Patents by Inventor James A. Sutton

James A. Sutton has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20180203688
    Abstract: A software program is executed, the software program requiring one or more physical interactions with a user through an input/output (I/O) device, wherein each of the one or more physical interactions includes respective predefined dimensions indicating a proficiency in performing one of the one or more physical interactions. The one or more physical interactions are tracked. A familiarity profile for each of the one or more physical interactions is generated based on the respective predefined dimensions for each of the one or more physical interactions. The software program is customized based on the familiarity profile for each of the one or more physical interactions.
    Type: Application
    Filed: April 4, 2018
    Publication date: July 19, 2018
    Inventors: Paul M.R. Edmonds, Joe Pavitt, James E. Ravenscroft, James Sutton
  • Publication number: 20180203687
    Abstract: A software program is executed, the software program requiring one or more physical interactions with a user through an input/output (I/O) device, wherein each of the one or more physical interactions includes respective predefined dimensions indicating a proficiency in performing one of the one or more physical interactions. The one or more physical interactions are tracked. A familiarity profile for each of the one or more physical interactions is generated based on the respective predefined dimensions for each of the one or more physical interactions. The software program is customized based on the familiarity profile for each of the one or more physical interactions.
    Type: Application
    Filed: April 4, 2018
    Publication date: July 19, 2018
    Inventors: Paul M.R. Edmonds, Joe Pavitt, James E. Ravenscroft, James Sutton
  • Patent number: 9990208
    Abstract: A method and apparatus for initiating secure operations in a microprocessor system is described. In one embodiment, one initiating logical processor initiates the process by halting the execution of the other logical processors, and then loading initialization and secure virtual machine monitor software into memory. The initiating processor then loads the initialization software into secure memory for authentication and execution. The initialization software then authenticates and registers the secure virtual machine monitor software prior to secure system operations.
    Type: Grant
    Filed: January 10, 2017
    Date of Patent: June 5, 2018
    Assignee: Intel Corporation
    Inventors: James A. Sutton, II, David W. Grawrock
  • Patent number: 9959112
    Abstract: A software program is executed, the software program requiring one or more physical interactions with a user through an input/output (I/O) device, wherein each of the one or more physical interactions includes respective predefined dimensions indicating a proficiency in performing one of the one or more physical interactions. The one or more physical interactions are tracked. A familiarity profile for each of the one or more physical interactions is generated based on the respective predefined dimensions for each of the one or more physical interactions. The software program is customized based on the familiarity profile for each of the one or more physical interactions.
    Type: Grant
    Filed: March 15, 2016
    Date of Patent: May 1, 2018
    Assignee: International Business Machines Corporation
    Inventors: Paul M. R. Edmonds, Joe Pavitt, James E. Ravenscroft, James Sutton
  • Patent number: 9921824
    Abstract: A software program is executed, the software program requiring one or more physical interactions with a user through an input/output (I/O) device, wherein each of the one or more physical interactions includes respective predefined dimensions indicating a proficiency in performing one of the one or more physical interactions. The one or more physical interactions are tracked. A familiarity profile for each of the one or more physical interactions is generated based on the respective predefined dimensions for each of the one or more physical interactions. The software program is customized based on the familiarity profile for each of the one or more physical interactions.
    Type: Grant
    Filed: September 12, 2017
    Date of Patent: March 20, 2018
    Assignee: International Business Machines Corporation
    Inventors: Paul M. R. Edmonds, Joe Pavitt, James E. Ravenscroft, James Sutton
  • Publication number: 20180059920
    Abstract: A method, a computer program product, and a device that includes one or more processors, a touchscreen, and an operating system. A first dialogue interface is displayed on the touchscreen for receiving user commands by a user touching the dialogue interface. Received user commands are ignored for a defined first period of time in response to the operating system causing a generation of a second dialogue interface on the touchscreen, wherein the defined first period of time is a function of a user interaction with the touch screen by the user.
    Type: Application
    Filed: August 30, 2016
    Publication date: March 1, 2018
    Inventors: Paul M. R. Edmonds, Joe Pavitt, James E. Ravenscroft, James Sutton
  • Publication number: 20170371646
    Abstract: A software program is executed, the software program requiring one or more physical interactions with a user through an input/output (I/O) device, wherein each of the one or more physical interactions includes respective predefined dimensions indicating a proficiency in performing one of the one or more physical interactions. The one or more physical interactions are tracked. A familiarity profile for each of the one or more physical interactions is generated based on the respective predefined dimensions for each of the one or more physical interactions. The software program is customized based on the familiarity profile for each of the one or more physical interactions.
