Patents by Inventor Randal J. Ramig
Randal J. Ramig has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 9448840Abstract: A runtime management system is described herein that allows a hosting layer to dynamically control an underlying runtime to selectively turn on and off various subsystems of the runtime to save power and extend battery life of devices on which the system operates. The hosting layer has information about usage of the runtime that is not available within the runtime, and can do a more effective job of disabling parts of the runtime that will not be needed without negatively affecting application performance or device responsiveness. The runtime management system includes a protocol of communication between arbitrary hosts and underlying platforms to expose a set of options to allow the host to selectively turn parts of a runtime on and off depending on varying environmental pressures. Thus, the runtime management system provides more effective use of potentially scarce power resources available on mobile platforms.Type: GrantFiled: December 29, 2014Date of Patent: September 20, 2016Assignee: Microsoft Technology Licensing, LLCInventors: Akhilesh Kaza, Gunjan A. Shah, Shawn T. Oster, Jonathan D. Sheller, Alan C. T. Liu, Nimesh I. Amin, Randal J. Ramig
-
Patent number: 9060196Abstract: The subject disclosure is directed towards a technology by which background application code (e.g., provided by third-party developers) runs on a mobile device in a way that is constrained with respect to resource usage. A resource manager processes a resource reservation request for background code, to determine whether the requested resources meet constraint criteria for that type of background code. If the criteria are met and the resources are available, the resources are reserved, whereby the background code is ensured priority access to its reserved resources. As a result, a properly coded background application that executes within its constraints will not experience glitches or other problems (e.g., unexpected termination) and thereby provide a good user experience.Type: GrantFiled: June 17, 2011Date of Patent: June 16, 2015Assignee: Microsoft Technology Licensing, LLCInventors: Peter John Torr, Abolade Gbadegesin, Shawn P. Burke, Vijayendra Gopalrao Vasu, Jason William Fuller, Randal J. Ramig, Kunal R. Gandhi, Jorge I. Raastroem, Darin Miller, Alper Selcuk, Timothy Michael Kurtzman, Rachel Jiang
-
Publication number: 20150116339Abstract: A runtime management system is described herein that allows a hosting layer to dynamically control an underlying runtime to selectively turn on and off various subsystems of the runtime to save power and extend battery life of devices on which the system operates. The hosting layer has information about usage of the runtime that is not available within the runtime, and can do a more effective job of disabling parts of the runtime that will not be needed without negatively affecting application performance or device responsiveness. The runtime management system includes a protocol of communication between arbitrary hosts and underlying platforms to expose a set of options to allow the host to selectively turn parts of a runtime on and off depending on varying environmental pressures. Thus, the runtime management system provides more effective use of potentially scarce power resources available on mobile platforms.Type: ApplicationFiled: December 29, 2014Publication date: April 30, 2015Inventors: Akhilesh Kaza, Gunjan A. Shah, Shawn T. Oster, Jonathan D. Sheller, Alan C.T. Liu, Nimesh I. Amin, Randal J. Ramig
-
Patent number: 8922564Abstract: A runtime management system is described herein that allows a hosting layer to dynamically control an underlying runtime to selectively turn on and off various subsystems of the runtime to save power and extend battery life of devices on which the system operates. The hosting layer has information about usage of the runtime that is not available within the runtime, and can do a more effective job of disabling parts of the runtime that will not be needed without negatively affecting application performance or device responsiveness. The runtime management system includes a protocol of communication between arbitrary hosts and underlying platforms to expose a set of options to allow the host to selectively turn parts of a runtime on and off depending on varying environmental pressures. Thus, the runtime management system provides more effective use of potentially scarce power resources available on mobile platforms.Type: GrantFiled: December 1, 2010Date of Patent: December 30, 2014Assignee: Microsoft CorporationInventors: Akhilesh Kaza, Gunjan A. Shah, Shawn T. Oster, Jonathan D. Sheller, Alan C.T. Liu, Nimesh I. Amin, Randal J. Ramig
-
Patent number: 8640244Abstract: A declared origin policy may be provided. First a plurality of records comprising addresses that an application is allowed to access may be received. The received plurality of records may be placed in a manifest. Then, a request containing an address may be received and compared to the plurality of records in the manifest. Access to the address may be allowed when one of the plurality of records in the manifest matches the address or when an ambiguity is encountered as to whether the one of the plurality of records in the manifest matches the address. Access to the address may be denied when none of the plurality of records in the manifest matches the address. Moreover, any request to change any of the plurality of records in the manifest may be denied when the application is updated, uninstalled, or reinstalled.Type: GrantFiled: June 27, 2008Date of Patent: January 28, 2014Assignee: Microsoft CorporationInventors: Matthew G. Lyons, Randal J. Ramig, Anil Dhawan
