Patents by Inventor Scott Field
Scott Field has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Publication number: 20230302349Abstract: A math game that requires choice and strategic thinking in the practice of multiplication. Play takes place on a game board which consists of a grid of randomly arranged multiplication products. Players are given a “hand” of three or more numbered cards, with each number representing a factor in a multiplication problem. Players take turns choosing two of the factors in their hand to create a product which they mark on the game board. The first player to obtain the required number of marked products in a row, horizontally, vertically, or diagonally, wins the game. By choosing which factors they multiply, players can make offensive or defensive moves in their attempt to be the first to mark the required number of products in a row.Type: ApplicationFiled: March 23, 2022Publication date: September 28, 2023Inventor: Nancy Scott Field
-
Patent number: 10979290Abstract: The subject disclosure relates to techniques for monitoring contextual and performance information of a device for anticipatorily sending update information to the device. An interface component can receive, from the client, contextual information indicating an operating environment of the client and performance information that is associated with one or more operations being performed by the client based on the operating environment, and send, based on correlation information, update information to the client. Further, a service component can to infer a relationship between the contextual information and the performance information to obtain the correlation information. In other embodiments, a client can populate a cache with portion(s) of the contextual information to obtain cached information, and send at least a portion of the cached information to a system including one or more aspects of the service component.Type: GrantFiled: December 19, 2016Date of Patent: April 13, 2021Assignee: Microsoft Technology Licensing, LLCInventors: Edward Reus, Mario Goertzel, Scott Field, Michael Joseph Healy, Joseph Dadzie, David Kays, John Douceur, Henricus Johannes Maria Meijer
-
Patent number: 10699011Abstract: A system and method for efficiently determining that a received file is not malware is presented. In operation, when a file is received at a computing device, an evaluation is made as to whether the file includes user-modifiable, or superficial, data areas, i.e., areas of the file that by their nature do not typically carry or embed malware. If the file includes superficial data areas, those superficial data areas are filtered out and a file signature is generated based on the remaining portions of the received file. The file can then be compared to a list of know malware to determine if the file is malware. Alternatively, the file can be compared to a list of known, trusted files to determine whether the file is trustworthy.Type: GrantFiled: June 28, 2018Date of Patent: June 30, 2020Assignee: Microsoft Technology Licensing, LLCInventors: Mihai Costea, Scott Field, Damodharan Ulagaratchagan
-
Publication number: 20180307836Abstract: A system and method for efficiently determining that a received file is not malware is presented. In operation, when a file is received at a computing device, an evaluation is made as to whether the file includes user-modifiable, or superficial, data areas, i.e., areas of the file that by their nature do not typically carry or embed malware. If the file includes superficial data areas, those superficial data areas are filtered out and a file signature is generated based on the remaining portions of the received file. The file can then be compared to a list of know malware to determine if the file is malware. Alternatively, the file can be compared to a list of known, trusted files to determine whether the file is trustworthy.Type: ApplicationFiled: June 28, 2018Publication date: October 25, 2018Inventors: Mihai COSTEA, Scott FIELD, Damodharan ULAGARATCHAGAN
-
Patent number: 10043008Abstract: A system and method for efficiently determining that a received file is not malware is presented. In operation, when a file is received at a computing device, an evaluation is made as to whether the file includes user-modifiable, or superficial, data areas, i.e., areas of the file that by their nature do not typically carry or embed malware. If the file includes superficial data areas, those superficial data areas are filtered out and a file signature is generated based on the remaining portions of the received file. The file can then be compared to a list of know malware to determine if the file is malware. Alternatively, the file can be compared to a list of known, trusted files to determine whether the file is trustworthy.Type: GrantFiled: October 29, 2004Date of Patent: August 7, 2018Assignee: Microsoft Technology Licensing, LLCInventors: Mihai Costea, Scott Field, Damodharan Ulagaratchagan
-
Publication number: 20170099185Abstract: The subject disclosure relates to techniques for monitoring contextual and performance information of a device for anticipatorily sending update information to the device. An interface component can receive, from the client, contextual information indicating an operating environment of the client and performance information that is associated with one or more operations being performed by the client based on the operating environment, and send, based on correlation information, update information to the client. Further, a service component can to infer a relationship between the contextual information and the performance information to obtain the correlation information. In other embodiments, a client can populate a cache with portion(s) of the contextual information to obtain cached information, and send at least a portion of the cached information to a system including one or more aspects of the service component.Type: ApplicationFiled: December 19, 2016Publication date: April 6, 2017Inventors: Edward Reus, Mario Goertzel, Scott Field, Michael Joseph Healy, Joseph Dadzie, David Kays, John Douceur, Henricus Johannes Maria Meijer
