Patents by Inventor Thomas Fakes
Thomas Fakes has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 7657923Abstract: A framework for a security system is described. The framework may be used to track which security engines are available to enforce security policies. A security engine is a software resource that enforces security policies designed to help ensure that a vulnerability of an application or operating system cannot be exploited. The framework may be used to maintain a holistic view of a status of computing devices that a security system is configured to operate with. The framework may enforce security policies uniformly across components of a security system by providing an application program interface. The security system may broker security enforcement events and security policies. By providing these services, the framework presents a unified model for interactions between software components and the security system.Type: GrantFiled: July 23, 2004Date of Patent: February 2, 2010Assignee: Microsoft CorporationInventors: Steven Townsend, Thomas Fakes
-
Patent number: 7530093Abstract: Techniques for securing applications and operating systems are provided. In an embodiment, the system notifies a user that a security enforcement action is being taken even though the condition prompting the action is detected by a security engine that executes in kernel mode. The security engine enforces security policies that help to ensure that a vulnerability of an application or operating system cannot be exploited. In an embodiment, the security system may solicit input from a user relating to a security enforcement action even though the condition prompting the action is detected by a security engine that executes in kernel mode. Security policies may be defined as sets of rules, each having a condition and an action. The security system thus enables kernel mode components to provide notifications to a user or solicit input from the user.Type: GrantFiled: April 30, 2004Date of Patent: May 5, 2009Assignee: Microsoft CorporationInventors: Anders Samuelsson, Steven Townsend, Thomas Fakes
-
Patent number: 7430760Abstract: A programming interface includes a first group of functions related to communicating a new security policy to multiple security engines. Each of the multiple security engines is configured to replace an existing security policy with the new security policy. The programming interface also includes a second group of functions related to communicating an indication of each security engine's readiness to implement the new security policy.Type: GrantFiled: December 5, 2003Date of Patent: September 30, 2008Assignee: Microsoft CorporationInventors: Steven Townsend, Thomas Fakes
-
Patent number: 7428572Abstract: Methods providing clients with a full contextual metadata experience. Metadata include multiple forms of property data, or information, relating to media accessed by a media player, such as a CD in a CD-ROM drive of a computer. Metadata is transferred from a server to a client. Identification parameters associated with the accessed media file are submitted by the client to a server, and property data is retrieved and forwarded to the client. The metadata provides the user with integrated, contemporaneous property data directly related to the media file being played, providing automatic, integrated access to data from multiple databases, simply by accessing a related media file through a media player, without further direction from the user.Type: GrantFiled: September 8, 2005Date of Patent: September 23, 2008Assignee: Microsoft CorporationInventors: Russell M. Eames, Thomas Fakes, Jason E. D. McCartney
-
Patent number: 7313591Abstract: Methods, computer readable mediums and systems provide media player users with a full contextual metadata experience. Metadata include multiple forms of property data, or information, relating to media accessed by a media player, such as a CD in a CD-ROM drive of a computer. Metadata is transferred from a server to a client. Identification parameters associated with the accessed media file are submitted by the client to a server, and property data is retrieved and forwarded to the client. The metadata provides the user with integrated, contemporaneous property data directly related to the media file being played, providing automatic, integrated access to data from multiple databases, simply by accessing a related media file through a media player, without further direction from the user.Type: GrantFiled: July 18, 2003Date of Patent: December 25, 2007Assignee: Microsoft CorporationInventors: Russell Mark Eames, Thomas Fakes, Jason E. D. McCartney
-
Patent number: 7257648Abstract: Individual records of a data set include data and semantic information to describe the data. The records in the data set are encoded to generate an encoded data set using a compression function which is determined from semantic information that is common to multiple records of the data set. Multiple records of the encoded data set include the data without the common semantic information. The encoded data set is transmitted, or otherwise communicated, to a destination device along with an expansion function that includes the semantic information that is common to the multiple records of the data set. The destination device expands the encoded data set with the expansion function such that the multiple records of the encoded data set are expanded to include the common semantic information.Type: GrantFiled: July 5, 2005Date of Patent: August 14, 2007Assignee: Microsoft CorporationInventors: Jason McCartney, Thomas Fakes
-
Patent number: 7149812Abstract: Individual records of a data set include data and semantic information to describe the data. The records in the data set are encoded to generate an encoded data set using a compression function which is determined from semantic information that is common to multiple records of the data set. Multiple records of the encoded data set include the data without the common semantic information. The encoded data set is transmitted, or otherwise communicated, to a destination device along with an expansion function that includes the semantic information that is common to the multiple records of the data set. The destination device expands the encoded data set with the expansion function such that the multiple records of the encoded data set are expanded to include the common semantic information.Type: GrantFiled: July 5, 2005Date of Patent: December 12, 2006Assignee: Microsoft CorporationInventors: Jason McCartney, Thomas Fakes
