Patents by Inventor Shawn Farkas
Shawn Farkas has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Publication number: 20240370894Abstract: A content management system may obtain a promoted content trigger event from an interactive software application based at least partially on content of the interactive software application. A content management system may suspend a user's interaction with the interactive software application based on the promoted content trigger event. A content management system may obtain promoted audiovisual content. A content management system may present the promoted audiovisual content to the user. A content management system may commence the user's interaction with the interactive software application. A content management system may establish a credit based at least partially on the promoted audiovisual content, wherein the credit delays suspension of the user's interaction with the interactive software application during a credit duration.Type: ApplicationFiled: May 1, 2023Publication date: November 7, 2024Inventors: Jared E. HENDERSON, Daniel G. KENNETT, Morgan Asher BROWN, Shawn FARKAS, Joseph WHEELER, Stylianos TSINAROGLOU, Yi-An CHIEN
-
Patent number: 11033813Abstract: The present concepts relate to erasing the delay effects caused by latency. A server may model an environment. The server may transmit a series of state information relating to the state of the environment to a client. The client may receive an input provided by a user. In response, the client may transmit the input along with the state information to the server, where the state information corresponds to the state of the environment from the user's perspective at the time the user provided the input. The server may process the input according to the state information received with the input rather than the state of the environment being modeled by the server at the time the input is received by the server. Accordingly, the user may experience that the server is responsive to her inputs as though there were no latency.Type: GrantFiled: June 7, 2019Date of Patent: June 15, 2021Assignee: Microsoft Technology Licensing, LLCInventors: Morgan A. Brown, Shawn Farkas
-
Publication number: 20200384359Abstract: The present concepts relate to erasing the delay effects caused by latency. A server may model an environment. The server may transmit a series of state information relating to the state of the environment to a client. The client may receive an input provided by a user. In response, the client may transmit the input along with the state information to the server, where the state information corresponds to the state of the environment from the user's perspective at the time the user provided the input. The server may process the input according to the state information received with the input rather than the state of the environment being modeled by the server at the time the input is received by the server. Accordingly, the user may experience that the server is responsive to her inputs as though there were no latency.Type: ApplicationFiled: June 7, 2019Publication date: December 10, 2020Applicant: Microsoft Technology Licensing, LLCInventors: Morgan A. BROWN, Shawn FARKAS
-
Patent number: 9390152Abstract: Embodiments are directed to dynamically adapting metadata for use with a native data encoding and to efficiently modifying object model type references. In one scenario, a computer system instantiates a metadata reader over an object model description to access various portions of metadata in the object model description. The metadata reader is configured to read native metadata, where native metadata is metadata represented in an encoding that is expected by the metadata reader. The metadata reader determines that the accessed metadata is encoded in a non-native encoding and then determines which metadata modifications are to be performed to transform the non-native encoding into a native encoding. The computer system then dynamically adapts the metadata of the object model from a non-native encoding to a native encoding according to the determined modifications. As such, the object model is readable by a native runtime.Type: GrantFiled: September 9, 2014Date of Patent: July 12, 2016Assignee: Microsoft Technology Licensing, LLCInventors: Jesse D. Kaplan, Shawn Farkas, Raja Krishnaswamy, Richard M. Byers, Ryan A. Byington
-
Patent number: 9183001Abstract: Embodiments are directed to providing a simulation of a type-level construct on an interface instance and to maintaining a token-based event handling system. In one scenario, a computer system instantiates an interface instance that includes an instance object and multiple instance members. The computer system also instantiates a separate typed object which is configured to maintain one or more simulated type-level parameterized constructors. The computer system then associates the instantiated interface instance with the separate typed object. The typed object routes method invocations from the interface instance to various simulated type-level parameterized constructors and static members of the type.Type: GrantFiled: January 13, 2012Date of Patent: November 10, 2015Assignee: Microsoft Technology Licensing, LLCInventors: Shawn Farkas, Jesse D. Kaplan, Ladislav Prosek, Richard M. Byers, Ryan A. Byington