-
Patent number: 9531588Abstract: The subject disclosure relates to techniques for monitoring contextual and performance information of a device for anticipatorily sending update information to the device. An interface component can receive, from the client, contextual information indicating an operating environment of the client and performance information that is associated with one or more operations being performed by the client based on the operating environment, and send, based on correlation information, update information to the client. Further, a service component can to infer a relationship between the contextual information and the performance information to obtain the correlation information. In other embodiments, a client can populate a cache with portion(s) of the contextual information to obtain cached information, and send at least a portion of the cached information to a system including one or more aspects of the service component.Type: GrantFiled: December 16, 2011Date of Patent: December 27, 2016Assignee: Microsoft Technology Licensing, LLCInventors: Edward Reus, Mario Goertzel, Scott Field, Michael Joseph Healy, Joseph Dadzie, David Kays, John Douceur, Henricus Johannes Maria Meijer
-
Patent number: 9166797Abstract: Systems and methods that establish a secured compartment that manages sensitive user transactions/information on a user's machine. The secured compartment qualifies user interaction with the machine, and separates such qualified interaction from other user activity on the machine. A user is switched to such secured compartment upon occurrence of a predetermined event, such as in form of: an explicit request (e.g., a secure attention sequence); an implicit request (e.g., inference of user activities); and presence of a peripheral device that is bound to the secured compartment (e.g., a USB)—wherein such actions typically cannot be generated by an application running outside the secured compartment.Type: GrantFiled: October 24, 2008Date of Patent: October 20, 2015Assignee: Microsoft Technology Licensing, LLCInventors: Thekkthalackal Varugis Kurien, Cormac E. Herley, Alice Jane Bernheim Brush, Daniel C. Robbins, Arindam Chatterjee, Scott Field
-
Patent number: 8813172Abstract: Data management techniques are provided for handling information resources. A data management process can account for attributes of information resources by analyzing or interpreting the workspace location, source, channel and device associated with an information resource, and effectuating policies, based on the attributes. Rules govern the attribute determination and policies for access restriction to the information resource. The attributes and policies determined are tagged to the information resource and is dynamically updated based on the attributes related to the information resource within different workspaces, such as a corporate workspace and a personal workspace.Type: GrantFiled: December 16, 2011Date of Patent: August 19, 2014Assignee: Microsoft CorporationInventors: Edward Reus, Scott Field, Michael Joseph Healy, Joseph Dadzie, Srivatsan Parthasarathy
-
Patent number: 8633314Abstract: The present invention provides alternative forms of Compound I, processes to reproducibly make them and methods of treating patients using them.Type: GrantFiled: February 24, 2012Date of Patent: January 21, 2014Assignee: Cephalon, Inc.Inventors: Stephen Bierlmaier, Michael Christie, R. Scott Field, R. Curtis Haltiwanger, Linli He, Martin J. Jacobs, Michael Kress, Robert E. McKean, Dale R. Mowrey, Joseph Petraitis, Mehran Yazdanian, Veronique Courvoisier
-
Publication number: 20130347115Abstract: A system and method for providing enhanced security with regard to obtained files is presented. Upon obtaining a file from an external location, the obtained file is tagged with tagging information regarding the origin of the obtained file. Additionally, an operating system suitable for execution on a computing device is also presented. The operating system includes at least one application-callable function (API) for obtaining content from an external location. Each application-callable function for obtaining content from an external location is configured to associate tagging information with each obtained file, the tagging information comprising the origin of the obtained file. The origin of the obtained file can be used for subsequent security policy decisions, such as whether to allow or block execution or rendering of the content, as well as whether the content will be accessed in a constrained environment such as a “sandbox” or virtual machine.Type: ApplicationFiled: August 21, 2013Publication date: December 26, 2013Applicant: Microsoft CorporationInventor: Scott Field
-
Patent number: 8513272Abstract: Alternative chemical and/or solid state forms of Compound I, processes to reproducibly make them and methods of treating patients using them.Type: GrantFiled: May 11, 2011Date of Patent: August 20, 2013Assignee: Cephalon, Inc.Inventors: Stephen Bierlmaier, Raymond Scott Field, R. Curtis Haltiwanger, Martin J. Jacobs, Robert E. McKean, Mehran Yazdanian, Veronique Courvoisier
-
Publication number: 20130159500Abstract: The subject disclosure relates to techniques for monitoring contextual and performance information of a device for anticipatorily sending update information to the device. An interface component can receive, from the client, contextual information indicating an operating environment of the client and performance information that is associated with one or more operations being performed by the client based on the operating environment, and send, based on correlation information, update information to the client. Further, a service component can to infer a relationship between the contextual information and the performance information to obtain the correlation information. In other embodiments, a client can populate a cache with portion(s) of the contextual information to obtain cached information, and send at least a portion of the cached information to a system including one or more aspects of the service component.Type: ApplicationFiled: December 16, 2011Publication date: June 20, 2013Applicant: MICROSOFT CORPORATIONInventors: Edward Reus, Mario Goertzel, Scott Field, Michael Joseph Healy, Joseph Dadzie, David Kays, John Douceur, Henricus Johannes Maria Meijer
