Patents by Inventor Scott Field

Scott Field has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 9500643
    Abstract: Ectoparasite infestation of a substrate like bedding is detected by contacting a sample from the substrate with a polyclonal ectoparasite antibody generated from a whole ectoparasite immunogen, under conditions wherein the antibody specifically binds ectoparasite antigen in the sample.
    Type: Grant
    Filed: November 16, 2015
    Date of Patent: November 22, 2016
    Assignee: SRI International
    Inventors: Rajeev Vaidyanathan, Joseph Perrone, Ellen Beaulieu, Scott Fields
  • Patent number: 9495190
    Abstract: In the host operating system of a computing device, entropy data is collected based at least in part on each of one or more hardware components of the computing device. An entropy pool is updated based at least in part on the collected entropy data, and data from the entropy pool is provided to a guest operating system running as a virtual machine of the computing device. The guest operating system maintains a guest operating system entropy pool based on the data from the entropy pool provided by the host operating system. The guest operating system accesses the guest operating system entropy pool and uses the guest operating system entropy pool as a basis for generating values including random numbers.
    Type: Grant
    Filed: August 24, 2009
    Date of Patent: November 15, 2016
    Assignee: Microsoft Technology Licensing, LLC
    Inventors: Carl M. Ellison, Scott A. Field, Brandon S. Baker
  • Patent number: 9413740
    Abstract: Embodiments are directed to establishing a secure connection between computing systems and to providing computer system virtualization on a secure computing device. In one scenario, a computer system receives a request that at least one specified function be initiated. The request includes user credentials and a device claim that identifies the computing device. The computer system authenticates the user using the received user credentials and determines, based on the device claim, that the computing device is an approved computing device that has been approved to initiate performance of the specified function. Then, upon determining that the user has been authenticated and that the computing device is approved to initiate performance the specified function, the computer system initiates performance of the specified function.
    Type: Grant
    Filed: July 22, 2014
    Date of Patent: August 9, 2016
    Assignee: Microsoft Technology Licensing, LLC
    Inventors: Mohamed Rouatbi, Karthik Jaganathan, Venkata K. Anumalasetty, Ramesh Chinta, Scott A. Field
  • Patent number: 9407654
    Abstract: Embodiments described herein are directed to preventing development of insecure web pages, preventing deployment of insecure web pages and to preventing access to insecure web pages. In one embodiment, a computer system accesses a web page that includes one or more web elements. The computer system then determines that the web page includes at least one element that requests user authentication and determines whether various specified secure protocols have been implemented on the web page. Then, if the specified secure protocols have not been implemented on the web page, the computer system displays a warning or error indicating that the web page is insecure.
    Type: Grant
    Filed: March 20, 2014
    Date of Patent: August 2, 2016
    Assignee: Microsoft Technology Licensing, LLC
    Inventors: Scott A. Field, Ellen E. Cram, Julian Federico Gonzalez
  • Publication number: 20160087963
    Abstract: Embodiments are directed to establishing a secure connection between computing systems and to providing computer system virtualization on a secure computing device. In one scenario, a computer system receives a request that at least one specified function be initiated. The request includes user credentials and a device claim that identifies the computing device. The computer system authenticates the user using the received user credentials and determines, based on the device claim, that the computing device is an approved computing device that has been approved to initiate performance of the specified function. Then, upon determining that the user has been authenticated and that the computing device is approved to initiate performance the specified function, the computer system initiates performance of the specified function.
    Type: Application
    Filed: December 1, 2015
    Publication date: March 24, 2016
    Inventors: Mohamed Rouatbi, Karthik Jaganathan, Venkata K. Anumalasetty, Ramesh Chinta, Scott A. Field
  • Publication number: 20160069869
    Abstract: Ectoparasite infestation of a substrate like bedding is detected by contacting a sample from the substrate with a polyclonal ectoparasite antibody generated from a whole ectoparasite immunogen, under conditions wherein the antibody specifically binds ectoparasite antigen in the sample.
    Type: Application
    Filed: November 16, 2015
    Publication date: March 10, 2016
    Inventors: Rajeev VAIDYANATHAN, Joseph PERRONE, Ellen BEAULIEU, Scott FIELDS
  • Publication number: 20160028704
    Abstract: Embodiments are directed to establishing a secure connection between computing systems and to providing computer system virtualization on a secure computing device. In one scenario, a computer system receives a request that at least one specified function be initiated. The request includes user credentials and a device claim that identifies the computing device. The computer system authenticates the user using the received user credentials and determines, based on the device claim, that the computing device is an approved computing device that has been approved to initiate performance of the specified function. Then, upon determining that the user has been authenticated and that the computing device is approved to initiate performance the specified function, the computer system initiates performance of the specified function.
