Patents by Inventor James A. Sutton

James A. Sutton has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20130303507
    Abstract: The present invention provides a compound of formula (II): where R1 is a substituted alkyl, heterocyclic, or cycloalkyl, group, and pharmaceutically acceptable salts, enantiomers, stereoisomers, rotamers, tautomers, diastereomers, or racemates thereof, and pharmaceutical compositions comprising these compounds. Also provided are methods of using these compounds to treat a disease or condition mediated by CDK9, such as cancers and other conditions described herein.
    Type: Application
    Filed: January 20, 2012
    Publication date: November 14, 2013
    Applicant: Novartis AG
    Inventors: William R. Antonios-McCrea, Paul A. Barsanti, Cheng Hu, Xianming Jin, Eric Martin, Yue Pan, Xiaodong Lin, Keith B. Pfister, Paul A. Renhowe, Martin Sendzik, James Sutton, Lifeng Wan
  • Publication number: 20130254905
    Abstract: In one embodiment of the present invention, a method includes verifying a master processor of a system; validating a trusted agent with the master processor if the master processor is verified; and launching the trusted agent on a plurality of processors of the system if the trusted agent is validated. After execution of such a trusted agent, a secure kernel may then be launched, in certain embodiments. The system may be a multiprocessor server system having a partially or fully connected topology with arbitrary point-to-point interconnects, for example.
    Type: Application
    Filed: May 20, 2013
    Publication date: September 26, 2013
    Inventors: John H. Wilson, Ioannis T. Schoinas, Mazin S. Yousif, Linda J. Rankin, David W. Grawrock, Robert J. Greiner, James A. Sutton, Kushagra Vaid, Williard M. Wiseman
  • Publication number: 20130205127
    Abstract: A method and apparatus for initiating secure operations in a microprocessor system is described. In one embodiment, one initiating logical processor initiates the process by halting the execution of the other logical processors, and then loading initialization and secure virtual machine monitor software into memory. The initiating processor then loads the initialization software into secure memory for authentication and execution. The initialization software then authenticates and registers the secure virtual machine monitor software prior to secure system operations.
    Type: Application
    Filed: March 15, 2013
    Publication date: August 8, 2013
    Inventors: James A. Sutton, II, David W. Grawrock
  • Patent number: 8464048
    Abstract: In one embodiment of the present invention, a method includes verifying a master processor of a system; validating a trusted agent with the master processor if the master processor is verified; and launching the trusted agent on a plurality of processors of the system if the trusted agent is validated. After execution of such a trusted agent, a secure kernel may then be launched, in certain embodiments. The system may be a multiprocessor server system having a partially or fully connected topology with arbitrary point-to-point interconnects, for example.
    Type: Grant
    Filed: March 16, 2012
    Date of Patent: June 11, 2013
    Assignee: Intel Corporation
    Inventors: John H. Wilson, Ioannis T. Schoinas, Mazin S. Yousif, Linda J. Rankin, David W. Grawrock, Robert J. Greiner, James A. Sutton, Kushagra Vaid, Willard M. Wiseman
  • Publication number: 20130103938
    Abstract: Apparatuses, methods, and systems for reconfiguring a secure system are disclosed. In one embodiment, an apparatus includes a configuration storage location, a lock, and lock override logic. The configuration storage location is to store information to configure the apparatus. The lock is to prevent writes to the configuration storage location. The lock override logic is to allow instructions executed from sub-operating mode code to override the lock.
    Type: Application
    Filed: October 31, 2012
    Publication date: April 25, 2013
    Inventors: Sham M. Datta, Mohan J. Kumar, Ernie Brickell, Ioannis T. Schoinas, James A. Sutton
  • Publication number: 20130101622
    Abstract: The invention provides novel compositions comprising imidazoquinoxaline compounds of formula (I) and analogs thereof. Also provided are methods of administering the compositions in an effective amount to enhance the immune response of a subject. Further provided are novel compositions and methods of administering the compositions in combination with (an) other agent(s).
    Type: Application
    Filed: May 7, 2012
    Publication date: April 25, 2013
    Applicant: Novartis AG
    Inventors: James SUTTON, Feng Xu, Nicholas Valiante, Jiong Lan
  • Patent number: 8415381
    Abstract: The present invention provides a compound of formula (I): and pharmaceutically acceptable salts, enantiomers, stereoisomers, rotamers, tautomers, diastereomers, or racemates thereof. Also provided is a method of treating a disease or condition mediated by CDK9.
