted storage. Since the variable values may be modified asynchronously, they are treated as volatile and thus, when a variable is used, its value is obtained through an application interface exposed by a network layer, e.g., through polling.Type: GrantFiled: September 19, 2002Date of Patent: November 18, 2008Assignee: Microsoft CorporationInventors: Guillaume Simonnet, Harry S. Pyle, Richard L. Hasha
-
Patent number: 7257644Abstract: Providing presence tracking of nodes of a logical network in a distributed computing system. Each node in a logical network tracks the presence of all other nodes on the network. This presence information is used by the protocol to optimize bandwidth utilization of the shared physical media, by not attempting to communicate with a device that does not appear to be or is unlikely to be present. In one embodiment, the presence tracking is applied to a power line carrier (PLC) physical media because of PLC's low-bandwidth characteristics, low baud rate characteristics and the widespread usage of plugged-in devices, the presence of which on the network is generally more transient by nature.Type: GrantFiled: September 19, 2002Date of Patent: August 14, 2007Assignee: Microsoft CorporationInventors: Guillaume Simonnet, Harry S. Pyle
-
Patent number: 7010749Abstract: A method and system for generating a user interface for controlling software components through a user control point device. The user interface system provides multiple software components that each can provide a user interface component. Each user interface component provides a user interface for the corresponding software component. A user control point component requests each software component to provide its user interface component. The user control point component then displays an indication of each software component. In response to the selection of a software component, the user control point component requests the user interface component for that software component to display its user interface through the control point device. When a user interacts with that user interface, the user interface component notifies the corresponding software component of the interaction.Type: GrantFiled: September 13, 2002Date of Patent: March 7, 2006Inventors: Richard Hasha, Harry S. Pyle
-
Publication number: 20040210630Abstract: Systems and methods for forming and maintaining a secure logical network are provided, thereby enabling confidentiality and authenticity in the exchange of information between nodes on the logical network. In one embodiment, an Address Space Arbitrator (ASA) is a component responsible for the management of a logical network. The ASA performs at least three related functions: discovery, acquisition and maintenance. The way each of discovery, acquisition and maintenance are performed and optimized in accordance with the invention contributes to keeping the logical network secure, and communications robust, even though the underlying physical network is a shared (public) and unreliable media.Type: ApplicationFiled: April 17, 2003Publication date: October 21, 2004Applicant: Microsoft CorporationInventors: Guillaume Simonnet, Harry S. Pyle, Richard Hasha
-
Patent number: 6734879Abstract: A method and system for generating a user interface for controlling software components through a user control point device. The user interface system provides multiple software components that each can provide a user interface component. Each user interface component provides a user interface for the corresponding software component. A user control point component requests each software component to provide its user interface component. The user control point component then displays an indication of each software component. In response to the selection of a software component, the user control point component requests the user interface component for that software component to display its user interface through the control point device. When a user interacts with that user interface, the user interface component notifies the corresponding software component of the interaction.Type: GrantFiled: September 13, 2002Date of Patent: May 11, 2004Inventors: Richard Hasha, Harry S. Pyle
-
Publication number: 20040081201Abstract: Systems and methods for automatic network optimization with application variables are provided. Operation of a protocol stack, such as an SCP stack, relies upon a number of persistent variables, which are remembered over power and reset cycles, used in connection with controlling protocol timing and behavior. These application variables are handled at the network layer of the protocol and may be assigned values by an address space arbitrator, which is an entity responsible for managing the logical network. Each node member of a logical network maintains a set of values for its application variables. This set can be handled by the protocol's network layer, and can be saved in persisted storage. Since the variable values may be modified asynchronously, they are treated as volatile and thus, when a variable is used, its value is obtained through an application interface exposed by a network layer, e.g., through polling.Type: ApplicationFiled: September 19, 2002Publication date: April 29, 2004Inventors: Guillaume Simonnet, Harry S. Pyle, Richard L. Hasha
-
Publication number: 20040059963Abstract: Systems and methods for providing presence tracking of nodes of a logical network in a distributed computing system are provided. Each node in a logical network tracks the presence of all other nodes on the network. This presence information is used by the protocol to optimize bandwidth utilization of the shared physical media, by not attempting to communicate with a device that does not appear to be or is unlikely to be present. In one embodiment, the presence tracking is applied to a power line carrier (PLC) physical media because of PLC's low-bandwidth characteristics, low baud rate characteristics and the widespread usage of plugged-in devices, the presence of which on the network is generally more transient by nature. Each node on the network asserts its presence at least by sending a periodic qualifying message or by sending traffic and tracks the presence of other nodes by periodically sampling whether a keep-alive has been received.Type: ApplicationFiled: September 19, 2002Publication date: March 25, 2004Inventors: Guillaume Simonnet, Harry S. Pyle