Patents by Inventor Scott Field
Scott Field has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Publication number: 20110230508Abstract: Alternative chemical and/or solid state forms of Compound I, processes to reproducibly make them and methods of treating patients using them.Type: ApplicationFiled: May 11, 2011Publication date: September 22, 2011Applicant: CEPHALON, INC.Inventors: Stephen Bierlmaier, Laurent Courvoisier, Raymond Scott Field, R. Curtis Haltiwanger, Martin J. Jacobs, Robert E. McKean, Mehran Yazdanian, Veronique Courvoisier
-
Patent number: 7991902Abstract: This document describes tools capable of receiving reputation metadata effective to enable better decision making about whether or not to authorize operations. The tools may build a reputation value from this reputation metadata and, based on this value and an authorization rule, better decide whether or not to authorize an operation requested by some program, application, or other actor.Type: GrantFiled: December 8, 2006Date of Patent: August 2, 2011Assignee: Microsoft CorporationInventors: David Cross, Scott Field, Varugis Kurien
-
Publication number: 20100107218Abstract: Systems and methods that establish a secured compartment that manages sensitive user transactions/information on a user's machine. The secured compartment qualifies user interaction with the machine, and separates such qualified interaction from other user activity on the machine. A user is switched to such secured compartment upon occurrence of a predetermined event, such as in form of: an explicit request (e.g., a secure attention sequence); an implicit request (e.g., inference of user activities); and presence of a peripheral device that is bound to the secured compartment (e.g., a USB)—wherein such actions typically cannot be generated by an application running outside the secured compartment.Type: ApplicationFiled: October 24, 2008Publication date: April 29, 2010Applicant: MICROSOFT CORPORATIONInventors: Thekkthalackal Varugis Kurien, Cormac E. Herley, Alice Jane Bernheim Brush, Daniel C. Robbins, Arindam Chatterjee, Scott Field
-
Publication number: 20090227650Abstract: Novel crystalline forms of lestaurtinib are described, including six co-crystal forms, nineteen solvate forms, three anhydrate forms and one hemihydrate form. Methods of their preparation and use are also described.Type: ApplicationFiled: January 16, 2009Publication date: September 10, 2009Applicant: Cephalon, Inc.Inventors: Stephen Bierlmaier, Laurent Courvoisier, Raymond Scott Field, R.Curtis Haltiwanger, Martin J. Jacobs, Robert E. McKean, Mehran Yazdanian
-
Publication number: 20090131480Abstract: The invention provides methods for treating and/or preventing cognitive impairments, dementia, or neurodegenerative diseases and disorders (e.g., Alzheimer's disease, Parkinson's disease, Huntington's disease, amyotrophic lateral sclerosis) in patients by administering therapeutically effective amounts of an AMPA receptor antagonist (e.g., 1,2-dihydropyridine compounds) and therapeutically effective amounts of nootropics (e.g., cholinesterase inhibitors) to patients. The invention also provides combinations, commercial packages, and pharmaceutical compositions comprising therapeutically effective amounts of AMPA receptor antagonists (e.g., 1,2-dihydropyridine compounds) and therapeutically effective amounts nootropics (e.g., cholinesterase inhibitors). The 1,2-dihydropyridine compound may be, for example, 3-(2-cyanophenyl)-5-(2-pyridyl)-1-phenyl-1,2-dihydropyridin-2-one. The cholinesterase inhibitor may be, for example, donepezil.Type: ApplicationFiled: April 4, 2006Publication date: May 21, 2009Applicant: EISAI Co., Ltd.Inventors: Julian A. Gray, Yoshiharu Yamanishi, Julian A. Gray, Yoshiharu Yamanishi, Nobuyuki Mori, Scott Fields
-
Publication number: 20080201236Abstract: A method and system used to obtain and process orders for full color printing. A job configuration and price calculator is supplied to a customer. The calculator calculates automatically a price quote as the customer selects configuration options of a print job. The price quote is then displayed automatically. The customer may select configuration options repeatedly until the job configuration is final. A digital graphic layout or image file is then obtained from the customer. The digital graphic layout or image file is then prepared and a proof thereof is created. When the proof is satisfactory, the print job is printed and delivered to the customer.Type: ApplicationFiled: April 30, 2008Publication date: August 21, 2008Inventors: Andrew Scott Field, Boyd Stanley Badten
-
Publication number: 20080141366Abstract: This document describes tools capable of receiving reputation metadata effective to enable better decision making about whether or not to authorize operations. The tools may build a reputation value from this reputation metadata and, based on this value and an authorization rule, better decide whether or not to authorize an operation requested by some program, application, or other actor.Type: ApplicationFiled: December 8, 2006Publication date: June 12, 2008Applicant: Microsoft CorporationInventors: David Cross, Scott Field, Varugis Kurien
-
