Patents by Inventor Julie Bennett
Julie Bennett has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Publication number: 20060206871Abstract: The present invention provides a system for processing data.Type: ApplicationFiled: April 29, 2005Publication date: September 14, 2006Applicant: Microsoft CorporationInventors: Bernhard Kohlmeier, Lori Brownell, Wei Wu, Shenghua Ye, Jordi Mola Marti, Jan Nelson, Mohammed El-Gammal, Julie Bennett
-
Publication number: 20060206797Abstract: The present invention provides a system for processing data.Type: ApplicationFiled: April 29, 2005Publication date: September 14, 2006Applicant: Microsoft CorporationInventors: Bernhard Kohlmeier, Lori Brownell, Wei Wu, Shenghua (Ed) Ye, Jordi Mola Marti, Jan Nelson, Mohammed El-Gammal, Julie Bennett
-
Publication number: 20060206303Abstract: The present invention provides a system for processing data.Type: ApplicationFiled: April 29, 2005Publication date: September 14, 2006Applicant: Microsoft CorporationInventors: Bernhard Kohlmeier, Lori Brownell, Wei Wu, Shenghua (Ed) Ye, Jordi Mola Marti, Jan Nelson, Mohammed El-Gammal, Julie Bennett
-
Publication number: 20060206798Abstract: The present invention provides a system for processing data.Type: ApplicationFiled: April 29, 2005Publication date: September 14, 2006Applicant: Microsoft CorporationInventors: Bernhard Kohlmeier, Lori Brownell, Wei Wu, Shenghua (Ed) Ye, Jordi Mola Marti, Jan Nelson, Mohammed El-Gammal, Julie Bennett
-
Publication number: 20060206877Abstract: The present invention provides a system for processing data.Type: ApplicationFiled: April 29, 2005Publication date: September 14, 2006Applicant: Microsoft CorporationInventors: Bernhard Kohlmeier, Lori Brownell, Wei Wu, Shenghua (Ed) Ye, Jordi Mola Marti, Jan Nelson, Mohammed El-Gammal, Julie Bennett
-
Publication number: 20060005249Abstract: Tampering with pieces of software is inhibited. Installation setup protection inhibits tampering during the installation of various pieces of software. Profiles are stored in a central hierarchical database and such profiles are protected from tampering. The obfuscation of a software image so as to becloud the comprehension of hackers in reverse engineering pieces of software comprising the software image is provided.Type: ApplicationFiled: February 17, 2005Publication date: January 5, 2006Applicant: Microsoft CorporationInventors: Wei Wu, Frank Chu, Julie Bennett, Mohammed El-Gammal, Simon Earnshaw, Rerkboon Suwanasuk
-
Publication number: 20060005251Abstract: Tampering with pieces of software is inhibited. The obfuscation of a software image so as to becloud the comprehension of hackers in reverse engineering pieces of software comprising the software image is provided. A process of verifying whether the pieces of software together constitute a software package that requires protection from tampering is also provided. Another process for determining whether the hardware resources, such as the central processing unit or the cache memory on a computing machine, belong to a class for which inhibiting software tampering is possible, is also provided.Type: ApplicationFiled: February 17, 2005Publication date: January 5, 2006Applicant: Microsoft CorporationInventors: Wei Wu, Frank Chu, Erik Fortune, Julie Bennett, Mohammed El-Gammal, Simon Earnshaw
-
Publication number: 20060005252Abstract: Tampering with pieces of software is inhibited. Software obfuscation inhibits reverse engineering by hackers by manipulating names of functions and adding jump instructions into various pieces of software. The obfuscation of a software image so as to becloud the comprehension of hackers in reverse engineering pieces of software comprising the software image is provided. Image verification ensures the originality of the pieces of software to be installed.Type: ApplicationFiled: February 17, 2005Publication date: January 5, 2006Applicant: Microsoft CorporationInventors: Frank Chu, Wei Wu, Julie Bennett, Mohammed El-Gammal
-
Publication number: 20060005250Abstract: Tampering with pieces of software is inhibited. Software obfuscation inhibits reverse engineering by hackers by manipulating names of functions and adding jump instructions into various pieces of software. Profiles are stored in a central hierarchical database and such profiles are protected from tampering. The obfuscation of a software image so as to becloud the comprehension of hackers in reverse engineering pieces of software comprising the software image is provided.Type: ApplicationFiled: February 17, 2005Publication date: January 5, 2006Applicant: Microsoft CorporationInventors: Frank Chu, Wei Wu, Julie Bennett, Mohammed El-Gammal
-
