Patents by Inventor Steven E. Lucco

Steven E. Lucco has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 7185209
    Abstract: Reliable end-to-end messaging in which tracking and acknowledgement information are contained in the electronic message that is visible to layers above the transport layer, thereby being independent of what transport protocols, and whether different transport protocols, are used to communicate between the two end points. Furthermore, acknowledgment messages may identify multiple ranges of sequence numbers corresponding to received electronic messages, thereby permitting further flexibility and completeness in acknowledging received messages.
    Type: Grant
    Filed: May 28, 2003
    Date of Patent: February 27, 2007
    Assignee: Microsoft Corporation
    Inventors: David E. Langworthy, Christopher G. Kaler, Luis Felipe Cabrera, Patrick J. Helland, Steven E. Lucco, John P. Shewchulk
  • Patent number: 6993714
    Abstract: A group identifier represents an association between each of a number of different abbreviated namespace identifiers with a corresponding hierarchical namespace (e.g., an XML namespace). A hierarchically-structured document (e.g., an XML document) is accessed by a computing system that determines that the group identifier is associated with the hierarchically-structured document. Hence, when using the abbreviated namespace identifiers in the hierarchically-structured document, the computing system knows that the corresponding namespace is associated with the designated portions of the hierarchically-structured document. Also, a schema description language document (e.g., an XSD document) may specify multiple target namespaces for a single element. Accordingly, groupings of elements may be included in different namespaces to creating overlapping or even nested namespaces.
    Type: Grant
    Filed: October 3, 2002
    Date of Patent: January 31, 2006
    Assignee: Microsoft Corporation
    Inventors: Christopher G. Kaler, Allen L. Brown, Robert G. Atkinson, Steven E. Lucco
  • Publication number: 20040243800
    Abstract: Reliable end-to-end messaging in which tracking and acknowledgement information are contained in the electronic message that is visible to layers above the transport layer, thereby being independent of what transport protocols, and whether different transport protocols, are used to communicate between the two end points. Furthermore, acknowledgment messages may identify multiple ranges of sequence numbers corresponding to received electronic messages, thereby permitting further flexibility and completeness in acknowledging received messages.
    Type: Application
    Filed: May 28, 2003
    Publication date: December 2, 2004
    Applicant: Microsoft Corporation
    Inventors: David E. Langworthy, Christopher G. Kaler, Luis Felipe Cabrera, Patrick J. Helland, Steven E. Lucco, John P. Shewchuk
  • Publication number: 20040193720
    Abstract: A network site often provides multiple offerings, each having their own context. The complete context for one of the offerings is stored. That complete context represents a root node in a hierarchical tree of context nodes, each node representing the context information for one or more of the offerings. Each node in the tree includes a reference to its parent node, and then a description of incremental changes to the context information as compared to the context information from the parent node. Accordingly, the context information for a particular node in the tree may be obtained by combining the complete context for the root node offering with incremental changes described in other nodes in the ancestral chain that leads from the particular offering to the root offering.
    Type: Application
    Filed: March 31, 2003
    Publication date: September 30, 2004
    Inventors: Christopher G. Kaler, Erik B. Christensen, Giovanni M. Della-Libera, John P. Shewchuk, Stephen J. Millet, Steven E. Lucco
  • Publication number: 20040111474
    Abstract: A originating computing system sends an electronic message to a destination computing system via a routing path that includes one or more intermediary message processing computing systems. The originating computing system includes information in the electronic message that designates constraints related to resources or time use to delivery the message. For example, the constraints may include the number of hops, the amount of raw time, or the amount of processor time needed to delivery the message. If along the routing path, any of the intermediary computing systems detects that any of the constraints have been exceeded, then delivery of the electronic message may be abandoned. Any of the intermediary message processing computing systems may also specify constraints related to the resources or time used to delivery the electronic message.
