Patents by Inventor Scott Field
Scott Field has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Publication number: 20090131480Abstract: The invention provides methods for treating and/or preventing cognitive impairments, dementia, or neurodegenerative diseases and disorders (e.g., Alzheimer's disease, Parkinson's disease, Huntington's disease, amyotrophic lateral sclerosis) in patients by administering therapeutically effective amounts of an AMPA receptor antagonist (e.g., 1,2-dihydropyridine compounds) and therapeutically effective amounts of nootropics (e.g., cholinesterase inhibitors) to patients. The invention also provides combinations, commercial packages, and pharmaceutical compositions comprising therapeutically effective amounts of AMPA receptor antagonists (e.g., 1,2-dihydropyridine compounds) and therapeutically effective amounts nootropics (e.g., cholinesterase inhibitors). The 1,2-dihydropyridine compound may be, for example, 3-(2-cyanophenyl)-5-(2-pyridyl)-1-phenyl-1,2-dihydropyridin-2-one. The cholinesterase inhibitor may be, for example, donepezil.Type: ApplicationFiled: April 4, 2006Publication date: May 21, 2009Applicant: EISAI Co., Ltd.Inventors: Julian A. Gray, Yoshiharu Yamanishi, Julian A. Gray, Yoshiharu Yamanishi, Nobuyuki Mori, Scott Fields
-
Publication number: 20090055921Abstract: Aspects of the subject matter described herein relate to providing file access in a multi-protocol environment. In aspects, a file server is operable to receive requests formatted according to two or more file access protocols. If a request is formatted according to a first file access protocol, the file server applies access rights associated with the file to an account associated with a requester to determine whether to grant access. If the request is formatted according to the second file access protocol, the file server may first attempt to find an account for the requester. If an account is not found, the file server may then grant access based on access rights associated with the file as applied to information in the request without consulting an account on the file server.Type: ApplicationFiled: August 23, 2007Publication date: February 26, 2009Applicant: MICROSOFT CORPORATIONInventors: Scott A. Field, Paul J. Leach, Roopesh C. Battepati, Michael C. Johnson
-
Patent number: 7490352Abstract: Systems and methods for validating integrity of an executable file are described. In one aspect, the systems and methods determine that an executable file is being introduced into a path of execution. The executable file is then automatically evaluated in view of multiple malware checks to detect if the executable file represents a type of malware. The multiple malware checks are integrated into an operating system trust verification process along the path of execution.Type: GrantFiled: April 7, 2005Date of Patent: February 10, 2009Assignee: Microsoft CorporationInventors: Michael Kramer, Kenneth D. Ray, Paul England, Scott A. Field, Jonathan D. Schwartz
-
Patent number: 7475421Abstract: Upon successfully authenticating a client device with a server system, the client device and server system share auto-reconnect data. Upon subsequently losing and re-establishing communications with the server system, the client sends an auto-authenticate request to the server. The auto-authenticate request includes a session verifier that is based at least in part on the shared auto-reconnect data. The server validates the session verifier. If the validation is successful, the server automatically re-authenticates the client device.Type: GrantFiled: January 25, 2006Date of Patent: January 6, 2009Assignee: Microsoft CorporationInventors: Nadim Y. Abdo, Adam J. Overton, Jason Garms, John E. Parsons, Jr., Alvin Loh, Scott A. Field
-
Publication number: 20090007102Abstract: Tools and techniques for dynamically computing reputation scores for objects are described herein. The tools may provide machine-readable storage media containing machine-readable instructions for receiving requests to dynamically compute reputation scores for the objects, for instantiating protected virtual environments in which to execute the objects, and for computing the reputation score based on how the object behaves when executing within the virtual environment.Type: ApplicationFiled: June 29, 2007Publication date: January 1, 2009Applicant: Microsoft CorporationInventors: Rajesh K. Dadhia, Scott A. Field
-
Publication number: 20090007100Abstract: Techniques described herein enable virtualizing a processor into one or more virtual machines and suspending an operating system of one of the virtual machines from outside of the operating system environment. Once suspended, these techniques capture a snapshot of the virtual machine to determine a presence of malware. This snapshot may also be used to determine whether an unauthorized change has occurred within contents of the virtual machine. Remedial action may occur responsive to determining a presence of malware or an unauthorized change.Type: ApplicationFiled: June 28, 2007Publication date: January 1, 2009Applicant: Microsoft CorporationInventors: Scott A. Field, Brandon Baker
-
Publication number: 20080235170Abstract: Mechanisms for directing advertising in search result presentation and/or scenario solution execution based upon a user's locality are provided. Locality refers to a collection of metadata created based upon scenario solutions executed by a user and/or enablers acquired by a user during scenario solution execution. For instance, embodiments of the present invention provide a mechanism by which scenario solutions or enablers related to commonly executed scenario solutions or enablers stored in association with the user's locality can be advertised to the user in conjunction with presentation of scenario solution-related search results. Additionally, embodiments of the present invention provide a mechanism by which more highly rated scenario solutions and/or enablers than those associated with the user's locality may be advertised during presentation of an executed scenario solution.Type: ApplicationFiled: March 19, 2007Publication date: September 25, 2008Applicant: MICROSOFT CORPORATIONInventors: Thekkthalackal Varugis Kurien, Steven E. Jackson, Scott A. Field