-
Publication number: 20120210326Abstract: The subject disclosure is directed towards a technology by which background application code (e.g., provided by third-party developers) runs on a mobile device in a way that is constrained with respect to resource usage. A resource manager processes a resource reservation request for background code, to determine whether the requested resources meet constraint criteria for that type of background code. If the criteria are met and the resources are available, the resources are reserved, whereby the background code is ensured priority access to its reserved resources. As a result, a properly coded background application that executes within its constraints will not experience glitches or other problems (e.g., unexpected termination) and thereby provide a good user experience.Type: ApplicationFiled: June 17, 2011Publication date: August 16, 2012Applicant: MICROSOFT CORPORATIONInventors: Peter John Torr, Abolade Gbadegesin, Shawn P. Burke, Vijayendra Gopalrao Vasu, Jason William Fuller, Randal J. Ramig, Kunal R. Gandhi, Jorge I. Raastroem, Darin Miller, Alper Selcuk, Timothy Michael Kurtzman, Rachel Jiang
-
Publication number: 20120210321Abstract: The subject disclosure is directed towards a technology in which a mobile device maintains an application in a dormant state in which the application's process is not terminated and remains in memory, but the application cannot execute code. Further, state and execution context are maintained for the application, allowing the application to be quickly and efficiently resumed into the running state. To prevent the application from executing code while dormant, thread activity is suspended, requests canceled, completed or paused, resources detached, and so forth. Resource usage may be monitored for dormant applications, to remove a misbehaving dormant application process from memory if improperly using resources.Type: ApplicationFiled: June 20, 2011Publication date: August 16, 2012Applicant: MICROSOFT CORPORATIONInventors: Bruno C. Silva, Abolade Gbadegesin, Ion Vasilian, Shawn P. Burke, Timothy Michael Kurtzman, Istvan Cseri, Randal J. Ramig, Adina Magdalena Trufinescu, Peter John Torr, Paul D. Barnett, Srivatsan Kidambi
-
Patent number: 8225403Abstract: A security element is displayed that provides information to a user to help ensure that they are not confused or misled into believing that content originates from a trusted source when in fact it does not. The security element shows the user the source of the content and is displayed in such a manner that the source of the content is easily viewable. For example, according to one embodiment, the security element is shown within the title bar of a window. The security element may also be temporarily shown. Providing the user with more information about the site being accessed helps them to make an intelligent decision about their browsing experience. The security element includes at least part of a domain name that identifies the source of the content. The security element may also include the entire domain name. For example, the security element may overlay the screen.Type: GrantFiled: June 2, 2005Date of Patent: July 17, 2012Assignee: Microsoft CorporationInventors: Diane L. Curtis, Seana Seraji, Vinoo Cherian, Aaron Filner, Randal J. Ramig
-
Publication number: 20120139929Abstract: A runtime management system is described herein that allows a hosting layer to dynamically control an underlying runtime to selectively turn on and off various subsystems of the runtime to save power and extend battery life of devices on which the system operates. The hosting layer has information about usage of the runtime that is not available within the runtime, and can do a more effective job of disabling parts of the runtime that will not be needed without negatively affecting application performance or device responsiveness. The runtime management system includes a protocol of communication between arbitrary hosts and underlying platforms to expose a set of options to allow the host to selectively turn parts of a runtime on and off depending on varying environmental pressures. Thus, the runtime management system provides more effective use of potentially scarce power resources available on mobile platforms.Type: ApplicationFiled: December 1, 2010Publication date: June 7, 2012Applicant: Microsoft CorporationInventors: Akhilesh Kaza, Gunjan A. Shah, Shawn T. Oster, Jonathan D. Sheller, Alan C.T. Liu, Nimesh I. Amin, Randal J. Ramig
-
Publication number: 20090328235Abstract: A declared origin policy may be provided. First a plurality of records comprising addresses that an application is allowed to access may be received. The received plurality of records may be placed in a manifest. Then, a request containing an address may be received and compared to the plurality of records in the manifest. Access to the address may be allowed when one of the plurality of records in the manifest matches the address or when an ambiguity is encountered as to whether the one of the plurality of records in the manifest matches the address. Access to the address may be denied when none of the plurality of records in the manifest matches the address. Moreover, any request to change any of the plurality of records in the manifest may be denied when the application is updated, uninstalled, or reinstalled.Type: ApplicationFiled: June 27, 2008Publication date: December 31, 2009Applicant: Microsoft CorporationInventors: Matthew G. Lyons, Randal J. Ramig, Anil Dhawan