    Type: Application
    Filed: December 5, 2002
    Publication date: June 10, 2004
    Inventors: Christopher G. Kaler, Steven E. Lucco
  • Publication number: 20040088433
    Abstract: A message processor accesses an electronic message. The message processor identifies from within the electronic message any schema-based time markers including time related message data associated with the message processor. The message processor determines if a schema-based time marker within the electronic message should be modified. This can include signing a portion of time related message data to indicate to a subsequent message processor that the time related message data can be trusted. The message processor routes the message (either directly or through one or more intermediary message processors) to a destination message processor. The destination message process receives the message and processes the electronic message according to time related message data included in the message. This can include trusting the portion time related data that was singed by the message processor.
    Type: Application
    Filed: November 6, 2002
    Publication date: May 6, 2004
    Inventors: Christopher G. Kaler, Steven E. Lucco, John P. Shewchuk
  • Publication number: 20040068694
    Abstract: A group identifier represents an association between each of a number of different abbreviated namespace identifiers with a corresponding hierarchical namespace (e.g., an XML namespace). A hierarchically-structured document (e.g., an XML document) is accessed by a computing system that determines that the group identifier is associated with the hierarchically-structured document. Hence, when using the abbreviated namespace identifiers in the hierarchically-structured document, the computing system knows that the corresponding namespace is associated with the designated portions of the hierarchically-structured document. Also, a schema description language document (e.g., an XSD document) may specify multiple target namespaces for a single element. Accordingly, groupings of elements may be included in different namespaces to creating overlapping or even nested namespaces.
    Type: Application
    Filed: October 3, 2002
    Publication date: April 8, 2004
    Inventors: Christopher G. Kaler, Allen L. Brown, Robert G. Atkinson, Steven E. Lucco
  • Publication number: 20030101284
    Abstract: Methods and systems for providing a virtual network are disclosed. At least one layer of abstraction is created between network service applications and conventional network protocols by inserting an adaptive dispatcher between applications and network transport services on each machine in a network. The message protocol in the virtual network is extensible, allowing application programs to create new headers within any message as needed. The adaptive dispatcher contains handlers that route and dispatch messages within the virtual network based on arbitrary content within each message, including any combination of headers and/or data content. Each device on the virtual network has a virtual address to which messages are directed, allowing devices to move within the network without reconfiguring routing tables.
    Type: Application
    Filed: November 27, 2001
    Publication date: May 29, 2003
    Applicant: Microsoft Corporation
    Inventors: Luis F. Cabrera, Erik B. Christensen, Giovanni M. Della-Libera, Christopher G. Kaler, David E. Levin, Bradford H. Lovering, Steven E. Lucco, Stephen J. Millet, John P. Shewchuk, Robert S. Wahbe, David A. Wortendyke
  • Publication number: 20030086620
    Abstract: A split-stream dictionary (SSD) program compression architecture has a dictionary builder, a dictionary compressor, and a SSD item generator. The dictionary builder constructs a dictionary containing two types of entries: (1) base entries for each instruction in an input program and (2) sequence entries for sequences of multiple instructions (e.g., 2-4 instructions) that are used multiple times in the program. The dictionary compressor compresses the dictionary by separately compressing the base entries and the sequence entries independently of one another. The SSD item generator generates a stream of items that represent the program instructions in terms of the base entries and the sequence entries. The SSD program compression architecture outputs the compressed dictionary and the stream of SSD items referencing the dictionary. The SSD program compression architecture supports a two-phase just-in-time (JIT) translation having a dictionary decompression phase and a copy phase.
    Type: Application
    Filed: June 27, 2001
    Publication date: May 8, 2003
    Inventor: Steven E. Lucco
  • Publication number: 20030074472
    Abstract: An apparatus and method is provided for resolving virtual network names using one or more name routers. A conventional Uniform Resource Locator (URL) naming scheme is extended by allowing any component to be mapped to an address. The resolution process occurs recursively through a plurality of name routers. Resolution can be contextual, such that the same virtual network name may be resolved differently depending on the identity of the client or other parameters.