-
Publication number: 20140379740Abstract: Embodiments are directed to dynamically adapting metadata for use with a native data encoding and to efficiently modifying object model type references. In one scenario, a computer system instantiates a metadata reader over an object model description to access various portions of metadata in the object model description. The metadata reader is configured to read native metadata, where native metadata is metadata represented in an encoding that is expected by the metadata reader. The metadata reader determines that the accessed metadata is encoded in a non-native encoding and then determines which metadata modifications are to be performed to transform the non-native encoding into a native encoding. The computer system then dynamically adapts the metadata of the object model from a non-native encoding to a native encoding according to the determined modifications. As such, the object model is readable by a native runtime.Type: ApplicationFiled: September 9, 2014Publication date: December 25, 2014Inventors: Jesse D. Kaplan, Shawn Farkas, Raja Krishnaswamy, Richard M. Byers, Ryan A. Byington
-
Patent number: 8849996Abstract: Embodiments are directed to dynamically adapting metadata for use with a native data encoding and to efficiently modifying object model type references. In one scenario, a computer system instantiates a metadata reader over an object model description to access various portions of metadata in the object model description. The metadata reader is configured to read native metadata, where native metadata is metadata represented in an encoding that is expected by the metadata reader. The metadata reader determines that the accessed metadata is encoded in a non-native encoding and then determines which metadata modifications are to be performed to transform the non-native encoding into a native encoding. The computer system then dynamically adapts the metadata of the object model from a non-native encoding to a native encoding according to the determined modifications. As such, the object model is readable by a native runtime.Type: GrantFiled: January 13, 2012Date of Patent: September 30, 2014Assignee: Microsoft CorporationInventors: Jesse D. Kaplan, Shawn Farkas, Raja Krishnaswamy, Richard M. Byers, Ryan A. Byington
-
Patent number: 8683207Abstract: The present invention extends to methods, systems, and computer program products for updating signature algorithms used for signing an assembly with a strong name without changing the identity of the assembly. The present invention enables an assembly that has already been given an identity (via strong name signing with an identity public/private key pair) to be resigned with a different public/private key pair without changing the original identity that was based on the identity public/private key pair. This is accomplished by including a counter signature within the assembly that links the original identity of the assembly to the new signature key pair.Type: GrantFiled: December 19, 2011Date of Patent: March 25, 2014Assignee: Microsoft CorporationInventors: Shawn Farkas, Mueez Siddiqui, Reid Martin Borsuk, Andrew Dai, Arun Moorthy
-
Publication number: 20130159718Abstract: The present invention extends to methods, systems, and computer program products for updating signature algorithms used for signing an assembly with a strong name without changing the identity of the assembly. The present invention enables an assembly that has already been given an identity (via strong name signing with an identity public/private key pair) to be resigned with a different public/private key pair without changing the original identity that was based on the identity public/private key pair. This is accomplished by including a counter signature within the assembly that links the original identity of the assembly to the new signature key pair.Type: ApplicationFiled: December 19, 2011Publication date: June 20, 2013Applicant: Microsoft CorporationInventors: Shawn Farkas, Mueez Siddiqui, Reid Martin Borsuk, Andrew Dai, Arun Moorthy
-
Patent number: 8443188Abstract: Various technologies and techniques are disclosed that use code access security for providing runtime accessibility checks. A request is received from a first program to access at least one private member of a second program at runtime. If the first program has a greater than or equal security context than the second program, then the first program is granted access to the at least one private member of the second program. This code access security check can be provided in a framework environment that is responsible for managing programs that are from unknown or untrusted sources.Type: GrantFiled: November 30, 2006Date of Patent: May 14, 2013Assignee: Microsoft CorporationInventors: Shrikrishna V. Borde, Shawn Farkas, Haibo Luo, Michael D. Downen, Raja Krishnaswamy, Thottam R. Sriram, Chris King
