Patents by Inventor Martin Hall

Martin Hall has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20070079127
    Abstract: A pay-per-use or pay-as-you-go computer uses a secure memory to store individual unique program identifiers. Each unique program identifier is associated with a particular hardware or software component, or service, or the entire computer available to a user. By combining the unique program identifier with a computer hardware identifier uniquely identified transactions may be tracked for both billing and reconciliation. Certificates associated with each unique program identifier, and coupled to the hardware identifier, provide a cryptographic basis for mutual verification of messages, requests, configuration instructions, and provisioning.
    Type: Application
    Filed: October 5, 2005
    Publication date: April 5, 2007
    Applicant: MICROSOFT CORPORATION
    Inventors: Alexander Frank, Bohdan Raciborski, James Duffus, Jeffrey Herold, Martin Hall, Paul Sutton, Thomas Phillips
  • Publication number: 20070061730
    Abstract: Embodiments of persona creation and management techniques are described herein.
    Type: Application
    Filed: September 15, 2005
    Publication date: March 15, 2007
    Applicant: Microsoft Corporation
    Inventors: Allison O'Mahony, Michael Kunz, Martin Hall
  • Publication number: 20070061535
    Abstract: A processing unit for use in an electronic device includes standard instruction processing and communication interfaces and also includes functional capability in addition to or in place of those found in an operating system. A secure memory within the processing unit may contain a hardware identifier, policy data, and subsystem functions such as a secure clock, policy management, and policy enforcement. Data in functions within the secure memory are not accessible from outside the processing unit.
    Type: Application
    Filed: September 12, 2005
    Publication date: March 15, 2007
    Applicant: MICROSOFT CORPORATION
    Inventors: Zhangwei Xu, Thomas Phillips, Alexander Frank, Curt Steeb, Isaac Ahdout, Martin Hall, James Duffus
  • Publication number: 20070050297
    Abstract: A pay-per-use or metered-use computer uses directives from an operating system or other software component to determine whether to meter or not. Because such directives may not be trustworthy, a metering system may determine a state of the computer to verify that the metering state complies with a policy. If the metering system determines that the power state is not in keeping with the metering state, the metering system may invoke a sanction, such as restarting metering or placing some or all of the computer in a standby power mode.
    Type: Application
    Filed: August 25, 2005
    Publication date: March 1, 2007
    Applicant: MICROSOFT CORPORATION
    Inventors: Zhangwei Xu, Martin Hall, Isaac Ahdout
  • Publication number: 20060184590
    Abstract: A method and apparatus for saving, retrieving, and adjusting metering data uses information about the period between saves of the metering data to non-volatile memory and other information, for example, a number of recovery events experienced by the computer. Adjusting the retrieved metering data according to the number of recovery events may discourage attempts by a subscriber to time power interruptions in an effort to advantageously use the metering data restoration process. Similarly, the time between saves of the metering data may be altered to help thwart such timing attacks. Information about the time between saves, or the period of the save cycle, may also be stored with the metering data for use in the metering data restoration process.
    Type: Application
    Filed: February 14, 2005
    Publication date: August 17, 2006
    Applicant: MICROSOFT CORPORATION
    Inventors: Alexander Frank, Mark Light, Martin Hall
  • Publication number: 20060173963
    Abstract: Strategies are described for propagating and responding to announcements within an environment having pre-established social groups, such as pre-established instant messenger social groups. More specifically, a member within a group can create an announcement, whereupon the announcement becomes associated with the member's identity. The member can then propagate that announcement out as part of their identity to members within the member's immediate social order group. If the member so authorizes, the announcement can also be propagated out to other social groups linked to the member's immediate social group. A member within the immediate social group or one of the linked social groups can responds to the announcement. The use of pre-established social groups to transact announcement-related exchanges provides a level of trust not offered by conventional network-based messaging and merchandising services.
    Type: Application
    Filed: February 3, 2005
    Publication date: August 3, 2006
    Applicant: Microsoft Corporation
    Inventors: Asta Roseway, Blake Irving, Daniel Makoski, Eunkyung Chung, Martin Hall, Melora Zaner-Godsey, Tammy Savage
  • Publication number: 20060168543
    Abstract: Attachment browser is described. In an embodiment, an attachment browser displays a selection of communications received from multiple sources where each of the communications has an attachment. A representative image of each attachment is organized for display according to an attribute of the respective attachment, and a portion of each communication is displayed proximate an associated representative image to maintain the association of a communication and a respective attachment.
    Type: Application
    Filed: January 27, 2005
    Publication date: July 27, 2006
    Applicant: Microsoft Corporation
    Inventors: Melora Zaner-Godsey, Asta Roseway, Eun-Kyung Chung, Martin Hall, Tammy Savage, Hosea Frank
  • Publication number: 20060136747
    Abstract: A computer or other electronic device uses a cryptographic capability and hardware identifier to verify a provisioning packet for changing the mode of operation of the device or a licensed component. A secure memory stores the provisioning packet for future reference. A sequence number may be used to limit replay attacks. An exemplary use is conversion of a computer from metered use during a subscription period to unlimited use when the subscription terms have been satisfied.
