Patents by Inventor Stephen R. Berard

Stephen R. Berard has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 8645734
    Abstract: A computer system may place memory objects in specific memory physical regions based on energy consumption and performance or other policies. The system may have multiple memory regions at least some of which may be powered down or placed in a low power state during system operation. The memory object may be characterized in terms of access frequency, movability, and desired performance and placed in an appropriate memory region. In some cases, the memory object may be placed in a temporary memory region and later moved to a final memory region for long term placement. The policies may allow some processes to operate while consuming less energy, while other processes may be configured to maximize performance.
    Type: Grant
    Filed: October 24, 2012
    Date of Patent: February 4, 2014
    Assignee: Microsoft Corporation
    Inventors: Stephen R Berard, Sean N McGrane, Bruce L Worthington
  • Patent number: 8321703
    Abstract: A computer system may place memory objects in specific memory physical regions based on energy consumption and performance or other policies. The system may have multiple memory regions at least some of which may be powered down or placed in a low power state during system operation. The memory object may be characterized in terms of access frequency, movability, and desired performance and placed in an appropriate memory region. In some cases, the memory object may be placed in a temporary memory region and later moved to a final memory region for long term placement. The policies may allow some processes to operate while consuming less energy, while other processes may be configured to maximize performance.
    Type: Grant
    Filed: December 12, 2009
    Date of Patent: November 27, 2012
    Assignee: Microsoft Corporation
    Inventors: Stephen R. Berard, Sean N. McGrane, Bruce L. Worthington
  • Patent number: 8245060
    Abstract: A computer system may manage objects in memory to consolidate less frequently accessed objects into memory regions that may be operated in a low power state where the access times may increase for the memory objects. By operating at least some of the memory regions in a low power state, significant power savings can be realized. The computer system may have several memory regions that may be independently controlled and may move memory objects to various memory regions in order to optimize power consumption. In some embodiments, an operation system level function may manage memory objects based on parameters gathered from usage history, memory topology and performance, and input from applications.
    Type: Grant
    Filed: October 15, 2009
    Date of Patent: August 14, 2012
    Assignee: Microsoft Corporation
    Inventors: Bruce L. Worthington, Stephen R. Berard, Sean N. McGrane
  • Patent number: 8046600
    Abstract: A plurality of power budgets are sent to a corresponding plurality of power consumers by a power management point, wherein a total power budget managed by the power management point includes a sum of the plurality of power budgets and an available power budget not assigned to the plurality of power consumers. An additional power request having a power increase amount is received from a first power consumer of the plurality of power consumers. The additional power request is approved when the power increase amount does not exceed the available power budget. The available power budget is decreased by the power increase amount. An approval of the additional power request is sent to the first power consumer.
    Type: Grant
    Filed: October 29, 2007
    Date of Patent: October 25, 2011
    Assignee: Microsoft Corporation
    Inventors: Matthew H. Holle, Stephen R. Berard, Sean N. McGrane, John M. Parchem
  • Publication number: 20110145609
    Abstract: A computer system may place memory objects in specific memory physical regions based on energy consumption and performance or other policies. The system may have multiple memory regions at least some of which may be powered down or placed in a low power state during system operation. The memory object may be characterized in terms of access frequency, movability, and desired performance and placed in an appropriate memory region. In some cases, the memory object may be placed in a temporary memory region and later moved to a final memory region for long term placement.
    Type: Application
    Filed: December 12, 2009
    Publication date: June 16, 2011
    Applicant: MICROSOFT CORPORATION
    Inventors: Stephen R. Berard, Sean N. McGrane, Bruce L. Worthington
  • Publication number: 20110093726
    Abstract: A computer system may manage objects in memory to consolidate less frequently accessed objects into memory regions that may be operated in a low power state where the access times may increase for the memory objects. By operating at least some of the memory regions in a low power state, significant power savings can be realized. The computer system may have several memory regions that may be independently controlled and may move memory objects to various memory regions in order to optimize power consumption. In some embodiments, an operation system level function may manage memory objects based on parameters gathered from usage history, memory topology and performance, and input from applications.
