Patents by Inventor Shawn Farkas

Shawn Farkas has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20240370894
    Abstract: A content management system may obtain a promoted content trigger event from an interactive software application based at least partially on content of the interactive software application. A content management system may suspend a user's interaction with the interactive software application based on the promoted content trigger event. A content management system may obtain promoted audiovisual content. A content management system may present the promoted audiovisual content to the user. A content management system may commence the user's interaction with the interactive software application. A content management system may establish a credit based at least partially on the promoted audiovisual content, wherein the credit delays suspension of the user's interaction with the interactive software application during a credit duration.
    Type: Application
    Filed: May 1, 2023
    Publication date: November 7, 2024
    Inventors: Jared E. HENDERSON, Daniel G. KENNETT, Morgan Asher BROWN, Shawn FARKAS, Joseph WHEELER, Stylianos TSINAROGLOU, Yi-An CHIEN
  • Patent number: 11033813
    Abstract: The present concepts relate to erasing the delay effects caused by latency. A server may model an environment. The server may transmit a series of state information relating to the state of the environment to a client. The client may receive an input provided by a user. In response, the client may transmit the input along with the state information to the server, where the state information corresponds to the state of the environment from the user's perspective at the time the user provided the input. The server may process the input according to the state information received with the input rather than the state of the environment being modeled by the server at the time the input is received by the server. Accordingly, the user may experience that the server is responsive to her inputs as though there were no latency.
    Type: Grant
    Filed: June 7, 2019
    Date of Patent: June 15, 2021
    Assignee: Microsoft Technology Licensing, LLC
    Inventors: Morgan A. Brown, Shawn Farkas
  • Publication number: 20200384359
    Abstract: The present concepts relate to erasing the delay effects caused by latency. A server may model an environment. The server may transmit a series of state information relating to the state of the environment to a client. The client may receive an input provided by a user. In response, the client may transmit the input along with the state information to the server, where the state information corresponds to the state of the environment from the user's perspective at the time the user provided the input. The server may process the input according to the state information received with the input rather than the state of the environment being modeled by the server at the time the input is received by the server. Accordingly, the user may experience that the server is responsive to her inputs as though there were no latency.
    Type: Application
    Filed: June 7, 2019
    Publication date: December 10, 2020
    Applicant: Microsoft Technology Licensing, LLC
    Inventors: Morgan A. BROWN, Shawn FARKAS
  • Patent number: 9390152
    Abstract: Embodiments are directed to dynamically adapting metadata for use with a native data encoding and to efficiently modifying object model type references. In one scenario, a computer system instantiates a metadata reader over an object model description to access various portions of metadata in the object model description. The metadata reader is configured to read native metadata, where native metadata is metadata represented in an encoding that is expected by the metadata reader. The metadata reader determines that the accessed metadata is encoded in a non-native encoding and then determines which metadata modifications are to be performed to transform the non-native encoding into a native encoding. The computer system then dynamically adapts the metadata of the object model from a non-native encoding to a native encoding according to the determined modifications. As such, the object model is readable by a native runtime.
    Type: Grant
    Filed: September 9, 2014
    Date of Patent: July 12, 2016
    Assignee: Microsoft Technology Licensing, LLC
    Inventors: Jesse D. Kaplan, Shawn Farkas, Raja Krishnaswamy, Richard M. Byers, Ryan A. Byington
  • Patent number: 9183001
    Abstract: Embodiments are directed to providing a simulation of a type-level construct on an interface instance and to maintaining a token-based event handling system. In one scenario, a computer system instantiates an interface instance that includes an instance object and multiple instance members. The computer system also instantiates a separate typed object which is configured to maintain one or more simulated type-level parameterized constructors. The computer system then associates the instantiated interface instance with the separate typed object. The typed object routes method invocations from the interface instance to various simulated type-level parameterized constructors and static members of the type.
