Patents by Inventor Kenneth Ray

Kenneth Ray has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20060010349
    Abstract: A protocol analyzer monitors a bus while a software module causes a trace packet to be generated and sent out on the bus to an invalid address. The trace packet triggers the protocol analyzer and permits the bus data flowing on the bus when the software module detected a problem to be analyzed. The trace packet causes the protocol analyzer to trigger even though the bus protocol is normal and the protocol analyzer would not otherwise trigger. The trace packet can be used to analyze and debug communications flowing on a bus when the software module detects a problem.
    Type: Application
    Filed: September 14, 2005
    Publication date: January 12, 2006
    Applicant: Microsoft Corporation
    Inventors: John Dun, Kenneth Ray, Glen Slick
  • Patent number: 6984675
    Abstract: An aqueous dispersion has an addition polymer (B) formed in situ on a sulfopolyester (A). The sulfopolyester (A) is formed as a polycondensation product of first and second reaction mixtures. The first reaction mixture includes at least about 70 mol. % of terephthalic acid or an ester thereof, and about 4–20 mol. % of a difunctional ester forming sulfomonomer containing at least one metal sulfonate group attached to an aromatic nucleus, wherein the functional groups are selected from the group consisting of hydroxyls, carboxyls and alkyl esters. The second reaction mixture includes at least two different glycols, at least about 20 mol. % of the second reaction mixture being ethylene glycol. The addition polymer (B) is formed in situ on the sulfopolyester (B) by polymerizing styrene monomer.
    Type: Grant
    Filed: March 19, 2002
    Date of Patent: January 10, 2006
    Assignee: Resolution Specialty Materials LLC
    Inventors: David Joe Lesley, Gregory David Lesley, Darrell Scott Nasser, Kenneth Ray Barton, Eurrell Thomas Eubanks
  • Publication number: 20060005034
    Abstract: A mechanism for protected operating system boot that prevents rogue components from being loaded with the operating system, and thus prevents divulgence of the system key under inappropriate circumstances. After a portion of the machine startup procedure has occurred, the operating system loader is run, the loader is validated, and a correct machine state is either verified to exist and/or created. Once the loader has been verified to be a legitimate loader, and the machine state under which it is running is verified to be correct, the loader's future behavior is known to protect against the loading of rogue components that could cause divulgence of the system key. With the loader's behavior being known to be safe for the system key, the validator may unseal the system key and provides it to the loader.
    Type: Application
    Filed: June 30, 2004
    Publication date: January 5, 2006
    Applicant: Microsoft Corporation
    Inventors: Bryan Willman, Paul England, Kenneth Ray, Jamie Hunter, Lonny McMichael, Derek LaSalle, Pierre Jacomet, Mark Paley, Thekkthalackal Kurien, David Cross
  • Publication number: 20050272168
    Abstract: A method for detecting and identifying metabolites in biological samples includes subjecting the samples to high resolution mass spectrometry (MS) analysis to detect ions of the molecular species. Mass defect values for the detected ions are determined. The method also includes specifying a predetermined range for mass defect values. Detected ions having mass defect values falling outside the specified range are discarded and those with mass defect values falling within the predetermined range are retained. Species of interest are determined from the retained values. The species of interest include drug metabolites or impurities and/or degradants of a known pharmaceutical sample.
    Type: Application
    Filed: June 2, 2004
    Publication date: December 8, 2005
    Inventors: Haiying Zhang, Kenneth Ray, Donglu Zhang
  • Publication number: 20050185591
    Abstract: Systems and methods for analyzing transactions on a bus. A software module can cause a trace packet to be generated and sent out on a bus to an invalid address. The trace packet triggers a protocol analyzer and permits the bus data flowing on the bus when the software module detected a problem to be analyzed. The trace packet causes the protocol analyzer to trigger even though the bus protocol is normal and the protocol analyzer would not otherwise trigger. The trace packet can be used to analyze and debug communications flowing on a bus when the software module detects a problem.
    Type: Application
    Filed: April 21, 2005
    Publication date: August 25, 2005
    Applicant: Microsoft Corporation
    Inventors: John Dun, Kenneth Ray, Glen Slick
  • Publication number: 20050160190
    Abstract: Systems and methods to specify device specific user interface information in firmware of a USB device are described. In one aspect, a USB device receives a host-specific device request from an application executing on a computing device coupled to the USB device. The USB device identifies a host-defined string descriptor defined by the application. The host-defined string descriptor is stored in firmware of the USB device.
    Type: Application
    Filed: March 10, 2005
    Publication date: July 21, 2005
    Applicant: Microsoft Corporation
    Inventors: Firdosh Bhesania, Kenneth Ray, Stephane St. Michel
  • Patent number: 6918171
    Abstract: A method of manufacturing injection-molded components having complex features is disclosed. Prior methods typically require the use of a three-piece mold system to form an injection molded component having a complex feature, such as a lawn mower hood having a parabolic shaped front. With the development of a new rigid type of reflective material the present method can thereby utilize a two-piece mold system to form an injection molded component having complex features such as a lawn mower hood having a C-shaped open cavity located at the front of the hood.