    Type: Application
    Filed: October 15, 2009
    Publication date: April 21, 2011
    Applicant: MICROSOFT CORPORATION
    Inventors: Bruce L. Worthington, Stephen R. Berard, Sean N. McGrane
  • Publication number: 20110022870
    Abstract: A component level power monitoring system may analyze workloads by determining energy consumed by individual components for the workload. By comparing different system configurations or by modifying the software operation, an optimized workload may be performed per energy consumed. In some embodiments, several system configurations may be attempted to determine an optimized system configuration. In other embodiments, a monitoring system may change how an application is executed by changing thread affinity or otherwise assigning certain operations to specific components. The component level monitoring may be implemented as operating system level function calls.
    Type: Application
    Filed: July 21, 2009
    Publication date: January 27, 2011
    Applicant: MICROSOFT CORPORATION
    Inventors: Sean N. McGrane, Stephen R. Berard, Bruce L. Worthington
  • Publication number: 20100235834
    Abstract: A system includes hardware, a software layer, a platform layer, and a management communication channel between the software layer and the platform layer. The management communication channel provides an interface to enable the software layer to issue a hardware management command to the platform layer, where the hardware management command is to specify a change of a setting of the hardware, and where the management communication channel allows a hardware management engine of the platform layer to collaborate with the software layer to perform the change of the setting of the hardware.
    Type: Application
    Filed: March 16, 2009
    Publication date: September 16, 2010
    Inventors: Scott P. Faasse, Nicholas S. Judge, Stephen R. Berard, Tristan A. Brown
  • Publication number: 20090113221
    Abstract: A plurality of power budgets are sent to a corresponding plurality of power consumers by a power management point, wherein a total power budget managed by the power management point includes a sum of the plurality of power budgets and an available power budget not assigned to the plurality of power consumers. An additional power request having a power increase amount is received from a first power consumer of the plurality of power consumers. The additional power request is approved when the power increase amount does not exceed the available power budget. The available power budget is decreased by the power increase amount. An approval of the additional power request is sent to the first power consumer.
    Type: Application
    Filed: October 29, 2007
    Publication date: April 30, 2009
    Applicant: MICROSOFT CORPORATION
    Inventors: Matthew H. Holle, Stephen R. Berard, Sean N. McGrane, John M. Parchem
  • Patent number: 7100054
    Abstract: A method and system are provided for authenticating a user of a computer over a computer network. In one embodiment of the invention, the method includes transmitting an applet having a challenge string and a first encryption key, receiving a login packet having the challenge string and a password that is encrypted using the first encryption key, decrypting the password, receiving information from an authentication provider, and authenticating the password by using the information provided by the authentication provider. The challenge string can be either a sequence number or a session identifier. The authentication provider can be a software program or an authentication server. An advantage of embodiments of the present invention is that a computer can provide secure Internet communications using a web browser that does not support SSL and can provide secure integration with third party security systems.
    Type: Grant
    Filed: August 9, 2001
    Date of Patent: August 29, 2006
    Assignee: American Power Conversion
    Inventors: Thomas F. Wenisch, Stephen R. Berard, David J. Smith
  • Publication number: 20030033545
    Abstract: A method and system are provided for authenticating a user of a computer over a computer network. In one embodiment of the invention, the method includes transmitting an applet having a challenge string and a first encryption key, receiving a login packet having the challenge string and a password that is encrypted using the first encryption key, decrypting the password, receiving information from an authentication provider, and authenticating the password by using the information provided by the authentication provider. The challenge string can be either a sequence number or a session identifier. The login packet can further include a user name, wherein the session identification, the user name, and the password are encrypted. Additionally, the login packet can include a hash of the session identification, the user name, and the password.
    Type: Application
    Filed: August 9, 2001
    Publication date: February 13, 2003
    Inventors: Thomas F. Wenisch, Stephen R. Berard, David J. Smith