Patents by Inventor Michael P. Calligaro
Michael P. Calligaro has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 9327194Abstract: Partitioned artificial intelligence (AI) for networked gaming. An exemplary system splits the AI into a computationally lightweight server-side component and a computationally intensive client-side component to harness the aggregate computational power of numerous gaming clients. Aggregating resources of many, even thousands of client machines enhances game realism in a manner that would be prohibitively expensive on the central server. The system is tolerant of latency between server and clients. Deterministic and stateless client-side components enable rapid handoff, preemptive migration, and replication of the client-side AI to address problems of client failure and game exploitation. The partitioned AI can support tactical gaming navigation, a challenging task to offload because of sensitivity to latency. The tactical navigation AI calculates influence fields partitioned into server-side and client-side components by means of a Taylor-series approximation.Type: GrantFiled: February 13, 2012Date of Patent: May 3, 2016Assignee: Microsoft Technology Licensing, LLCInventors: John R. Douceur, Michael P. Calligaro, Randall C Wood, Jacob R. Lorch
-
Publication number: 20120142430Abstract: Partitioned artificial intelligence (AI) for networked gaming. An exemplary system splits the AI into a computationally lightweight server-side component and a computationally intensive client-side component to harness the aggregate computational power of numerous gaming clients. Aggregating resources of many, even thousands of client machines enhances game realism in a manner that would be prohibitively expensive on the central server. The system is tolerant of latency between server and clients. Deterministic and stateless client-side components enable rapid handoff, preemptive migration, and replication of the client-side AI to address problems of client failure and game exploitation. The partitioned AI can support tactical gaming navigation, a challenging task to offload because of sensitivity to latency. The tactical navigation AI calculates influence fields partitioned into server-side and client-side components by means of a Taylor-series approximation.Type: ApplicationFiled: February 13, 2012Publication date: June 7, 2012Applicant: Microsoft CorporationInventors: John R. Douceur, Michael P. Calligaro, Randall C. Wood, Jacob R. Lorch
-
Patent number: 8137199Abstract: Partitioned artificial intelligence (AI) for networked gaming. An exemplary system splits the AI into a computationally lightweight server-side component and a computationally intensive client-side component to harness the aggregate computational power of numerous gaming clients. Aggregating resources of many, even thousands of client machines enhances game realism in a manner that would be prohibitively expensive on the central server. The system is tolerant of latency between server and clients. Deterministic and stateless client-side components enable rapid handoff, preemptive migration, and replication of the client-side AI to address problems of client failure and game exploitation. The partitioned AI can support tactical gaming navigation, a challenging task to offload because of sensitivity to latency. The tactical navigation AI calculates influence fields partitioned into server-side and client-side components by means of a Taylor-series approximation.Type: GrantFiled: February 11, 2008Date of Patent: March 20, 2012Assignee: Microsoft CorporationInventors: John R. Douceur, Michael P. Calligaro, Randall C Wood, Jacob R. Lorch
-
Patent number: 7577849Abstract: A keyed-build system for controlling the distribution of software. The system and method of the present invention control distribution of software by keying computer-executable programs with device identifications. Each of the computing devices of the keyed-build system contains a device identification that is uniquely associated with and is embedded in the device. A computer-executable program for use in a particular computing device is keyed with the device's unique device identification during the build process of the program. When the computer-executable program is launched on a computing device, the device identification in the program is compared with the device identification embedded in the computing device. If the two device identifications do not match, the computer-executable program is disabled.Type: GrantFiled: April 2, 2003Date of Patent: August 18, 2009Assignee: Microsoft CorporationInventors: Chee Chew, Michael P. Calligaro, Dominique Fortier, Igor Borisov Peev
-
Publication number: 20090203449Abstract: Partitioned artificial intelligence (AI) for networked gaming. An exemplary system splits the AI into a computationally lightweight server-side component and a computationally intensive client-side component to harness the aggregate computational power of numerous gaming clients. Aggregating resources of many, even thousands of client machines enhances game realism in a manner that would be prohibitively expensive on the central server. The system is tolerant of latency between server and clients. Deterministic and stateless client-side components enable rapid handoff, preemptive migration, and replication of the client-side AI to address problems of client failure and game exploitation. The partitioned AI can support tactical gaming navigation, a challenging task to offload because of sensitivity to latency. The tactical navigation AI calculates influence fields partitioned into server-side and client-side components by means of a Taylor-series approximation.Type: ApplicationFiled: February 11, 2008Publication date: August 13, 2009Applicant: Microsoft CorporationInventors: John R. Douceur, Michael P. Calligaro, Randall C. Wood, Jacob R. Lorch
-
