Patents by Inventor Scott Field
Scott Field has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 9500643Abstract: Ectoparasite infestation of a substrate like bedding is detected by contacting a sample from the substrate with a polyclonal ectoparasite antibody generated from a whole ectoparasite immunogen, under conditions wherein the antibody specifically binds ectoparasite antigen in the sample.Type: GrantFiled: November 16, 2015Date of Patent: November 22, 2016Assignee: SRI InternationalInventors: Rajeev Vaidyanathan, Joseph Perrone, Ellen Beaulieu, Scott Fields
-
Patent number: 9495190Abstract: In the host operating system of a computing device, entropy data is collected based at least in part on each of one or more hardware components of the computing device. An entropy pool is updated based at least in part on the collected entropy data, and data from the entropy pool is provided to a guest operating system running as a virtual machine of the computing device. The guest operating system maintains a guest operating system entropy pool based on the data from the entropy pool provided by the host operating system. The guest operating system accesses the guest operating system entropy pool and uses the guest operating system entropy pool as a basis for generating values including random numbers.Type: GrantFiled: August 24, 2009Date of Patent: November 15, 2016Assignee: Microsoft Technology Licensing, LLCInventors: Carl M. Ellison, Scott A. Field, Brandon S. Baker
-
Patent number: 9413740Abstract: Embodiments are directed to establishing a secure connection between computing systems and to providing computer system virtualization on a secure computing device. In one scenario, a computer system receives a request that at least one specified function be initiated. The request includes user credentials and a device claim that identifies the computing device. The computer system authenticates the user using the received user credentials and determines, based on the device claim, that the computing device is an approved computing device that has been approved to initiate performance of the specified function. Then, upon determining that the user has been authenticated and that the computing device is approved to initiate performance the specified function, the computer system initiates performance of the specified function.Type: GrantFiled: July 22, 2014Date of Patent: August 9, 2016Assignee: Microsoft Technology Licensing, LLCInventors: Mohamed Rouatbi, Karthik Jaganathan, Venkata K. Anumalasetty, Ramesh Chinta, Scott A. Field
-
Patent number: 9407654Abstract: Embodiments described herein are directed to preventing development of insecure web pages, preventing deployment of insecure web pages and to preventing access to insecure web pages. In one embodiment, a computer system accesses a web page that includes one or more web elements. The computer system then determines that the web page includes at least one element that requests user authentication and determines whether various specified secure protocols have been implemented on the web page. Then, if the specified secure protocols have not been implemented on the web page, the computer system displays a warning or error indicating that the web page is insecure.Type: GrantFiled: March 20, 2014Date of Patent: August 2, 2016Assignee: Microsoft Technology Licensing, LLCInventors: Scott A. Field, Ellen E. Cram, Julian Federico Gonzalez
-
Publication number: 20160087963Abstract: Embodiments are directed to establishing a secure connection between computing systems and to providing computer system virtualization on a secure computing device. In one scenario, a computer system receives a request that at least one specified function be initiated. The request includes user credentials and a device claim that identifies the computing device. The computer system authenticates the user using the received user credentials and determines, based on the device claim, that the computing device is an approved computing device that has been approved to initiate performance of the specified function. Then, upon determining that the user has been authenticated and that the computing device is approved to initiate performance the specified function, the computer system initiates performance of the specified function.Type: ApplicationFiled: December 1, 2015Publication date: March 24, 2016Inventors: Mohamed Rouatbi, Karthik Jaganathan, Venkata K. Anumalasetty, Ramesh Chinta, Scott A. Field
-
Publication number: 20160069869Abstract: Ectoparasite infestation of a substrate like bedding is detected by contacting a sample from the substrate with a polyclonal ectoparasite antibody generated from a whole ectoparasite immunogen, under conditions wherein the antibody specifically binds ectoparasite antigen in the sample.Type: ApplicationFiled: November 16, 2015Publication date: March 10, 2016Inventors: Rajeev VAIDYANATHAN, Joseph PERRONE, Ellen BEAULIEU, Scott FIELDS
-
Publication number: 20160028704Abstract: Embodiments are directed to establishing a secure connection between computing systems and to providing computer system virtualization on a secure computing device. In one scenario, a computer system receives a request that at least one specified function be initiated. The request includes user credentials and a device claim that identifies the computing device. The computer system authenticates the user using the received user credentials and determines, based on the device claim, that the computing device is an approved computing device that has been approved to initiate performance of the specified function. Then, upon determining that the user has been authenticated and that the computing device is approved to initiate performance the specified function, the computer system initiates performance of the specified function.Type: ApplicationFiled: July 22, 2014Publication date: January 28, 2016Inventors: Mohamed Rouatbi, Karthik Jaganathan, Venkata K. Anumalasetty, Ramesh Chinta, Scott A. Field