-
Patent number: 7299303Abstract: A communication protocol for use between serially chained portable pendant peripherals and a portable host device. The bus communications system protocol enables multiple low power input/output peripherals to communicate over a bi-directional data line with a portable host device such as a PDA or cellular phone. A message packet data structure for use in the bus communications system includes a device identifier, a packet type identifier, and message data bits. The packet type identifier describes the actions associated with the packet. A method determines whether the message packet received by a device is intended for the device by evaluating if the device identifier is zero. If the device identifier is other than zero, the method modifies the device identifier and communicates the message packet to another device in the bus communications system.Type: GrantFiled: May 29, 2002Date of Patent: November 20, 2007Assignee: Microsoft CorporationInventors: Michael P. Calligaro, David William Voth, Randal J. Ramig, Roberto Cazzaro
-
Patent number: 7284056Abstract: Host name data is “looped-back” from a native host name resolver included in a requesting computer system to a name resolution port that is also included in the requesting computer system. A replacement host name resolver monitors the name resolution port for host name data that is incompatible with name resolution techniques utilized by a network. The replacement host name resolver modifies the otherwise incompatible host name data for compatibility with name resolution techniques utilized by the network. Modifying host name data may include changing a transmission protocol associated with the host name data or formatting non-secure host name data for resolution with secure host name resolution techniques. The replacement host name resolver redirects compatible host name data to a module that may cause the host name data to be resolved into a network address. The network address may be provided to the native host name resolver.Type: GrantFiled: February 13, 2002Date of Patent: October 16, 2007Assignee: Microsoft CorporationInventor: Randal J. Ramig
-
Publication number: 20030158917Abstract: A computer system is connected to an infrastructure from among a number of infrastructures. For example, a mobile computer system may be connected to a corporate intranet or a home network. The computer system receives one or more parameters that are provided by the infrastructure. The received parameters may include a network address and a subnet mask. The received parameters are combined to generate an identifier that is representative of an environment the computer system will operate in. Generating an identifier may include combining a network address and a subnet mask to determine a network location. Based on the identifier, characteristics associated with the environment the computer system will operate in are selected. The selected characteristics may facilitate changing the configuration of the computer system to operate in the environment represented by the identifier.Type: ApplicationFiled: February 4, 2002Publication date: August 21, 2003Inventors: Felix G.T.I. Andrew, Randal J. Ramig, Zeke Koch
-
Publication number: 20030133471Abstract: A communication protocol for use between serially chained portable pendant peripherals and a portable host device. The bus communications system protocol enables multiple low power input/output peripherals to communicate over a bi-directional data line with a portable host device such as a PDA or cellular phone. A message packet data structure for use in the bus communications system includes a device identifier, a packet type identifier, and message data bits. The packet type identifier describes the actions associated with the packet. A method determines whether the message packet received by a device is intended for the device by evaluating if the device identifier is zero. If the device identifier is other than zero, the method modifies the device identifier and communicates the message packet to another device in the bus communications system.Type: ApplicationFiled: May 29, 2002Publication date: July 17, 2003Applicant: Microsoft CorporationInventors: Michael P. Calligaro, David William Voth, Randal J. Ramig, Roberto Cazzaro
-
Publication number: 20030069992Abstract: Host name data is “looped-back” from a native host name resolver included in a requesting computer system to a name resolution port that is also included in the requesting computer system. A replacement host name resolver monitors the name resolution port for host name data that is incompatible with name resolution techniques utilized by a network. The replacement host name resolver modifies the otherwise incompatible host name data for compatibility with name resolution techniques utilized by the network. Modifying host name data may include changing a transmission protocol associated with the host name data or formatting non-secure host name data for resolution with secure host name resolution techniques. The replacement host name resolver redirects compatible host name data to a module that may cause the host name data to be resolved into a network address. The network address may be provided to the native host name resolver.Type: ApplicationFiled: February 13, 2002Publication date: April 10, 2003Inventor: Randal J. Ramig