Patents by Inventor Scott Field

Scott Field has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20140065100
    Abstract: The invention relates to immunotherapeutic compounds and to methods for stimulating an immune response in a subject individual at risk for developing cancer, diagnosed with a cancer, in treatment for cancer, or in post-therapy recovery from cancer or the compounds of the invention can be administered as a prophylactic to a subject individual to prevent or delay the development of cancer.
    Type: Application
    Filed: November 8, 2013
    Publication date: March 6, 2014
    Applicant: Eisai R&D Management Co., Ltd.
    Inventors: Daniel P. Rossignol, Sally T. Ishizaka, Lynn D. Hawkins, Scott Fields
  • Patent number: 8640215
    Abstract: A secure web hosting system is provided. In various embodiments, the secure web hosting system identifies an application that is to be loaded, creates a security token that is unique to the computer system and based on a name of the identified application, receives a request to load the identified application, and creates a process in which to load the identified application, the process having security attributes associated with the created security token. In various embodiments, the secure web hosting system includes an isolation service component that creates a security token based on an application name of an application identified by the configuration file.
    Type: Grant
    Filed: March 23, 2007
    Date of Patent: January 28, 2014
    Assignee: Microsoft Corporation
    Inventors: Vikas Malhotra, Scott A. Field, Jaroslav Dunajsky
  • Patent number: 8633314
    Abstract: The present invention provides alternative forms of Compound I, processes to reproducibly make them and methods of treating patients using them.
    Type: Grant
    Filed: February 24, 2012
    Date of Patent: January 21, 2014
    Assignee: Cephalon, Inc.
    Inventors: Stephen Bierlmaier, Michael Christie, R. Scott Field, R. Curtis Haltiwanger, Linli He, Martin J. Jacobs, Michael Kress, Robert E. McKean, Dale R. Mowrey, Joseph Petraitis, Mehran Yazdanian, Veronique Courvoisier
  • Publication number: 20130347115
    Abstract: A system and method for providing enhanced security with regard to obtained files is presented. Upon obtaining a file from an external location, the obtained file is tagged with tagging information regarding the origin of the obtained file. Additionally, an operating system suitable for execution on a computing device is also presented. The operating system includes at least one application-callable function (API) for obtaining content from an external location. Each application-callable function for obtaining content from an external location is configured to associate tagging information with each obtained file, the tagging information comprising the origin of the obtained file. The origin of the obtained file can be used for subsequent security policy decisions, such as whether to allow or block execution or rendering of the content, as well as whether the content will be accessed in a constrained environment such as a “sandbox” or virtual machine.
    Type: Application
    Filed: August 21, 2013
    Publication date: December 26, 2013
    Applicant: Microsoft Corporation
    Inventor: Scott Field
  • Patent number: 8615801
    Abstract: Software is authorized in accordance with a reputation of the software. A trust in the author and/or publisher of the software is determined via digital signatures and/or CoAs, and a reputation of the software is utilized to determine the intent of the software. The reputation of the software can be determined via a local service, such as an enterprise IT department and/or via a reputation determination service. When software is downloaded or to be executed, the trust in the author/publisher is determined using digital signatures and/or CoAs associated with the software. If the author/publisher is determined to be trusted, a service is called to determine the reputation of the software. The software can be installed and/or executed dependent upon the reputation of the software and trustworthiness of the author/publisher.
    Type: Grant
    Filed: August 31, 2006
    Date of Patent: December 24, 2013
    Assignee: Microsoft Corporation
    Inventors: David B. Cross, Thekkthalackal Varugis Kurien, Scott A. Field
  • Patent number: 8603482
    Abstract: The invention relates to immunotherapeutic compounds and to methods for stimulating an immune response in a subject individual at risk for developing cancer, diagnosed with a cancer, in treatment for cancer, or in post-therapy recovery from cancer or the compounds of the invention can be administered as a prophylactic to a subject individual to prevent or delay the development of cancer.
    Type: Grant
    Filed: June 13, 2011
    Date of Patent: December 10, 2013
    Assignee: Eisai R&D Management Co., Ltd.
    Inventors: Daniel P. Rossignol, Sally T. Ishizaka, Lynn D. Hawkins, Scott Fields
  • Patent number: 8584094
    Abstract: Tools and techniques for dynamically computing reputation scores for objects are described herein. The tools may provide machine-readable storage media containing machine-readable instructions for receiving requests to dynamically compute reputation scores for the objects, for instantiating protected virtual environments in which to execute the objects, and for computing the reputation score based on how the object behaves when executing within the virtual environment.