Publication number: 20060005248Abstract: Tampering with pieces of software is inhibited. Registry protection prevents changes made to keys and values in a central hierarchical database. Hardware protection prevents hackers from forcing various pieces of software from running on unauthorized pieces of hardware. The obfuscation of a software image so as to becloud the comprehension of hackers in reverse engineering pieces of software comprising the software image is provided. Image verification ensures the originality of the pieces of software to be installed.Type: ApplicationFiled: February 17, 2005Publication date: January 5, 2006Applicant: Microsoft CorporationInventors: Wei Wu, Julie Bennett, Frank Chu, Mohammed El-Gammal, Simon Earnshaw
-
Publication number: 20050278782Abstract: Tampering with pieces of software is inhibited. Thread protection inhibits tampering with various threads that execute protective pieces of software. Profiles are stored in a central hierarchical database and such profiles are protected from tampering. The obfuscation of a software image so as to becloud the comprehension of hackers in reverse engineering pieces of software comprising the software image is provided.Type: ApplicationFiled: February 17, 2005Publication date: December 15, 2005Applicant: Microsoft CorporationInventors: Frank Chu, Wei Wu, Julie Bennett, Mohammed El-Gammal
-
Publication number: 20050278535Abstract: Tampering with pieces of software is inhibited. Profiles are stored in a central hierarchical database and such profiles are protected from tampering. The obfuscation of a software image so as to becloud the comprehension of hackers in reverse engineering pieces of software comprising the software image is provided. A process of verifying whether the pieces of software together constitute a software package that requires protection from tampering is also provided.Type: ApplicationFiled: February 17, 2005Publication date: December 15, 2005Applicant: Microsoft CorporationInventors: Erik Fortune, Wei Wu, Julie Bennett, Mohammed El-Gammal
-
Publication number: 20050278791Abstract: Tampering with pieces of software is inhibited. Service protection inhibits tampering by allowing various unauthorized services to execute. Profiles are stored in a central hierarchical database and such profiles are protected from tampering. The obfuscation of a software image so as to becloud the comprehension of hackers in reverse engineering pieces of software comprising the software image is provided.Type: ApplicationFiled: February 17, 2005Publication date: December 15, 2005Applicant: Microsoft CorporationInventors: Frank Chu, Wei Wu, Julie Bennett, Mohammed El-Gammal, Simon Earnshaw
-
Publication number: 20050278553Abstract: Tampering with pieces of software is inhibited. Hardware protection prevents hackers from forcing various pieces of software from running on unauthorized pieces of hardware. The obfuscation of a software image so as to becloud the comprehension of hackers in reverse engineering pieces of software comprising the software image is provided. Image verification ensures the originality of the pieces of software to be installed.Type: ApplicationFiled: February 17, 2005Publication date: December 15, 2005Applicant: Microsoft CorporationInventors: Wei Wu, Erik Fortune, Julie Bennett, Frank Chu, Mohammed El-Gammal, Simon Earnshaw
-
Publication number: 20050246716Abstract: An application program interface (API) provides a set of functions, including a set of base classes and types that are used in substantially all applications accessing the API, for application developers who build Web applications on Microsoft Corporation's .NETâ„¢ platform.Type: ApplicationFiled: June 23, 2005Publication date: November 3, 2005Applicant: Microsoft CorporationInventors: Adam Smith, Anthony Moore, Brian LaMacchia, Anders Hejlsberg, Brian Grunkemeyer, Caleb Doise, Christopher Brumme, Christopher Anderson, Corina Feuerstein, Craig Sinclair, Daniel Takacs, David Ebbo, David Driver, David Mortenson, Erik Christensen, Erik Olson, Fabio Yeon, Gopala Kakivaya, Gregory Fee, Hany Ramadan, Henry Sanders, Jayanth Rajan, Jeffrey Cooperstein, Jonathan Hawkins, James Hogg, Joe Long, John McConnell, Jesus Ruiz-Scougall, James Miller, Julie Bennett, Krzysztof Cwalina, Lance Olson, Loren Kohnfelder, Michael Magruder, Manish Prabhu, Radu Palanca, Raja Krishnaswamy, Shawn Burke, Sean Trowbridge, Seth Demsey, Shajan Dasan, Stefan Pharies, Suzanne Cook, Tarun Anand, Travis Muhlestein, Yann Christensen, Yung-shin Lin, Ramasamy Krishnaswamy, Joseph Roxe, Alan Boshier, David Bau
-
