Patents by Inventor Stephen Hodge
Stephen Hodge has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Publication number: 20150141339Abstract: According to the invention there is provided a compound of formula (I): wherein R1, R2, R3 and n have meanings given in the description, or a pharmaceutically acceptable solvate, salt or prodrug thereof for use in the treatment of osteoporosis and/or osteopenia.Type: ApplicationFiled: October 21, 2014Publication date: May 21, 2015Inventors: Stephen Hodges, Robin Soper
-
Publication number: 20150124968Abstract: Securely joining a secure wireless communications network is described, for example, where a printer or other device is securely added to a home wireless network. In various embodiments, a temporary wireless network is established between a new joiner device and a second wireless communications device which is already a member of a secure home wireless network. In an example, the temporary wireless network is set up using a secret key known to the new joiner device and the second wireless communications device by virtue of physical proximity. In various examples, the secure, temporary wireless network is used to transfer credentials of the secure home network to the new joiner device which then joins the home network. In an example the temporary wireless network is cancelled once the new joiner device becomes a member of the secure home (or other) wireless network.Type: ApplicationFiled: January 12, 2015Publication date: May 7, 2015Inventors: James Scott, Alice Jane Bernheim Brush, Ratul Mahajan, Stephen Hodges
-
Publication number: 20150043721Abstract: A computer-implemented system and method for secure electronic message exchange including coupling a control platform to a workstation of a plurality of workstations via a communications medium, where the control platform includes one or more apparatuses for monitoring, controlling, conversion, and billing, related to messages exchanged between a plurality of local users and a plurality of remote users. The system prevents forwarding or copying of a message sent by a local user of the plurality of local users and received by a remote user of the plurality of remote users, to another party by the control platform. The system and method also provides for authenticating the remote user with the control platform.Type: ApplicationFiled: August 12, 2014Publication date: February 12, 2015Inventors: Stephen HODGE, David Woody
-
Publication number: 20150046978Abstract: A computer-implemented system and method for secure electronic message exchange including coupling a control platform to a workstation of a plurality of workstations via a communications medium, where the control platform includes one or more apparatuses for monitoring, controlling, conversion, and billing, related to messages exchanged between a plurality of local users and a plurality of remote users. The system prevents forwarding or copying of a message sent by a local user of the plurality of local users and received by a remote user of the plurality of remote users, to another party by the control platform. The system and method also provides for authenticating the remote user with the control platform.Type: ApplicationFiled: August 12, 2014Publication date: February 12, 2015Inventors: Stephen Hodge, David Woody
-
Publication number: 20150047004Abstract: A computer-implemented system and method for secure electronic message exchange including coupling a control platform to a workstation of a plurality of workstations via a communications medium, where the control platform includes one or more apparatuses for monitoring, controlling, conversion, and billing, related to messages exchanged between a plurality of local users and a plurality of remote users. The system prevents forwarding or copying of a message sent by a local user of the plurality of local users and received by a remote user of the plurality of remote users, to another party by the control platform. The system and method also provides for authenticating the remote user with the control platform.Type: ApplicationFiled: August 12, 2014Publication date: February 12, 2015Inventors: Stephen HODGE, David Woody
-
Patent number: 8948390Abstract: Securely joining a secure wireless communications network is described, for example, where a printer or other device is securely added to a home wireless network. In various embodiments, a temporary wireless network is established between a new joiner device and a second wireless communications device which is already a member of a secure home wireless network. In an example, the temporary wireless network is set up using a secret key known to the new joiner device and the second wireless communications device by virtue of physical proximity. In various examples, the secure, temporary wireless network is used to transfer credentials of the secure home network to the new joiner device which then joins the home network. In an example the temporary wireless network is cancelled once the new joiner device becomes a member of the secure home (or other) wireless network.Type: GrantFiled: September 29, 2012Date of Patent: February 3, 2015Assignee: Microsoft CorporationInventors: James Scott, Alice Jane Bernheim Brush, Ratul Mahajan, Stephen Hodges
-
Patent number: 8895624Abstract: According to the invention there is provided a compound of formula (I): wherein R1, R2, R3 and n have meanings given in the description, or a pharmaceutically acceptable solvate, salt or prodrug thereof for use in the treatment of osteoporosis and/or osteopenia.Type: GrantFiled: December 22, 2010Date of Patent: November 25, 2014Assignee: Haoma Medica Ltd.Inventors: Stephen Hodges, Robin Soper
-