-
Publication number: 20130067053Abstract: Embodiments are directed to dynamically adapting metadata for use with a native data encoding and to efficiently modifying object model type references. In one scenario, a computer system instantiates a metadata reader over an object model description to access various portions of metadata in the object model description. The metadata reader is configured to read native metadata, where native metadata is metadata represented in an encoding that is expected by the metadata reader. The metadata reader determines that the accessed metadata is encoded in a non-native encoding and then determines which metadata modifications are to be performed to transform the non-native encoding into a native encoding. The computer system then dynamically adapts the metadata of the object model from a non-native encoding to a native encoding according to the determined modifications. As such, the object model is readable by a native runtime.Type: ApplicationFiled: January 13, 2012Publication date: March 14, 2013Applicant: MICROSOFT CORPORATIONInventors: Jesse D. Kaplan, Shawn Farkas, Raja Krishnaswamy, Richard M. Byers, Ryan A. Byington
-
Publication number: 20130066622Abstract: Embodiments are directed to providing a simulation of a type-level construct on an interface instance and to maintaining a token-based event handling system. In one scenario, a computer system instantiates an interface instance that includes an instance object and multiple instance members. The computer system also instantiates a separate typed object which is configured to maintain one or more simulated type-level parameterized constructors. The computer system then associates the instantiated interface instance with the separate typed object. The typed object routes method invocations from the interface instance to various simulated type-level parameterized constructors and static members of the type.Type: ApplicationFiled: January 13, 2012Publication date: March 14, 2013Applicant: MICROSOFT CORPORATIONInventors: Shawn Farkas, Jesse D. Kaplan, Ladislav Prosek, Richard M. Byers, Ryan A. Byington
-
Publication number: 20100023767Abstract: Various technologies and techniques are disclosed for implementing a Diffie-Hellman secret agreement. An application programming interface is provided that is operable to allow a first computer to generate a Diffie-Hellman secret agreement for communicating securely with a second computer over an insecure channel. A get public key operation is performed upon receiving a request to perform the get public key operation. The get public key operation gets a public key of the first computer. A retrieval operation is performed upon receiving a request to perform the retrieval operation. The retrieval operation retrieves the Diffie-Hellman secret agreement upon supplying a public key of the second computer.Type: ApplicationFiled: May 18, 2007Publication date: January 28, 2010Applicant: Microsoft CorporationInventors: Michael D. Downen, Shawn Farkas, Charles William Kaufman
-
Publication number: 20080201759Abstract: A method and system for enforcing a security policy that is version-independent of a managed environment when loading custom code for a host application is provided. A security system of the managed environment receives an identifier of custom code to be loaded by the host application. Before loading the identified custom code, the managed environment enforces the security policy using the security system. The security system applies the security policy expressed using a version-independent indication of identifiers of untrusted custom code. If the security system determines that the trust of the custom code is unknown, then the security system requests a trust manager associated with the host application to enforce a host application-specific security policy. When the custom code is trusted, the managed environment loads the custom code.Type: ApplicationFiled: February 15, 2007Publication date: August 21, 2008Applicant: Microsoft CorporationInventors: Michael D. Downen, Darryn O. Lavery, Adriaan W. Canter, Sameer V. Bhangar, Thomas E. Quinn, Justin Kwak, David A. Whitechapel, Jeff Young, Shawn Farkas
-
Publication number: 20080134310Abstract: Various technologies and techniques are disclosed that use code access security for providing runtime accessibility checks. A request is received from a first program to access at least one private member of a second program at runtime. If the first program has a greater than or equal security context than the second program, then the first program is granted access to the at least one private member of the second program. This code access security check can be provided in a framework environment that is responsible for managing programs that are from unknown or untrusted sources.Type: ApplicationFiled: November 30, 2006Publication date: June 5, 2008Applicant: Microsoft CorporationInventors: Shrikrishna V. Borde, Shawn Farkas, Haibo Luo, Michael D. Downen, Raja Krishnaswamy, Thottam R. Sriram, Chris King