Patents by Inventor John M. Hawkins

John M. Hawkins has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20160262730
    Abstract: The devices and methods taught in this disclosure are directed to facilitate the observation, collection, transportation, storage, and preservation of specimens possibly containing DNA, said specimens potentially constituting evidence of sexual assault. The devices and methods described further allow for a means of minimizing the possibility of specimen contamination, dilution, or degradation during the collection and storage processes. The disclosed devices may contain electrical components that provide for the generation and recordation of information (specifically, times, dates, and locations) related to circumstances surrounding the collection of such specimens. This information may serve as evidence corroborating the circumstance of specimen collection, it may help to maintain a known and identifiable Chain of Custody (CoC), and it may additionally be used for unique device identification (UDI), inventory control, and current procedural terminology (CPT) coding purposes.
    Type: Application
    Filed: August 18, 2015
    Publication date: September 15, 2016
    Inventors: Jonathan M. Speck, Ronald L. Speck, Glenda Beth Horn Herring, Diana Faugno, Rachell A Ekroos, Stacey A. Mitchell, Erik J Ernst, John M Hawkins
  • Patent number: 9384119
    Abstract: An error in a web page displayed on a device is detected. The error is assigned to a bucket to indicate a type of the error, and a record describing the current state of the device is generated. Both an indication of the bucket and the record describing the current state of the device are then sent to a server. At the server, error information including error records and bucket identifiers are received from multiple devices. Each error record describes a current state of one of the multiple devices at a time when an error in a web page displayed on the one device was detected. Each bucket identifier corresponds to one of the error records and describes a type of the error associated with that error record. The error records are grouped into multiple baskets based at least in part on the current state information in the error records.
    Type: Grant
    Filed: January 27, 2014
    Date of Patent: July 5, 2016
    Assignee: Microsoft Technology Licensing, LLC
    Inventors: Kellie Eickmeyer, Harley Michael Rosnow, Evguenia Maliouta, John M. Hawkins
  • Patent number: 9265580
    Abstract: The devices and methods taught in this disclosure are directed to facilitate the observation, collection, transportation, storage, and preservation of specimens possibly containing DNA, said specimens potentially constituting evidence of sexual assault. The devices and methods described further allow for a means of minimizing the possibility of specimen contamination, dilution, or degradation during the collection and storage processes. The disclosed devices may contain electrical components that provide for the generation and recordation of information (specifically, times, dates, and locations) related to circumstances surrounding the collection of such specimens. This information may serve as evidence corroborating the circumstance of specimen collection, it may help to maintain a known and identifiable Chain of Custody (CoC), and it may additionally be used for unique device identification (UDI), inventory control, and current procedural terminology (CPT) coding purposes.
    Type: Grant
    Filed: May 1, 2014
    Date of Patent: February 23, 2016
    Inventors: Jonathan M. Speck, Ronald L Speck, Glenda Beth Horn Herring, Diana K Faugno, Rachell A Ekroos, Stacey A. Mitchell, Erik J. Ernst, John M. Hawkins
  • Publication number: 20140330167
    Abstract: The devices and methods taught in this disclosure are directed to facilitate the observation, collection, transportation, storage, and preservation of specimens possibly containing DNA, said specimens potentially constituting evidence of sexual assault. The devices and methods described further allow for a means of minimizing the possibility of specimen contamination, dilution, or degradation during the collection and storage processes. The disclosed devices may contain electrical components that provide for the generation and recordation of information (specifically, times, dates, and locations) related to circumstances surrounding the collection of such specimens. This information may serve as evidence corroborating the circumstance of specimen collection, it may help to maintain a known and identifiable Chain of Custody (CoC), and it may additionally be used for unique device identification (UDI), inventory control, and current procedural terminology (CPT) coding purposes.
    Type: Application
    Filed: May 1, 2014
    Publication date: November 6, 2014
    Inventors: Jonathan M. Speck, Ronald L. Speck, Glenda Beth Horn Herring, Diana K. Faugno, Rachell A. Ekroos, Stacey A. Mitchell, Erik J. Ernst, John M. Hawkins
  • Publication number: 20140143606
    Abstract: An error in a web page displayed on a device is detected. The error is assigned to a bucket to indicate a type of the error, and a record describing the current state of the device is generated. Both an indication of the bucket and the record describing the current state of the device are then sent to a server. At the server, error information including error records and bucket identifiers are received from multiple devices. Each error record describes a current state of one of the multiple devices at a time when an error in a web page displayed on the one device was detected. Each bucket identifier corresponds to one of the error records and describes a type of the error associated with that error record. The error records are grouped into multiple baskets based at least in part on the current state information in the error records.