    Type: Application
    Filed: August 24, 2005
    Publication date: June 22, 2006
    Applicant: MICROSOFT CORPORATION
    Inventors: Isaac Ahdout, Martin Hall, Zhangwei Xu
  • Publication number: 20060107329
    Abstract: A system and method for monitoring a computer, particularly a pay-per-use computer, uses an isolated computing environment or supervisor. The isolated computing environment boots prior to any boot device associated with an operating system, runs concurrently with the operating system and monitors and measures the computer in operation. Once the isolated computing environment determines the computer is not in compliance with the required policies, the isolated computing environment may either impose an impediment to use such as slowing clock speed or completely disable the operating system. The user may have to return the computer to a service provider to restore it from the offending condition and reset the computer to an operational state.
    Type: Application
    Filed: June 14, 2005
    Publication date: May 18, 2006
    Applicant: MICROSOFT CORPORATION
    Inventors: Alexander Frank, Curt Steeb, Isaac Ahdout, James Duffus, Martin Hall, Nicholas Temple, Rajagopal Venkatachalam, Thomas Phillips, Zhangwei Xu
  • Publication number: 20060107328
    Abstract: A computer is adapted for pay-for-use operation by adding a isolated computing environment to a standard computer. The isolated computing environment may include a trusted non-volatile memory, a digital signature verification capability, a clock or timer and a logic circuit for triggering execution of a validation program responsive to the clock or timer. The isolated computing environment may be protected from tampering by physical or cryptographic mechanisms, or both. The validation program measures or monitors for non-compliant states of the computer and may enforce sanctions when non-compliant states of the computer are detected.
    Type: Application
    Filed: December 22, 2004
    Publication date: May 18, 2006
    Applicant: MICROSOFT CORPORATION
    Inventors: Alexander Frank, Martin Hall, Thomas Phillips
  • Publication number: 20060053770
    Abstract: A valve assembly defines a chamber and three ports. A first valve selectively obstructs a first port to prevent fluid communication between a secondary air injection pump and the chamber. A second valve selectively obstructs a second port to prevent fluid communication between an air intake manifold and the chamber. A third port provides fluid communication between the chamber and an exhaust manifold. The chamber thus serves as a common passageway for secondary air flowing from the pump to the exhaust manifold and for exhaust gas flowing from the exhaust manifold to the air intake manifold. In a preferred embodiment, the first and second valves are rigidly interconnected.
    Type: Application
    Filed: September 14, 2004
    Publication date: March 16, 2006
    Inventors: Bryant Hammond, David Frank, Martin Hall
  • Patent number: 6700088
    Abstract: A sealing apparatus for effecting a temporary seal against an elongate object. The object is placed in a chamber(17) and supported between inlet and outlet apertures in the walls of the chamber. A resilient seal (32) is placed at the point where the object passes through one of the apertures. A piston (34) is located on the remote side of the seal being operable to compress the seal towards the relevant aperture thereby deforming the seal laterally into contact with the object to seal the periphery of the object. When the piston is released, the seal reverts to its relaxed condition thereby enabling the object to be moved between the two apertures.
    Type: Grant
    Filed: March 5, 2002
    Date of Patent: March 2, 2004
    Assignee: Amchem Limited
    Inventors: Simon Geoffrey Loynes, Martin Hall
  • Publication number: 20030102444
    Abstract: A fast method of creating nanostructures comprising the steps of forming one or more electrically-charged regions (5) of predetermined shape on a surface (1) of a first material, by contacting the regions with a stamp for transferring electric charge, and providing electrically charged nanoparticles (7) of a second material, and permitting the particles to flow in the vicinity of the regions, to be deposited on the regions.
    Type: Application
    Filed: October 29, 2002
    Publication date: June 5, 2003
    Inventors: Knut Wilfried Deppert, Carl Martin Hall Magnusson, Lars Ivar Samuelson, Thomas Johannes Krinke
  • Publication number: 20020190031
    Abstract: An electrical discharge machining apparatus 10 comprises an electrode assembly 40 having an electrode clamp 54 for clamping a hollow electrode 24. Dielectric fluid is directed through the hollow interior of the electrode 24 to a workpiece 14. A deformable seal 70 seals between the electrode 24 and the assembly 40, and is moveable between a relaxed position (see FIG. 3) in which dielectric fluid can flow between the seal 70 and the assembly 40, and an operative position (see FIG. 5) in which the seal is deformed, and seals between the electrode and the assembly 40. A piston 74 actuates the clamp 54 and also caused deformation of the seal 70. The clamp 54 and seal 70 are capable of receiving an electrode 24 having an external diameter within a 200 micron range.
    Type: Application
    Filed: June 6, 2002
    Publication date: December 19, 2002
    Inventor: Martin Hall