Publication number: 20080070944Abstract: The invention provides safe and effective methods for treating and/or preventing gastrointestinal disorders, psychiatric disorders, learning disabilities, Tourette's syndrome, obesity, epilepsy, post-menopausal syndrome, pre-menstrual syndrome, asthma, laryngitis and/or migraines by administering to a patient in need thereof at least one aminobenzoic acid compound. The aminobenzoic acid compound can optionally be administered in combination with other medications that are useful for the disease being treated.Type: ApplicationFiled: September 20, 2007Publication date: March 20, 2008Applicant: EISAI Co., Ltd.Inventors: Jay Barth, Kathleen Lomax, Scott Fields, Mindell Seidlin
-
Publication number: 20080022093Abstract: At computer device power on, the operating system of the computer device initiates a monitor. The monitor assigns a monitoring program to each program and object (collectively, “program”) running on the computer device to monitor the activities of the program. When the monitoring program is assigned to a program, the monitoring program is assigned an integrity and/or privacy label (collectively, “integrity label”) based on predetermined criteria applied to the monitored program. The monitoring program, in turn, assigns an integrity label to the program monitored by the monitoring program. The integrity label assigned to the monitored program is less than or equal to the integrity label of the monitoring program. The monitor enforces an integrity policy of the computer device based on the integrity label assigned to monitored programs and the integrity label associated with data, another program, or a remote network resource that the monitored program is seeking to access.Type: ApplicationFiled: June 20, 2006Publication date: January 24, 2008Applicant: Microsoft CorporationInventors: Thekkthalackal Varugis Kurien, Jeffrey B. Hamblin, Narasimha Rao Nagampalli, Peter T. Brundrett, Scott Field
-
Publication number: 20070292418Abstract: The invention relates to immunotherapeutic compounds, compositions that include such compounds, and methods of using the compounds, for example, to treat an individual having, at risk for, or previously treated for a cancer.Type: ApplicationFiled: November 28, 2006Publication date: December 20, 2007Inventors: Scott Fields, Lynn Hawkins, Sally Ishizaka, Daniel Rossignol
-
Publication number: 20070234330Abstract: Prevention of executable code modification is provided by making the act of allocating and modifying existing memory backed code pages a highly privileged operating system (OS) function. The integrity of loaded code is also optionally checked at load time inside the OS kernel. A privilege check in the system is invoked when executable pages are allocated or modified. This privilege is assigned only to the operating system kernel and highly trusted identities in the operating system.Type: ApplicationFiled: March 1, 2006Publication date: October 4, 2007Applicant: Microsoft CorporationInventor: Scott Field
-
Publication number: 20070162975Abstract: Generally described, a method, software system, and computer-readable medium are provided for efficiently collecting data this useful in developing software systems to identify and protect against malware. In accordance with one embodiment, a method for collecting data to determine whether a malware is propagating in a networking environment is provided. More specifically, the method includes receiving preliminary data sets at a server computer from a plurality of client computers that describes attributes of a potential malware. Then a determination is made regarding whether secondary data is needed to implement systems for protecting against the potential malware. If secondary data is needed, the method causes the secondary data to be collected when an additional preliminary data set is received from a client computer.Type: ApplicationFiled: January 6, 2006Publication date: July 12, 2007Applicant: Microssoft CorporationInventors: Adam Overton, Alexey Polyakov, Andrew Newman, Jason Garms, Ronald Franczyk, Scott Field, Sterling Reasor
-
Publication number: 20070101148Abstract: Techniques are described herein for securely prompting a user to confirm sensitive operations, input sensitive information or the like. The techniques include receiving or intercepting calls from applications to prompting routines. When a call to a prompting routine is received or intercepted a hint may be provided to the user to switch to a secure desktop. When the user switches from the user desktop to the secure desktop the particular prompt is displayed. The input to the prompt is received on the secure desktop and verified to have been provided by the user. The user input or a representation of the input is then returned to the application running on the user desktop. Using these techniques, interception of prompting messages by malware does not result in sensitive information being revealed. Furthermore, spoofing of new messages by malware does not lead to the dismissal of critical prompting.Type: ApplicationFiled: October 17, 2005Publication date: May 3, 2007Applicant: Microsoft CorporationInventors: Klaus Schutz, Matthew Thomlinson, Scott Field
-
Publication number: 20070048701Abstract: A math teaching aid for helping beginning students learn how to count change. The invention includes a number of base units with cylindrical depressions in slots for a flag. A flag which determines the desired amount of change is placed in a flag holder in the base unit. Units representing pennies, nickels, dimes and quarters are then placed in the grooves of the base unit to arrive at the desired amount of change.Type: ApplicationFiled: September 1, 2005Publication date: March 1, 2007Inventor: Scott Fields