-
Publication number: 20080235790Abstract: A secure web hosting system is provided. In various embodiments, the secure web hosting system identifies an application that is to be loaded, creates a security token that is unique to the computer system and based on a name of the identified application, receives a request to load the identified application, and creates a process in which to load the identified application, the process having security attributes associated with the created security token. In various embodiments, the secure web hosting system includes an isolation service component that creates a security token based on an application name of an application identified by the configuration file.Type: ApplicationFiled: March 23, 2007Publication date: September 25, 2008Applicant: Microsoft CorporationInventors: Vikas Malhotra, Scott A. Field, Jaroslav Dunajsky
-
Publication number: 20080235206Abstract: Methods for using scenario solution-related information to generate customized user experiences are provided. Upon receiving a user query, a plurality of results is returned, each result being representative of a scenario solution which may be utilized to address a particular issue relevant to the received query. At the time of authoring, each scenario solution is organized based upon one or more keywords and/or one or more categories (i.e., namespaces). Data associated with a namespace/keyword corresponding to a returned search result may be mined to determine information beyond basic scenario solution search results that may be of interest to the user.Type: ApplicationFiled: March 19, 2007Publication date: September 25, 2008Applicant: MICROSOFT CORPORATIONInventors: Thekkthalackal Varugis Kurien, Steven E. Jackson, Scott A. Field
-
Publication number: 20080235229Abstract: Mechanisms for organizing scenario solution-related information based upon a user's locality are provided. Locality refers to a collection of metadata created based upon scenario solutions executed by a user and/or enablers acquired by a user during scenario solution execution. Such metadata may be stored in association with a scenario solution execution workspace and/or in association with a user-specific information store. Once such information is acquired, a user may desire to share the information, or a portion thereof, with one or more other users, for instance, the members of a user group. However, often times, the user would prefer that the information not be made available to the general public. Thus, mechanisms for controlling access to user-specific information are also provided.Type: ApplicationFiled: March 19, 2007Publication date: September 25, 2008Applicant: MICROSOFT CORPORATIONInventors: Thekkthalackal Varugis Kurien, Steven E. Jackson, Scott A. Field, David B. Cross
-
Publication number: 20080235179Abstract: Systems, methods, and computer-readable media for identifying executable scenario solutions relevant to a user query and returning such executable scenario solutions as search results in response to the user query are provided. Upon receiving a user query, a plurality of results is returned, each result being representative of a series of steps which may be implemented to address a particular issue relevant to the received user query. Often, a series of steps or scenario includes a number of sub-scenarios, each of which is to be executed sequentially to achieve the desired result. Accordingly, upon selection of a particular search result, the user may be guided through a series of sub-scenario result options until an item having direct association to a series of steps is selected. Once selected, the executable scenario solution is presented to the user for execution.Type: ApplicationFiled: March 19, 2007Publication date: September 25, 2008Applicant: MICROSOFT CORPORATIONInventors: Thekkthalackal Varugis Kurien, Steven E. Jackson, Scott A. Field, Philip J. Lafornara
-
Publication number: 20080201236Abstract: A method and system used to obtain and process orders for full color printing. A job configuration and price calculator is supplied to a customer. The calculator calculates automatically a price quote as the customer selects configuration options of a print job. The price quote is then displayed automatically. The customer may select configuration options repeatedly until the job configuration is final. A digital graphic layout or image file is then obtained from the customer. The digital graphic layout or image file is then prepared and a proof thereof is created. When the proof is satisfactory, the print job is printed and delivered to the customer.Type: ApplicationFiled: April 30, 2008Publication date: August 21, 2008Inventors: Andrew Scott Field, Boyd Stanley Badten
-
Patent number: 7409719Abstract: A security scheme provides security to one or more self-contained operating environment instances executing on a computer. The security scheme may include implementing a set of security applications that may be controlled by a supervisory process, or the like. Both the set of security applications and the supervisory process may operate on a host system of the computer, which may also provide a platform for execution of the one or more self-contained operating environments. The security scheme protects processes running in the one or more self-contained operating environment and processes running on the computer outside of the self-contained operating environments.Type: GrantFiled: December 21, 2004Date of Patent: August 5, 2008Assignee: Microsoft CorporationInventors: Benjamin Armstrong, Paul England, Scott A. Field, Jason Garms, Michael Kramer, Kenneth D. Ray
