Patents by Inventor Mark Light

Mark Light has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 12154679
    Abstract: An approach for providing a cap with an embedded high-resolution lens and a sampling insert that is used during an authentication of a composition of a liquid in a container sealed by the cap. The cap has a top portion of a cap with an opening, a sampling insert inside the opening in the top portion of the cap, and a high-resolution lens inside an opening in the sampling insert.
    Type: Grant
    Filed: November 16, 2020
    Date of Patent: November 26, 2024
    Inventors: Ramani R. Routray, Bruce Light Hillsberg, Venkat K. Balagurusamy, Ashwin Dhinesh Kumar, Donna N Eng Dillenberger, Mark Dudman
  • Publication number: 20060184590
    Abstract: A method and apparatus for saving, retrieving, and adjusting metering data uses information about the period between saves of the metering data to non-volatile memory and other information, for example, a number of recovery events experienced by the computer. Adjusting the retrieved metering data according to the number of recovery events may discourage attempts by a subscriber to time power interruptions in an effort to advantageously use the metering data restoration process. Similarly, the time between saves of the metering data may be altered to help thwart such timing attacks. Information about the time between saves, or the period of the save cycle, may also be stored with the metering data for use in the metering data restoration process.
    Type: Application
    Filed: February 14, 2005
    Publication date: August 17, 2006
    Applicant: MICROSOFT CORPORATION
    Inventors: Alexander Frank, Mark Light, Martin Hall
  • Publication number: 20060165005
    Abstract: A system for supplying computers with little or no upfront payment has a service provider, a computer, and an optional funding account. The computer is adapted to render itself substantially useless unless provisioned by the service provider. The service provider has a capability to collect funds from the user and to provide the data necessary for continued operation of the computer. Cryptographic means may be employed to generate and receive the data necessary for continued operation of the computer. The computer's self-imposed sanctions may include slowed operation, reduced graphics capability, limited communication, and limited access to peripherals.
    Type: Application
    Filed: December 8, 2004
    Publication date: July 27, 2006
    Applicant: MICROSOFT CORPORATION
    Inventors: Alexander Frank, Curt Steeb, David Edelstein, James Duffus, Mark Light, Paul Sutton, Thomas Phillips
  • Publication number: 20060139069
    Abstract: A system and method for maintaining persistent data during an unexpected power loss uses a memory controller and a supplemental power source. An entity running on the computer, for example, an application program, a utility, the operating system or other entity, may identify data for preservation using an application program interface. The application program interface may be provided by the memory controller. A sensor determines when an unexpected power loss has occurred and signals the memory controller. Using power from the supplemental power source, i.e. a battery or capacitor, the memory controller copies the identified data to a non-volatile memory. The memory controller may set a flag to indicate that preserved data is available for later recovery.
    Type: Application
    Filed: December 22, 2004
    Publication date: June 29, 2006
    Applicant: MICROSOFT CORPORATION
    Inventors: Alexander Frank, Mark Light, William Westerinen
  • Publication number: 20060106845
    Abstract: A computer is configured for pay-per-use or prepaid operation using internally stored value that may be directed to various aspects of the computer's operation, for example, printing or use of a particular application program. The value used may be logged and that information may be transferred to a host where individual service providers may be compensated for purchases made on the computer according to usage. The user may be presented with payment options such as single use or subscription for a given local purchase decision. A method of operation is also disclosed.
    Type: Application
    Filed: December 8, 2004
    Publication date: May 18, 2006
    Applicant: MICROSOFT CORPORATION
    Inventors: Alexander Frank, Curt Steeb, David Edelstein, James Duffus, Mark Light, Paul Sutton, Thomas Phillips
  • Publication number: 20060107335
    Abstract: A dynamic software provisioning system allows provisioning software on a number of different computing devices based upon a desired business process. The dynamic software provisioning system allows a user to request usage of the operating system for a specific period of time, for a specific amount of usage, or in any other desired manner from an operating system provisioning service or from a third party. The provisioning service processes the request from the user or from the third party to provision the use of the operating system and in response to the request provisions use of the operating system for a specific device specified by the request. The dynamic software activation system also includes a local provisioning module located on the device using the operating system, wherein the local provisioning module activates and deactivates the operating system based on instructions received from the provisioning service.
    Type: Application
    Filed: November 15, 2004
    Publication date: May 18, 2006
    Applicant: MICROSOFT CORPORATION
    Inventors: Alexander Frank, Curt Steeb, James Duffus, Mark Light, Martin Holladay, Paul Sutton, Thomas Phillips, Zeyong Xu, Zhangwei Xu
  • Publication number: 20060095965
    Abstract: A network security module for protecting computing devices connected to a communication network from security threats is presented. The network security module is interposed, either logically or physically, between the protected computer and the communication network. The network security module receives security information from a security service. The security information comprises security measures which, when enforced by the network security module, protect the computer from a security threat to the computer. The network security module implements the security measures by controlling the network activities between the protected computer and the network. The network security module also temporarily implements security patches until corresponding patches are installed onto the protected computer.
    Type: Application
    Filed: October 29, 2004
    Publication date: May 4, 2006
    Applicant: Microsoft Corporation
    Inventors: Thomas Phillips, Christopher Schoppa, Alexander Frank, Mark Light, Wiliam Westerinen