Patents by Inventor Scott B. Graham

Scott B. Graham has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 11950526
    Abstract: A product on demand nozzle assembly includes a chamber at least partially defined by an external wall and an array of vertically spaced nozzles. Each nozzle has an air inlet, an air and entrained product outlet extending from the external wall, and an entrainment zone between the air inlet and the air and entrained product outlet to receive a product therein to be distributed.
    Type: Grant
    Filed: October 23, 2019
    Date of Patent: April 9, 2024
    Assignee: Deere & Company
    Inventors: Stanley R. Borkgren, William D. Graham, Terry L. Snipes, Elijah B. Garner, Robert T. Casper, Scott C. McCartney, Michael E. Frasier
  • Patent number: 10445528
    Abstract: Techniques for content handling for applications are described. In one or more implementations, a first set of content handling policies is enforced for a first portion of an application that is permitted to invoke code elements of the computing device and a second set of content handling policies is enforced for a second portion of the application that is not permitted to invoke the code elements. Further, a determination is made whether to apply the first set of content handling policies or the second set of content handling policies to content based on which portion of the application is requesting the content.
    Type: Grant
    Filed: September 7, 2011
    Date of Patent: October 15, 2019
    Assignee: Microsoft Technology Licensing, LLC
    Inventors: David L. Risney, Jr., Scott B. Graham, Mathias Jourdain, Sermet Iskin, David Andrew Ross
  • Patent number: 10356204
    Abstract: An application based hardware identifier is generated for an application on a device. The application based hardware identifier is generated based on both information describing the application and information describing one or more hardware components of the device. The application based hardware identifier can also optionally be based on an identifier of a user of the device. The application based hardware identifier can be provided by the application to a service provider, allowing the service provider to associate the application based hardware identifier with a particular user or user account. However, as the application based hardware identifier is based on the application information, different applications on the same device will have different application based hardware identifiers. The application based hardware identifier thus helps maintain privacy by preventing tracking of the device across different applications.
    Type: Grant
    Filed: December 13, 2012
    Date of Patent: July 16, 2019
    Assignee: Microsoft Technology Licensing, LLC
    Inventors: John A. M. Hazen, Stan D. Pennington, Sermet Iskin, Robin C. Speed, John M. Sheehan, Scott B. Graham
  • Patent number: 9858247
    Abstract: A computing device includes a view control that manages presentation of electronic content on the computing device. The presentation can include displaying content, audibly playing back content, and so forth. The view control is made available to multiple different applications on the computing device. To use the view control, an application provides to the view control an indication of a resolver for the view control to use. The electronic document includes references to electronic content, and the view control requests the referenced electronic content from the resolver. The resolver obtains the referenced electronic content, decodes (e.g., decompresses, decrypts, etc.) the obtained electronic content, and returns the decoded electronic content to the view control for display or other presentation.
    Type: Grant
    Filed: May 20, 2013
    Date of Patent: January 2, 2018
    Assignee: MICROSOFT TECHNOLOGY LICENSING, LLC
    Inventors: David L Risney, Jr., Bradley J Peters, Scott B Graham, Lindsay D Verola
  • Patent number: 9679130
    Abstract: A package identifier for a package from which an application is installed on a computing device is obtained. The package identifier is assigned to each of one or more processes created for running the application and, for each of the one or more processes, whether the process is permitted to access a resource of the computing device is determined based at least in part on the package identifier.
    Type: Grant
    Filed: March 5, 2015
    Date of Patent: June 13, 2017
    Assignee: MICROSOFT TECHNOLOGY LICENSING, LLC
    Inventors: John M. Sheehan, Howard S. Kapustein, Jerome Thomas Holman, Scott B. Graham, Sermet Iskin
  • Patent number: 9223976
    Abstract: Content inspection techniques are described. In one or more implementations, it is detected that an application executing on a computing device is calling a particular code element of a group of code elements to be used to process content. For example, the group of code elements can include a pre-specified group of code elements (e.g., functions and/or properties) that may enable access to particular functionalities of a computing device and thus are associated with a known security risk. It is then ascertained that the content is untrusted and, in response to ascertaining that the content is untrusted, the content is inspected to determine if the content is safe to be passed to the code element.
