Patents by Inventor Nathan Ide
Nathan Ide has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 11919256Abstract: A manufacturing system includes a cutting machine, an adhesion machine, and a pick-and-place system. The cutting machine sequentially cuts a continuous length of a unidirectional prepreg into prepreg segments. Each prepreg segment has an opposing pair of segment cut edges that are non-parallel to a lengthwise direction of the unidirectional prepreg. The adhesion machine has a conveyor belt and an adhesion station. The pick-and-place system sequentially picks up the prepreg segments from the cutting machine, and places the prepreg segments in end-to-end relation on the conveyor belt, and in an orientation such that the segment cut edges are generally parallel to a lengthwise direction of the conveyor belt. The conveyor belt feeds the prepreg segments to the adhesion station. The adhesion station adheres the prepreg segments to a continuous length of a backing material, thereby resulting in a continuous length of a backed cross-ply prepreg.Type: GrantFiled: March 16, 2022Date of Patent: March 5, 2024Assignees: The Boeing Company, University of WashingtonInventors: Shuonan Dong, Silas L. Studley, Samuel F. Pedigo, Nathan A. Secinaro, Lukas Wavrin, Kevin Hsu, James Hutchinson, Connor Burch, Nini Hong, Devin Ide, Lucky Singh, Santosh Devasia
-
Publication number: 20190358214Abstract: The present invention features compositions and methods for the treatment of HCV infection. In one embodiment, the compositions of the invention comprise (1) Compound 1 or a pharmaceutically acceptable salt thereof, and (2) Compound 2a or a pharmaceutically acceptable salt thereof. In another embodiment, the compositions of the invention comprise (1) Compound 1 or a pharmaceutically acceptable salt thereof, and (2) a prodrug of Compound 2a (e.g., one of Compounds 2b-2k or Examples 3-1 to 3-10) or a pharmaceutically acceptable salt of said prodrug.Type: ApplicationFiled: November 13, 2017Publication date: November 28, 2019Applicant: AbbVie Inc.Inventors: Brian Brown, Hui-Ju Chen, David DeGoey, Geoff Halvorsen, John Hartung, Howard R. Heyman, Nathan Ide, Dale Kempf, Allen C. Krueger, Tao Li, Tongmei Li, Steven R. Martinez, Christopher C. Marvin, John T. Randolph, Eric Voight, Rolf Wagner, Jaclyn Chau
-
Patent number: 10078747Abstract: In one embodiment, a user device may reestablish access to a user resource while forgoing use of a user credential during a system reboot. The user device may receive the user credential from a user during an initial login to access the user resource. The user device may create an ephemeral entropy to access the user resource. The user device may access the user resource using the ephemeral entropy.Type: GrantFiled: June 23, 2015Date of Patent: September 18, 2018Assignee: Microsoft Technology Licensing, LLCInventors: Tony Ureche, Saurav Sinha, Pranav Kukreja, Ibrahim Mohammad Ismail, Jonathan Schwartz, Nathan Ide, Yashar Bahman
-
Patent number: 10053474Abstract: The present invention features compounds effective in inhibiting active against Hepatitis C virus (“HCV”) polymerase. The invention also features processes of making such compounds, compositions comprising such compounds, and methods of using such compounds to treat HCV infection.Type: GrantFiled: May 5, 2017Date of Patent: August 21, 2018Assignee: AbbVie Inc.Inventors: Jaclyn Chau, Hui-Ju J. Chen, David A. DeGoey, John Hartung, Nathan Ide, Vikram Kalthod, Allan C. Krueger, Yi-Yin Ku, Tongmei Li, John T. Randolph, Rolf Wagner, Geoff T. Halvorsen, Christopher C. Marvin, Eric Voight, Brian S. Brown, Steven R. Martinez, Anurupa Shrestha, Howard R. Heyman
-
Patent number: 9998438Abstract: In one embodiment, a client device 110 may use an attestation service 140 to verify a secure server 120. The secure server 120 may receive a signed trusted credential 310 from an attestation service 140 validating the secure server 120 as trustworthy to a client device 110 seeking access. The secure server 120 may protect the signed trusted credential 310 in a server secure module 280.Type: GrantFiled: October 23, 2013Date of Patent: June 12, 2018Assignee: Microsoft Technology Licensing, LLCInventors: Saurav Sinha, Gopinathan Kannan, Nathan Ide, Shawn Corey, Tony Ureche
-
Publication number: 20180022763Abstract: The present invention features compounds effective in inhibiting active against Hepatitis C virus (“HCV”) polymerase. The invention also features processes of making such compounds, compositions comprising such compounds, and methods of using such compounds to treat HCV infection.Type: ApplicationFiled: May 5, 2017Publication date: January 25, 2018Applicant: AbbVie Inc.Inventors: Jaclyn Chau, Hui-Ju J. Chen, David A. DeGoey, John Hartung, Nathan Ide, Vikram Kalthod, Allan C. Krueger, Yi-Yin Ku, Tongmei Li, John T. Randolph, Rolf Wagner, Geoff T. Halvorsen, Christopher C. Marvin, Eric Voight, Brian S. Brown, Steven R. Martinez, Anurupa Shrestha, Howard R. Heyman
-
