Patents by Inventor Todd Manion
Todd Manion has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 9144744Abstract: Example apparatus and methods concern an improved immersive experience for a video gamer that is provided by controlling a game based on the three dimensional location and orientation of a control and display device held by or otherwise associated with the gamer. The location is determined from data comprising a three dimensional position and an orientation of a portion of a player in a three dimensional space associated with a computerized game. The facing and rotation of the device is determined as a function of both the location of the device and the orientation of the device. The orientation may be determined by data from motion sensors in or on the device. Example apparatus and methods control the computerized game based, at least in part, on the position of the device, the facing of the device, and the rotation of the device.Type: GrantFiled: June 10, 2013Date of Patent: September 29, 2015Inventors: Eric Langlois, Ed Pinto, Marcelo Lopez Ruiz, Todd Manion, Zsolt Mathe
-
Publication number: 20140364227Abstract: Example apparatus and methods concern an improved immersive experience for a video gamer that is provided by controlling a game based on the three dimensional location and orientation of a control and display device held by or otherwise associated with the gamer. The location is determined from data comprising a three dimensional position and an orientation of a portion of a player in a three dimensional space associated with a computerized game. The facing and rotation of the device is determined as a function of both the location of the device and the orientation of the device. The orientation may be determined by data from motion sensors in or on the device. Example apparatus and methods control the computerized game based, at least in part, on the position of the device, the facing of the device, and the rotation of the device.Type: ApplicationFiled: June 10, 2013Publication date: December 11, 2014Inventors: Eric Langlois, Ed Pinto, Marcelo Lopez Ruiz, Todd Manion, Zsolt Mathe
-
Patent number: 8756683Abstract: Automatic file replication and scanning for malware in a sharing environment is based on detection of file system changes. Only one client of the multi-client environment needs to include malware protection software for all clients to benefit. A file replication service for each client monitors a shared directory, and synchronizes files across clients at the file system driver level. When a new file appears in the shared directory of a client system, through this driver, the new file automatically gets replicated. A malware protection component operates by monitoring the directory for new or modified files. File replication causes automatic malware scanning on the client that has protection. When the file has been cleaned and re-written to the directory, the replication service senses that the file has changed and replicates the cleaned file to the other clients. Thus, the replication behavior produces a multiparty file scanning and cleansing protection scheme.Type: GrantFiled: December 13, 2006Date of Patent: June 17, 2014Assignee: Microsoft CorporationInventors: Todd Manion, Ryan Kim, Sandeep K. Singhal, Guhan Suriyanarayanan
-
Patent number: 8489701Abstract: Architecture for exposing a virtual private network of peer devices into the public domain via an overlay network. Computing devices, peripheral devices, as well as mobile devices can be physically distributed, but appear to belong to the same virtual private (or home) network, and be accessible from anywhere. Benefits include access to user media/documents from anywhere, searching of all connected devices from one location, multicast and broadcast connectivity, management of the private network and the associated policies, and device discovery on the private network from across public networks. P2P networks and ad-hoc networks can be exposed as a virtual interface, as well as the utilization of client operating systems to create the virtual network, grouping, graphing, the integration with relay services and other NAT/firewall traversal schemes, and the creation of a P2P overlay manager on a physical NIC (network interface card) address rather than a virtual address.Type: GrantFiled: June 28, 2007Date of Patent: July 16, 2013Assignee: Microsoft CorporationInventors: Todd Manion, Arsalan Ahmad, Alain Gefflaut, Sandeep Singhal
-
Patent number: 8386424Abstract: A unified data access mechanism can provide transparent access to data that is either stored locally or remotely. Application programs can direct data requests and data modifications to this singular component without foreknowledge of where the data is stored. The unified data access mechanism can work in concert with a synchronization mechanism that can maintain data synchronization between local data and remote data. Requested or modified data can be identified as stored locally or remotely based on the namespace of the data. If the data is stored remotely, the user credentials associated with the user's process space within which the application program is executing can be utilized to identify, and then provide, relevant authentication information to the remote data store, should it be required.Type: GrantFiled: June 15, 2010Date of Patent: February 26, 2013Assignee: Microsoft CorporationInventors: Nitin Sharma, Todd Manion, Akash Jeevan Sagar, Nishant Gupta, Farookh Mohammed, Aditya G Bhandarkar, Karthik Raman, Ori Amiga
-
Publication number: 20110307442Abstract: A unified data access mechanism can provide transparent access to data that is either stored locally or remotely. Application programs can direct data requests and data modifications to this singular component without foreknowledge of where the data is stored. The unified data access mechanism can work in concert with a synchronization mechanism that can maintain data synchronization between local data and remote data. Requested or modified data can be identified as stored locally or remotely based on the namespace of the data. If the data is stored remotely, the user credentials associated with the user's process space within which the application program is executing can be utilized to identify, and then provide, relevant authentication information to the remote data store, should it be required.Type: ApplicationFiled: June 15, 2010Publication date: December 15, 2011Applicant: MICROSOFT CORPORATIONInventors: Nitin Sharma, Todd Manion, Akash Jeevan Sagar, Nishant Gupta, Farookh Mohammed, Aditya G. Bhandarkar, Karthik Raman, Ori Amiga