    Type: Grant
    Filed: September 8, 2011
    Date of Patent: December 29, 2015
    Assignee: Microsoft Technology Licensing, LLC
    Inventors: David L. Risney, Jr., Scott B. Graham, David Andrew Ross, Mathias Jourdain
  • Patent number: 9118686
    Abstract: Per process networking capability techniques are described. In one or more implementations, a determination is made as to whether access to a network capability is permitted for a process that is executed on the computing device based on a token that is associated with the process. The token has one or more security identifiers that reference one or more network capabilities described in a manifest. The access to the network capability is managed based on the determination.
    Type: Grant
    Filed: September 6, 2011
    Date of Patent: August 25, 2015
    Assignee: Microsoft Technology Licensing, LLC
    Inventors: Gerardo Diaz-Cuellar, Sermet Iskin, Jorge P. Coronel Mendoza, Scott B. Graham, Nicholas D. Wood
  • Publication number: 20150178495
    Abstract: A package identifier for a package from which an application is installed on a computing device is obtained. The package identifier is assigned to each of one or more processes created for running the application and, for each of the one or more processes, whether the process is permitted to access a resource of the computing device is determined based at least in part on the package identifier.
    Type: Application
    Filed: March 5, 2015
    Publication date: June 25, 2015
    Inventors: John M. Sheehan, Howard S. Kapustein, Jerome Thomas Holman, Scott B. Graham, Sermet Iskin
  • Patent number: 8990561
    Abstract: A package identifier for a package from which an application is installed on a computing device is obtained. The package identifier is assigned to each of one or more processes created for running the application and, for each of the one or more processes, whether the process is permitted to access a resource of the computing device is determined based at least in part on the package identifier.
    Type: Grant
    Filed: September 9, 2011
    Date of Patent: March 24, 2015
    Assignee: Microsoft Technology Licensing, LLC
    Inventors: John M. Sheehan, Howard S. Kapustein, Jerome Thomas Holman, Scott B. Graham, Sermet Iskin
  • Publication number: 20140344667
    Abstract: A computing device includes a view control that manages presentation of electronic content on the computing device. The presentation can include displaying content, audibly playing back content, and so forth. The view control is made available to multiple different applications on the computing device. To use the view control, an application provides to the view control an indication of a resolver for the view control to use. The electronic document includes references to electronic content, and the view control requests the referenced electronic content from the resolver. The resolver obtains the referenced electronic content, decodes (e.g., decompresses, decrypts, etc.) the obtained electronic content, and returns the decoded electronic content to the view control for display or other presentation.
    Type: Application
    Filed: May 20, 2013
    Publication date: November 20, 2014
    Applicant: Microsoft Corporation
    Inventors: David L Risney, JR., Bradley J. Peters, Scott B. Graham, Lindsay D. Verola
  • Publication number: 20140173071
    Abstract: An application based hardware identifier is generated for an application on a device. The application based hardware identifier is generated based on both information describing the application and information describing one or more hardware components of the device. The application based hardware identifier can also optionally be based on an identifier of a user of the device. The application based hardware identifier can be provided by the application to a service provider, allowing the service provider to associate the application based hardware identifier with a particular user or user account. However, as the application based hardware identifier is based on the application information, different applications on the same device will have different application based hardware identifiers. The application based hardware identifier thus helps maintain privacy by preventing tracking of the device across different applications.
    Type: Application
    Filed: December 13, 2012
    Publication date: June 19, 2014
    Applicant: MICROSOFT CORPORATION
    Inventors: John A. M. Hazen, Stan D. Pennington, Sermet Iskin, Robin C. Speed, John M. Sheehan, Scott B. Graham
  • Patent number: 8505070
    Abstract: Various embodiments provide an ability to isolate execution of trusted content and/or script from execution of untrusted content and/or script. Separate contexts and/or execution environments can be used for the trusted content and untrusted content, respectively. A trusted context and/or execution environment associated with execution of trusted content can be configured to enable access to sensitive resources associated with a computing device. An untrusted context and/or execution environment associated with execution of untrusted content can be configured with limited and/or no access to the sensitive resources. Alternately or additionally, data generated within the untrusted context can be transferred to the trusted context in a benign manner.
    Type: Grant
    Filed: September 8, 2011
    Date of Patent: August 6, 2013
    Assignee: Microsoft Corporation
    Inventors: Andy R. Sterland, David L. Risney, Jr., Scott B. Graham
  • Publication number: 20130067585
    Abstract: Various embodiments provide an ability to isolate execution of trusted content and/or script from execution of untrusted content and/or script. Separate contexts and/or execution environments can be used for the trusted content and untrusted content, respectively. A trusted context and/or execution environment associated with execution of trusted content can be configured to enable access to sensitive resources associated with a computing device. An untrusted context and/or execution environment associated with execution of untrusted content can be configured with limited and/or no access to the sensitive resources. Alternately or additionally, data generated within the untrusted context can be transferred to the trusted context in a benign manner.