Patent number: 7386638Abstract: A communications system is arranged for serially chaining multiple portable pendant peripherals to a portable host device. The system enables multiple low power input/output peripherals to communicate over a bi-directional data line with a portable host device such as a PDA or cellular phone. Fixed-length data packets are employed in a store-and-forward approach between the host device and the pendant peripherals. An upstream pendant system component controls a unidirectional clock signal that regulates data transfers to or from the host device and a downstream pendant peripheral. A device identification field associated with the data packet is incremented or decremented as the data packet is forwarded along the pendant bus chain until it reaches its destination.Type: GrantFiled: July 21, 2005Date of Patent: June 10, 2008Assignee: Microsoft CorporationInventors: David William Voth, Michael P. Calligaro
-
Patent number: 7379709Abstract: The present invention automatically selects the wireless mode of a device. The user of a Bluetooth device has the benefit of discoverable mode with the relative safety of connectable mode. The mode of the device is automatically switched from discoverable to connectable and back based on the activity of the device. For example, the mode may be switched to discoverable mode when the device is determined to be active and to connectable mode when the device is determined to be inactive. The device may be determined to be active based on many criteria, including, but not limited to: determining when a screen associated with the device is active; determining when the device is not key locked; and determining when the device is active further comprises determining when a lid associated with the device is open.Type: GrantFiled: April 24, 2003Date of Patent: May 27, 2008Assignee: Microsoft CorporationInventors: Ray Sun, Michael P. Calligaro
-
Patent number: 7299303Abstract: A communication protocol for use between serially chained portable pendant peripherals and a portable host device. The bus communications system protocol enables multiple low power input/output peripherals to communicate over a bi-directional data line with a portable host device such as a PDA or cellular phone. A message packet data structure for use in the bus communications system includes a device identifier, a packet type identifier, and message data bits. The packet type identifier describes the actions associated with the packet. A method determines whether the message packet received by a device is intended for the device by evaluating if the device identifier is zero. If the device identifier is other than zero, the method modifies the device identifier and communicates the message packet to another device in the bus communications system.Type: GrantFiled: May 29, 2002Date of Patent: November 20, 2007Assignee: Microsoft CorporationInventors: Michael P. Calligaro, David William Voth, Randal J. Ramig, Roberto Cazzaro
-
Patent number: 7152243Abstract: A trusted component on a device includes a secure HWID therein and is verified by obtaining a key from the device, and verifying each signed component of the operating system of the device therewith. A driver table is examined to locate a HWID driver which is verified as containing a pointer back to an address inside a kernel. The verified operating system is called to obtain the secure HWID from a HWID component by way of the HWID driver and to return same to the trusted component. Thereafter, the returned HWID is verified as matching the HWID included with the trusted component.Type: GrantFiled: June 27, 2002Date of Patent: December 19, 2006Assignee: Microsoft CorporationInventors: Steven Bourne, Vinay Krishnaswamy, Michael P. Calligaro, Randal Ramig, David Brian Wecker
-
Patent number: 7017004Abstract: Upgrading a non-volatile memory image such as a flash ROM is accomplished by partitioning the flash ROM into a plurality of flash ROM regions. One of the flash ROM regions is selected to receive the software upgrade, which can then be directly overwritten without having to overwrite the flash ROM image in its entirety. Through the use of an image buffer, which stores information about the ROM regions, it is possible to move ROM regions, delete ROM regions, add ROM regions, expand/contact ROM regions, update ROM regions, and enable/disable ROM regions without having to modify the entire ROM image or shadow parts of the ROM image in RAM. Additionally, security and registry information can also be logically linked to a particular region.Type: GrantFiled: March 29, 2002Date of Patent: March 21, 2006Assignee: Microsoft CorporationInventors: Michael P. Calligaro, Chee H. Chew, Dominique Fortier, Eric Lawrence Albert Lantz, Randal James Ramig
-
Patent number: 6957284Abstract: A communications system is arranged for serially chaining multiple portable pendant peripherals to a portable host device. The system enables multiple low power input/output peripherals to communicate over a bi-directional data line with a portable host device such as a PDA or cellular phone. Fixed-length data packets are employed in a store-and-forward approach between the host device and the pendant peripherals. An upstream pendant system component controls a unidirectional clock signal that regulates data transfers to or from the host device and a downstream pendant peripheral. A device identification field associated with the data packet is incremented or decremented as the data packet is forwarded along the pendant bus chain until it reaches its destination.Type: GrantFiled: May 29, 2002Date of Patent: October 18, 2005Assignee: Microsoft CorporationInventors: David William Voth, Michael P. Calligaro
-
Publication number: 20040199766Abstract: A keyed-build system for controlling the distribution of software. The system and method of the present invention control distribution of software by keying computer-executable programs with device identifications. Each of the computing devices of the keyed-build system contains a device identification that is uniquely associated with and is embedded in the device. A computer-executable program for use in a particular computing device is keyed with the device's unique device identification during the build process of the program. When the computer-executable program is launched on a computing device, the device identification in the program is compared with the device identification embedded in the computing device. If the two device identifications do not match, the computer-executable program is disabled.Type: ApplicationFiled: April 2, 2003Publication date: October 7, 2004Applicant: Microsoft CorporationInventors: Chee Chew, Michael P. Calligaro, Dominique Fortier, Igor Borisov Peev
