Patents by Inventor Stan D. Pennington

Stan D. Pennington has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 10356204
    Abstract: An application based hardware identifier is generated for an application on a device. The application based hardware identifier is generated based on both information describing the application and information describing one or more hardware components of the device. The application based hardware identifier can also optionally be based on an identifier of a user of the device. The application based hardware identifier can be provided by the application to a service provider, allowing the service provider to associate the application based hardware identifier with a particular user or user account. However, as the application based hardware identifier is based on the application information, different applications on the same device will have different application based hardware identifiers. The application based hardware identifier thus helps maintain privacy by preventing tracking of the device across different applications.
    Type: Grant
    Filed: December 13, 2012
    Date of Patent: July 16, 2019
    Assignee: Microsoft Technology Licensing, LLC
    Inventors: John A. M. Hazen, Stan D. Pennington, Sermet Iskin, Robin C. Speed, John M. Sheehan, Scott B. Graham
  • Publication number: 20140173071
    Abstract: An application based hardware identifier is generated for an application on a device. The application based hardware identifier is generated based on both information describing the application and information describing one or more hardware components of the device. The application based hardware identifier can also optionally be based on an identifier of a user of the device. The application based hardware identifier can be provided by the application to a service provider, allowing the service provider to associate the application based hardware identifier with a particular user or user account. However, as the application based hardware identifier is based on the application information, different applications on the same device will have different application based hardware identifiers. The application based hardware identifier thus helps maintain privacy by preventing tracking of the device across different applications.
    Type: Application
    Filed: December 13, 2012
    Publication date: June 19, 2014
    Applicant: MICROSOFT CORPORATION
    Inventors: John A. M. Hazen, Stan D. Pennington, Sermet Iskin, Robin C. Speed, John M. Sheehan, Scott B. Graham
  • Patent number: 8045564
    Abstract: Mechanisms are disclosed for detecting protocols independently of the ports used by streams associated with the protocols or applications that may send out such streams. The detecting may entail using a content filter that is hosted on a networking stack, where the content filter may be composed of a stream buffer and handlers for detecting the protocols. The handlers may be further used to modify streams incoming to a port or streams outgoing from an application. The handlers can modify the streams in a variety of ways, including reading, inserting, replacing, deleting, and completing data in the streams according to some policy criteria, such as those set by parental controls. Individual handlers may be selected from a plurality or set of handlers so that they can be matched up to the appropriate streams.
    Type: Grant
    Filed: January 5, 2006
    Date of Patent: October 25, 2011
    Assignee: Microsoft Corporation
    Inventors: Aaron Culbreth, Brian L. Trenbeath, Keumars A. Ahdieh, Peter M. Wiest, Roger H. Wynn, Stan D. Pennington
  • Publication number: 20080005325
    Abstract: Communications provided via e-mail, instant messaging, chat, and web-based telephony applications, are monitored and restricted at a computer host. In one approach, messages from unknown or unsafe senders are intercepted and stored in a location inaccessible to all but an authorized person, until they can be reviewed by the authorized person, such as a parent. Via a user interface, the authorized user can review the messages at a later time to determine if the intended recipient, such as a child, should be able to access them. Once access is authorized, the stored messages are retrieved and provided to the recipient. In another aspect, a shared allow/block contact list identifies a user having different user names from one or more service providers. The contact list can integrate users from different services and communication modes. In another aspect, notification of monitoring is provided in the monitored messages or in newly generated messages.
    Type: Application
    Filed: June 28, 2006
    Publication date: January 3, 2008
    Applicant: MICROSOFT CORPORATION
    Inventors: Roger H. Wynn, Timothy A. Gill, Peter M. Wiest, David S. Bennett, Stan D. Pennington, Aaron Culbreth