    Type: Application
    Filed: January 27, 2014
    Publication date: May 22, 2014
    Applicant: MICROSOFT CORPORATION
    Inventors: Kellie Eickmeyer, Harley Michael Rosnow, Evguenia Maliouta, John M. Hawkins
  • Patent number: 8677188
    Abstract: An error in a web page displayed on a device is detected. The error is assigned to a bucket to indicate a type of the error, and a record describing the current state of the device is generated. Both an indication of the bucket and the record describing the current state of the device are then sent to a server. At the server, error information including error records and bucket identifiers are received from multiple devices. Each error record describes a current state of one of the multiple devices at a time when an error in a web page displayed on the one device was detected. Each bucket identifier corresponds to one of the error records and describes a type of the error associated with that error record. The error records are grouped into multiple baskets based at least in part on the current state information in the error records.
    Type: Grant
    Filed: November 11, 2011
    Date of Patent: March 18, 2014
    Assignee: Microsoft Corporation
    Inventors: Kellie Eickmeyer, Harley Michael Rosnow, Jane Evguenia Maliouta, John M. Hawkins
  • Patent number: 8245270
    Abstract: Access to a resource by sandboxed code is dynamically authorized by a client security system based on a resource based policy. A sandboxed application running on a client is granted access to a resource based on a resource based policy despite denial of the access based on a static policy associated with the client security system. The granting of access coincides with the determination that the threat to a user or the user's information is not increased should the access be granted.
    Type: Grant
    Filed: September 1, 2005
    Date of Patent: August 14, 2012
    Assignee: Microsoft Corporation
    Inventors: Jeffrey M. Cooperstein, Aaron R. Goldfeder, Gregory D. Fee, John M. Hawkins, Venkatraman Kudallur
  • Patent number: 8156558
    Abstract: Described is a mechanism for collectively evaluating security risks associated with loading an application. A hosting environment associated with loading the application invokes a trust manager to evaluate the security risks. The trust manager invokes a plurality of trust evaluators, where each trust evaluator is responsible for analyzing and assessing a different security risk. Upon completion of each security risk evaluation, results of those individual security risk evaluations are returned to the trust manager. The trust manager aggregates the variety of security risk evaluation results and makes a security determination based on the aggregated evaluation results. That determination may be to move forward with loading the application, to block the load of the application, or perhaps to prompt the user for a decision about whether to move forward with the load.
    Type: Grant
    Filed: May 17, 2003
    Date of Patent: April 10, 2012
    Assignee: Microsoft Corporation
    Inventors: Aaron R. Goldfeder, John M. Hawkins, Sergey A. Khorun, Viresh N. Ramdatmisier, Joseph Thomas Farro, Gregory Darrell Fee, Jeremiah S. Epling, Andrew G. Bybee, Jingyang Xu, Tony Edward Schreiner, Jamie L. Cool
  • Publication number: 20120060065
    Abstract: An error in a web page displayed on a device is detected. The error is assigned to a bucket to indicate a type of the error, and a record describing the current state of the device is generated. Both an indication of the bucket and the record describing the current state of the device are then sent to a server. At the server, error information including error records and bucket identifiers are received from multiple devices. Each error record describes a current state of one of the multiple devices at a time when an error in a web page displayed on the one device was detected. Each bucket identifier corresponds to one of the error records and describes a type of the error associated with that error record. The error records are grouped into multiple baskets based at least in part on the current state information in the error records.
    Type: Application
    Filed: November 11, 2011
    Publication date: March 8, 2012
    Applicant: Microsoft Corporation
    Inventors: Kellie Eickmeyer, Harley Michael Rosnow, Jane (Evguenia) Maliouta, John M. Hawkins
  • Patent number: 8060789
    Abstract: An error in a web page displayed on a device is detected. The error is assigned to a bucket to indicate a type of the error, and a record describing the current state of the device is generated. Both an indication of the bucket and the record describing the current state of the device are then sent to a server. At the server, error information including error records and bucket identifiers are received from multiple devices. Each error record describes a current state of one of the multiple devices at a time when an error in a web page displayed on the one device was detected. Each bucket identifier corresponds to one of the error records and describes a type of the error associated with that error record. The error records are grouped into multiple baskets based at least in part on the current state information in the error records.
