Patents by Inventor Mark Jeremy
Mark Jeremy has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
METHOD AND SYSTEM FOR RESTRICTING EXECUTION OF VIRTUAL APPLICATIONS TO A MANAGED PROCESS ENVIRONMENT
Publication number: 20120110337Abstract: Methods and systems for restricting the launch of virtual application files. In one embodiment, a launching application is signed with a digital signature. When the launching application launches a runtime engine and instructs it to execute an application file, the runtime engine determines whether an entity identifier associated with the launching application identifies an authorized entity. If the entity identifier identifies an authorized entity and the digital signature is valid, the runtime engine executes the application file. In another embodiment, a ticket is transmitted to the launching application along with an instruction to launch the application file. The ticket includes a digital signature and an expiration date. The launching application communicates the ticket to the runtime engine, which will execute the application file only if the digital signature is valid and a current date is not later than the expiration date.Type: ApplicationFiled: October 29, 2010Publication date: May 3, 2012Applicant: Code Systems CorporationInventors: C. Michael Murphey, Kenjl C. Obata, Mark Jeremy Zeller, Stefan I. Larimore -
Publication number: 20120096071Abstract: A method and system for publishing virtual applications on the Internet. The method includes obtaining a list of applications associated with a publisher from a server computing device and displaying the list to a user via a user interface. Next, a selection by the user of one of the applications is received from the user interface. A new virtualized version of the selected application is built. The virtualized version includes at least one application file that at least partially implements the new virtualized version of the selected application. Then, the application file is uploaded to the server computing device. An application address is received from the server computing device and a link to the application address is displayed to the user via the user interface. The virtualized version of the application is available at the application address for download and execution over a network (e.g., the Internet).Type: ApplicationFiled: October 18, 2010Publication date: April 19, 2012Applicant: Code Systems CorporationInventors: C. Michael Murphey, Kenji C. Obata, Mark Jeremy Zeller
-
Publication number: 20120005309Abstract: A method for collecting transcripts each storing an order in which portions of an application file were accessed by the file when the file was executed on one of a plurality of computing devices. The method includes receiving requests to download the file from directing processes each executing on a different one of the computing devices, and in response to those requests, downloading the file to the computing devices and instructing the directing processes to profile usage of the file. Then, transcripts created by the directing processes are received therefrom. A streaming model may be created based on the transcripts received. The file may be divided into a plurality of smaller files based on the streaming model. The streaming model may be used to download the file by downloading at least a portion of the smaller files using a conventional download protocol without using a specialized streaming protocol.Type: ApplicationFiled: September 8, 2010Publication date: January 5, 2012Applicant: Code Systems CorporationInventors: Kenji C. Obata, Jason Pollentier, Mark Jeremy Zeller
-
Publication number: 20120005674Abstract: A method and system for profiling execution of an application implemented by an application file comprising a plurality of data blocks. The application is executed in response to an execute command from a management process. Read messages are sent to the management process each time the application reads one or more of the plurality of data blocks of the application file. The management process records information about the read operations in one or more transcripts which may be used to create a streaming model for the application allowing the application to be downloaded using a conventional download protocol without using a specialized streaming protocol.Type: ApplicationFiled: September 3, 2010Publication date: January 5, 2012Applicant: Code Systems CorporationInventors: Stefan I. Larimore, Kenji C. Obata, Mark Jeremy Zeller
-
Publication number: 20110314163Abstract: A communications module, and a consumer device comprising the communications model, is provided for use in a communication network with one or more consumer devices or “smart” appliances. The communications module includes a wireless transceiver for communication with the network, for example in accordance with the ZigBee protocol, and an interface for communicating with a host processor of the consumer device. The module receives scheduled event data over a wireless link on behalf of the host processor, and schedules events for execution by the host processor upon receipt of commands transmitted by the module. The communications module may include a virtual host module, which translates commands between a protocol used by the host processor and a protocol used by the communications module. The communications module is also configured to automatically seek and join a network, and to discover and bind to services provided over the network.Type: ApplicationFiled: June 16, 2010Publication date: December 22, 2011Applicant: MMB RESEARCH INC.Inventors: Mark Jeremy Borins, Daniel Jordan Moneta, Alireza Motamed, Eugene Yijun Peng, David Smith
-
Publication number: 20110289513Abstract: A method of hosting a first application (e.g., a virtual application) inside a second application (e.g., a control displayed by a web browser). The method includes executing the first application inside a runtime environment generated at least in part by a runtime engine. The executing first application calls user interface functions that when executed inside the runtime environment generate a first user interface. The runtime engine captures these calls, generates messages comprising information associated with the captured calls, and forwards the messages to a user interface manager that is a separate application from the runtime engine. The user interface manager receives the messages, translates the information associated with the captured calls into instructions for the second application, and sends the instructions to the second application. The control receives the instructions sent by the user interface manager, and displays a second user interface for the first application based on the instructions.Type: ApplicationFiled: April 15, 2011Publication date: November 24, 2011Applicant: Code Systems CorporationInventors: Ozcan Degirmenci, Mark Jeremy Zeller, Stefan I. Larimore