    Type: Grant
    Filed: June 29, 2007
    Date of Patent: November 12, 2013
    Assignee: Microsoft Corporation
    Inventors: Rajesh K Dadhia, Scott A. Field
  • Patent number: 8544086
    Abstract: A system and method for providing enhanced security with regard to obtained files is presented. Upon obtaining a file from an external location, the obtained file is tagged with tagging information regarding the origin of the obtained file. Additionally, an operating system suitable for execution on a computing device is also presented. The operating system includes at least one application-callable function (API) for obtaining content from an external location. Each application-callable function for obtaining content from an external location is configured to associate tagging information with each obtained file, the tagging information comprising the origin of the obtained file. The origin of the obtained file can be used for subsequent security policy decisions, such as whether to allow or block execution or rendering of the content, as well as whether the content will be accessed in a constrained environment such as a “sandbox” or virtual machine.
    Type: Grant
    Filed: June 9, 2006
    Date of Patent: September 24, 2013
    Assignee: Microsoft Corporation
    Inventor: Scott A Field
  • Patent number: 8539469
    Abstract: A facility for applying a software patch is described. Using an automatic patching agent, the facility receives the software patch. In response to receiving the software patch, without user intervention, the facility performs the following acts: First, the facility identifies an instance of an executable module that is currently loaded, and to which the received software patch pertains. Second, the facility applies the received software patch to the identified loaded executable module instance to modify the behavior of the identified executable module instance.
    Type: Grant
    Filed: June 30, 2004
    Date of Patent: September 17, 2013
    Assignee: Microsoft Corporation
    Inventors: Anthony Blumfield, Gilad Golan, Jason Garms, Saud Alshibani, Scott A. Field
  • Patent number: 8513272
    Abstract: Alternative chemical and/or solid state forms of Compound I, processes to reproducibly make them and methods of treating patients using them.
    Type: Grant
    Filed: May 11, 2011
    Date of Patent: August 20, 2013
    Assignee: Cephalon, Inc.
    Inventors: Stephen Bierlmaier, Raymond Scott Field, R. Curtis Haltiwanger, Martin J. Jacobs, Robert E. McKean, Mehran Yazdanian, Veronique Courvoisier
  • Publication number: 20130160072
    Abstract: Data management techniques are provided for handling information resources. A data management process can account for attributes of information resources by analyzing or interpreting the workspace location, source, channel and device associated with an information resource, and effectuating policies, based on the attributes. Rules govern the attribute determination and policies for access restriction to the information resource. The attributes and policies determined are tagged to the information resource and is dynamically updated based on the attributes related to the information resource within different workspaces, such as a corporate workspace and a personal workspace.
    Type: Application
    Filed: December 16, 2011
    Publication date: June 20, 2013
    Applicant: MICROSOFT CORPORATION
    Inventors: Edward Reus, Scott Field, Michael Joseph Healy, Joseph Dadzie, Srivatsan Parthasarathy
  • Publication number: 20130159500
    Abstract: The subject disclosure relates to techniques for monitoring contextual and performance information of a device for anticipatorily sending update information to the device. An interface component can receive, from the client, contextual information indicating an operating environment of the client and performance information that is associated with one or more operations being performed by the client based on the operating environment, and send, based on correlation information, update information to the client. Further, a service component can to infer a relationship between the contextual information and the performance information to obtain the correlation information. In other embodiments, a client can populate a cache with portion(s) of the contextual information to obtain cached information, and send at least a portion of the cached information to a system including one or more aspects of the service component.
    Type: Application
    Filed: December 16, 2011
    Publication date: June 20, 2013
    Applicant: MICROSOFT CORPORATION
    Inventors: Edward Reus, Mario Goertzel, Scott Field, Michael Joseph Healy, Joseph Dadzie, David Kays, John Douceur, Henricus Johannes Maria Meijer
  • Publication number: 20130145027
    Abstract: Regulatory compliance techniques are provided for dynamically modifying access to data based on the jurisdiction a user seeking access to the data is located within. Dynamically modifying access to data provides for a more efficient and accurate solution to regulatory compliance issues faced when hosting data in a central repository. Users can be notified when their access to data is modified due to a compliance issue. In addition, an audit history can be associated with data packets that allow an administrator or the like to view the history of data packet access. Finally, signatures associated with a data packet can be used to search data store(s) to track access to information within the data packet that may have been subsequently modified.
    Type: Application
    Filed: December 1, 2011
    Publication date: June 6, 2013
    Applicant: Microsoft Corporation
    Inventors: Srivatsan Parthasarathy, Scott Field, Mario Goertzel, David Kays, Joseph Dadzie, Edward Reus
  • Publication number: 20130117806
    Abstract: The subject disclosure generally relates to provisioning devices via a network service, such as a cloud service. A profile component can authenticate a user of a device with a cloud service, and determine services maintained by the network service that are associated with the user. A reception component can receive a request for a set of services from the device, and a services component can obtain the set of services from the network service, and provision the device based on the set of services. Provisioning the device can include downloading the services to the device, or including the services in a virtual machine executing in the network service.