-
Publication number: 20070020232Abstract: The invention relates to immunotherapeutic compounds and to methods for stimulating an immune response in a subject individual at risk for developing cancer, diagnosed with a cancer, in treatment for cancer, or in post-therapy recovery from cancer or the compounds of the invention can be administered as a prophylactic to a subject individual to prevent or delay the development of cancer.Type: ApplicationFiled: April 26, 2006Publication date: January 25, 2007Applicant: Eisai Co., Ltd.Inventors: Daniel Rossignol, Sally Ishizaka, Lynn Hawkins, Scott Fields
-
Publication number: 20070016675Abstract: A computer system having secured network services is presented. The computer system comprises a processor, a memory, and a network action processing module. The network action processing module processes network actions from one or more network services executing on the computer system. The computer system is further configured to execute at least network service performing network actions in conjunction with the network action processing module. Upon receiving a network action from a network service, the network action processing module determines whether the network action is a valid network action according to a network action control list. If the network action is determined to not be a valid network action, the network action is blocked. Alternatively, if the network action is determined to be a valid network action, the network action is permitted to be completed.Type: ApplicationFiled: July 13, 2005Publication date: January 18, 2007Applicant: Microsoft CorporationInventors: Pradeep Bahl, Ramesh Chinta, Narasimha Nagampalli, Scott Field
-
Publication number: 20070015789Abstract: The invention provides safe and effective methods for treating and/or preventing gastrointestinal disorders, psychiatric disorders, learning disabilities, Tourette's syndrome, obesity, epilepsy, post-menopausal syndrome, pre-menstrual syndrome, asthma, laryngitis and/or migraines by administering to a patient in need thereof at least one aminobenzoic acid compound. The aminobenzoic acid compound can optionally be administered in combination with other medications that are useful for the disease being treated.Type: ApplicationFiled: January 11, 2006Publication date: January 18, 2007Inventors: Jay Barth, Kathleen Lomax, Scott Fields, Mindell Seidlin
-
Publication number: 20070006304Abstract: Malware recovery optimization is provided in which malware detection processes and protocol processes on a device are monitored for events indicating a breach of security of the device, such as the presence of an infection or other evidence of a malware attack. The devices report the events for collection on a centralized event collector that issues alerts of the events to other devices that may have been compromised as a result of the breach of security. Upon receipt of the alert, the receiving devices may initiate malware recovery optimization, including activating anti-virus software to initiate a targeted scan of those resources that may have been compromised. In this manner, malware recovery processes are optimized to recover the receiving device and/or resources when indicated.Type: ApplicationFiled: June 30, 2005Publication date: January 4, 2007Applicant: Microsoft CorporationInventors: Michael Kramer, Scott Field, Marc Seinfeld
-
Publication number: 20060294592Abstract: Embodiments of a RootKit detector are directed to identifying a RootKit on a computer that is designed to conceal malware. Aspects of the RootKit detector leverage services provided by kernel debugger facilities to automatically obtain data in specified data structures that are maintained by an operating system. Then the data obtained from the kernel debugger facilities is processed with an integrity checker that determines whether the data contains properties sufficient to declare that a RootKit is resident on the computer.Type: ApplicationFiled: June 28, 2005Publication date: December 28, 2006Applicant: Microsoft CorporationInventors: Alexey Polyakov, Gretchen Loihle, Mihai Costea, Robert Hensing, Scott Field, Vincent Orgovan, Yi-Min Wang, Yun Lin
-
Publication number: 20060270709Abstract: The invention provides methods for treating and/or preventing cognitive impairments, dementia, or neurodegenerative diseases and disorders (e.g., Alzheimer's disease, Parkinson's disease, Huntington's disease, amyotrophic lateral sclerosis) in patients by administering therapeutically effective amounts of an AMPA receptor antagonist (e.g., 1,2-dihydropyridine compounds) and therapeutically effective amounts of nootropics (e.g., cholinesterase inhibitors) to patients. The invention also provides combinations, commercial packages, and pharmaceutical compositions comprising therapeutically effective amounts of AMPA receptor antagonists (e.g., 1,2-dihydropyridine compounds) and therapeutically effective amounts nootropics (e.g., cholinesterase inhibitors). The 1,2-dihydropyridine compound may be, for example, 3-(2-cyanophenyl)-5-(2-pyridyl)-1-phenyl-1,2-dihydropyridin-2-one. The cholinesterase inhibitor may be, for example, donepezil.Type: ApplicationFiled: April 4, 2006Publication date: November 30, 2006Applicant: Eisai Co. Ltd.Inventors: Julian Gray, Yoshiharu Yamanishi, Nobuyuki Mori, Scott Fields