    Type: Application
    Filed: September 12, 2017
    Publication date: December 28, 2017
    Inventors: Paul M.R. Edmonds, Joe Pavitt, James E. Ravenscroft, James Sutton
  • Patent number: 9779249
    Abstract: In one embodiment of the present invention, a method includes verifying a master processor of a system; validating a trusted agent with the master processor if the master processor is verified; and launching the trusted agent on a plurality of processors of the system if the trusted agent is validated. After execution of such a trusted agent, a secure kernel may then be launched, in certain embodiments. The system may be a multiprocessor server system having a partially or fully connected topology with arbitrary point-to-point interconnects, for example.
    Type: Grant
    Filed: October 13, 2016
    Date of Patent: October 3, 2017
    Assignee: Intel Corporation
    Inventors: John H. Wilson, Ioannis T. Schoinas, Mazin S. Yousif, Linda J. Rankin, David W. Grawrock, Robert J. Greiner, James A. Sutton, Kushagra Vaid, Willard M. Wiseman
  • Publication number: 20170269925
    Abstract: A software program is executed, the software program requiring one or more physical interactions with a user through an input/output (I/O) device, wherein each of the one or more physical interactions includes respective predefined dimensions indicating a proficiency in performing one of the one or more physical interactions. The one or more physical interactions are tracked. A familiarity profile for each of the one or more physical interactions is generated based on the respective predefined dimensions for each of the one or more physical interactions. The software program is customized based on the familiarity profile for each of the one or more physical interactions.
    Type: Application
    Filed: March 15, 2016
    Publication date: September 21, 2017
    Inventors: Paul M.R. Edmonds, Joe Pavitt, James E. Ravenscroft, James Sutton
  • Publication number: 20170147359
    Abstract: A method and apparatus for initiating secure operations in a microprocessor system is described. In one embodiment, one initiating logical processor initiates the process by halting the execution of the other logical processors, and then loading initialization and secure virtual machine monitor software into memory. The initiating processor then loads the initialization software into secure memory for authentication and execution. The initialization software then authenticates and registers the secure virtual machine monitor software prior to secure system operations.
    Type: Application
    Filed: January 10, 2017
    Publication date: May 25, 2017
    Inventors: James A. Sutton, II, David W. Grawrock
  • Publication number: 20170132014
    Abstract: A method and apparatus for initiating secure operations in a microprocessor system is described. In one embodiment, one initiating logical processor initiates the process by halting the execution of the other logical processors, and then loading initialization and secure virtual machine monitor software into memory. The initiating processor then loads the initialization software into secure memory for authentication and execution. The initialization software then authenticates and registers the secure virtual machine monitor software prior to secure system operations.
    Type: Application
    Filed: January 10, 2017
    Publication date: May 11, 2017
    Inventors: James A. Sutton, II, David W. Grawrock
  • Publication number: 20170115993
    Abstract: A method and apparatus for initiating secure operations in a microprocessor system is described. In one embodiment, one initiating logical processor initiates the process by halting the execution of the other logical processors, and then loading initialization and secure virtual machine monitor software into memory. The initiating processor then loads the initialization software into secure memory for authentication and execution. The initialization software then authenticates and registers the secure virtual machine monitor software prior to secure system operations.
    Type: Application
    Filed: January 10, 2017
    Publication date: April 27, 2017
    Inventors: James A. Sutton, II, David W. Grawrock
  • Publication number: 20170098085
    Abstract: In one embodiment of the present invention, a method includes verifying a master processor of a system; validating a trusted agent with the master processor if the master processor is verified; and launching the trusted agent on a plurality of processors of the system if the trusted agent is validated. After execution of such a trusted agent, a secure kernel may then be launched, in certain embodiments. The system may be a multiprocessor server system having a partially or fully connected topology with arbitrary point-to-point interconnects, for example.
    Type: Application
    Filed: October 13, 2016
    Publication date: April 6, 2017
    Inventors: John H. Wilson, Ioannis T. Schoinas, Mazin S. Yousif, Linda J. Rankin, David W. Grawrock, Robert J. Greiner, James A. Sutton, Kushagra Vaid, Willard M. Wiseman
  • Patent number: 9507952
    Abstract: In one embodiment of the present invention, a method includes verifying a master processor of a system; validating a trusted agent with the master processor if the master processor is verified; and launching the trusted agent on a plurality of processors of the system if the trusted agent is validated. After execution of such a trusted agent, a secure kernel may then be launched, in certain embodiments. The system may be a multiprocessor server system having a partially or fully connected topology with arbitrary point-to-point interconnects, for example.