-
Publication number: 20130160072Abstract: Data management techniques are provided for handling information resources. A data management process can account for attributes of information resources by analyzing or interpreting the workspace location, source, channel and device associated with an information resource, and effectuating policies, based on the attributes. Rules govern the attribute determination and policies for access restriction to the information resource. The attributes and policies determined are tagged to the information resource and is dynamically updated based on the attributes related to the information resource within different workspaces, such as a corporate workspace and a personal workspace.Type: ApplicationFiled: December 16, 2011Publication date: June 20, 2013Applicant: MICROSOFT CORPORATIONInventors: Edward Reus, Scott Field, Michael Joseph Healy, Joseph Dadzie, Srivatsan Parthasarathy
-
Publication number: 20130145027Abstract: Regulatory compliance techniques are provided for dynamically modifying access to data based on the jurisdiction a user seeking access to the data is located within. Dynamically modifying access to data provides for a more efficient and accurate solution to regulatory compliance issues faced when hosting data in a central repository. Users can be notified when their access to data is modified due to a compliance issue. In addition, an audit history can be associated with data packets that allow an administrator or the like to view the history of data packet access. Finally, signatures associated with a data packet can be used to search data store(s) to track access to information within the data packet that may have been subsequently modified.Type: ApplicationFiled: December 1, 2011Publication date: June 6, 2013Applicant: Microsoft CorporationInventors: Srivatsan Parthasarathy, Scott Field, Mario Goertzel, David Kays, Joseph Dadzie, Edward Reus
-
Publication number: 20130117806Abstract: The subject disclosure generally relates to provisioning devices via a network service, such as a cloud service. A profile component can authenticate a user of a device with a cloud service, and determine services maintained by the network service that are associated with the user. A reception component can receive a request for a set of services from the device, and a services component can obtain the set of services from the network service, and provision the device based on the set of services. Provisioning the device can include downloading the services to the device, or including the services in a virtual machine executing in the network service.Type: ApplicationFiled: November 9, 2011Publication date: May 9, 2013Applicant: MICROSOFT CORPORATIONInventors: Srivatsan Parthasarathy, Scott Field, Joseph Dadzie, David Kays
-
Patent number: 8407102Abstract: A method and system used to obtain and process orders for full color printing. A job configuration and price calculator is supplied to a customer. The calculator calculates automatically a price quote as the customer selects configuration options of a print job. The price quote is then displayed automatically. The customer may select configuration options repeatedly until the job configuration is final. A digital graphic layout or image file is then obtained from the customer. The digital graphic layout or image file is then prepared and a proof thereof is created. When the proof is satisfactory, the print job is printed and delivered to the customer.Type: GrantFiled: April 30, 2008Date of Patent: March 26, 2013Assignee: Printingforless.comInventors: Andrew Scott Field, Boyd Stanley Badten
-
Patent number: 8347085Abstract: At computer device power on, the operating system of the computer device initiates a monitor. The monitor assigns a monitoring program to each program and object (collectively, “program”) running on the computer device to monitor the activities of the program. When the monitoring program is assigned to a program, the monitoring program is assigned an integrity and/or privacy label (collectively, “integrity label”) based on predetermined criteria applied to the monitored program. The monitoring program, in turn, assigns an integrity label to the program monitored by the monitoring program. The integrity label assigned to the monitored program is less than or equal to the integrity label of the monitoring program. The monitor enforces an integrity policy of the computer device based on the integrity label assigned to monitored programs and the integrity label associated with data, another program, or a remote network resource that the monitored program is seeking to access.Type: GrantFiled: December 30, 2011Date of Patent: January 1, 2013Assignee: Microsoft CorporationInventors: Thekkthalackal Varugis Kurien, Jeffrey B Hamblin, Narasimha Rao Nagampalli, Peter T Brundrett, Scott Field
-
Publication number: 20120214998Abstract: The present invention provides alternative forms of Compound I, processes to reproducibly make them and methods of treating patients using them.Type: ApplicationFiled: February 24, 2012Publication date: August 23, 2012Applicant: Cephalon, Inc.Inventors: Stephen Bierlmaier, Michael Christie, Laurent Courvoisier, Veronique Courvoisier, R. Scott Field, R. Curtis Haltiwanger, Linli He, Martin J. Jacobs, Michael Kress, Robert E. McKean, Dale R. Mowrey, Joseph Petraitis, Mehran Yazdanian
-
Patent number: D665422Type: GrantFiled: January 11, 2012Date of Patent: August 14, 2012Assignee: Microsoft CorporationInventors: Greg Morrow, Rishi Kumar, Scott Field, Peter Tracy