    Type: Application
    Filed: November 9, 2011
    Publication date: May 9, 2013
    Applicant: MICROSOFT CORPORATION
    Inventors: Srivatsan Parthasarathy, Scott Field, Joseph Dadzie, David Kays
  • Patent number: 8417962
    Abstract: Booting a computing device includes executing one or more firmware components followed by a boot loader component. A protection component for the computing device, such as an anti-malware program, is identified and executed as an initial component after executing the boot loader component. One or more boot components are also executed, these one or more boot components including only boot components that have been approved by the protection component. A list of boot components that have been previously approved by the protection component can also be maintained in a tamper-proof manner.
    Type: Grant
    Filed: June 11, 2010
    Date of Patent: April 9, 2013
    Assignee: Microsoft Corporation
    Inventors: Mark F. Novak, Robert Karl Spiger, Stefan Thom, David J. Linsley, Scott A. Field, Anil Francis Thomas
  • Patent number: 8407102
    Abstract: A method and system used to obtain and process orders for full color printing. A job configuration and price calculator is supplied to a customer. The calculator calculates automatically a price quote as the customer selects configuration options of a print job. The price quote is then displayed automatically. The customer may select configuration options repeatedly until the job configuration is final. A digital graphic layout or image file is then obtained from the customer. The digital graphic layout or image file is then prepared and a proof thereof is created. When the proof is satisfactory, the print job is printed and delivered to the customer.
    Type: Grant
    Filed: April 30, 2008
    Date of Patent: March 26, 2013
    Assignee: Printingforless.com
    Inventors: Andrew Scott Field, Boyd Stanley Badten
  • Patent number: 8359645
    Abstract: A system and method for protecting a computer system connected to a communication network from a potential vulnerability. The system and method protects a computer system that is about to undergo or has just undergone a change in state that may result in placing the computer system at risk to viruses, and the like, over a communication network. The system and method first detect an imminent or recent change in state. A security component and a fixing component react to the detection of the change in state. The security component may raise the security level to block incoming network information, other than information from a secure or known location, or information requested by the computer system. The fixing component implements a fixing routine, such as installing missing updates or patches, and on successfully completing the fixing routine, the security level is relaxed or lowered.
    Type: Grant
    Filed: March 25, 2005
    Date of Patent: January 22, 2013
    Assignee: Microsoft Corporation
    Inventors: Michael Kramer, Art Shelest, Carl M Carter-Schwendler, Gary S Henderson, Scott A Field, Sterling M Reasor
  • Patent number: 8347085
    Abstract: At computer device power on, the operating system of the computer device initiates a monitor. The monitor assigns a monitoring program to each program and object (collectively, “program”) running on the computer device to monitor the activities of the program. When the monitoring program is assigned to a program, the monitoring program is assigned an integrity and/or privacy label (collectively, “integrity label”) based on predetermined criteria applied to the monitored program. The monitoring program, in turn, assigns an integrity label to the program monitored by the monitoring program. The integrity label assigned to the monitored program is less than or equal to the integrity label of the monitoring program. The monitor enforces an integrity policy of the computer device based on the integrity label assigned to monitored programs and the integrity label associated with data, another program, or a remote network resource that the monitored program is seeking to access.
    Type: Grant
    Filed: December 30, 2011
    Date of Patent: January 1, 2013
    Assignee: Microsoft Corporation
    Inventors: Thekkthalackal Varugis Kurien, Jeffrey B Hamblin, Narasimha Rao Nagampalli, Peter T Brundrett, Scott Field
  • Publication number: 20120214998
    Abstract: The present invention provides alternative forms of Compound I, processes to reproducibly make them and methods of treating patients using them.
    Type: Application
    Filed: February 24, 2012
    Publication date: August 23, 2012
    Applicant: Cephalon, Inc.
    Inventors: Stephen Bierlmaier, Michael Christie, Laurent Courvoisier, Veronique Courvoisier, R. Scott Field, R. Curtis Haltiwanger, Linli He, Martin J. Jacobs, Michael Kress, Robert E. McKean, Dale R. Mowrey, Joseph Petraitis, Mehran Yazdanian
  • Patent number: D665422
    Type: Grant
    Filed: January 11, 2012
    Date of Patent: August 14, 2012
    Assignee: Microsoft Corporation
    Inventors: Greg Morrow, Rishi Kumar, Scott Field, Peter Tracy