    Type: Grant
    Filed: January 13, 2012
    Date of Patent: November 10, 2015
    Assignee: Microsoft Technology Licensing, LLC
    Inventors: Shawn Farkas, Jesse D. Kaplan, Ladislav Prosek, Richard M. Byers, Ryan A. Byington
  • Publication number: 20140379740
    Abstract: Embodiments are directed to dynamically adapting metadata for use with a native data encoding and to efficiently modifying object model type references. In one scenario, a computer system instantiates a metadata reader over an object model description to access various portions of metadata in the object model description. The metadata reader is configured to read native metadata, where native metadata is metadata represented in an encoding that is expected by the metadata reader. The metadata reader determines that the accessed metadata is encoded in a non-native encoding and then determines which metadata modifications are to be performed to transform the non-native encoding into a native encoding. The computer system then dynamically adapts the metadata of the object model from a non-native encoding to a native encoding according to the determined modifications. As such, the object model is readable by a native runtime.
    Type: Application
    Filed: September 9, 2014
    Publication date: December 25, 2014
    Inventors: Jesse D. Kaplan, Shawn Farkas, Raja Krishnaswamy, Richard M. Byers, Ryan A. Byington
  • Patent number: 8849996
    Abstract: Embodiments are directed to dynamically adapting metadata for use with a native data encoding and to efficiently modifying object model type references. In one scenario, a computer system instantiates a metadata reader over an object model description to access various portions of metadata in the object model description. The metadata reader is configured to read native metadata, where native metadata is metadata represented in an encoding that is expected by the metadata reader. The metadata reader determines that the accessed metadata is encoded in a non-native encoding and then determines which metadata modifications are to be performed to transform the non-native encoding into a native encoding. The computer system then dynamically adapts the metadata of the object model from a non-native encoding to a native encoding according to the determined modifications. As such, the object model is readable by a native runtime.
    Type: Grant
    Filed: January 13, 2012
    Date of Patent: September 30, 2014
    Assignee: Microsoft Corporation
    Inventors: Jesse D. Kaplan, Shawn Farkas, Raja Krishnaswamy, Richard M. Byers, Ryan A. Byington
  • Patent number: 8683207
    Abstract: The present invention extends to methods, systems, and computer program products for updating signature algorithms used for signing an assembly with a strong name without changing the identity of the assembly. The present invention enables an assembly that has already been given an identity (via strong name signing with an identity public/private key pair) to be resigned with a different public/private key pair without changing the original identity that was based on the identity public/private key pair. This is accomplished by including a counter signature within the assembly that links the original identity of the assembly to the new signature key pair.
    Type: Grant
    Filed: December 19, 2011
    Date of Patent: March 25, 2014
    Assignee: Microsoft Corporation
    Inventors: Shawn Farkas, Mueez Siddiqui, Reid Martin Borsuk, Andrew Dai, Arun Moorthy
  • Publication number: 20130159718
    Abstract: The present invention extends to methods, systems, and computer program products for updating signature algorithms used for signing an assembly with a strong name without changing the identity of the assembly. The present invention enables an assembly that has already been given an identity (via strong name signing with an identity public/private key pair) to be resigned with a different public/private key pair without changing the original identity that was based on the identity public/private key pair. This is accomplished by including a counter signature within the assembly that links the original identity of the assembly to the new signature key pair.
    Type: Application
    Filed: December 19, 2011
    Publication date: June 20, 2013
    Applicant: Microsoft Corporation
    Inventors: Shawn Farkas, Mueez Siddiqui, Reid Martin Borsuk, Andrew Dai, Arun Moorthy
  • Patent number: 8443188
    Abstract: Various technologies and techniques are disclosed that use code access security for providing runtime accessibility checks. A request is received from a first program to access at least one private member of a second program at runtime. If the first program has a greater than or equal security context than the second program, then the first program is granted access to the at least one private member of the second program. This code access security check can be provided in a framework environment that is responsible for managing programs that are from unknown or untrusted sources.
