Patents by Inventor Scott Field
Scott Field has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Publication number: 20140065100Abstract: The invention relates to immunotherapeutic compounds and to methods for stimulating an immune response in a subject individual at risk for developing cancer, diagnosed with a cancer, in treatment for cancer, or in post-therapy recovery from cancer or the compounds of the invention can be administered as a prophylactic to a subject individual to prevent or delay the development of cancer.Type: ApplicationFiled: November 8, 2013Publication date: March 6, 2014Applicant: Eisai R&D Management Co., Ltd.Inventors: Daniel P. Rossignol, Sally T. Ishizaka, Lynn D. Hawkins, Scott Fields
-
Patent number: 8640215Abstract: A secure web hosting system is provided. In various embodiments, the secure web hosting system identifies an application that is to be loaded, creates a security token that is unique to the computer system and based on a name of the identified application, receives a request to load the identified application, and creates a process in which to load the identified application, the process having security attributes associated with the created security token. In various embodiments, the secure web hosting system includes an isolation service component that creates a security token based on an application name of an application identified by the configuration file.Type: GrantFiled: March 23, 2007Date of Patent: January 28, 2014Assignee: Microsoft CorporationInventors: Vikas Malhotra, Scott A. Field, Jaroslav Dunajsky
-
Patent number: 8633314Abstract: The present invention provides alternative forms of Compound I, processes to reproducibly make them and methods of treating patients using them.Type: GrantFiled: February 24, 2012Date of Patent: January 21, 2014Assignee: Cephalon, Inc.Inventors: Stephen Bierlmaier, Michael Christie, R. Scott Field, R. Curtis Haltiwanger, Linli He, Martin J. Jacobs, Michael Kress, Robert E. McKean, Dale R. Mowrey, Joseph Petraitis, Mehran Yazdanian, Veronique Courvoisier
-
Publication number: 20130347115Abstract: A system and method for providing enhanced security with regard to obtained files is presented. Upon obtaining a file from an external location, the obtained file is tagged with tagging information regarding the origin of the obtained file. Additionally, an operating system suitable for execution on a computing device is also presented. The operating system includes at least one application-callable function (API) for obtaining content from an external location. Each application-callable function for obtaining content from an external location is configured to associate tagging information with each obtained file, the tagging information comprising the origin of the obtained file. The origin of the obtained file can be used for subsequent security policy decisions, such as whether to allow or block execution or rendering of the content, as well as whether the content will be accessed in a constrained environment such as a “sandbox” or virtual machine.Type: ApplicationFiled: August 21, 2013Publication date: December 26, 2013Applicant: Microsoft CorporationInventor: Scott Field
-
Patent number: 8615801Abstract: Software is authorized in accordance with a reputation of the software. A trust in the author and/or publisher of the software is determined via digital signatures and/or CoAs, and a reputation of the software is utilized to determine the intent of the software. The reputation of the software can be determined via a local service, such as an enterprise IT department and/or via a reputation determination service. When software is downloaded or to be executed, the trust in the author/publisher is determined using digital signatures and/or CoAs associated with the software. If the author/publisher is determined to be trusted, a service is called to determine the reputation of the software. The software can be installed and/or executed dependent upon the reputation of the software and trustworthiness of the author/publisher.Type: GrantFiled: August 31, 2006Date of Patent: December 24, 2013Assignee: Microsoft CorporationInventors: David B. Cross, Thekkthalackal Varugis Kurien, Scott A. Field
-
Patent number: 8603482Abstract: The invention relates to immunotherapeutic compounds and to methods for stimulating an immune response in a subject individual at risk for developing cancer, diagnosed with a cancer, in treatment for cancer, or in post-therapy recovery from cancer or the compounds of the invention can be administered as a prophylactic to a subject individual to prevent or delay the development of cancer.Type: GrantFiled: June 13, 2011Date of Patent: December 10, 2013Assignee: Eisai R&D Management Co., Ltd.Inventors: Daniel P. Rossignol, Sally T. Ishizaka, Lynn D. Hawkins, Scott Fields
-
Patent number: 8584094Abstract: Tools and techniques for dynamically computing reputation scores for objects are described herein. The tools may provide machine-readable storage media containing machine-readable instructions for receiving requests to dynamically compute reputation scores for the objects, for instantiating protected virtual environments in which to execute the objects, and for computing the reputation score based on how the object behaves when executing within the virtual environment.Type: GrantFiled: June 29, 2007Date of Patent: November 12, 2013Assignee: Microsoft CorporationInventors: Rajesh K Dadhia, Scott A. Field
-
