Patents by Inventor Jeffrey A. Bisset
Jeffrey A. Bisset has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Publication number: 20080263470Abstract: Various exemplary metadirectories, systems and/or methods include or allow for executing a software module on an execution engine, emitting semantic information based on the executing, and analyzing the executing using the semantic information. An exemplary execution engine includes an input for receiving software modules, an output for emitting semantic information, and an output for outputting generated output information. Upon execution, an exemplary software module may cause processing of information in a metadirectory and emitting of semantic information pertaining to the processing. Various exemplary metadirectories, systems and/or methods emit and/or store semantic information in a self-defining language, an extensible language, and/or a markup language. Other exemplary metadirectories, systems, and/or methods are also disclosed.Type: ApplicationFiled: August 14, 2007Publication date: October 23, 2008Applicant: Microsoft CorporationInventors: Derek Murman, Edward H. Wayt, Jeffrey Bisset, Jing Wu, Kim Cameron, Max L. Benson, Jie Liu
-
Patent number: 7257603Abstract: Various exemplary metadirectories, systems and/or methods include or allow for executing a software module on an execution engine, emitting semantic information based on the executing, and analyzing the executing using the semantic information. An exemplary execution engine includes an input for receiving software modules, an output for emitting semantic information, and an output for outputting generated output information. Upon execution, an exemplary software module may cause processing of information in a metadirectory and emitting of semantic information pertaining to the processing. Various exemplary metadirectories, systems and/or methods emit and/or store semantic information in a self-defining language, an extensible language, and/or a markup language. Other exemplary metadirectories, systems, and/or methods are also disclosed.Type: GrantFiled: May 8, 2003Date of Patent: August 14, 2007Assignee: Microsoft CorporationInventors: Derek Murman, Edward H. Wayt, Jeffrey Bisset, Jing Wu, Kim Cameron, Max L. Benson, Jie Liu
-
Publication number: 20040225682Abstract: Various exemplary metadirectories, systems and/or methods include or allow for executing a software module on an execution engine, emitting semantic information based on the executing, and analyzing the executing using the semantic information. An exemplary execution engine includes an input for receiving software modules, an output for emitting semantic information, and an output for outputting generated output information. Upon execution, an exemplary software module may cause processing of information in a metadirectory and emitting of semantic information pertaining to the processing. Various exemplary metadirectories, systems and/or methods emit and/or store semantic information in a self-defining language, an extensible language, and/or a markup language. Other exemplary metadirectories, systems, and/or methods are also disclosed.Type: ApplicationFiled: May 8, 2003Publication date: November 11, 2004Applicant: MICROSOFT CORPORATIONInventors: Derek Murman, Edward H. Wayt, Jeffrey Bisset, Jing Wu, Kim Cameron, Max L. Benson, Jie Liu
-
Patent number: 6584495Abstract: A computerized method provides unshared local storage space to a process distributed by a trusted source through the use of an identity associated with the process that specifies local capabilities for the identity on a computer. The method obtains the identity and allocates the local storage space based on the information on the local capabilities, securing the space with the identity so that only a process with the same identity can access the space. The method also enforces the local capabilities on the process by monitoring the use of the local storage space. The identity is uniquely defined by a digital certificate or similar security facility. The identity is associated with a data structure, such as a digital signature, that includes the size of the local storage space and, optionally, whether the process is subject to global storage limits set by the computer. A computerized system which executes the method is also disclosed.Type: GrantFiled: January 30, 1998Date of Patent: June 24, 2003Assignee: Microsoft CorporationInventors: Jeffrey A. Bisset, Michael Jerger, Michael Toutonghi
-
Patent number: 6473800Abstract: Computer-based systems and methods are disclosed for a comprehensive security model for managing active content downloaded from a computer network. The security model includes the configuration of a system security policy that is stored on a host computer. The system security policy is configured by security zone in progressively “finer grain” levels with each level associated with and defining the previous level. These levels may include: protected operations; user permission sets, permissions, parameters and primitives. In the disclosed method and systems, a publisher of active content specifies a requested permission set that includes a list the permissions (defined by parameters, which are defined by primitives) that the active content requires in order to run on the host system. The requested permission set is external to the active content so that it is not necessary to run the active content in order to discover the permissions that the active content requires in order to run.Type: GrantFiled: July 15, 1998Date of Patent: October 29, 2002Assignee: Microsoft CorporationInventors: Michael S. Jerger, Jeffrey A. Bisset, Craig T. Sinclair, Michael J. Toutonghi
-
Patent number: 6345361Abstract: Computer-based systems and methods are disclosed for a comprehensive security model for managing active content downloaded from a computer network. The security model includes the configuration of a system security policy that is stored on a host computer. The system security policy is configured by security zone in progressively “finer grain” levels with each level associated with and defining the previous level. These levels may include: protected operations; user permission sets, permissions, parameters and primitives associated with parameters. A requested permission set is provided by the publisher of active content that lists the permissions that the active content requires in order to run on the host system. The requested permission set is automatically compared to one or more user permission sets to determine the permissions, if any that will be granted on the host system.Type: GrantFiled: July 15, 1998Date of Patent: February 5, 2002Assignee: Microsoft CorporationInventors: Michael S. Jerger, Jeffrey A. Bisset, Craig T. Sinclair, Michael J. Toutonghi
-
Patent number: 6321334Abstract: Computer-based systems and methods are disclosed for a comprehensive security model for managing foreign content downloaded from a computer network. The methods and systems include the configuration of a system security policy that is stored on a host computer. The system security policy includes one or more independently configurable security zones. Each security zone corresponds to a group of network locations and may have one or more associated configurable protected operations that control the access to the host system by foreign content downloaded from the computer network. A protected operations may have one or more associated configurable permissions that define the capabilities of the protected operation. Each permission may be defined by one or more parameters and each parameter may be defined by one or more primitives. The permissions may be defined to enable the permission, disable the permission, or prompt the user when the permission is required.Type: GrantFiled: July 15, 1998Date of Patent: November 20, 2001Assignee: Microsoft CorporationInventors: Michael S. Jerger, Jeffrey A. Bisset, Craig T. Sinclair, Michael J. Toutonghi