Publication number: 20140287715Abstract: A communication device and system are disclosed for providing communication and data services to residents of a controlled facility. The device can be restricted to communicating only using an internet protocol so as to restrict the device communication to an internal intranet. Wireless access points may be disposed throughout the environment to route calls and data between the device and a central processing center. By converting a protocol of the communications received from the device to a protocol used by the central processing center, minimal modifications to the central processing center are needed to support a wireless communication infrastructure. Many restrictions and safeguards may be implemented within the phone and system in order to prevent improper use.Type: ApplicationFiled: July 19, 2013Publication date: September 25, 2014Applicant: Global Tel*Link Corp.Inventors: Stephen HODGE, Garth Johnson, Christopher McNitt
-
Publication number: 20140098018Abstract: A wearable sensor for tracking articulated body parts is described such as a wrist-worn device which enables 3D tracking of fingers and optionally also the arm and hand without the need to wear a glove or markers on the hand. In an embodiment a camera captures images of an articulated part of a body of a wearer of the device and an articulated model of the body part is tracked in real time to enable gesture-based control of a separate computing device such as a smart phone, laptop computer or other computing device. In examples the device has a structured illumination source and a diffuse illumination source for illuminating the articulated body part.Type: ApplicationFiled: October 4, 2012Publication date: April 10, 2014Applicant: MICROSOFT CORPORATIONInventors: David Kim, Shahram Izadi, Otmar Hilliges, David Alexander Butler, Stephen Hodges, Patrick Luke Olivier, Jiawen Chen, Iason Oikonomidis
-
Publication number: 20140093079Abstract: Securely joining a secure wireless communications network is described, for example, where a printer or other device is securely added to a home wireless network. In various embodiments, a temporary wireless network is established between a new joiner device and a second wireless communications device which is already a member of a secure home wireless network. In an example, the temporary wireless network is set up using a secret key known to the new joiner device and the second wireless communications device by virtue of physical proximity. In various examples, the secure, temporary wireless network is used to transfer credentials of the secure home network to the new joiner device which then joins the home network. In an example the temporary wireless network is cancelled once the new joiner device becomes a member of the secure home (or other) wireless network.Type: ApplicationFiled: September 29, 2012Publication date: April 3, 2014Applicant: MICROSOFT CORPORATIONInventors: James Scott, Alice Jane Bernheim Brush, Ratul Mahajan, Stephen Hodges
-
Publication number: 20140044242Abstract: Disclosed is a voice message exchange system and method for improving communication between an inmate and a third party by enabling the inmate to leave a message when a call is not answered and further allowing the third party who receives the message to reply with a message to the inmate. Additionally, outside parties that meet the institution's requirements can leave messages for inmates at any time. The present invention can be used as an add-on to legacy inmate call management systems or incorporated internally into an inmate call management system. The system also provides monitoring, controlling, recording, and billing means.Type: ApplicationFiled: August 14, 2013Publication date: February 13, 2014Applicant: Global Tel*Link Corp.Inventors: Stephen Hodge, David Woody
-
Publication number: 20140020063Abstract: A computer-implemented system and method for secure electronic message exchange including coupling a control platform to a workstation of a plurality of workstations via a communications medium, where the control platform includes one or more apparatuses for monitoring, controlling, conversion, and billing, related to messages exchanged between a plurality of local users and a plurality of remote users. The system prevents forwarding or copying of a message sent by a local user of the plurality of local users and received by a remote user of the plurality of remote users, to another party by the control platform. The system and method also provides for authenticating the remote user with the control platform.Type: ApplicationFiled: July 12, 2013Publication date: January 16, 2014Inventors: Stephen HODGE, David WOODY
-
Publication number: 20130346762Abstract: Methods for optimizing battery use for a known future load are described. In an embodiment, one or more battery cells are selected from a set of battery cells to provide power to a computing-based device. The battery cells are selected based on discharge profile data for each battery cell and both the current power requirement and a known future power requirement of the computing-based device. The known future power requirement is calculated based on information available to the operating system running on the computing-based device. In some examples, one or more battery cells may also be selected for charging when a power source is available and these cells may be selected based on charge profile data and the known future power requirement. The selection of the battery cells may also be made in order to satisfy a battery optimization goal, which may be defined by a user.Type: ApplicationFiled: June 22, 2012Publication date: December 26, 2013Applicant: MICROSOFT CORPORATIONInventors: Stephen HODGES, Ranveer CHANDRA, Julia Louise MEINERSHAGEN, James SCOTT
-