-
Patent number: 7082478Abstract: Individual records of a data set include data and semantic information to describe the data. The records in the data set are encoded to generate an encoded data set using a compression function which is determined from semantic information that is common to multiple records of the data set. Multiple records of the encoded data set include the data without the common semantic information. The encoded data set is transmitted, or otherwise communicated, to a destination device along with an expansion function that includes the semantic information that is common to the multiple records of the data set. The destination device expands the encoded data set with the expansion function such that the multiple records of the encoded data set are expanded to include the common semantic information.Type: GrantFiled: May 2, 2001Date of Patent: July 25, 2006Assignee: Microsoft CorporationInventors: Jason McCartney, Thomas Fakes
-
Publication number: 20060136586Abstract: Page-view recording with click-thru tracking is described. In an embodiment, a tracking system receives a request for content that includes request-tracking information. The request-tracking information designates that the tracking system receive the content request before the request is communicated to a content provider. The request for content is communicated to the content provider that provides the content. The content includes content-tracking information that the tracking system receives from a requesting device when the content is provided to the requesting device. The tracking system maintains the request-tracking and the content-tracking information, and associates the request-tracking and the content-tracking information with the destination device.Type: ApplicationFiled: February 28, 2006Publication date: June 22, 2006Applicant: Microsoft CorporationInventors: Jeffrey Johnson, Thomas Fakes
-
Publication number: 20060020879Abstract: Methods providing clients with a full contextual metadata experience. Metadata include multiple forms of property data, or information, relating to media accessed by a media player, such as a CD in a CD-ROM drive of a computer. Metadata is transferred from a server to a client. Identification parameters associated with the accessed media file are submitted by the client to a server, and property data is retrieved and forwarded to the client. The metadata provides the user with integrated, contemporaneous property data directly related to the media file being played, providing automatic, integrated access to data from multiple databases, simply by accessing a related media file through a media player, without further direction from the user.Type: ApplicationFiled: September 8, 2005Publication date: January 26, 2006Applicant: Microsoft CorporationInventors: Russell Eames, Thomas Fakes, Jason McCartney
-
Publication number: 20060021002Abstract: A framework for a security system is described. The framework may be used to track which security engines are available to enforce security policies. A security engine is a software resource that enforces security policies designed to help ensure that a vulnerability of an application or operating system cannot be exploited. The framework may be used to maintain a holistic view of a status of computing devices that a security system is configured to operate with. The framework may enforce security policies uniformly across components of a security system by providing an application program interface. The security system may broker security enforcement events and security policies. By providing these services, the framework presents a unified model for interactions between software components and the security system.Type: ApplicationFiled: July 23, 2004Publication date: January 26, 2006Applicant: Microsoft CorporationInventors: Steven Townsend, Thomas Fakes
-
Publication number: 20060015614Abstract: Page-view recording with click-thru tracking is described. In an embodiment, a tracking system receives a request for content that includes request-tracking information. The request-tracking information designates that the tracking system receive the content request before the request is communicated to a content provider. The request for content is communicated to the content provider that provides the content. The content includes content-tracking information that the tracking system receives from a requesting device when the content is provided to the requesting device. The tracking system maintains the request-tracking and the content-tracking information, and associates the request-tracking and the content-tracking information with the destination device.Type: ApplicationFiled: September 2, 2005Publication date: January 19, 2006Applicant: Microsoft CorporationInventors: Jeffrey Johnson, Thomas Fakes
-
Publication number: 20060005227Abstract: Languages for expressing security policies are provided. The languages comprise rules that specify conditions and actions. The rules may be enforced by a security engine when a security enforcement event occurs. The languages support data separation, dynamic evaluation, and ordered rule scope. By separating data from logic, security engines may only need to be updated with a portion of rules that change. With dynamic evaluation, expressions of rules may be evaluated dynamically, such as by querying a database, when a security engine enforces a rule. With ordered rule scope, when a security enforcement event implicates a number of rules simultaneously, the rules may be enforced in a deterministic and logically organized manner.Type: ApplicationFiled: July 1, 2004Publication date: January 5, 2006Applicant: Microsoft CorporationInventors: Anders Samuelsson, Thomas Fakes, Arindam Chatterjee, Art Shelest, Mark Vayman, Rajesh Dadhia, Saveen Reddy, Shirish Koti, Steven Townsend
