Patents by Inventor Scott Field

Scott Field has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20110230508
    Abstract: Alternative chemical and/or solid state forms of Compound I, processes to reproducibly make them and methods of treating patients using them.
    Type: Application
    Filed: May 11, 2011
    Publication date: September 22, 2011
    Applicant: CEPHALON, INC.
    Inventors: Stephen Bierlmaier, Laurent Courvoisier, Raymond Scott Field, R. Curtis Haltiwanger, Martin J. Jacobs, Robert E. McKean, Mehran Yazdanian, Veronique Courvoisier
  • Patent number: 7991902
    Abstract: This document describes tools capable of receiving reputation metadata effective to enable better decision making about whether or not to authorize operations. The tools may build a reputation value from this reputation metadata and, based on this value and an authorization rule, better decide whether or not to authorize an operation requested by some program, application, or other actor.
    Type: Grant
    Filed: December 8, 2006
    Date of Patent: August 2, 2011
    Assignee: Microsoft Corporation
    Inventors: David Cross, Scott Field, Varugis Kurien
  • Publication number: 20100107218
    Abstract: Systems and methods that establish a secured compartment that manages sensitive user transactions/information on a user's machine. The secured compartment qualifies user interaction with the machine, and separates such qualified interaction from other user activity on the machine. A user is switched to such secured compartment upon occurrence of a predetermined event, such as in form of: an explicit request (e.g., a secure attention sequence); an implicit request (e.g., inference of user activities); and presence of a peripheral device that is bound to the secured compartment (e.g., a USB)—wherein such actions typically cannot be generated by an application running outside the secured compartment.
    Type: Application
    Filed: October 24, 2008
    Publication date: April 29, 2010
    Applicant: MICROSOFT CORPORATION
    Inventors: Thekkthalackal Varugis Kurien, Cormac E. Herley, Alice Jane Bernheim Brush, Daniel C. Robbins, Arindam Chatterjee, Scott Field
  • Publication number: 20090227650
    Abstract: Novel crystalline forms of lestaurtinib are described, including six co-crystal forms, nineteen solvate forms, three anhydrate forms and one hemihydrate form. Methods of their preparation and use are also described.
    Type: Application
    Filed: January 16, 2009
    Publication date: September 10, 2009
    Applicant: Cephalon, Inc.
    Inventors: Stephen Bierlmaier, Laurent Courvoisier, Raymond Scott Field, R.Curtis Haltiwanger, Martin J. Jacobs, Robert E. McKean, Mehran Yazdanian
  • Publication number: 20090131480
    Abstract: The invention provides methods for treating and/or preventing cognitive impairments, dementia, or neurodegenerative diseases and disorders (e.g., Alzheimer's disease, Parkinson's disease, Huntington's disease, amyotrophic lateral sclerosis) in patients by administering therapeutically effective amounts of an AMPA receptor antagonist (e.g., 1,2-dihydropyridine compounds) and therapeutically effective amounts of nootropics (e.g., cholinesterase inhibitors) to patients. The invention also provides combinations, commercial packages, and pharmaceutical compositions comprising therapeutically effective amounts of AMPA receptor antagonists (e.g., 1,2-dihydropyridine compounds) and therapeutically effective amounts nootropics (e.g., cholinesterase inhibitors). The 1,2-dihydropyridine compound may be, for example, 3-(2-cyanophenyl)-5-(2-pyridyl)-1-phenyl-1,2-dihydropyridin-2-one. The cholinesterase inhibitor may be, for example, donepezil.
    Type: Application
    Filed: April 4, 2006
    Publication date: May 21, 2009
    Applicant: EISAI Co., Ltd.
    Inventors: Julian A. Gray, Yoshiharu Yamanishi, Julian A. Gray, Yoshiharu Yamanishi, Nobuyuki Mori, Scott Fields
  • Publication number: 20080201236
    Abstract: A method and system used to obtain and process orders for full color printing. A job configuration and price calculator is supplied to a customer. The calculator calculates automatically a price quote as the customer selects configuration options of a print job. The price quote is then displayed automatically. The customer may select configuration options repeatedly until the job configuration is final. A digital graphic layout or image file is then obtained from the customer. The digital graphic layout or image file is then prepared and a proof thereof is created. When the proof is satisfactory, the print job is printed and delivered to the customer.
    Type: Application
    Filed: April 30, 2008
    Publication date: August 21, 2008
    Inventors: Andrew Scott Field, Boyd Stanley Badten
  • Publication number: 20080141366
    Abstract: This document describes tools capable of receiving reputation metadata effective to enable better decision making about whether or not to authorize operations. The tools may build a reputation value from this reputation metadata and, based on this value and an authorization rule, better decide whether or not to authorize an operation requested by some program, application, or other actor.