Publication number: 20130308499Abstract: The present invention discloses a centralized, digital, computer-based telephone call management system for authenticating users of a telephone system in an institutional facility. The system includes the capacity to allow an institution to control, record, monitor, and bill and report usage and access to a telephone network. The telephone call management system further includes both accounting and management software for use in controlling, monitoring, billing, recording, and reporting usage and access. Also, it can operate over both a Public Switch Telephone Network (PSTN) and a Voice over Internet Protocol (VOIP) infrastructure.Type: ApplicationFiled: July 24, 2013Publication date: November 21, 2013Applicant: Global Tel*Link Corp.Inventor: Stephen HODGE
-
Patent number: 8587670Abstract: An image capture device is described which is operable in any one of a number of capture modes. The device comprises a camera, a memory and a processor. The memory stores a plurality of sets of capture triggers, with each set of capture triggers being associated with one of the plurality of capture modes. The processor selects one of the plurality of capture modes, such that the device is operable in the selected capture mode. In the selected capture mode, an image is captured automatically when a capture trigger within the associated set of capture triggers is satisfied.Type: GrantFiled: November 16, 2006Date of Patent: November 19, 2013Assignee: Microsoft CorporationInventors: Kenneth Wood, Stephen Hodges, Lyndsay Williams, James Srinivasan, Carsten Rother, Antonio Criminisi, John Chiloyan
-
Publication number: 20130290910Abstract: User interface control using a keyboard is described. In an embodiment, a user interface displayed on a display device is controlled using a computer connected to a keyboard. The keyboard has a plurality of alphanumeric keys that can be used for text entry. The computer receives data comprising a sequence of key-presses from the keyboard, and generates for each key-press a physical location on the keyboard. The relative physical locations of the key-presses are compared to calculate a movement path over the keyboard. The movement path describes the path of a user's digit over the keyboard. The movement path is mapped to a sequence of coordinates in the user interface, and the movement of an object displayed in the user interface is controlled in accordance with the sequence of coordinates.Type: ApplicationFiled: June 24, 2013Publication date: October 31, 2013Inventors: Harper LaFave, Stephen Hodges, James Scott, Shahram Izadi, David Molyneaux, Nicolas Villar, David Alexander Butler, Mike Hazas
-
Publication number: 20130275957Abstract: Configuring appliances is described. In an embodiment an appliance, for example, a domestic appliance can have both a physical user interface, for example the buttons on the appliance and a remote user interface. In various embodiments a user can access the remote user interface by connecting to a network interface associated with the appliance using a client device. The client device can display the remote user interface of the appliance and the user can use the remote user interface to configure settings and functions of the appliance and of the physical and remote user interfaces. In various embodiments the remote user interface can be used in combination with the physical user interface. In various embodiments the remote user interface is a development environment which enables the user to change the functionality of the appliance by altering or replacing program files which are executed at the appliance.Type: ApplicationFiled: April 12, 2012Publication date: October 17, 2013Applicant: MICROSOFT CORPORATIONInventors: Nicolas Villar, James Scott, Stephen Hodges, Christian Winkler
-
Patent number: 8558917Abstract: A method of transferring images from a first device to a second device and computer program code for performing this method is described. A connection characteristic for a connection between the first & second devices is determined and at least one image is selected from a plurality of images on the first device for transfer dependent upon both the connection characteristic and image selection criteria. The selected image(s) are then transferred over the connection from the first device to the second device.Type: GrantFiled: November 24, 2006Date of Patent: October 15, 2013Assignee: Microsoft CorporationInventors: Kenneth Wood, Stephen Hodges, Lyndsay Williams, Mitch Goldberg, Carsten Rother, Antonio Criminisi, James Srinivasan
-
Patent number: 8515031Abstract: Disclosed is a voice message exchange system and method for improving communication between an inmate and a third party by enabling the inmate to leave a message when a call is not answered and further allowing the third party who receives the message to reply with a message to the inmate. Additionally, outside parties that meet the institution's requirements can leave messages for inmates at any time. The present invention can be used as an add-on to legacy inmate call management systems or incorporated internally into an inmate call management system. The system also provides monitoring, controlling, recording, and billing means.Type: GrantFiled: August 13, 2012Date of Patent: August 20, 2013Assignee: Value-Added Communications, Inc.Inventors: Stephen Hodge, David Woody
-
Patent number: 8488756Abstract: A computer-implemented system and method for secure electronic message exchange including coupling a control platform to a workstation of a plurality of workstations via a communications medium, where the control platform includes one or more apparatuses for monitoring, controlling, conversion, and billing, related to messages exchanged between a plurality of local users and a plurality of remote users. The system prevents forwarding or copying of a message sent by a local user of the plurality of local users and received by a remote user of the plurality of remote users, to another party by the control platform. The system and method also provides for authenticating the remote user with the control platform.Type: GrantFiled: June 10, 2010Date of Patent: July 16, 2013Assignee: Credit Suisse AG, Cayman Islands BranchInventors: Stephen Hodge, David Woody