    Type: Grant
    Filed: July 26, 2010
    Date of Patent: April 9, 2013
    Assignee: Novartis AG
    Inventors: Paul A. Barsanti, Cheng Hu, Jeff Jin, Robert Keyes, Robert Kucejko, Xiaodong Lin, Yue Pan, Keith B. Pfister, Martin Sendzik, James Sutton, Lifeng Wan
  • Patent number: 8407476
    Abstract: An article of manufacture is provided for securing a region in a memory of a computer. According to one embodiment, the article of manufacture comprises a machine-accessible medium including data that, when accessed by a machine, causes the machine to: halt all but one of a plurality of processing elements in a computer, where the halted processing elements enter into a special halted state; load content into the region only after the halting of all but the one of the plurality of processing elements and the region is protected from access by the halted processing elements; place the non-halted processing element into a known privileged state; and cause the halted processing elements to exit the halted state after the non-halted processing element has been placed into the known privileged state.
    Type: Grant
    Filed: November 10, 2009
    Date of Patent: March 26, 2013
    Assignee: Intel Corporation
    Inventors: Michael A. Kozuch, James A. Sutton, II, David Grawrock
  • Patent number: 8386788
    Abstract: A method and apparatus is provided for securing a region in a memory of a computer. According to one embodiment, the method comprises halting of all but one of a plurality of processors in a computer. The halted processors entering into a special halted state. Content is loaded into the region only after the halting of all but the one of the plurality of processors and the region is protected from access by the halted processors. The method further comprises placing the non-halted processor into a known privileged state, and causing the halted processors to exit the halted state after the non-halted processor has been placed into the known privileged state.
    Type: Grant
    Filed: November 10, 2009
    Date of Patent: February 26, 2013
    Assignee: Intel Corporation
    Inventors: Michael A. Kozuch, James A. Sutton, II, David Grawrock
  • Patent number: 8316414
    Abstract: Apparatuses, methods, and systems for reconfiguring a secure system are disclosed. In one embodiment, an apparatus includes a configuration storage location, a lock, and lock override logic. The configuration storage location is to store information to configure the apparatus. The lock is to prevent writes to the configuration storage location. The lock override logic is to allow instructions executed from sub-operating mode code to override the lock.
    Type: Grant
    Filed: December 29, 2006
    Date of Patent: November 20, 2012
    Assignee: Intel Corporation
    Inventors: Sham M. Datta, Mohan J. Kumar, James A. Sutton, Ernie Brickell, Ioannis T. Schoinas
  • Patent number: 8293769
    Abstract: Benzoxazole and benzothiazole compounds and their oxides, esters, prodrugs, solvates, and pharmaceutically acceptable salts thereof are disclosed. Compositions of the compounds, either alone or in combination with at least one additional therapeutic agent, with a pharmaceutically acceptable carrier, and uses of the compounds, either alone or in combination with at least one additional therapeutic agent are also disclosed. The embodiments are useful for inhibiting cellular proliferation, inhibiting the growth and/or metathesis of tumors, treating or preventing cancer, treating or preventing degenerating bone diseases such as rheumatoid arthritis, and/or inhibiting molecules such as CSF 1R.
    Type: Grant
    Filed: May 20, 2008
    Date of Patent: October 23, 2012
    Assignee: Novartis AG
    Inventors: Simon C. Ng, Keith B. Pfister, Martin Sendzik, James Sutton, Allan S. Wagman, Marion Wiesmann
  • Publication number: 20120239906
    Abstract: In one embodiment of the present invention, a method includes verifying a master processor of a system; validating a trusted agent with the master processor if the master processor is verified; and launching the trusted agent on a plurality of processors of the system if the trusted agent is validated. After execution of such a trusted agent, a secure kernel may then be launched, in certain embodiments. The system may be a multiprocessor server system having a partially or fully connected topology with arbitrary point-to-point interconnects, for example.
    Type: Application
    Filed: March 16, 2012
    Publication date: September 20, 2012
    Inventors: John H. Wilson, Ioannis T. Schoinas, Mazin S. Yousif, Linda J. Rankin, David W. Grawrock, Robert J. Greiner, James A. Sutton, Kushagra Vaid, Willard M. Wiseman
  • Publication number: 20120216025
    Abstract: A method and apparatus for initiating secure operations in a microprocessor system is described. In one embodiment, one initiating logical processor initiates the process by halting the execution of the other logical processors, and then loading initialization and secure virtual machine monitor software into memory. The initiating processor then loads the initialization software into secure memory for authentication and execution. The initialization software then authenticates and registers the secure virtual machine monitor software prior to secure system operations.