-
Publication number: 20080183996Abstract: This document describes tools capable of enabling a protection agent to determine, from memory inaccessible from an operating-system privilege mode, whether one or more resources of an operating system have been modified. In some instances, these tools may enable the protection agent to reside within a virtual machine monitor. In other instances, the tools may enable the protection agent to reside within a distinct virtual partition provided by the virtual machine monitor. By operating outside of the operating-system privilege mode, the protection agent may be less vulnerable to attacks by entities operating within the operating-system privilege mode.Type: ApplicationFiled: January 25, 2007Publication date: July 31, 2008Applicant: Microsoft CorporationInventors: Scott A. Field, Brandon Baker, Eric Traut, Suyash Sinha, Joy Ganguly, Forrest Foltz, David Cutler
-
Publication number: 20080141366Abstract: This document describes tools capable of receiving reputation metadata effective to enable better decision making about whether or not to authorize operations. The tools may build a reputation value from this reputation metadata and, based on this value and an authorization rule, better decide whether or not to authorize an operation requested by some program, application, or other actor.Type: ApplicationFiled: December 8, 2006Publication date: June 12, 2008Applicant: Microsoft CorporationInventors: David Cross, Scott Field, Varugis Kurien
-
Patent number: 7383571Abstract: Upon successfully authenticating a client device with a server system, the client device and server system share auto-reconnect data. Upon subsequently losing and re-establishing communications with the server system, the client sends an auto-authenticate request to the server. The auto-authenticate request includes a session verifier that is based at least in part on the shared auto-reconnect data. The server validates the session verifier. If the validation is successful, the server automatically re-authenticates the client device.Type: GrantFiled: January 24, 2006Date of Patent: June 3, 2008Assignee: Microsoft CorporationInventors: Nadim Y. Abdo, Adam J. Overton, Jason Garms, John E. Parsons, Jr., Alvin Loh, Scott A. Field
-
Publication number: 20080120690Abstract: If a service detects that a state of a computer system deviates from an acceptable state, the computer system can be prevented from accessing network resources or locations, except for those network resources or locations that would bring the state into compliance. Monitored states can include whether applications or the operating system have been properly purchased, whether they have been properly updated, and whether they are being properly used given the environment of their usage. Network restrictions can be implemented through a parental control mechanism, a domain name service mechanism, or other like mechanisms, and can include redirection to appropriate network resources or locations.Type: ApplicationFiled: November 17, 2006Publication date: May 22, 2008Applicant: Microsoft CorporationInventors: Rebecca A. Norlander, Pradeep Bahl, Scott A. Field
-
Patent number: 7376968Abstract: A system and method for facilitating BIOS integrated encryption is provided. An interface is defined between the operating system and the BIOS. The operating system employs this interface to provide BIOS code information to facilitate decryption of data that is encrypted on the system. In the pre-operating system boot phase, the BIOS employs the decryption information provided from this interface in order to decrypt the data. The decrypted information can be employed to facilitate secure rebooting of a computer system from hibernate mode and/or secure access to device(s).Type: GrantFiled: November 20, 2003Date of Patent: May 20, 2008Assignee: Microsoft CorporationInventors: Andrew J. Ritz, David B. Cross, Duncan Bryce, James A. Schwartz, Jr., Jianrong Gu, Scott A. Field
-
Publication number: 20080070944Abstract: The invention provides safe and effective methods for treating and/or preventing gastrointestinal disorders, psychiatric disorders, learning disabilities, Tourette's syndrome, obesity, epilepsy, post-menopausal syndrome, pre-menstrual syndrome, asthma, laryngitis and/or migraines by administering to a patient in need thereof at least one aminobenzoic acid compound. The aminobenzoic acid compound can optionally be administered in combination with other medications that are useful for the disease being treated.Type: ApplicationFiled: September 20, 2007Publication date: March 20, 2008Applicant: EISAI Co., Ltd.Inventors: Jay Barth, Kathleen Lomax, Scott Fields, Mindell Seidlin
-
Publication number: 20080072049Abstract: Software is authorized in accordance with a reputation of the software. A trust in the author and/or publisher of the software is determined via digital signatures and/or CoAs, and a reputation of the software is utilized to determine the intent of the software. The reputation of the software can be determined via a local service, such as an enterprise IT department and/or via a reputation determination service. When software is downloaded or to be executed, the trust in the author/publisher is determined using digital signatures and/or CoAs associated with the software. If the author/publisher is determined to be trusted, a service is called to determine the reputation of the software. The software can be installed and/or executed dependent upon the reputation of the software and trustworthiness of the author/publisher.Type: ApplicationFiled: August 31, 2006Publication date: March 20, 2008Applicant: Microsoft CorporationInventors: David B. Cross, Thekkthalackal Varugis Kurien, Scott A. Field