    Type: Grant
    Filed: October 8, 2003
    Date of Patent: July 19, 2005
    Assignee: MTD Products Inc
    Inventors: Jeffrey R. Kucera, Kenneth Ray Smith
  • Publication number: 20050125548
    Abstract: A resource is obtained from a resource provider (RP) for a resource requester (RR) operating on a computing device. The RR has an identity descriptor (id) associated therewith, where the id including security-related information specifying an environment in which the RR operates. A code identity (code-ID) is calculated corresponding to and based on the loaded RR and loaded id. The RP verifies that the calculated code-ID in a request for the resource matches one of one or more valid code-IDs for the identified RR to conclude that the RR and id can be trusted, and the RP responds to the forwarded request by providing the requested resource to the RR.
    Type: Application
    Filed: October 23, 2003
    Publication date: June 9, 2005
    Inventors: Paul England, Anshul Dhir, Thekkthalackal Kurien, Kenneth Ray
  • Patent number: 6897179
    Abstract: Disclosed is a method of protecting the loss of catalytic activity of metalloaluminophosphate molecular sieve, particularly a SAPO molecular sieve, from contact with moisture. The method involves heating the metalloaluminophosphate molecular sieve so as to remove template, and provide a molecular sieve in sufficiently dry form for storage.
    Type: Grant
    Filed: June 13, 2003
    Date of Patent: May 24, 2005
    Assignee: ExxonMobil Chemical Patents Inc.
    Inventors: Shun Chong Fung, Stephen Neil Vaughn, Marcel Johannes Janssen, Luc Roger Marc Martens, Kenneth Ray Clem
  • Patent number: 6889587
    Abstract: A first layer of urethane sheet material is molded with a plurality of interlocking male and female fingers at opposing blanket ends and which fingers form a projection for insertion into an anvil channel. The fingers are arrayed in a plane beneath the plane of the first layer. The abutting ends of the blanket above the fingers form a seam of different configuration than the fingers, e.g., linear, to minimize formation of flat spots on the work surface. A fabric is bonded to the underside of the sheet material in one embodiment or a second layer of urethane is molded to blanket underside to form a major portion of the fingers and the projection in a second embodiment. The second layer has a relative durometer that is harder than the first layer, and a shrinkage smaller than that of the first layer to minimize the formation of edge curl.
    Type: Grant
    Filed: June 4, 2003
    Date of Patent: May 10, 2005
    Assignee: Robud
    Inventor: Kenneth Ray Neal
  • Publication number: 20050091661
    Abstract: Application factoring or partitioning is used to integrate secure features into a conventional application. An application's functionality is partitioned into two sets according to whether a given action does, or does not, involve the handling of sensitive data. Separate software objects (processors) are created to perform these two sets of actions. A trusted processor handles secure data and runs in a high-assurance environment. When another processor encounters secure data, that data is sent to the trusted processor. The data is wrapped in such a way that allows it to be routed to the trusted processor, and prevents the data from being deciphered by any entity other than the trusted processor. An infrastructure is provided that wraps objects, routes them to the correct processor, and allows their integrity to be attested through a chain of trust leading back to base component that is known to be trustworthy.
    Type: Application
    Filed: October 24, 2003
    Publication date: April 28, 2005
    Inventors: Thekkthalackal Kurien, Kenneth Ray, Marcus Peinado, Paul England
  • Publication number: 20050091503
    Abstract: Techniques are disclosed to provide security for user output and input in which a first, host operating system is used along with a second, high assurance operating system (nexus), where the first system provides at least some of the infrastructure for the second system. A trusted UI engine has a trusted input manager and a trusted output manager. The trusted input manager controls access to trusted input, distributing decrypted input to the host operating system where appropriate, or to the appropriate process running in the nexus. The trusted output manager manages output to the display, and allows trusted agents in the nexus to output data for display without needing to be aware of output-device-dependent details.
    Type: Application
    Filed: October 24, 2003
    Publication date: April 28, 2005
    Inventors: Paul Roberts, Christine Chew, Bryan Willman, Kenneth Ray
  • Publication number: 20050080936
    Abstract: Systems and methods for specifying extended configuration descriptor information in a Universal Serial Bus (USB) device are described. In one aspect, an extended configuration descriptor is provided in firmware of a USB device. The extended configuration descriptor includes a set of non-standard class codes. Responsive to receiving a host-specific device request, the USB device communicates the extended configuration descriptor to a requestor.
    Type: Application
    Filed: October 21, 2004
    Publication date: April 14, 2005
    Applicant: Microsoft Corporation
    Inventors: Kenneth Ray, Firdosh Bhesania, John Dunn
  • Patent number: 6858129
    Abstract: There is provided a zeolite bound zeolite catalyst which does not contain significant amount of non-zeolitic binder and can be tailored to optimize its performance and a process for converting hydrocarbons utilizing the zeolite bound zeolite catalyst. The zeolite bound zeolite catalyst comprises core crystals containing first crystals of a first zeolite and optionally second crystals of a second zeolite having a composition, structure type, or both that is different from said first zeolite and binder crystals containing third crystals of a third zeolite and optionally fourth crystals of a fourth zeolite having a composition, structure type, or both that is different from said third zeolite. If the core crystals do not contain the second crystals of the second zeolite, then the binder crystals must contain the fourth crystals of the fourth zeolite. The zeolite bound zeolite finds application in hydrocarbon conversion processes, e.g.