    Type: Application
    Filed: April 11, 2012
    Publication date: August 23, 2012
    Inventors: James A. Sutton, II, David W. Grawrock
  • Patent number: 8250364
    Abstract: In one embodiment of the present invention, a method includes verifying an initiating logical processor of a system; validating a trusted agent with the initiating logical processor if the initiating logical processor is verified; and launching the trusted agent on a plurality of processors of the system if the trusted agent is validated. After execution of such a trusted agent, a secure kernel may then be launched, in certain embodiments. The system may be a multiprocessor server system having a partially or fully connected topology with arbitrary point-to-point interconnects, for example.
    Type: Grant
    Filed: June 28, 2010
    Date of Patent: August 21, 2012
    Assignee: Intel Corporation
    Inventors: John H. Wilson, Ioannis T. Schoinas, Mazin S. Yousif, Linda J. Rankin, David W. Grawrock, Robert J. Greiner, James A. Sutton, Kushagra Vaid, Willard M. Wiseman
  • Publication number: 20120165306
    Abstract: The present invention provides a compound of Formula (I): and pharmaceutically acceptable salts thereof. Also provided is a method of using a compound of Formula I for treating a disease or condition mediated by a CDK inhibitor.
    Type: Application
    Filed: September 2, 2010
    Publication date: June 28, 2012
    Inventors: Paul A. Barsanti, Cheng Hu, Cheng Hu, Keith B. Pfister, Martin Sendzik, James Sutton
  • Publication number: 20120133294
    Abstract: A method for controlling an output of a AC current fluorescent lamp, including the steps of predetermining a desired degree of lamp illumination, determining the zero crossing point of a waveform representing an input voltage to the fluorescent lamp, and correlating the desired degree of illumination in relation to the zero crossing point and a cycle position later than the zero crossing point. Input voltage is allowed to flow to the fluorescent lamp beginning at zero voltage and an output feedback load is generated by the fluorescent lamp. The optimized input voltage is prevented from flowing to the fluorescent lamp after the zero crossing point at the correlated position of the input current in relation to the zero crossing point based on the detected output feedback load generated by the fluorescent lamp. A dimmer for carrying out the method is also disclosed.
    Type: Application
    Filed: December 27, 2010
    Publication date: May 31, 2012
    Applicant: PRO-TECH, INC.
    Inventor: James A. Sutton
  • Patent number: 8185734
    Abstract: A method and apparatus for initiating secure operations in a microprocessor system is described. In one embodiment, one initiating logical processor initiates the process by halting the execution of the other logical processors, and then loading initialization and secure virtual machine monitor software into memory. The initiating processor then loads the initialization software into secure memory for authentication and execution. The initialization software then authenticates and registers the secure virtual machine monitor software prior to secure system operations.
    Type: Grant
    Filed: June 8, 2009
    Date of Patent: May 22, 2012
    Assignee: Intel Corporation
    Inventors: James A. Sutton, II, David W. Grawrock
  • Patent number: 8173657
    Abstract: The invention provides novel compositions comprising imidazoquinoxaline compounds of formula (I) and analogs thereof. Also provided are methods of administering the compositions in an effective amount to enhance the immune response of a subject. Further provided are novel compositions and methods of administering the compositions in combination with (an) other agent(s).
    Type: Grant
    Filed: March 23, 2007
    Date of Patent: May 8, 2012
    Assignee: Novartis AG
    Inventors: James Sutton, Feng Xu, Nicholas Valiante, Jiong Lan
  • Patent number: 8161280
    Abstract: In one embodiment of the present invention, a method includes verifying a master processor of a system; validating a trusted agent with the master processor if the master processor is verified; and launching the trusted agent on a plurality of processors of the system if the trusted agent is validated. After execution of such a trusted agent, a secure kernel may then be launched, in certain embodiments. The system may be a multiprocessor server system having a partially or fully connected topology with arbitrary point-to-point interconnects, for example.
    Type: Grant
    Filed: June 29, 2010
    Date of Patent: April 17, 2012
    Assignee: Intel Corporation
    Inventors: John H. Wilson, Ioannis T. Schoinas, Mazin S. Yousif, Linda J. Rankin, David W. Grawrock, Robert J. Greiner, James A. Sutton, Kushagra Vaid, Willard M. Wiseman
  • Patent number: 8145816
    Abstract: A method and system of deadlock free bus protection of memory and I/O resources during secure execution. A bus cycle initiates entry of a bus agent into a secure execution mode. The chipset records an identifier of the secure mode processor. Thereafter, the chipset intercedes if another bus agent attempts a security sensitive bus cycle before the secure mode processor exits the secure mode.
    Type: Grant
    Filed: September 15, 2004
    Date of Patent: March 27, 2012
    Assignee: Intel Corporation
    Inventors: Stephen A. Fischer, Douglas Raymond Moran, James A. Sutton, II