    Type: Application
    Filed: July 22, 2014
    Publication date: January 28, 2016
    Inventors: Mohamed Rouatbi, Karthik Jaganathan, Venkata K. Anumalasetty, Ramesh Chinta, Scott A. Field
  • Patent number: 9188583
    Abstract: Ectoparasite infestation of a substrate like bedding is detected by contacting a sample from the substrate with a polyclonal ectoparasite antibody generated from a whole ectoparasite immunogen, under conditions wherein the antibody specifically binds ectoparasite antigen in the sample.
    Type: Grant
    Filed: February 27, 2013
    Date of Patent: November 17, 2015
    Assignee: SRI International
    Inventors: Rajeev Vaidyanathan, Joseph Perrone, Ellen Beaulieu, Scott Fields
  • Patent number: 9166797
    Abstract: Systems and methods that establish a secured compartment that manages sensitive user transactions/information on a user's machine. The secured compartment qualifies user interaction with the machine, and separates such qualified interaction from other user activity on the machine. A user is switched to such secured compartment upon occurrence of a predetermined event, such as in form of: an explicit request (e.g., a secure attention sequence); an implicit request (e.g., inference of user activities); and presence of a peripheral device that is bound to the secured compartment (e.g., a USB)—wherein such actions typically cannot be generated by an application running outside the secured compartment.
    Type: Grant
    Filed: October 24, 2008
    Date of Patent: October 20, 2015
    Assignee: Microsoft Technology Licensing, LLC
    Inventors: Thekkthalackal Varugis Kurien, Cormac E. Herley, Alice Jane Bernheim Brush, Daniel C. Robbins, Arindam Chatterjee, Scott Field
  • Publication number: 20150271197
    Abstract: Embodiments described herein are directed to preventing development of insecure web pages, preventing deployment of insecure web pages and to preventing access to insecure web pages. In one embodiment, a computer system accesses a web page that includes one or more web elements. The computer system then determines that the web page includes at least one element that requests user authentication and determines whether various specified secure protocols have been implemented on the web page. Then, if the specified secure protocols have not been implemented on the web page, the computer system displays a warning or error indicating that the web page is insecure.
    Type: Application
    Filed: March 20, 2014
    Publication date: September 24, 2015
    Applicant: MICROSOFT CORPORATION
    Inventors: Scott A. Field, Ellen E. Cram, Julian Federico Gonzalez
  • Patent number: 9135357
    Abstract: Methods for using scenario solution-related information to generate customized user experiences are provided. Upon receiving a user query, a plurality of results is returned, each result being representative of a scenario solution which may be utilized to address a particular issue relevant to the received query. At the time of authoring, each scenario solution is organized based upon one or more keywords and/or one or more categories (i.e., namespaces). Data associated with a namespace/keyword corresponding to a returned search result may be mined to determine information beyond basic scenario solution search results that may be of interest to the user.
    Type: Grant
    Filed: September 20, 2010
    Date of Patent: September 15, 2015
    Assignee: Microsoft Technology Licensing, LLC
    Inventors: Thekkthalackal Varugis Kurien, Steven E. Jackson, Scott A. Field
  • Patent number: 9092301
    Abstract: A facility for applying a software patch is described. Using an automatic patching agent, the facility receives the software patch. In response to receiving the software patch, without user intervention, the facility performs the following acts: First, the facility identifies an instance of an executable module that is currently loaded, and to which the received software patch pertains. Second, the facility applies the received software patch to the identified loaded executable module instance to modify the behavior of the identified executable module instance.
    Type: Grant
    Filed: September 16, 2013
    Date of Patent: July 28, 2015
    Assignee: Microsoft Technology Licensing, LLC
    Inventors: Anthony Blumfield, Gilad Golan, Jason Garms, Saud Alshibani, Scott A. Field
  • Patent number: 8996866
    Abstract: Computer-executable instructions that are directed to the performance of consequential actions and automatically elevate to execute at a higher privilege level to do so can perform such consequential actions only after user notification. Doing so can enable monitoring processes to avoid presenting duplicative user notification upon detection of such auto-elevation. In addition, prior to presenting user notification, input from the execution environment can be ignored and access to DLLs for performing consequential actions can be avoided. A static analyzer can identify non-conforming computer-executable instructions. A wrapper can be utilized to provide compliance by otherwise unknown or non-conforming computer-executable instructions.
    Type: Grant
    Filed: December 22, 2009
    Date of Patent: March 31, 2015
    Assignee: Microsoft Technology Licensing, LLC
    Inventors: Crispin Cowan, Matthew Z. Tamayo-Rios, Tanmoy Dutta, John Lambert, Paul J. Leach, Scott A. Field, Thomas C. Jones
  • Patent number: 8977564
    Abstract: Apparatus for coordinating a rule-based relationship between a bank, a vendor and a merchant is provided. The apparatus may include a first receiver configured to receive an employee identification number input into a graphical user interface (“GUI”). The apparatus may additionally include the first receiver being configured to receive a billing account number input into the GUI. The apparatus may also include a processor configured to determine if the billing account number includes a number of consecutive, identical digits. The processor may further be configured to determine if the number of consecutive, identical digits is equal to or greater than a threshold number of consecutive, identical digits.