Patent number: 9676797Abstract: The present invention features compounds effective in inhibiting active against Hepatitis C virus (“HCV”) polymerase. The invention also features processes of making such compounds, compositions comprising such compounds, and methods of using such compounds to treat HCV infection.Type: GrantFiled: September 1, 2016Date of Patent: June 13, 2017Assignee: AbbVie Inc.Inventors: Hui-Ju J. Chen, David A. DeGoey, John Hartung, Nathan Ide, Vikram Kalthod, Allan C. Krueger, Yi-Yin Ku, Tongmei Li, John T. Randolph, Rolf Wagner, Jaclyn Chau, Geoff T. Halvorsen, Christopher C. Marvin, Eric Voight
-
Publication number: 20170057981Abstract: The present invention features compounds effective in inhibiting active against Hepatitis C virus (“HCV”) polymerase. The invention also features processes of making such compounds, compositions comprising such compounds, and methods of using such compounds to treat HCV infection.Type: ApplicationFiled: September 1, 2016Publication date: March 2, 2017Applicant: AbbVie Inc.Inventors: Hui-Ju J. Chen, David A. DeGoey, John Hartung, Nathan Ide, Vikram Kalthod, Allan C. Krueger, Yi-Yin Ku, Tongmei Li, John T. Randolph, Rolf Wagner, Jaclyn Chau, Geoff T. Halvorsen, Christopher C. Marvin, Eric Voight
-
Publication number: 20160378972Abstract: In one embodiment, a user device may reestablish access to a user resource while forgoing use of a user credential during a system reboot. The user device may receive the user credential from a user during an initial login to access the user resource. The user device may create an ephemeral entropy to access the user resource. The user device may access the user resource using the ephemeral entropy.Type: ApplicationFiled: June 23, 2015Publication date: December 29, 2016Applicant: MICROSOFT TECHNOLOGY LICENSING, LLCInventors: Tony Ureche, Saurav Sinha, Pranav Kukreja, Ibrahim Mohammad Ismail, Jonathan Schwartz, Nathan Ide, Yashar Bahman
-
Publication number: 20160224780Abstract: A facility for managing the state of an electronic device is described. A facility determines a maximum-inactivity-to-lock period length and a grace period length. The facility subtracts the grace period length from the maximum-inactivity-to-lock period length to obtain an inactivity-to-disable-display period length. During a time when the device is unlocked and a visual display of the device is enabled, the facility receives one or more first user input events. At a time that is the inactivity-to-disable-display period length after the latest first user input event is received, the facility disables the visual display to begin a grace period. At a time that is less than the grace period length later than the beginning of the grace period, the facility receives a second user input event. In response, the facility enables the visual display in order to provide authenticated access to the device without imposing any further authentication process.Type: ApplicationFiled: February 4, 2015Publication date: August 4, 2016Inventors: Prajav Kukreja, Ibrahim Mohammad Ismail, Octavian Tony Ureche, Nathan Ide, Andrew V. Echols, Paresh Maisuria, Neeraj Kumar Singh, Yashar Bahman
-
Publication number: 20150113618Abstract: In one embodiment, a client device 110 may use an attestation service 140 to verify a secure server 120. The secure server 120 may receive a signed trusted credential 310 from an attestation service 140 validating the secure server 120 as trustworthy to a client device 110 seeking access. The secure server 120 may protect the signed trusted credential 310 in a server secure module 280.Type: ApplicationFiled: October 23, 2013Publication date: April 23, 2015Inventors: Saurav Sinha, Gopinathan Kannan, Nathan Ide, Shawn Corey, Tony Ureche
-
Patent number: 8800048Abstract: Methods and a tool or instrument for performing the methods of protecting a computer program with a parameter cloud are disclosed. A parameter cloud comprising a plurality of elements may be created. Called functions of a computer program may have defined expected parameter cloud states so that proper behavior of the called function is achieved when the parameter cloud state is the expected parameter cloud state. An expected parameter cloud state may include a selected set of elements of the parameter cloud having assigned values. Static portions of the called functions may depend on a current parameter cloud state, and calling functions may transform the parameter cloud state prior to calling their respective called functions. The methods and instrument may operate on original source code or post-binary targets of the computer program. A fingerprint may be used to identify a specific computer program from a sequence of state transitions.Type: GrantFiled: May 20, 2008Date of Patent: August 5, 2014Assignee: Microsoft CorporationInventors: Matthias Wollnik, Nathan Ide, Andrey Lelikov, John Richard McDowell, Aaron Payne Goldsmid, Karan Singh Dhillon
-