-
Publication number: 20080183853Abstract: Architecture for exposing a virtual private network of peer devices into the public domain via an overlay network. Computing devices, peripheral devices, as well as mobile devices can be physically distributed, but appear to belong to the same virtual private (or home) network, and be accessible from anywhere. Benefits include access to user media/documents from anywhere, searching of all connected devices from one location, multicast and broadcast connectivity, management of the private network and the associated policies, and device discovery on the private network from across public networks. P2P networks and ad-hoc networks can be exposed as a virtual interface, as well as the utilization of client operating systems to create the virtual network, grouping, graphing, the integration with relay services and other NAT/firewall traversal schemes, and the creation of a P2P overlay manager on a physical NIC (network interface card) address rather than a virtual address.Type: ApplicationFiled: June 28, 2007Publication date: July 31, 2008Applicant: MICROSOFT CORPORATIONInventors: Todd Manion, Arsalan Ahmad, Alain Gefflaut, Sandeep Singhal
-
Publication number: 20080148403Abstract: Automatic file replication and scanning for malware in a sharing environment is based on detection of file system changes. Only one client of the multi-client environment needs to include malware protection software for all clients to benefit. A file replication service for each client monitors a shared directory, and synchronizes files across clients at the file system driver level. When a new file appears in the shared directory of a client system, through this driver, the new file automatically gets replicated. A malware protection component operates by monitoring the directory for new or modified files. File replication causes automatic malware scanning on the client that has protection. When the file has been cleaned and re-written to the directory, the replication service senses that the file has changed and replicates the cleaned file to the other clients. Thus, the replication behavior produces a multiparty file scanning and cleansing protection scheme.Type: ApplicationFiled: December 13, 2006Publication date: June 19, 2008Applicant: Microsoft CorporationInventors: Todd Manion, Ryan Kim, Sandeep K. Singhal, Guhan Suriyanarayanan
-
Publication number: 20070255577Abstract: A method and system may provide a unified concept of presence across all connected hosts by providing a common point of access for all presence-related data on the system. The application abstraction layer may provide a common interface for all presence-enabled applications to access and publish information related to locally or remotely-executing presence applications. The application abstraction layer may push presence data to the presence-enabled applications, or each application may access the layer to gain presence data related to other applications. Also, the application abstraction layer may store all presence data locally or remotely.Type: ApplicationFiled: April 28, 2006Publication date: November 1, 2007Applicant: MICROSOFT CORPORATIONInventors: Ravi Rao, Sandeep Singhal, Todd Manion
-
Publication number: 20070250590Abstract: The claimed method and system describes a dynamic construction of a virtual proxy using a set of virtual proxy hosts. The virtual proxy hosts may maintain a shared data store that contains a record of discovered services on a network. The virtual proxy hosts may work together to respond to discovery requests using the shared data store. Clients on a network having a virtual proxy host may be limited to unicast discovery requests with the virtual proxy host, thereby reducing broadcast traffic.Type: ApplicationFiled: April 21, 2006Publication date: October 25, 2007Applicant: MICROSOFT CORPORATIONInventors: Eliot Flannery, Henry Sanders, Sandeep Singhal, Todd Manion, Upshur Parks
-
Publication number: 20070250641Abstract: A series of unique records may be published to establish and maintain ad hoc or online meetings on a peer-to-peer network. The published records include a creator record, a presentation record, a file sharing record, a friendly name record, and invitation status record, a capabilities record, and a presence record. Each of the published records has a global unique identifier (GUID) a uniquely and universally identifies each of the record types.Type: ApplicationFiled: April 21, 2006Publication date: October 25, 2007Applicant: MICROSOFT CORPORATIONInventors: Eliot Flannery, Jeremy Dewey, Kanaka Komandur, Ryan Kim, Todd Manion
-
Publication number: 20070150558Abstract: The claimed invention adapts an existing operating system native replication service component to interface with a general application running on a peer-to-peer network. The claimed invention provides the general application with replication services without the need for coding this functionality from scratch. The claimed invention also adapts the replication service functionality to create a topology of connections based on information received from a peer-to-peer network component, thereby making the replication service function more efficiently with a peer-to-peer network.Type: ApplicationFiled: December 22, 2005Publication date: June 28, 2007Applicant: MICROSOFT CORPORATIONInventors: Dan Teodosiu, Ravi Rao, Ryan Kim, Sandeep Singhal, Todd Manion
-