    Type: Grant
    Filed: May 3, 2010
    Date of Patent: November 15, 2011
    Assignee: Microsoft Corporation
    Inventors: Kellie Eickmeyer, Harley Michael Rosnow, Jane Evguenia Maliouta, John M. Hawkins
  • Publication number: 20100218053
    Abstract: An error in a web page displayed on a device is detected. The error is assigned to a bucket to indicate a type of the error, and a record describing the current state of the device is generated. Both an indication of the bucket and the record describing the current state of the device are then sent to a server. At the server, error information including error records and bucket identifiers are received from multiple devices. Each error record describes a current state of one of the multiple devices at a time when an error in a web page displayed on the one device was detected. Each bucket identifier corresponds to one of the error records and describes a type of the error associated with that error record. The error records are grouped into multiple baskets based at least in part on the current state information in the error records.
    Type: Application
    Filed: May 3, 2010
    Publication date: August 26, 2010
    Applicant: Microsoft Corporation
    Inventors: Kellie Eickmeyer, Harley Michael Rosnow, Jane (Evguenia) Maliouta, John M. Hawkins
  • Patent number: 7739551
    Abstract: An error in a web page displayed on a device is detected. The error is assigned to a bucket to indicate a type of the error, and a record describing the current state of the device is generated. Both an indication of the bucket and the record describing the current state of the device are then sent to a server. At the server, error information including error records and bucket identifiers are received from multiple devices. Each error record describes a current state of one of the multiple devices at a time when an error in a web page displayed on the one device was detected. Each bucket identifier corresponds to one of the error records and describes a type of the error associated with that error record. The error records are grouped into multiple baskets based at least in part on the current state information in the error records.
    Type: Grant
    Filed: June 20, 2007
    Date of Patent: June 15, 2010
    Assignee: Microsoft Corporation
    Inventors: Kellie Eickmeyer, Harley Michael Rosnow, Jane (Evguenia) Maliouta, John M. Hawkins
  • Patent number: 7698735
    Abstract: A method and system for using an Internet client's local authentication mechanism in systems having updated browser code, so as to enable third party authentication according to an authentication scheme specified by a participating server on clients with updated browser code, while not breaking clients with legacy browser code. A redirect response from a server has authentication data added thereto such that updated browser code can detect the data's presence and enable the use of local security mechanisms for authentication purposes with the server-specified authentication scheme, including local credential entry for verification at a third party login server. At the same time, if such a redirect response is received by prior browser code, the added data is ignored while conventional redirection occurs, such that third party authentication may be performed via redirection to a third party's Internet page that provides a form for credential entry.
    Type: Grant
    Filed: April 24, 2006
    Date of Patent: April 13, 2010
    Assignee: Microsoft Corporation
    Inventors: Rajeev Dujari, Biao Wang, John M. Hawkins, Yordan Rouskov, Samim Erdogan
  • Patent number: 7669238
    Abstract: Evidence-based application security may be implemented at the application and/or application group levels. A manifest may be provided defining at least one trust condition for the application or application group. A policy manager evaluates application evidence (e.g., an XrML license) for an application or group of applications relative to the manifest. The application is only granted permissions on the computer system if the application evidence indicates that the application is trusted. Similarly, a group of applications are only granted permissions on the computer system if the evidence indicates that the group of applications is trusted. If the application evidence satisfies the at least one trust condition defined by the manifest, the policy manager generates a permission grant set for each code assembly that is a member of the at least one application. Evidence may be further evaluated for code assemblies that are members of the trusted application or application group.
    Type: Grant
    Filed: November 10, 2003
    Date of Patent: February 23, 2010
    Assignee: Microsoft Corporation
    Inventors: Gregory D. Fee, Aaron Goldfeder, John M. Hawkins, Jamie L. Cool, Sebastian Lange, Sergey Khorun
  • Patent number: 7516477
    Abstract: Described is a system and method by which an application program is evaluated for trustworthiness based on the permissions and/or privileges it requests relative to a program category. The program describes the permissions needed to operate, and identifies itself as belonging to a particular category. Security components compare the requested permission set against the permissions that programs of that category actually need in order to operate properly. Programs requesting more permissions than needed are deemed untrustworthy. For example, screen saver application programs need only a limited permission set to operate properly, including full screen access and the ability to read files, but do not need network access permissions or write access to files. Any screensaver application that requests only the needed permission set is deemed trustworthy, while others that request permissions beyond what is actually needed are not deemed trustworthy, and a user or automated policy process may then intervene.