Patent number: 8627464Abstract: An event log can comprise, not only entries associated with components instantiated since a most recent power on of a computing device, but also entries of components instantiated prior to that power on, such as components that were instantiated, and represent, a state of the computing device prior to hibernation that has now been resumed. Upon hibernation, the current values of the Platform Configuration Registers (PCRs) of a Trusted Platform Module (trusted execution environment), as well as a quote of those current values, and a current value of a monotonic counter of the trusted execution environment can be logged. The monotonic counter can be incremented at each power on to track successive generations of the computing device and to guard against an intervening, not-logged generation. A subsequent parsing of the event log can verify the prior generational entries with reference to the PCR values in the log that are associated with those generations.Type: GrantFiled: November 2, 2010Date of Patent: January 7, 2014Assignee: Microsoft CorporationInventors: Stefan Thom, Nathan Ide, Scott Danie Anderson, Robert Karl Spiger, David J. Linsley, Mark Fishel Novak, Magnus Nyström
-
Patent number: 8271803Abstract: A first process operating on a computer comprises code to be executed in connection therewith, where the code includes at least one triggering device. A digital license corresponds to the first process and sets forth terms and conditions for operating the first process. A second process operating on the computer proxy-executes code corresponding to each triggering device of the first process on behalf of such first process. The second process includes a selection of options to thwart reverse engineering by a debugger if a debugger is detected. The options include execution by a proxy engine of a re-routed call, crashing the first process, detection ad elimination of a debugger related interrupt a call to an arbitrary function.Type: GrantFiled: May 25, 2007Date of Patent: September 18, 2012Assignee: Microsoft CorporationInventors: Aaron Payne Goldsmid, Nir Ben-Zvi, Sekhar P. Chintalapati, Karan Singh Dhillon, Nathan Ide, David John Linsley, Ping Xie
-
Publication number: 20120110644Abstract: An event log can comprise, not only entries associated with components instantiated since a most recent power on of a computing device, but also entries of components instantiated prior to that power on, such as components that were instantiated, and represent, a state of the computing device prior to hibernation that has now been resumed. Upon hibernation, the current values of the Platform Configuration Registers (PCRs) of a Trusted Platform Module (trusted execution environment), as well as a quote of those current values, and a current value of a monotonic counter of the trusted execution environment can be logged. The monotonic counter can be incremented at each power on to track successive generations of the computing device and to guard against an intervening, not-logged generation. A subsequent parsing of the event log can verify the prior generational entries with reference to the PCR values in the log that are associated with those generations.Type: ApplicationFiled: November 2, 2010Publication date: May 3, 2012Applicant: Microsoft CorporationInventors: Stefan Thom, Nathan Ide, Scott Daniel Anderson, Robert Karl Spiger, David J. Linsley, Mark Fishel Novak, Magnus Nyström
-
Publication number: 20090293041Abstract: Methods and a tool or instrument for performing the methods of protecting a computer program with a parameter cloud are disclosed. A parameter cloud comprising a plurality of elements may be created. Called functions of a computer program may have defined expected parameter cloud states so that proper behavior of the called function is achieved when the parameter cloud state is the expected parameter cloud state. An expected parameter cloud state may include a selected set of elements of the parameter cloud having assigned values. Static portions of the called functions may depend on a current parameter cloud state, and calling functions may transform the parameter cloud state prior to calling their respective called functions. The methods and instrument may operate on original source code or post-binary targets of the computer program. A fingerprint may be used to identify a specific computer program from a sequence of state transitions.Type: ApplicationFiled: May 20, 2008Publication date: November 26, 2009Applicant: MICROSOFT CORPORATIONInventors: Matthias Wollnik, Nathan Ide, Andrey Lelikov, John Richard McDowell, Aaron Payne Goldsmid, Karan Singh Dhillon
-
Publication number: 20070234430Abstract: A first process operating on a computer comprises code to be executed in connection therewith, where the code includes at least one triggering device. A digital license corresponds to the first process and sets forth terms and conditions for operating the first process. A second process operating on the computer proxy-executes code corresponding to each triggering device of the first process on behalf of such first process. The second process includes a selection of options to thwart reverse engineering by a debugger if a debugger is detected. The options include execution by a proxy engine of a re-routed call, crashing the first process, detection ad elimination of a debugger related interrupt a call to an arbitrary function.Type: ApplicationFiled: May 25, 2007Publication date: October 4, 2007Applicant: Microsoft CorporationInventors: Aaron Goldsmid, Nir Ben-Zvi, Sekhar Chintalapati, Karan Dhillon, Nathan Ide, David Linsley, Ping Xie