Publication number: 20050240943Abstract: An application program interface (API) provides a set of functions, including a set of base classes and types that are used in substantially all applications accessing the API, for application developers who build Web applications on Microsoft Corporation's .NETâ„¢ platform.Type: ApplicationFiled: June 23, 2005Publication date: October 27, 2005Applicant: Microsoft CorporationInventors: Adam Smith, Anthony Moore, Brian LaMacchia, Anders Hejlsberg, Biran Grunkemeyer, Caleb Doise, Christopher Brumme, Christopher Anderson, Corina Feuerstein, Craig Sinclair, Daniel Takacs, David Ebbo, David Driver, David Mortenson, Erik Christensen, Erik Olson, Fabio Yeon, Gopala Kakivaya, George Fee, Hany Ramadan, Henry Sanders, Jayanth Rajan, Jeffrey Cooperstein, Jonathan Hawkins, James Hogg, Joe Long, John McConnell, Jesus Ruiz-Scougall, James Miller, Julie Bennett, Krzysztof Cwalina, Lance Olson, Loren Kohnfelder, Michael Magruder, Manish Prabhu, Radu Palanca, Raja Krishnaswamy, Shawn Burke, Sean Trowbridge, Seth Demsey, Shajan Dasan, Stefan Pharies, Suzanne Cook, Tarun Anand, Travis Muhlestein, Yann Christensen, Yung-shin Lin, Ramasamy Krishnaswamy, Joseph Roxe, Alan Boshier, David Bau
-
Publication number: 20050171949Abstract: A method and system for mapping a number of characters in a string, wherein the string comprises a combination of characters representing indexed expressions and a combination of characters representing non-indexed expressions. One embodiment produces a weight array that can be utilized to compare a first and second string having indexed and non-indexed expressions. In one embodiment, a method generates a set of special weights for characters that represent indexed and non-indexed expressions. The method then associates a weight value of an indexed expression with the specific group of characters representing a specific non-indexed expression, and generates a weight array by retrieving a plurality of special weights associated with the specific group of characters representing the specific non-indexed expression and the associated weight value of the indexed expression.Type: ApplicationFiled: March 29, 2005Publication date: August 4, 2005Applicant: Microsoft CorporationInventors: John McConnell, Julie Bennett, Yung-Shin Lin
-
Publication number: 20050108433Abstract: An improved application architecture comprises a bifurcated structure having a language neutral portion and a localizable portion, compacted for efficiency into a smaller set of larger files. This bifurcated structure allows for easier distribution and updating of the application, while the reduced set of files provides for more efficient file management. A resource manifest can be specified during the compile stage to identify elements that are language specific and elements that remain language neutral. Furthermore, additional software can be used after compilation for compacting multiple localizable elements into a single file. Such compacting software can receive inputs specifying the language specific resources which are to be compacted into larger files, and the identity of those larger files.Type: ApplicationFiled: October 23, 2003Publication date: May 19, 2005Applicant: Microsoft CorporationInventors: Wei Wu, Shenghua Ye, Julie Bennett, Mohammed El-Gammal, Frank Chu, Sunggook Chue
-
Publication number: 20050102253Abstract: An improved application architecture comprises a bifurcated structure having a language neutral portion and a localizable portion, compacted for efficiency into a smaller set of larger files. This bifurcated structure allows for easier distribution and updating of the application, while the reduced set of files provides for more efficient file management. A resource manifest can be specified during the compile stage to identify elements that are language specific and elements that remain language neutral. Furthermore, additional software can be used after compilation for compacting multiple localizable elements into a single file. Such compacting software can receive inputs specifying the language specific resources which are to be compacted into larger files, and the identity of those larger files.Type: ApplicationFiled: October 23, 2003Publication date: May 12, 2005Applicant: Microsoft CorporationInventors: Wei Wu, Shenghua Ye, Julie Bennett, Mohammed El-Gammal, Frank Chu, Sunggook Chue, Kenneth Hsu, Laura Gomez
-
Publication number: 20050099324Abstract: A system and method for converting a source data sequence to a target encoding is disclosed. A fallback technique, specifiable by a user program component, is applied to data in the source data sequence that cannot be mapped to the target encoding. A particular embodiment involves methods for encoding a Unicode string as a sequence of bytes in a target encoding, and decoded the encoded bytes back to Unicode.Type: ApplicationFiled: October 19, 2004Publication date: May 12, 2005Applicant: Microsoft CorporationInventors: Shawn Steele, Yung-shin Lin, Julie Bennett, John McConnell