    Type: Grant
    Filed: November 11, 2015
    Date of Patent: November 29, 2016
    Assignee: Intel Corporation
    Inventors: John H. Wilson, Ioannis T. Schoinas, Mazin S. Yousif, Linda J. Rankin, David W. Grawrock, Robert J. Greiner, James A. Sutton, Kushagra Vaid, Willard M. Wiseman
  • Patent number: 9434719
    Abstract: The invention is directed to a formula (I): or a pharmaceutically acceptable salt thereof, wherein R1, R2a, R2b and R3-R7 are herein. The invention is also directed to compositions containing a compound of formula (I) and to the use of such compounds in the inhibition of mutant IDH proteins having a neomorphic activity. The invention is further directed to the use of a compound of formula (I) in the treatment of diseases or disorders associated with such mutant IDH proteins including, but not limited to, cell-proliferation disorders, such as cancer.
    Type: Grant
    Filed: March 12, 2014
    Date of Patent: September 6, 2016
    Assignee: NOVARTIS AG
    Inventors: Thomas Raymond Caferro, Zhuoliang Chen, Young Shin Cho, Abran Q. Costales, Julian Roy Levell, Gang Liu, James R. Manning, Martin Sendzik, Cynthia Shafer, Michael David Shultz, James Sutton, Yaping Wang, Qian Zhao
  • Patent number: 9361121
    Abstract: A method and apparatus for initiating secure operations in a microprocessor system is described. In one embodiment, one initiating logical processor initiates the process by halting the execution of the other logical processors, and then loading initialization and secure virtual machine monitor software into memory. The initiating processor then loads the initialization software into secure memory for authentication and execution. The initialization software then authenticates and registers the secure virtual machine monitor software prior to secure system operations.
    Type: Grant
    Filed: March 24, 2014
    Date of Patent: June 7, 2016
    Assignee: Intel Corporation
    Inventors: James A. Sutton, II, David W. Grawrock
  • Publication number: 20160063261
    Abstract: In one embodiment of the present invention, a method includes verifying a master processor of a system; validating a trusted agent with the master processor if the master processor is verified; and launching the trusted agent on a plurality of processors of the system if the trusted agent is validated. After execution of such a trusted agent, a secure kernel may then be launched, in certain embodiments. The system may be a multiprocessor server system having a partially or fully connected topology with arbitrary point-to-point interconnects, for example.
    Type: Application
    Filed: November 11, 2015
    Publication date: March 3, 2016
    Inventors: John H. Wilson, Ioannis T. Schoinas, Mazin S. Yousif, Linda J. Rankin, David W. Grawrock, Robert J. Greiner, James A. Sutton, Kushagra Vaid, Willard M. Wiseman
  • Publication number: 20160056960
    Abstract: A method and apparatus for initiating secure operations in a microprocessor system is described. In one embodiment, one initiating logical processor initiates the process by halting the execution of the other logical processors, and then loading initialization and secure virtual machine monitor software into memory. The initiating processor then loads the initialization software into secure memory for authentication and execution. The initialization software then authenticates and registers the secure virtual machine monitor software prior to secure system operations.
    Type: Application
    Filed: September 24, 2015
    Publication date: February 25, 2016
    Applicant: Intel Corporation
    Inventors: James A. Sutton, David W. Grawrock
  • Patent number: 9213865
    Abstract: In one embodiment of the present invention, a method includes verifying a master processor of a system; validating a trusted agent with the master processor if the master processor is verified; and launching the trusted agent on a plurality of processors of the system if the trusted agent is validated. After execution of such a trusted agent, a secure kernel may then be launched, in certain embodiments. The system may be a multiprocessor server system having a partially or fully connected topology with arbitrary point-to-point interconnects, for example.
    Type: Grant
    Filed: October 3, 2014
    Date of Patent: December 15, 2015
    Assignee: Intel Corporation
    Inventors: John H. Wilson, Ioannis T. Schoinas, Mazin S. Yousif, Linda J. Rankin, David W. Grawrock, Robert J. Greiner, James A. Sutton, Kushagra Vaid, Willard M. Wiseman
  • Publication number: 20150306085
    Abstract: The present invention provides a compound of formula I; wherein R1 is an alkyl pyrazole or an alkyl carboxamide, and R2 is a hydroxycycloalkyl; or a pharmaceutically acceptable salt thereof, and compositions containing these compounds, for use to treat a brain tumor, particularly glioblastoma. The invention provides effective treatment of a brain tumor and can be used by oral administration of a compound of Formula I as further described herein. The invention also provides a method to treat a subject having a brain tumor such as glioblastoma, wherein the method comprises administering to the subject an effective amount of a compound of Formula I. Gene signatures correlated with successful treatment using these methods are also disclosed.
    Type: Application
    Filed: June 29, 2015
    Publication date: October 29, 2015
    Applicant: Novartis AG
    Inventors: Dylan DANIEL, Johanna JOYCE, James SUTTON