Publication number: 20070076630Abstract: An application program interface (API) for sending and receiving endpoint registration data and peer-to-peer network cloud data has a registration call for adding endpoint data to a peer-to-peer network. The API may receive explicit data regarding address information or may be instructed to select and maintain suitable address information as the topology of the peer-to-peer network changes. Blocking and non-blocking calls are exposed for retrieving information peer-to-peer network endpoint data.Type: ApplicationFiled: September 30, 2005Publication date: April 5, 2007Applicant: MICROSOFT CORPORATIONInventors: Noah Horton, David Thaler, Brian Lieuallen, Upshur Parks, Jeremy Dewey, Todd Manion, Scott Senkeresty
-
Publication number: 20070050450Abstract: A method of interfacing applets with a collaboration program is disclosed. The method may be in the form of application programming interface calls.Type: ApplicationFiled: August 29, 2005Publication date: March 1, 2007Applicant: MICROSOFT CORPORATIONInventors: Todd Manion, Kanaka Komandur, Peter Williamson, Ryan Kim, R. Scott Briggs, Eliot Flannery
-
Publication number: 20070011232Abstract: A drag-and-drop user interface facilitates the selection and presentation of data to meeting participants from one of the peers in a peer-to-peer network. First icons associated with data for presentation may be dragged onto second icons associated with networked resources such as computers associated with meeting participants or other networked resources such as projectors. The data may be streamed from the presenter's computer to the networked resource over peer-to-peer network facilities such as a terminal services session.Type: ApplicationFiled: July 6, 2005Publication date: January 11, 2007Applicant: MICROSOFT CORPORATIONInventors: Todd Manion, Sandeep Singhal, Gursharan Sidhu
-
Publication number: 20070008987Abstract: Users on a peer-to-peer network, particularly a local subnet or ad hoc wireless network, may publish first contact information to a graph or data store on the network. The first contact information may include a certificate with a public-key and a user identification, such as a peer name. Other users may discover the first contact information and use the first contact information to request additional information from the user. Data in the first contact information may also be “promoted” by adding the information to a trusted contacts database, allowing the user additional privileges. The user publishing the first contact information may be given the opportunity to approve or deny the request for additional information.Type: ApplicationFiled: July 6, 2005Publication date: January 11, 2007Applicant: MICROSOFT CORPORATIONInventors: Todd Manion, Sandeep Singhal, Ravi Rao
-
Publication number: 20070011233Abstract: A method for creating, discovering, and joining meetings over a peer-to-peer network involves creation of a graph of meetings on a local subnet. When a meeting is created a meeting record is added to the graph where it may be discovered by other potential meeting attendees. A user may select from a list of meetings displayed in a meeting management window and send requested showing the selected meaning. Credentials, such as a password, may be supplied with the request. When the request is validated, information is sent to the requester for use in joining the meeting. When an ad hoc wireless session is used to hold a meeting the discovery process may further include analyzing data traffic to determine which wireless sessions are meetings.Type: ApplicationFiled: July 6, 2005Publication date: January 11, 2007Applicant: MICROSOFT CORPORATIONInventors: Todd Manion, Sandeep Singhal, Eliot Flannery, Aaron Cunningham, Ravi Rao
-
Publication number: 20070011231Abstract: An application and its associated user interface provide a meeting window for use in organizing and holding meetings using peer-to-peer network facilities. The meeting window offers menu selections for choosing a network over which to hold the meeting and for discovering and inviting meeting participants. The meeting window includes three main panes, one each for managing attendees, for distributing files to attendees, and for streaming presentation materials real-time to attendees. Data streaming is also supported to network devices such as projectors. Control of the presentation may be delegated by the presentation owner to another attendee, and may also be revoked by the presentation owner. The real-time streaming of the presentation may be paused and resumed to accommodate meeting dynamics or real-time changes.Type: ApplicationFiled: July 6, 2005Publication date: January 11, 2007Applicant: MICROSOFT CORPORATIONInventors: Todd Manion, Sandeep Singhal, Gursharan Sidhu, Simon Wong, Frederick Fourie, Ryan Kim, Eliot Flannery, Peter Williamson, Vladimir Bobov, Kanaka Komandur, Scott Briggs
-
Publication number: 20060262726Abstract: In a distributed computing system, an artificial intelligence system may be employed to configure the network variables. A metric describing the overall system performance may be derived during network operation or simulation and compared to an ideal metric describing the same distributed system performance. The difference between the derived metric and the ideal metric may then be used with an artificial intelligence system to modify the network variables to evolve the system toward the ideal performance standard.Type: ApplicationFiled: April 28, 2006Publication date: November 23, 2006Applicant: MICROSOFT CORPORATIONInventors: Brian Lieuallen, Geogy Samuel, Noah Norton, Sandeep Singhal, Todd Manion
-
Publication number: 20060242581Abstract: A computer implemented method and system enable users to create a social network providing access to other users. By providing access to such networks via a visual presentation, the system renders content available for access by other network members. Access is sometimes provided through propagation of metadata or other uniquely identifying indicia associated with the social network to all or at least certain other network members.Type: ApplicationFiled: April 20, 2005Publication date: October 26, 2006Applicant: Microsoft CorporationInventors: Todd Manion, Aaron Cunningham, Noah Horton, Gursharan Sidhu, Sandeep Singhal