    Type: Grant
    Filed: August 6, 2003
    Date of Patent: February 22, 2005
    Assignee: ExxonMobil Chemical Patents Inc.
    Inventors: Gary David Mohr, Kenneth Ray Clem, Wilfried Jozef Mortier, Machteld Maria Mertens, Xiaobing Feng, Marc H. Anthonis, Bart Schoofs
  • Publication number: 20050033980
    Abstract: In a single machine that has entities running in an untrusted environment and entities running in a trusted environment, the trustworthiness of the entities in the trusted environment is projected to the entities in the untrusted environment. This is applicable, for example, to Microsoft®'s Next Generation Secure Computing Base (NGSCB), where a regular operating system (e.g., the Windows® operating system) hosts a secure operating system (e.g., the nexus).
    Type: Application
    Filed: August 7, 2003
    Publication date: February 10, 2005
    Inventors: Bryan Willman, Paul England, Kenneth Ray, Keith Kaplan, Varugis Kurien, Michael Marr
  • Patent number: 6850254
    Abstract: An apparatus and method of allowing a user to set relationships between two or more parameters are provided. To set up the relationship, the user invokes a dialog box within which all available parameters, as well as their current relationship, are displayed. The user is allowed to change present relationships or set up totally new relationships using parameters that are presently used or unused or combining presently used and unused parameters. Once done, the new values of the parameters are displayed. Furthermore, if a user changes the displayed value of one parameter, displayed values of the other related parameters are automatically updated.
    Type: Grant
    Filed: December 2, 1999
    Date of Patent: February 1, 2005
    Assignee: International Business Machines Corporation
    Inventors: Kenneth Ray Banning, Jack Allen Alford, Jr.
  • Publication number: 20040260140
    Abstract: The invention is directed to methods for protecting metalloaluminophosphate molecular sieves, particularly silicoaluminophosphate (SAPO) molecular sieves, from loss of catalytic activity due to contact with a gas containing water. The methods of the invention provide procedures that enable activated sieve to contact water vapor, within a certain range of time, temperature, and water partial pressure conditions, before the sieve becomes substantially deactivated.
    Type: Application
    Filed: June 20, 2003
    Publication date: December 23, 2004
    Inventors: Peter N. Loezos, Shun Chong Fung, Stephen Neil Vaughn, Kenneth Ray Clem, James H. Beech, Nicolas P. Coute, Marcel Johannes Janssen, Luc Roger Marc Martens, Karl G. Strohmaier
  • Publication number: 20040254068
    Abstract: Disclosed is a method of protecting the loss of catalytic activity of metalloaluminophosphate molecular sieve, particularly a SAPO molecular sieve, from contact with moisture. The method involves heating the metalloaluminophosphate molecular sieve so as to remove template, and provide a molecular sieve in sufficiently dry form for storage.
    Type: Application
    Filed: June 13, 2003
    Publication date: December 16, 2004
    Inventors: Shun Chong Fung, Stephen Neil Vaughn, Marcel Johannes Janssen, Luc Roger Marc Martens, Kenneth Ray Clem
  • Publication number: 20040244556
    Abstract: A first layer of urethane sheet material is molded with a plurality of interlocking male and female fingers at opposing blanket ends and which fingers form a projection for insertion into an anvil channel. The fingers are arrayed in a plane beneath the plane of the first layer. The abutting ends of the blanket above the fingers form a seam of different configuration than the fingers, e.g., linear, to minimize formation of flat spots on the work surface. A fabric is bonded to the underside of the sheet material in one embodiment or a second layer of urethane is molded to blanket underside to form a major portion of the fingers and the projection in a second embodiment. The second layer has a relative durometer that is harder than the first layer, and a shrinkage smaller than that of the first layer to minimize the formation of edge curl and to support the first layer. The first layer outer work surface is roughened to mimic a shot peened surface.
    Type: Application
    Filed: June 4, 2003
    Publication date: December 9, 2004
    Inventor: Kenneth Ray Neal
  • Publication number: 20040250087
    Abstract: A security module and method implements data requests from a USB or other similar device, in which a secure component can communicate securely with a device without modifying the underlying USB bus protocol, or the device, even where the software controlling the bus is untrusted. A security module (physically separate or integrated into a device or hub) intercepts data being sent from device to secure component in response to a data request. A “not acknowledged” signal is sent to the secure component, and the data is encrypted. The next data request is intercepted, and the encrypted data sent in response. The acknowledgement from the secure component to the device is allowed to reach the device. In order to handle a setup request, an allow command is sent to the security module, which includes the encrypted and unencrypted setup command. If an encryption check is successful, a setup command sent to the device (via the security module) is allowed to reach the device.
    Type: Application
    Filed: May 2, 2003
    Publication date: December 9, 2004
    Applicant: Microsoft Corporation
    Inventors: Kenneth Ray, Theodore Kehl