-
Publication number: 20050253741Abstract: Individual records of a data set include data and semantic information to describe the data. The records in the data set are encoded to generate an encoded data set using a compression function which is determined from semantic information that is common to multiple records of the data set. Multiple records of the encoded data set include the data without the common semantic information. The encoded data set is transmitted, or otherwise communicated, to a destination device along with an expansion function that includes the semantic information that is common to the multiple records of the data set. The destination device expands the encoded data set with the expansion function such that the multiple records of the encoded data set are expanded to include the common semantic information.Type: ApplicationFiled: July 5, 2005Publication date: November 17, 2005Applicant: Microsoft CorporationInventors: Jason McCartney, Thomas Fakes
-
Publication number: 20050246364Abstract: Individual records of a data set include data and semantic information to describe the data. The records in the data set are encoded to generate an encoded data set using a compression function which is determined from semantic information that is common to multiple records of the data set. Multiple records of the encoded data set include the data without the common semantic information. The encoded data set is transmitted, or otherwise communicated, to a destination device along with an expansion function that includes the semantic information that is common to the multiple records of the data set. The destination device expands the encoded data set with the expansion function such that the multiple records of the encoded data set are expanded to include the common semantic information.Type: ApplicationFiled: July 5, 2005Publication date: November 3, 2005Applicant: Microsoft CorporationInventors: Jason McCartney, Thomas Fakes
-
Publication number: 20050246522Abstract: Techniques for securing applications and operating systems are provided. In an embodiment, the system notifies a user that a security enforcement action is being taken even though the condition prompting the action is detected by a security engine that executes in kernel mode. The security engine enforces security policies that help to ensure that a vulnerability of an application or operating system cannot be exploited. In an embodiment, the security system may solicit input from a user relating to a security enforcement action even though the condition prompting the action is detected by a security engine that executes in kernel mode. Security policies may be defined as sets of rules, each having a condition and an action. The security system thus enables kernel mode components to provide notifications to a user or solicit input from the user.Type: ApplicationFiled: April 30, 2004Publication date: November 3, 2005Applicant: Microsoft CorporationInventors: Anders Samuelsson, Steven Townsend, Thomas Fakes
-
Publication number: 20050149553Abstract: Individual records of a data set include data and semantic information to describe the data. The records in the data set are encoded to generate an encoded data set using a compression function which is determined from semantic information that is common to multiple records of the data set. Multiple records of the encoded data set include the data without the common semantic information. The encoded data set is transmitted, or otherwise communicated, to a destination device along with an expansion function that includes the semantic information that is common to the multiple records of the data set. The destination device expands the encoded data set with the expansion function such that the multiple records of the encoded data set are expanded to include the common semantic information.Type: ApplicationFiled: December 31, 2004Publication date: July 7, 2005Applicant: Microsoft CorporationInventors: Jason McCartney, Thomas Fakes
-
Publication number: 20050125694Abstract: Security policy update supporting at least one security service provider includes each of one or more security service providers receiving a set of new rules to be enforced as part of a new security policy. Each security service provider processes the new rules in order to be ready to begin using the new rules, but continues to use the previous set of rules until instructed to begin using the new rules. When all of the one or more security service providers are ready to begin using the new rules, they are instructed to begin using the new rules at which point all of the security service providers begin using the set of new rules substantially concurrently.Type: ApplicationFiled: December 5, 2003Publication date: June 9, 2005Inventors: Thomas Fakes, Anders Samuelsson
-
Publication number: 20050125687Abstract: A programming interface includes a first group of functions related to communicating a new security policy to multiple security engines. Each of the multiple security engines is configured to replace an existing security policy with the new security policy. The programming interface also includes a second group of functions related to communicating an indication of each security engine's readiness to implement the new security policy.Type: ApplicationFiled: December 5, 2003Publication date: June 9, 2005Inventors: Steven Townsend, Thomas Fakes
-
Publication number: 20050125685Abstract: An event, such as a security-related event, is received from a first security engine or another source. A second security engine is identified that is configured to utilize information contained in the event. The information contained in the event is then communicated to the second security engine. Additionally, other information, such as system state information, can be provided to one or more security engines.Type: ApplicationFiled: December 5, 2003Publication date: June 9, 2005Inventors: Anders Samuelsson, Thomas Fakes