    Type: Grant
    Filed: October 21, 2004
    Date of Patent: April 7, 2009
    Assignee: Microsoft Corporation
    Inventors: Karen E. Corby, Aaron Goldfeder, John M. Hawkins
  • Publication number: 20080320343
    Abstract: An error in a web page displayed on a device is detected. The error is assigned to a bucket to indicate a type of the error, and a record describing the current state of the device is generated. Both an indication of the bucket and the record describing the current state of the device are then sent to a server. At the server, error information including error records and bucket identifiers are received from multiple devices. Each error record describes a current state of one of the multiple devices at a time when an error in a web page displayed on the one device was detected. Each bucket identifier corresponds to one of the error records and describes a type of the error associated with that error record. The error records are grouped into multiple baskets based at least in part on the current state information in the error records.
    Type: Application
    Filed: June 20, 2007
    Publication date: December 25, 2008
    Applicant: Microsoft Corporation
    Inventors: Kellie Eickmeyer, Harley Michael Rosnow, Jane (Evguenia) Maliouta, John M. Hawkins
  • Patent number: 7210167
    Abstract: Described herein is an implementation of a technology for managing credentials. With an implementation, a credential manager is domain-authentication aware and concurrent authentications with multiple independent networks (e.g., domains) may be established and maintained. Moreover, a credential manager provides a credential model retrofit for legacy applications that only understand the password model. The manager provides a mechanism where the application is only a “blind courier” of credentials between the trusted part of the OS to the network and/or network resource. The manager fully insulates the application from “read” access to the credentials. This abstract itself is not intended to limit the scope of this patent. The scope of the present invention is pointed out in the appending claims.
    Type: Grant
    Filed: January 8, 2001
    Date of Patent: April 24, 2007
    Assignee: Microsoft Corporation
    Inventors: John E. Brezak, Clifford P. Van Dyke, John M. Hawkins, Klaus U. Schutz
  • Patent number: 7191467
    Abstract: A method and system for using an Internet client's local authentication mechanism in systems having updated browser code, so as to enable third party authentication according to an authentication scheme specified by a participating server on clients with updated browser code, while not breaking clients with legacy browser code. A redirect response from a server has authentication data added thereto such that updated browser code can detect the data's presence and enable the use of local security mechanisms for authentication purposes with the server-specified authentication scheme, including local credential entry for verification at a third party login server. At the same time, if such a redirect response is received by prior browser code, the added data is ignored while conventional redirection occurs, such that third party authentication may be performed via redirection to a third party's Internet page that provides a form for credential entry.
    Type: Grant
    Filed: March 15, 2002
    Date of Patent: March 13, 2007
    Assignee: Microsoft Corporation
    Inventors: Rajeev Dujari, Biao Wang, John M. Hawkins, Yordan Rouskov, Samim Erdogan
  • Publication number: 20040230835
    Abstract: Described is a mechanism for collectively evaluating security risks associated with loading an application. A hosting environment associated with loading the application invokes a trust manager to evaluate the security risks. The trust manager invokes a plurality of trust evaluators, where each trust evaluator is responsible for analyzing and assessing a different security risk. Upon completion of each security risk evaluation, results of those individual security risk evaluations are returned to the trust manager. The trust manager aggregates the variety of security risk evaluation results and makes a security determination based on the aggregated evaluation results. That determination may be to move forward with loading the application, to block the load of the application, or perhaps to prompt the user for a decision about whether to move forward with the load.
    Type: Application
    Filed: May 17, 2003
    Publication date: November 18, 2004
    Inventors: Aaron R. Goldfeder, John M. Hawkins, Serge A. Khorun, Viresh N. Ramdatmisier, Joseph Thomas Farro, Gregory Darrell Fee, Jeremiah S. Epling, Andrew G. Bybee, Yingyang Xu, Tony Edward Schreiner, Jamie L. Cool
  • Publication number: 20040148514
    Abstract: Evidence-based application security may be implemented at the application and/or application group levels. A manifest may be provided defining at least one trust condition for the application or application group. A policy manager evaluates application evidence (e.g., an XrML license) for an application or group of applications relative to the manifest. The application is only granted permissions on the computer system if the application evidence indicates that the application is trusted. Similarly, a group of applications are only granted permissions on the computer system if the evidence indicates that the group of applications is trusted. If the application evidence satisfies the at least one trust condition defined by the manifest, the policy manager generates a permission grant set for each code assembly that is a member of the at least one application. Evidence may be further evaluated for code assemblies that are members of the trusted application or application group.
    Type: Application
    Filed: November 10, 2003
    Publication date: July 29, 2004
    Inventors: Gregory D. Fee, Aaron Goldfeder, John M. Hawkins, Jamie L. Cool, Sebastian Lange, Sergey Khorun