Patent number: 8544086Abstract: A system and method for providing enhanced security with regard to obtained files is presented. Upon obtaining a file from an external location, the obtained file is tagged with tagging information regarding the origin of the obtained file. Additionally, an operating system suitable for execution on a computing device is also presented. The operating system includes at least one application-callable function (API) for obtaining content from an external location. Each application-callable function for obtaining content from an external location is configured to associate tagging information with each obtained file, the tagging information comprising the origin of the obtained file. The origin of the obtained file can be used for subsequent security policy decisions, such as whether to allow or block execution or rendering of the content, as well as whether the content will be accessed in a constrained environment such as a “sandbox” or virtual machine.Type: GrantFiled: June 9, 2006Date of Patent: September 24, 2013Assignee: Microsoft CorporationInventor: Scott A Field
-
Patent number: 8539469Abstract: A facility for applying a software patch is described. Using an automatic patching agent, the facility receives the software patch. In response to receiving the software patch, without user intervention, the facility performs the following acts: First, the facility identifies an instance of an executable module that is currently loaded, and to which the received software patch pertains. Second, the facility applies the received software patch to the identified loaded executable module instance to modify the behavior of the identified executable module instance.Type: GrantFiled: June 30, 2004Date of Patent: September 17, 2013Assignee: Microsoft CorporationInventors: Anthony Blumfield, Gilad Golan, Jason Garms, Saud Alshibani, Scott A. Field
-
Patent number: 8513272Abstract: Alternative chemical and/or solid state forms of Compound I, processes to reproducibly make them and methods of treating patients using them.Type: GrantFiled: May 11, 2011Date of Patent: August 20, 2013Assignee: Cephalon, Inc.Inventors: Stephen Bierlmaier, Raymond Scott Field, R. Curtis Haltiwanger, Martin J. Jacobs, Robert E. McKean, Mehran Yazdanian, Veronique Courvoisier
-
Publication number: 20130160072Abstract: Data management techniques are provided for handling information resources. A data management process can account for attributes of information resources by analyzing or interpreting the workspace location, source, channel and device associated with an information resource, and effectuating policies, based on the attributes. Rules govern the attribute determination and policies for access restriction to the information resource. The attributes and policies determined are tagged to the information resource and is dynamically updated based on the attributes related to the information resource within different workspaces, such as a corporate workspace and a personal workspace.Type: ApplicationFiled: December 16, 2011Publication date: June 20, 2013Applicant: MICROSOFT CORPORATIONInventors: Edward Reus, Scott Field, Michael Joseph Healy, Joseph Dadzie, Srivatsan Parthasarathy
-
Publication number: 20130159500Abstract: The subject disclosure relates to techniques for monitoring contextual and performance information of a device for anticipatorily sending update information to the device. An interface component can receive, from the client, contextual information indicating an operating environment of the client and performance information that is associated with one or more operations being performed by the client based on the operating environment, and send, based on correlation information, update information to the client. Further, a service component can to infer a relationship between the contextual information and the performance information to obtain the correlation information. In other embodiments, a client can populate a cache with portion(s) of the contextual information to obtain cached information, and send at least a portion of the cached information to a system including one or more aspects of the service component.Type: ApplicationFiled: December 16, 2011Publication date: June 20, 2013Applicant: MICROSOFT CORPORATIONInventors: Edward Reus, Mario Goertzel, Scott Field, Michael Joseph Healy, Joseph Dadzie, David Kays, John Douceur, Henricus Johannes Maria Meijer
-
Publication number: 20130145027Abstract: Regulatory compliance techniques are provided for dynamically modifying access to data based on the jurisdiction a user seeking access to the data is located within. Dynamically modifying access to data provides for a more efficient and accurate solution to regulatory compliance issues faced when hosting data in a central repository. Users can be notified when their access to data is modified due to a compliance issue. In addition, an audit history can be associated with data packets that allow an administrator or the like to view the history of data packet access. Finally, signatures associated with a data packet can be used to search data store(s) to track access to information within the data packet that may have been subsequently modified.Type: ApplicationFiled: December 1, 2011Publication date: June 6, 2013Applicant: Microsoft CorporationInventors: Srivatsan Parthasarathy, Scott Field, Mario Goertzel, David Kays, Joseph Dadzie, Edward Reus
-