-
Patent number: 9188583Abstract: Ectoparasite infestation of a substrate like bedding is detected by contacting a sample from the substrate with a polyclonal ectoparasite antibody generated from a whole ectoparasite immunogen, under conditions wherein the antibody specifically binds ectoparasite antigen in the sample.Type: GrantFiled: February 27, 2013Date of Patent: November 17, 2015Assignee: SRI InternationalInventors: Rajeev Vaidyanathan, Joseph Perrone, Ellen Beaulieu, Scott Fields
-
Patent number: 9166797Abstract: Systems and methods that establish a secured compartment that manages sensitive user transactions/information on a user's machine. The secured compartment qualifies user interaction with the machine, and separates such qualified interaction from other user activity on the machine. A user is switched to such secured compartment upon occurrence of a predetermined event, such as in form of: an explicit request (e.g., a secure attention sequence); an implicit request (e.g., inference of user activities); and presence of a peripheral device that is bound to the secured compartment (e.g., a USB)—wherein such actions typically cannot be generated by an application running outside the secured compartment.Type: GrantFiled: October 24, 2008Date of Patent: October 20, 2015Assignee: Microsoft Technology Licensing, LLCInventors: Thekkthalackal Varugis Kurien, Cormac E. Herley, Alice Jane Bernheim Brush, Daniel C. Robbins, Arindam Chatterjee, Scott Field
-
Publication number: 20150271197Abstract: Embodiments described herein are directed to preventing development of insecure web pages, preventing deployment of insecure web pages and to preventing access to insecure web pages. In one embodiment, a computer system accesses a web page that includes one or more web elements. The computer system then determines that the web page includes at least one element that requests user authentication and determines whether various specified secure protocols have been implemented on the web page. Then, if the specified secure protocols have not been implemented on the web page, the computer system displays a warning or error indicating that the web page is insecure.Type: ApplicationFiled: March 20, 2014Publication date: September 24, 2015Applicant: MICROSOFT CORPORATIONInventors: Scott A. Field, Ellen E. Cram, Julian Federico Gonzalez
-
Patent number: 9135357Abstract: Methods for using scenario solution-related information to generate customized user experiences are provided. Upon receiving a user query, a plurality of results is returned, each result being representative of a scenario solution which may be utilized to address a particular issue relevant to the received query. At the time of authoring, each scenario solution is organized based upon one or more keywords and/or one or more categories (i.e., namespaces). Data associated with a namespace/keyword corresponding to a returned search result may be mined to determine information beyond basic scenario solution search results that may be of interest to the user.Type: GrantFiled: September 20, 2010Date of Patent: September 15, 2015Assignee: Microsoft Technology Licensing, LLCInventors: Thekkthalackal Varugis Kurien, Steven E. Jackson, Scott A. Field
-
Patent number: 9092301Abstract: A facility for applying a software patch is described. Using an automatic patching agent, the facility receives the software patch. In response to receiving the software patch, without user intervention, the facility performs the following acts: First, the facility identifies an instance of an executable module that is currently loaded, and to which the received software patch pertains. Second, the facility applies the received software patch to the identified loaded executable module instance to modify the behavior of the identified executable module instance.Type: GrantFiled: September 16, 2013Date of Patent: July 28, 2015Assignee: Microsoft Technology Licensing, LLCInventors: Anthony Blumfield, Gilad Golan, Jason Garms, Saud Alshibani, Scott A. Field
-
Patent number: 8996866Abstract: Computer-executable instructions that are directed to the performance of consequential actions and automatically elevate to execute at a higher privilege level to do so can perform such consequential actions only after user notification. Doing so can enable monitoring processes to avoid presenting duplicative user notification upon detection of such auto-elevation. In addition, prior to presenting user notification, input from the execution environment can be ignored and access to DLLs for performing consequential actions can be avoided. A static analyzer can identify non-conforming computer-executable instructions. A wrapper can be utilized to provide compliance by otherwise unknown or non-conforming computer-executable instructions.Type: GrantFiled: December 22, 2009Date of Patent: March 31, 2015Assignee: Microsoft Technology Licensing, LLCInventors: Crispin Cowan, Matthew Z. Tamayo-Rios, Tanmoy Dutta, John Lambert, Paul J. Leach, Scott A. Field, Thomas C. Jones
-