    Type: Application
    Filed: December 8, 2006
    Publication date: June 12, 2008
    Applicant: Microsoft Corporation
    Inventors: David Cross, Scott Field, Varugis Kurien
  • Publication number: 20080070944
    Abstract: The invention provides safe and effective methods for treating and/or preventing gastrointestinal disorders, psychiatric disorders, learning disabilities, Tourette's syndrome, obesity, epilepsy, post-menopausal syndrome, pre-menstrual syndrome, asthma, laryngitis and/or migraines by administering to a patient in need thereof at least one aminobenzoic acid compound. The aminobenzoic acid compound can optionally be administered in combination with other medications that are useful for the disease being treated.
    Type: Application
    Filed: September 20, 2007
    Publication date: March 20, 2008
    Applicant: EISAI Co., Ltd.
    Inventors: Jay Barth, Kathleen Lomax, Scott Fields, Mindell Seidlin
  • Publication number: 20080022093
    Abstract: At computer device power on, the operating system of the computer device initiates a monitor. The monitor assigns a monitoring program to each program and object (collectively, “program”) running on the computer device to monitor the activities of the program. When the monitoring program is assigned to a program, the monitoring program is assigned an integrity and/or privacy label (collectively, “integrity label”) based on predetermined criteria applied to the monitored program. The monitoring program, in turn, assigns an integrity label to the program monitored by the monitoring program. The integrity label assigned to the monitored program is less than or equal to the integrity label of the monitoring program. The monitor enforces an integrity policy of the computer device based on the integrity label assigned to monitored programs and the integrity label associated with data, another program, or a remote network resource that the monitored program is seeking to access.
    Type: Application
    Filed: June 20, 2006
    Publication date: January 24, 2008
    Applicant: Microsoft Corporation
    Inventors: Thekkthalackal Varugis Kurien, Jeffrey B. Hamblin, Narasimha Rao Nagampalli, Peter T. Brundrett, Scott Field
  • Publication number: 20070292418
    Abstract: The invention relates to immunotherapeutic compounds, compositions that include such compounds, and methods of using the compounds, for example, to treat an individual having, at risk for, or previously treated for a cancer.
    Type: Application
    Filed: November 28, 2006
    Publication date: December 20, 2007
    Inventors: Scott Fields, Lynn Hawkins, Sally Ishizaka, Daniel Rossignol
  • Publication number: 20070234330
    Abstract: Prevention of executable code modification is provided by making the act of allocating and modifying existing memory backed code pages a highly privileged operating system (OS) function. The integrity of loaded code is also optionally checked at load time inside the OS kernel. A privilege check in the system is invoked when executable pages are allocated or modified. This privilege is assigned only to the operating system kernel and highly trusted identities in the operating system.
    Type: Application
    Filed: March 1, 2006
    Publication date: October 4, 2007
    Applicant: Microsoft Corporation
    Inventor: Scott Field
  • Publication number: 20070162975
    Abstract: Generally described, a method, software system, and computer-readable medium are provided for efficiently collecting data this useful in developing software systems to identify and protect against malware. In accordance with one embodiment, a method for collecting data to determine whether a malware is propagating in a networking environment is provided. More specifically, the method includes receiving preliminary data sets at a server computer from a plurality of client computers that describes attributes of a potential malware. Then a determination is made regarding whether secondary data is needed to implement systems for protecting against the potential malware. If secondary data is needed, the method causes the secondary data to be collected when an additional preliminary data set is received from a client computer.
    Type: Application
    Filed: January 6, 2006
    Publication date: July 12, 2007
    Applicant: Microssoft Corporation
    Inventors: Adam Overton, Alexey Polyakov, Andrew Newman, Jason Garms, Ronald Franczyk, Scott Field, Sterling Reasor
  • Publication number: 20070101148
    Abstract: Techniques are described herein for securely prompting a user to confirm sensitive operations, input sensitive information or the like. The techniques include receiving or intercepting calls from applications to prompting routines. When a call to a prompting routine is received or intercepted a hint may be provided to the user to switch to a secure desktop. When the user switches from the user desktop to the secure desktop the particular prompt is displayed. The input to the prompt is received on the secure desktop and verified to have been provided by the user. The user input or a representation of the input is then returned to the application running on the user desktop. Using these techniques, interception of prompting messages by malware does not result in sensitive information being revealed. Furthermore, spoofing of new messages by malware does not lead to the dismissal of critical prompting.
    Type: Application
    Filed: October 17, 2005
    Publication date: May 3, 2007
    Applicant: Microsoft Corporation
    Inventors: Klaus Schutz, Matthew Thomlinson, Scott Field
  • Publication number: 20070048701
    Abstract: A math teaching aid for helping beginning students learn how to count change. The invention includes a number of base units with cylindrical depressions in slots for a flag. A flag which determines the desired amount of change is placed in a flag holder in the base unit. Units representing pennies, nickels, dimes and quarters are then placed in the grooves of the base unit to arrive at the desired amount of change.