Publication number: 20130117806Abstract: The subject disclosure generally relates to provisioning devices via a network service, such as a cloud service. A profile component can authenticate a user of a device with a cloud service, and determine services maintained by the network service that are associated with the user. A reception component can receive a request for a set of services from the device, and a services component can obtain the set of services from the network service, and provision the device based on the set of services. Provisioning the device can include downloading the services to the device, or including the services in a virtual machine executing in the network service.Type: ApplicationFiled: November 9, 2011Publication date: May 9, 2013Applicant: MICROSOFT CORPORATIONInventors: Srivatsan Parthasarathy, Scott Field, Joseph Dadzie, David Kays
-
Patent number: 8417962Abstract: Booting a computing device includes executing one or more firmware components followed by a boot loader component. A protection component for the computing device, such as an anti-malware program, is identified and executed as an initial component after executing the boot loader component. One or more boot components are also executed, these one or more boot components including only boot components that have been approved by the protection component. A list of boot components that have been previously approved by the protection component can also be maintained in a tamper-proof manner.Type: GrantFiled: June 11, 2010Date of Patent: April 9, 2013Assignee: Microsoft CorporationInventors: Mark F. Novak, Robert Karl Spiger, Stefan Thom, David J. Linsley, Scott A. Field, Anil Francis Thomas
-
Patent number: 8407102Abstract: A method and system used to obtain and process orders for full color printing. A job configuration and price calculator is supplied to a customer. The calculator calculates automatically a price quote as the customer selects configuration options of a print job. The price quote is then displayed automatically. The customer may select configuration options repeatedly until the job configuration is final. A digital graphic layout or image file is then obtained from the customer. The digital graphic layout or image file is then prepared and a proof thereof is created. When the proof is satisfactory, the print job is printed and delivered to the customer.Type: GrantFiled: April 30, 2008Date of Patent: March 26, 2013Assignee: Printingforless.comInventors: Andrew Scott Field, Boyd Stanley Badten
-
Patent number: 8359645Abstract: A system and method for protecting a computer system connected to a communication network from a potential vulnerability. The system and method protects a computer system that is about to undergo or has just undergone a change in state that may result in placing the computer system at risk to viruses, and the like, over a communication network. The system and method first detect an imminent or recent change in state. A security component and a fixing component react to the detection of the change in state. The security component may raise the security level to block incoming network information, other than information from a secure or known location, or information requested by the computer system. The fixing component implements a fixing routine, such as installing missing updates or patches, and on successfully completing the fixing routine, the security level is relaxed or lowered.Type: GrantFiled: March 25, 2005Date of Patent: January 22, 2013Assignee: Microsoft CorporationInventors: Michael Kramer, Art Shelest, Carl M Carter-Schwendler, Gary S Henderson, Scott A Field, Sterling M Reasor
-
Patent number: 8347085Abstract: At computer device power on, the operating system of the computer device initiates a monitor. The monitor assigns a monitoring program to each program and object (collectively, “program”) running on the computer device to monitor the activities of the program. When the monitoring program is assigned to a program, the monitoring program is assigned an integrity and/or privacy label (collectively, “integrity label”) based on predetermined criteria applied to the monitored program. The monitoring program, in turn, assigns an integrity label to the program monitored by the monitoring program. The integrity label assigned to the monitored program is less than or equal to the integrity label of the monitoring program. The monitor enforces an integrity policy of the computer device based on the integrity label assigned to monitored programs and the integrity label associated with data, another program, or a remote network resource that the monitored program is seeking to access.Type: GrantFiled: December 30, 2011Date of Patent: January 1, 2013Assignee: Microsoft CorporationInventors: Thekkthalackal Varugis Kurien, Jeffrey B Hamblin, Narasimha Rao Nagampalli, Peter T Brundrett, Scott Field
-
Publication number: 20120214998Abstract: The present invention provides alternative forms of Compound I, processes to reproducibly make them and methods of treating patients using them.Type: ApplicationFiled: February 24, 2012Publication date: August 23, 2012Applicant: Cephalon, Inc.Inventors: Stephen Bierlmaier, Michael Christie, Laurent Courvoisier, Veronique Courvoisier, R. Scott Field, R. Curtis Haltiwanger, Linli He, Martin J. Jacobs, Michael Kress, Robert E. McKean, Dale R. Mowrey, Joseph Petraitis, Mehran Yazdanian
-
Patent number: D665422Type: GrantFiled: January 11, 2012Date of Patent: August 14, 2012Assignee: Microsoft CorporationInventors: Greg Morrow, Rishi Kumar, Scott Field, Peter Tracy