    Type: Application
    Filed: October 24, 2001
    Publication date: April 17, 2003
    Inventors: Steven E. Lucco, Erik B. Christensen, Andrew J. Layman, David E. Levin, Bradford H. Lovering, Henrik Frystyk Nielsen, John P. Shewchuk
  • Publication number: 20030074482
    Abstract: Methods and systems for using a compensable network messaging protocol are disclosed. A complete set of attributes and characteristics of a messaging protocol are broken down into independent pieces, or protocolettes. When a network application sends a message across the network, the network application selects the set of services that are needed for that specific message (e.g., reliability). A code generator composes a messaging protocol using the preconstructed protocolettes, based on the network application's needs and/or request. The message is forwarded to a router, which transmits the message using the uniquely composed messaging protocol for delivery to the recipient(s).
    Type: Application
    Filed: October 24, 2001
    Publication date: April 17, 2003
    Inventors: Erik B. Christensen, Andrew I. Layman, Bradford H. Lovering, Steven E. Lucco, Henrik Frystyk Nielsen, John P. Shewchuk, Robert S. Wahbe, Christopher G. Kaler
  • Publication number: 20030074357
    Abstract: Methods, systems, and data structures for communicating object metadata are provided. A generic metadata container is presented that allows object metadata to be described in an extensible manner using protocol-neutral and platform-independent methodologies. A metadata scope refers to a dynamic universe of targets to which the included metadata statements correspond. Metadata properties provide a mechanism to describe the metadata itself, and metadata security can be used to ensure authentic metadata is sent and received. Mechanisms are also provided to allow refinement and replacement of metadata statements. The metadata container may be used to convey referral data to update routing tables in network nodes, and may also be used register referral statements and query a node for referral information.
    Type: Application
    Filed: October 15, 2002
    Publication date: April 17, 2003
    Applicant: Microsoft Corporation
    Inventors: Henrik F. Nielsen, Christopher G. Kaler, Steven E. Lucco, David E. Levin, Erik B. Christensen
  • Publication number: 20030074579
    Abstract: A distributed security system is provided. The distributed security system uses a security policy that is written in a policy language that is transport and security protocol independent as well as independent of cryptographic technologies. This security policy can be expressed using the language to create different security components allowing for greater scalability and flexibility. By abstracting underlying protocols and technologies, multiple environments and platforms can be supported.
    Type: Application
    Filed: February 6, 2002
    Publication date: April 17, 2003
    Applicant: Microsoft Corporation
    Inventors: Giovanni M. Della-Libera, Christopher G. Kaler, Scott A. Konersmann, Butler W. Lampson, Paul J. Leach, Bradford H. Lovering, Steven E. Lucco, Stephen J. Millet, Richard F. Rashid, John P. Shewchuk
  • Patent number: 6151618
    Abstract: A safe general purpose virtual machine computing system having a general purpose memory protection model that is hardware architecture and programming language independent. The safe general purpose virtual machine computing system is software based to facilitate operation on hardware architectures that otherwise would prevent the exchange and successful execution of mobile code programs from one computer system to another. The safe general purpose virtual machine computing system also facilitates generating Bytecode Reduced Instruction Set Computer (BRISC) compressed mobile code that can be compiled or translated into executable code very quickly in addition to being compact for transmission purposes, and that is prevented from accessing unauthorized memory locations due to Software Fault Isolation techniques implemented in the code.
    Type: Grant
    Filed: June 18, 1997
    Date of Patent: November 21, 2000
    Assignee: Microsoft Corporation
    Inventors: Robert S. Wahbe, Steven E. Lucco, Christopher W. Fraser, Vance Palmer Morrison
  • Patent number: 5761477
    Abstract: An efficient method for implementing a safe virtual machine, in software, that embodies a general purpose memory protection model. The present invention runs on any general purpose computer architecture and will run an executable that has been developed for the virtual machine. The present invention compiles the executable into the native instructions of the hardware. During the compilation, specialized code sequences are added to the code using a technique called software fault isolation. A set of allowed behaviors and a set of responses to the undesirable actions will be created and written to memory. A series of optimizations are applied so that the translated code executes at nearly the native speed of the architecture, but the fault isolation sequences prevent it from engaging in undesirable actions. In particular, the memory protection model is enforced, providing the same level of protection that customarily requires hardware support to enforce efficiently.
    Type: Grant
    Filed: December 4, 1995
    Date of Patent: June 2, 1998
    Assignee: Microsoft Corporation
    Inventors: Robert S. Wahbe, Steven E. Lucco