    Type: Application
    Filed: September 8, 2011
    Publication date: March 14, 2013
    Applicant: Microsoft Corporation
    Inventors: Andy R. Sterland, David L. Risney, JR., Scott B. Graham
  • Publication number: 20130062401
    Abstract: A package identifier for a package from which an application is installed on a computing device is obtained. The package identifier is assigned to each of one or more processes created for running the application and, for each of the one or more processes, whether the process is permitted to access a resource of the computing device is determined based at least in part on the package identifier.
    Type: Application
    Filed: September 9, 2011
    Publication date: March 14, 2013
    Applicant: Microsoft Corporation
    Inventors: John M. Sheehan, Howard S. Kapustein, Jerome Thomas Holman, Scott B. Graham, Sermet Iskin
  • Publication number: 20130067570
    Abstract: Content inspection techniques are described. In one or more implementations, it is detected that an application executing on a computing device is calling a particular code element of a group of code elements to be used to process content. For example, the group of code elements can include a pre-specified group of code elements (e.g., functions and/or properties) that may enable access to particular functionalities of a computing device and thus are associated with a known security risk. It is then ascertained that the content is untrusted and, in response to ascertaining that the content is untrusted, the content is inspected to determine if the content is safe to be passed to the code element.
    Type: Application
    Filed: September 8, 2011
    Publication date: March 14, 2013
    Applicant: Microsoft Corporation
    Inventors: David L. Risney, JR., Scott B. Graham, David Andrew Ross, Mathias Jourdain
  • Publication number: 20130061282
    Abstract: Techniques for content handling for applications are described. In one or more implementations, a first set of content handling policies is enforced for a first portion of an application that is permitted to invoke code elements of the computing device and a second set of content handling policies is enforced for a second portion of the application that is not permitted to invoke the code elements. Further, a determination is made whether to apply the first set of content handling policies or the second set of content handling policies to content based on which portion of the application is requesting the content.
    Type: Application
    Filed: September 7, 2011
    Publication date: March 7, 2013
    Applicant: Microsoft Corporation
    Inventors: David L. Risney, JR., Scott B. Graham, Mathias Jourdain, Sermet Iskin, David Andrew Ross
  • Publication number: 20130061316
    Abstract: Capability access management techniques for processes are described. In one or more implementations, a token is formed having one or more security identifiers that reference capabilities described in a manifest for the executable code responsive to an input received to initiate execution of executable code installed on the computing device. The one or more processes formed through execution of the executable code on the computing device are associated with the token, the token usable to manage access of the one or more processes to the capabilities of the computing device.
    Type: Application
    Filed: September 6, 2011
    Publication date: March 7, 2013
    Applicant: Microsoft Corporation
    Inventors: Sermet Iskin, John A.M. Hazen, Liang Zhao, Scott B. Graham, John M. Sheelan
  • Publication number: 20130061309
    Abstract: Per process networking capability techniques are described. In one or more implementations, a determination is made as to whether access to a network capability is permitted for a process that is executed on the computing device based on a token that is associated with the process. The token has one or more security identifiers that reference one or more network capabilities described in a manifest. The access to the network capability is managed based on the determination.
    Type: Application
    Filed: September 6, 2011
    Publication date: March 7, 2013
    Applicant: Microsoft Corporation
    Inventors: Gerardo Diaz-Cuellar, Sermet Iskin, Jorge P. Coronel Mendoza, Scott B. Graham, Nicholas D. Wood
  • Publication number: 20120304283
    Abstract: A broker module of a computing device receives requests from an isolated application to access one or more items of an item source. In response to a request, storage item objects representing items of the item source are generated and returned to the isolated application for each item of the item source that the isolated application is authorized to access. Whether the isolated application is authorized to access a particular item can be based on particular item sources and/or particular item locations.
    Type: Application
    Filed: May 27, 2011
    Publication date: November 29, 2012
    Applicant: Microsoft Corporation
    Inventors: Tyler K. Beam, Kavitha Radhakrishnan, Benjamin J. Karas, Katrina M. Blanch, Lyon Wong, Allen T. Kim, Steven J. Ball, J. Tracy Lauricella, Scott B. Graham, Manav Mishra