    Type: Grant
    Filed: November 30, 2006
    Date of Patent: May 14, 2013
    Assignee: Microsoft Corporation
    Inventors: Shrikrishna V. Borde, Shawn Farkas, Haibo Luo, Michael D. Downen, Raja Krishnaswamy, Thottam R. Sriram, Chris King
  • Publication number: 20130067053
    Abstract: Embodiments are directed to dynamically adapting metadata for use with a native data encoding and to efficiently modifying object model type references. In one scenario, a computer system instantiates a metadata reader over an object model description to access various portions of metadata in the object model description. The metadata reader is configured to read native metadata, where native metadata is metadata represented in an encoding that is expected by the metadata reader. The metadata reader determines that the accessed metadata is encoded in a non-native encoding and then determines which metadata modifications are to be performed to transform the non-native encoding into a native encoding. The computer system then dynamically adapts the metadata of the object model from a non-native encoding to a native encoding according to the determined modifications. As such, the object model is readable by a native runtime.
    Type: Application
    Filed: January 13, 2012
    Publication date: March 14, 2013
    Applicant: MICROSOFT CORPORATION
    Inventors: Jesse D. Kaplan, Shawn Farkas, Raja Krishnaswamy, Richard M. Byers, Ryan A. Byington
  • Publication number: 20130066622
    Abstract: Embodiments are directed to providing a simulation of a type-level construct on an interface instance and to maintaining a token-based event handling system. In one scenario, a computer system instantiates an interface instance that includes an instance object and multiple instance members. The computer system also instantiates a separate typed object which is configured to maintain one or more simulated type-level parameterized constructors. The computer system then associates the instantiated interface instance with the separate typed object. The typed object routes method invocations from the interface instance to various simulated type-level parameterized constructors and static members of the type.
    Type: Application
    Filed: January 13, 2012
    Publication date: March 14, 2013
    Applicant: MICROSOFT CORPORATION
    Inventors: Shawn Farkas, Jesse D. Kaplan, Ladislav Prosek, Richard M. Byers, Ryan A. Byington
  • Publication number: 20100023767
    Abstract: Various technologies and techniques are disclosed for implementing a Diffie-Hellman secret agreement. An application programming interface is provided that is operable to allow a first computer to generate a Diffie-Hellman secret agreement for communicating securely with a second computer over an insecure channel. A get public key operation is performed upon receiving a request to perform the get public key operation. The get public key operation gets a public key of the first computer. A retrieval operation is performed upon receiving a request to perform the retrieval operation. The retrieval operation retrieves the Diffie-Hellman secret agreement upon supplying a public key of the second computer.
    Type: Application
    Filed: May 18, 2007
    Publication date: January 28, 2010
    Applicant: Microsoft Corporation
    Inventors: Michael D. Downen, Shawn Farkas, Charles William Kaufman
  • Publication number: 20080201759
    Abstract: A method and system for enforcing a security policy that is version-independent of a managed environment when loading custom code for a host application is provided. A security system of the managed environment receives an identifier of custom code to be loaded by the host application. Before loading the identified custom code, the managed environment enforces the security policy using the security system. The security system applies the security policy expressed using a version-independent indication of identifiers of untrusted custom code. If the security system determines that the trust of the custom code is unknown, then the security system requests a trust manager associated with the host application to enforce a host application-specific security policy. When the custom code is trusted, the managed environment loads the custom code.
    Type: Application
    Filed: February 15, 2007
    Publication date: August 21, 2008
    Applicant: Microsoft Corporation
    Inventors: Michael D. Downen, Darryn O. Lavery, Adriaan W. Canter, Sameer V. Bhangar, Thomas E. Quinn, Justin Kwak, David A. Whitechapel, Jeff Young, Shawn Farkas
  • Publication number: 20080134310
    Abstract: Various technologies and techniques are disclosed that use code access security for providing runtime accessibility checks. A request is received from a first program to access at least one private member of a second program at runtime. If the first program has a greater than or equal security context than the second program, then the first program is granted access to the at least one private member of the second program. This code access security check can be provided in a framework environment that is responsible for managing programs that are from unknown or untrusted sources.
    Type: Application
    Filed: November 30, 2006
    Publication date: June 5, 2008
    Applicant: Microsoft Corporation
    Inventors: Shrikrishna V. Borde, Shawn Farkas, Haibo Luo, Michael D. Downen, Raja Krishnaswamy, Thottam R. Sriram, Chris King