-
Publication number: 20040093393Abstract: A system and method is directed to selecting a media file for a mobile device. The system is configured to select a media file from a plurality of media files based in part on a selection rule, and a heuristic associated with the media file. Heuristics are collected based in part on execution of the media file. The heuristics may include skipping a media file, repeating a-media file, and a frequency of execution of the media file. In one embodiment, a user interface enables a consumer to determine a frequency the media file is selected. The selection rule may include selecting a media file based on an artist, a seasonal characteristic of the media file, size of the media file, frequency of selection of the media file, and other heuristics associated with the media file.Type: ApplicationFiled: November 7, 2002Publication date: May 13, 2004Applicant: Microsoft CorporationInventors: Michael P. Calligaro, Chee H. Chew, Kevin T. Shields, Joe Belfiore
-
Publication number: 20040077314Abstract: The present invention automatically selects the wireless mode of a device. The user of a Bluetooth device has the benefit of discoverable mode with the relative safety of connectable mode. The mode of the device is automatically switched from discoverable to connectable and back based on the activity of the device. For example, the mode may be switched to discoverable mode when the device is determined to be active and to connectable mode when the device is determined to be inactive. The device may be determined to be active based on many criteria, including, but not limited to: determining when a screen associated with the device is active; determining when the device is not key locked; and determining when the device is active further comprises determining when a lid associated with the device is open.Type: ApplicationFiled: April 24, 2003Publication date: April 22, 2004Applicant: Microsoft CorporationInventors: Ray Sun, Michael P. Calligaro
-
Publication number: 20040003271Abstract: A trusted component on a device includes a secure HWID therein and is verified by obtaining a key from the device, and verifying each signed component of the operating system of the device therewith. A driver table is examined to locate a HWID driver which is verified as containing a pointer back to an address inside a kernel. The verified operating system is called to obtain the secure HWID from a HWID component by way of the HWID driver and to return same to the trusted component. Thereafter, the returned HWID is verified as matching the HWID included with the trusted component.Type: ApplicationFiled: June 27, 2002Publication date: January 1, 2004Applicant: Microsoft CorporationInventors: Steven Bourne, Vinay Krishnaswamy, Michael P. Calligaro, Randal Ramig, David Brian Wecker
-
Publication number: 20030133471Abstract: A communication protocol for use between serially chained portable pendant peripherals and a portable host device. The bus communications system protocol enables multiple low power input/output peripherals to communicate over a bi-directional data line with a portable host device such as a PDA or cellular phone. A message packet data structure for use in the bus communications system includes a device identifier, a packet type identifier, and message data bits. The packet type identifier describes the actions associated with the packet. A method determines whether the message packet received by a device is intended for the device by evaluating if the device identifier is zero. If the device identifier is other than zero, the method modifies the device identifier and communicates the message packet to another device in the bus communications system.Type: ApplicationFiled: May 29, 2002Publication date: July 17, 2003Applicant: Microsoft CorporationInventors: Michael P. Calligaro, David William Voth, Randal J. Ramig, Roberto Cazzaro
-
Publication number: 20030135774Abstract: A communications system is arranged for serially chaining multiple portable pendant peripherals to a portable host device. The system enables multiple low power input/output peripherals to communicate over a bi-directional data line with a portable host device such as a PDA or cellular phone. Fixed-length data packets are employed in a store-and-forward approach between the host device and the pendant peripherals. An upstream pendant system component controls a unidirectional clock signal that regulates data transfers to or from the host device and a downstream pendant peripheral. A device identification field associated with the data packet is incremented or decremented as the data packet is forwarded along the pendant bus chain until it reaches its destination.Type: ApplicationFiled: May 29, 2002Publication date: July 17, 2003Applicant: Microsoft CorporationInventors: David William Voth, Michael P. Calligaro
-
Patent number: 6021203Abstract: A protocol is provided for transmitting low security messages and high security messages with one-time-pad cryptosystem. In one implementation of the present invention, low security messages are encrypted using random bit strings in accordance with a one-time-pad encryption scheme. A high security message and a decoy message are embedded within a set of encryption keys and cyphertexts that is to be transmitted from a sender to a receiver. The encryption keys are transmitted over a secure channel from the sender to the receiver, and the cyphertexts are transmitted over a publicly accessible channel from the sender to the receiver. The receiver uses the encryption keys and knowledge regarding keys for a high security message and a decoy message to decrypt the low security messages, extract the high security message and/or decoy message, and decrypt the high security message and/or decoy message.Type: GrantFiled: December 11, 1996Date of Patent: February 1, 2000Assignee: Microsoft CorporationInventors: John R. Douceur, Michael P. Calligaro, Matthew W. Thomlinson