    Type: Application
    Filed: September 1, 2005
    Publication date: March 1, 2007
    Inventor: Scott Fields
  • Publication number: 20070020232
    Abstract: The invention relates to immunotherapeutic compounds and to methods for stimulating an immune response in a subject individual at risk for developing cancer, diagnosed with a cancer, in treatment for cancer, or in post-therapy recovery from cancer or the compounds of the invention can be administered as a prophylactic to a subject individual to prevent or delay the development of cancer.
    Type: Application
    Filed: April 26, 2006
    Publication date: January 25, 2007
    Applicant: Eisai Co., Ltd.
    Inventors: Daniel Rossignol, Sally Ishizaka, Lynn Hawkins, Scott Fields
  • Publication number: 20070016675
    Abstract: A computer system having secured network services is presented. The computer system comprises a processor, a memory, and a network action processing module. The network action processing module processes network actions from one or more network services executing on the computer system. The computer system is further configured to execute at least network service performing network actions in conjunction with the network action processing module. Upon receiving a network action from a network service, the network action processing module determines whether the network action is a valid network action according to a network action control list. If the network action is determined to not be a valid network action, the network action is blocked. Alternatively, if the network action is determined to be a valid network action, the network action is permitted to be completed.
    Type: Application
    Filed: July 13, 2005
    Publication date: January 18, 2007
    Applicant: Microsoft Corporation
    Inventors: Pradeep Bahl, Ramesh Chinta, Narasimha Nagampalli, Scott Field
  • Publication number: 20070015789
    Abstract: The invention provides safe and effective methods for treating and/or preventing gastrointestinal disorders, psychiatric disorders, learning disabilities, Tourette's syndrome, obesity, epilepsy, post-menopausal syndrome, pre-menstrual syndrome, asthma, laryngitis and/or migraines by administering to a patient in need thereof at least one aminobenzoic acid compound. The aminobenzoic acid compound can optionally be administered in combination with other medications that are useful for the disease being treated.
    Type: Application
    Filed: January 11, 2006
    Publication date: January 18, 2007
    Inventors: Jay Barth, Kathleen Lomax, Scott Fields, Mindell Seidlin
  • Publication number: 20070006304
    Abstract: Malware recovery optimization is provided in which malware detection processes and protocol processes on a device are monitored for events indicating a breach of security of the device, such as the presence of an infection or other evidence of a malware attack. The devices report the events for collection on a centralized event collector that issues alerts of the events to other devices that may have been compromised as a result of the breach of security. Upon receipt of the alert, the receiving devices may initiate malware recovery optimization, including activating anti-virus software to initiate a targeted scan of those resources that may have been compromised. In this manner, malware recovery processes are optimized to recover the receiving device and/or resources when indicated.
    Type: Application
    Filed: June 30, 2005
    Publication date: January 4, 2007
    Applicant: Microsoft Corporation
    Inventors: Michael Kramer, Scott Field, Marc Seinfeld
  • Publication number: 20060294592
    Abstract: Embodiments of a RootKit detector are directed to identifying a RootKit on a computer that is designed to conceal malware. Aspects of the RootKit detector leverage services provided by kernel debugger facilities to automatically obtain data in specified data structures that are maintained by an operating system. Then the data obtained from the kernel debugger facilities is processed with an integrity checker that determines whether the data contains properties sufficient to declare that a RootKit is resident on the computer.
    Type: Application
    Filed: June 28, 2005
    Publication date: December 28, 2006
    Applicant: Microsoft Corporation
    Inventors: Alexey Polyakov, Gretchen Loihle, Mihai Costea, Robert Hensing, Scott Field, Vincent Orgovan, Yi-Min Wang, Yun Lin
  • Publication number: 20060270709
    Abstract: The invention provides methods for treating and/or preventing cognitive impairments, dementia, or neurodegenerative diseases and disorders (e.g., Alzheimer's disease, Parkinson's disease, Huntington's disease, amyotrophic lateral sclerosis) in patients by administering therapeutically effective amounts of an AMPA receptor antagonist (e.g., 1,2-dihydropyridine compounds) and therapeutically effective amounts of nootropics (e.g., cholinesterase inhibitors) to patients. The invention also provides combinations, commercial packages, and pharmaceutical compositions comprising therapeutically effective amounts of AMPA receptor antagonists (e.g., 1,2-dihydropyridine compounds) and therapeutically effective amounts nootropics (e.g., cholinesterase inhibitors). The 1,2-dihydropyridine compound may be, for example, 3-(2-cyanophenyl)-5-(2-pyridyl)-1-phenyl-1,2-dihydropyridin-2-one. The cholinesterase inhibitor may be, for example, donepezil.
    Type: Application
    Filed: April 4, 2006
    Publication date: November 30, 2006
    Applicant: Eisai Co. Ltd.
    Inventors: Julian Gray, Yoshiharu Yamanishi, Nobuyuki Mori, Scott Fields