    Type: Grant
    Filed: March 14, 2013
    Date of Patent: March 10, 2015
    Assignee: Bank of America Corporation
    Inventors: Poornima Bushpala, Vipul Seth, Rajneesh Talwar, Venkatesh Naidu, Scott A. Field, Kathy S. Myers, Wichuda Chewawong, Vamshi Yeligepally
  • Publication number: 20150064727
    Abstract: Ectoparasite infestation of a substrate like bedding is detected by contacting a sample from the substrate with a polyclonal ectoparasite antibody generated from a whole ectoparasite immunogen, under conditions wherein the antibody specifically binds ectoparasite antigen in the sample.
    Type: Application
    Filed: February 27, 2013
    Publication date: March 5, 2015
    Inventors: Rajeev Vaidyanathan, Joseph Perrone, Ellen Braulieu, Scott Fields
  • Patent number: 8938618
    Abstract: Booting a computing device includes executing one or more firmware components followed by a boot loader component. A protection component for the computing device, such as an anti-malware program, is identified and executed as an initial component after executing the boot loader component. One or more boot components are also executed, these one or more boot components including only boot components that have been approved by the protection component. A list of boot components that have been previously approved by the protection component can also be maintained in a tamper-proof manner.
    Type: Grant
    Filed: April 5, 2013
    Date of Patent: January 20, 2015
    Assignee: Microsoft Corporation
    Inventors: Mark F. Novak, Robert Karl Spiger, Stefan Thom, David J. Linsley, Scott A. Field, Anil Francis Thomas
  • Publication number: 20140279319
    Abstract: Apparatus for coordinating a rule-based relationship between a bank, a vendor and a merchant is provided. The apparatus may include a first receiver configured to receive an employee identification number input into a graphical user interface (“GUI”). The apparatus may additionally include the first receiver being configured to receive a billing account number input into the GUI. The apparatus may also include a processor configured to determine if the billing account number includes a number of consecutive, identical digits. The processor may further be configured to determine if the number of consecutive, identical digits is equal to or greater than a threshold number of consecutive, identical digits.
    Type: Application
    Filed: March 14, 2013
    Publication date: September 18, 2014
    Applicant: BANK OF AMERICA CORPORATION
    Inventors: Poornima Bushpala, Vipul Seth, Rajneesh Talwar, Venkatesh Naidu, Scott A. Field, Kathy S. Myers, Wichuda Chewawong, Vamshi Yeligepally
  • Patent number: 8813172
    Abstract: Data management techniques are provided for handling information resources. A data management process can account for attributes of information resources by analyzing or interpreting the workspace location, source, channel and device associated with an information resource, and effectuating policies, based on the attributes. Rules govern the attribute determination and policies for access restriction to the information resource. The attributes and policies determined are tagged to the information resource and is dynamically updated based on the attributes related to the information resource within different workspaces, such as a corporate workspace and a personal workspace.
    Type: Grant
    Filed: December 16, 2011
    Date of Patent: August 19, 2014
    Assignee: Microsoft Corporation
    Inventors: Edward Reus, Scott Field, Michael Joseph Healy, Joseph Dadzie, Srivatsan Parthasarathy
  • Patent number: 8789159
    Abstract: Systems and methods for creating a secure process on a web server can include creating an application manager process, and creating an application host process, the application host process being created under control of the application manager process. Example methods can also include restricting attributes of the application host process, and assigning a unique logon identifier to the application host process so that the application host process can only communicate with the application manager process.
    Type: Grant
    Filed: February 11, 2008
    Date of Patent: July 22, 2014
    Assignee: Microsoft Corporation
    Inventors: S. Franklin Williams, Kiran Akella Venkata, David C. LeBlanc, Juraj Gottweis, Gareth A. Howell, Scott A. Field, Ramesh Chinta
  • Publication number: 20140096122
    Abstract: A facility for applying a software patch is described. Using an automatic patching agent, the facility receives the software patch. In response to receiving the software patch, without user intervention, the facility performs the following acts: First, the facility identifies an instance of an executable module that is currently loaded, and to which the received software patch pertains. Second, the facility applies the received software patch to the identified loaded executable module instance to modify the behavior of the identified executable module instance.
    Type: Application
    Filed: September 16, 2013
    Publication date: April 3, 2014
    Applicant: Microsoft Corporation
    Inventors: Anthony Blumfield, Gilad Golan, Jason Garms, Saud Alshibani, Scott A. Field