Patent number: 8977564Abstract: Apparatus for coordinating a rule-based relationship between a bank, a vendor and a merchant is provided. The apparatus may include a first receiver configured to receive an employee identification number input into a graphical user interface (“GUI”). The apparatus may additionally include the first receiver being configured to receive a billing account number input into the GUI. The apparatus may also include a processor configured to determine if the billing account number includes a number of consecutive, identical digits. The processor may further be configured to determine if the number of consecutive, identical digits is equal to or greater than a threshold number of consecutive, identical digits.Type: GrantFiled: March 14, 2013Date of Patent: March 10, 2015Assignee: Bank of America CorporationInventors: Poornima Bushpala, Vipul Seth, Rajneesh Talwar, Venkatesh Naidu, Scott A. Field, Kathy S. Myers, Wichuda Chewawong, Vamshi Yeligepally
-
Publication number: 20150064727Abstract: Ectoparasite infestation of a substrate like bedding is detected by contacting a sample from the substrate with a polyclonal ectoparasite antibody generated from a whole ectoparasite immunogen, under conditions wherein the antibody specifically binds ectoparasite antigen in the sample.Type: ApplicationFiled: February 27, 2013Publication date: March 5, 2015Inventors: Rajeev Vaidyanathan, Joseph Perrone, Ellen Braulieu, Scott Fields
-
Patent number: 8938618Abstract: Booting a computing device includes executing one or more firmware components followed by a boot loader component. A protection component for the computing device, such as an anti-malware program, is identified and executed as an initial component after executing the boot loader component. One or more boot components are also executed, these one or more boot components including only boot components that have been approved by the protection component. A list of boot components that have been previously approved by the protection component can also be maintained in a tamper-proof manner.Type: GrantFiled: April 5, 2013Date of Patent: January 20, 2015Assignee: Microsoft CorporationInventors: Mark F. Novak, Robert Karl Spiger, Stefan Thom, David J. Linsley, Scott A. Field, Anil Francis Thomas
-
Publication number: 20140279319Abstract: Apparatus for coordinating a rule-based relationship between a bank, a vendor and a merchant is provided. The apparatus may include a first receiver configured to receive an employee identification number input into a graphical user interface (“GUI”). The apparatus may additionally include the first receiver being configured to receive a billing account number input into the GUI. The apparatus may also include a processor configured to determine if the billing account number includes a number of consecutive, identical digits. The processor may further be configured to determine if the number of consecutive, identical digits is equal to or greater than a threshold number of consecutive, identical digits.Type: ApplicationFiled: March 14, 2013Publication date: September 18, 2014Applicant: BANK OF AMERICA CORPORATIONInventors: Poornima Bushpala, Vipul Seth, Rajneesh Talwar, Venkatesh Naidu, Scott A. Field, Kathy S. Myers, Wichuda Chewawong, Vamshi Yeligepally
-
Patent number: 8813172Abstract: Data management techniques are provided for handling information resources. A data management process can account for attributes of information resources by analyzing or interpreting the workspace location, source, channel and device associated with an information resource, and effectuating policies, based on the attributes. Rules govern the attribute determination and policies for access restriction to the information resource. The attributes and policies determined are tagged to the information resource and is dynamically updated based on the attributes related to the information resource within different workspaces, such as a corporate workspace and a personal workspace.Type: GrantFiled: December 16, 2011Date of Patent: August 19, 2014Assignee: Microsoft CorporationInventors: Edward Reus, Scott Field, Michael Joseph Healy, Joseph Dadzie, Srivatsan Parthasarathy
-
Patent number: 8789159Abstract: Systems and methods for creating a secure process on a web server can include creating an application manager process, and creating an application host process, the application host process being created under control of the application manager process. Example methods can also include restricting attributes of the application host process, and assigning a unique logon identifier to the application host process so that the application host process can only communicate with the application manager process.Type: GrantFiled: February 11, 2008Date of Patent: July 22, 2014Assignee: Microsoft CorporationInventors: S. Franklin Williams, Kiran Akella Venkata, David C. LeBlanc, Juraj Gottweis, Gareth A. Howell, Scott A. Field, Ramesh Chinta
-
Publication number: 20140096122Abstract: A facility for applying a software patch is described. Using an automatic patching agent, the facility receives the software patch. In response to receiving the software patch, without user intervention, the facility performs the following acts: First, the facility identifies an instance of an executable module that is currently loaded, and to which the received software patch pertains. Second, the facility applies the received software patch to the identified loaded executable module instance to modify the behavior of the identified executable module instance.Type: ApplicationFiled: September 16, 2013Publication date: April 3, 2014Applicant: Microsoft CorporationInventors: Anthony Blumfield, Gilad Golan, Jason Garms, Saud Alshibani, Scott A. Field