-
Publication number: 20110238696Abstract: Methods and computer-readable media are provided for associating security trimmers with documents in an enterprise search system. According to one method, a search index is maintained that includes one or more document identifiers corresponding to documents stored at back-end computing systems. Each document identifier in the search index is associated with one or more security trimmer implementations. When a query request is received from a user, the search index is queried to identify documents referenced by the search index that match search terms provided with the query request. For each document that matches the search terms, the associated security trimmer implementations are identified and executed to retrieve the access rights to view the document for the current user from the back-end computing system where the document is stored.Type: ApplicationFiled: June 7, 2011Publication date: September 29, 2011Applicant: MICROSOFT CORPORATIONInventors: Mark Jeremy Zeller, Arshish Cyrus Kapadia, Shajan Dasan
-
Publication number: 20110185043Abstract: A virtual process manager for use with a client application. Both the process manager and the client application are installed on a client computing device. In response to a user command to execute a virtual application at least partially implemented by a virtualized application file stored on a remote computing device, the client application sends a high priority command to the process manager to execute the virtual application. Before receiving the user command, the client application sends a low priority command to the process manager to download at least a portion of the virtualized application file. In response to the high priority command, and without additional user input, the process manager downloads any portion of the file not downloaded in response to the low priority command, and executes the virtual application on the client computing device. The client application may comprise a conventional web browser or operating system shell process.Type: ApplicationFiled: February 12, 2010Publication date: July 28, 2011Applicant: Code Systems CorporationInventors: Mark Jeremy Zeller, Kenji C. Obata
-
Patent number: 7979458Abstract: Methods and computer-readable media are provided for associating security trimmers with documents in an enterprise search system. According to one method, a search index is maintained that includes one or more document identifiers corresponding to documents stored at back-end computing systems. Each document identifier in the search index is associated with one or more security trimmer implementations. When a query request is received from a user, the search index is queried to identify documents referenced by the search index that match search terms provided with the query request. For each document that matches the search terms, the associated security trimmer implementations are identified and executed to retrieve the access rights to view the document for the current user from the back-end computing system where the document is stored.Type: GrantFiled: January 16, 2007Date of Patent: July 12, 2011Assignee: Microsoft CorporationInventors: Mark Jeremy Zeller, Arshish Cyrus Kapadia, Shajan Dasan
-
Publication number: 20100089924Abstract: A metal container or component part of a metal container (e.g. a can end or sidewall of a can body) has an aperture defined by a cut edge about the periphery of the aperture, with a cover element sealed to the outward-facing surface of the can end so as to extend over and cover the aperture. A film of lacquer is directly applied (without the presence of an intermediate primer layer) to the inward-facing of the container/component part so as to coat the entirety of the cut edge and all or part of the inward-facing surfaces of both the can end and that part of the cover element located radially inward of the cut edge, thereby inhibiting corrosion of the cut edge. The invention is particularly suitable for can ends. The invention also relates to a method of making a can end to the invention.Type: ApplicationFiled: February 22, 2008Publication date: April 15, 2010Applicant: Crown Packaging Technology, Inc.Inventors: Mark Jeremy Rowland, Matthieu Jacques Dupuis
-
Publication number: 20080172390Abstract: Methods and computer-readable media are provided for associating security trimmers with documents in an enterprise search system. According to one method, a search index is maintained that includes one or more document identifiers corresponding to documents stored at back-end computing systems. Each document identifier in the search index is associated with one or more security trimmer implementations. When a query request is received from a user, the search index is queried to identify documents referenced by the search index that match search terms provided with the query request. For each document that matches the search terms, the associated security trimmer implementations are identified and executed to retrieve the access rights to view the document for the current user from the back-end computing system where the document is stored.Type: ApplicationFiled: January 16, 2007Publication date: July 17, 2008Applicant: Microsoft CorporationInventors: Mark Jeremy Zeller, Arshish Cyrus Kapadia, Shajan Dasan
-
Publication number: 20070022043Abstract: A system whereby high volumes of related commodities or securities trades with a brokerage firm's clients may be processed by the firm's back office systems. The system includes a firm account processor and a wash account processor which combine all characteristically similar trades with the same counterparty into a discrete aggregate trades. The firm and wash account processor calculates the quantity and proceeds of the aggregate trades from the sum of the quantities and proceeds of characteristically similar related trades which make up the aggregate trades. The prices of the aggregate trades are computed as the average price of all of their related trades. The wash account processor transmits information concerning any aggregate trades and unaggregated trades to the firm's back office systems for settlement as individual trades with each individual counterparty.Type: ApplicationFiled: September 27, 2006Publication date: January 25, 2007Inventors: Mark Jeremy Melville Naylor, Alfred Fletcher, Harry Barman
-
Patent number: 6718889Abstract: A multi-fuel boiler having multiple, independent draft or combustion air sources and controls. A conventional oil/gas burner and nozzle assembly is fitted to an injector tube and isolated from a thermal transfer medium. A butterfly valve is supported in the injector tube and a motorized linkage directs valve operation. When the burner is non-operational, the valve prevents secondary combustion air from passing through the oil/gas burner to effect combustion in the firebox.Type: GrantFiled: August 30, 2002Date of Patent: April 13, 2004Assignee: Central Boiler, Inc.Inventors: Dennis Brazier, Mark Jeremy Reese, Rodney Lyle Tolefson
-
Publication number: 20040014066Abstract: The invention provides a method of detecting in a sample the activity of an antibiotic which affects cell integrity, which method comprises the steps of: a) providing a transformed microorganism which comprises a nucleic acid encoding a promoter operably linked to a heterologous reporter gene capable of causing a detectable signal; b) contacting the sample with the transformed microorganism; c) observing said microorganism for said detectable signal, wherein the promoter is regulated by a two-component signal transduction system, which signal components are: i) a receptor responsive to changes in the cell envelope or membrane of the microorganism, ii) a trans-acting factor which is activated in response to stimulation by the receptor, and which regulates the promoter. Preferred signal components are derived from CseB and CseC which regulate a sigE promoter. Also provided are corresponding microorganisms, systems, kits, and processes of use of these things.Type: ApplicationFiled: May 22, 2003Publication date: January 22, 2004Inventors: Hee-Jeon Hong, Mark Sebastian Boye Paget, Mark Jeremy Buttner
-
Publication number: 20020143689Abstract: A system whereby high volumes of related commodities or securities trades with a brokerage firm's clients may be processed by the firm's back office systems. The system includes a firm account processor and a wash account processor which combine all characteristically similar trades with the same counterparty into a discrete aggregate trades. The firm and wash account processor calculates the quantity and proceeds of the aggregate trades from the sum of the quantities and proceeds of characteristically similar related trades which make up the aggregate trades. The prices of the aggregate trades are computed as the average price of all of their related trades. The wash account processor transmits information concerning any aggregate trades and unaggregated trades to the firm's back office systems for settlement as individual trades with each individual counterparty.Type: ApplicationFiled: March 30, 2001Publication date: October 3, 2002Inventors: Mark Jeremy Melville Naylor, Alfred Neil Fletcher, Harry Justin Barman
-
Patent number: 5999846Abstract: An insomnia or vigilance monitor comprising one or more electrodes (1a,1b) for obtaining an electrical signal from a subject over a period of epochs, the electrical signal being related to the sleep or wakefulness stage type being experienced by the subject; and a processor (5) adapted to analyze the electrical signal and assign a sleep or wakefulness stage type to each epoch to generate a hypnogram. Methods of monitoring sleep or vigilance using the mastoid site are also disclosed. Further disclosures relate to a method of training and testing a first neural network for use in a physiological monitor, and a method of assigning a class to an epoch of a physiological signal obtained from a subject as a set of samples.Type: GrantFiled: November 8, 1996Date of Patent: December 7, 1999Assignee: Oxford Medical LimitedInventors: James Pardey, Mark Jeremy Laister, Michael Richard Dadswell, Lionel Tarassenko
-
Patent number: 5695579Abstract: A process and apparatus for producing laminated materials comprising a metal sheet laminated on one or both sides to a polymer film or films. The process comprises forming a laminate by a combination of heat and pressure followed by reheating. A heat zone is provided for heating and/or cooling the laminate after the reheat stage and prior to quenching so that the laminate enters the quenching stage at a substantially constant temperature, irrespective of line speed.Type: GrantFiled: December 4, 1995Date of Patent: December 9, 1997Assignee: Carnaudmetalbox plcInventor: Mark Jeremy Rowland
-
Patent number: 5686043Abstract: An apparatus for and a method of forming a metal coated with a polymer is achieved through the provision of a reservoir containing a cooling liquid having a relative undisturbed upper surface. A metal coated with a polymer is introduced into the cooling liquid through the upper surface and is subject to quenching liquid at a temperature T.sub.q directed at the polymer coated metal substantially immediately below the cooling liquid upper surface and substantially along the entire predetermined width thereof. This achieves rapid and uniform cooling in the absence of bubble formation and/or quenching liquid surface agitation to assure desired crystalline formation of the polymer absent the polymer blemishes.Type: GrantFiled: November 29, 1995Date of Patent: November 11, 1997Assignee: Carnaudmetalbox PLCInventors: John Hammond, Mark Jeremy Rowland
-
Patent number: 5679200Abstract: A process for producing laminated materials in which one or more polymer films are laminated to a metal strip by a combination of heat and pressure. Generally, polymer films are applied to both sides of the metal strip in a lamination nip which exerts a force of at least 15 kN/m. The nip rolls may also be at different temperatures, either by one nip roll being of conducting material such as steel and the other nip roll being of insulating material, or by actively cooling one of the rolls. This enables films having different softening temperatures to be laminated without risk of micro-blistering or of pick-up on the rolls.Type: GrantFiled: December 8, 1995Date of Patent: October 21, 1997Assignee: Carnaudmetalbox plcInventors: Peter Michael Newcomb, Mark Jeremy Rowland, Harjap Singh, Allen Christopher Treadgold