new TOP 200 Companies filing patents this week

new Companies with the Most Patent Filings

Scott A. Field patents

Recent patents with Scott A. Field listed as an inventor - additional entries may be under other spellings.


Scott A. Field - Related organizations: Microsoft Technology Licensing, Llc patents, Microsoft Corporation patents

Establishing secure computing devices for virtualization and administration

03/24/16 - 20160087963 - Embodiments are directed to establishing a secure connection between computing systems and to providing computer system virtualization on a secure computing device. In one scenario, a computer system receives a request that at least one specified function be initiated. The request includes user credentials and a device claim that identifies
Inventors: Mohamed Rouatbi, Karthik Jaganathan, Venkata K. Anumalasetty, Ramesh Chinta, Scott A. Field

Establishing secure computing devices for virtualization and administration

01/28/16 - 20160028704 - Embodiments are directed to establishing a secure connection between computing systems and to providing computer system virtualization on a secure computing device. In one scenario, a computer system receives a request that at least one specified function be initiated. The request includes user credentials and a device claim that identifies
Inventors: Mohamed Rouatbi, Karthik Jaganathan, Venkata K. Anumalasetty, Ramesh Chinta, Scott A. Field

Providing multi-level password and phishing protection

09/24/15 - 20150271197 - Embodiments described herein are directed to preventing development of insecure web pages, preventing deployment of insecure web pages and to preventing access to insecure web pages. In one embodiment, a computer system accesses a web page that includes one or more web elements. The computer system then determines that the
Inventors: Scott A. Field, Ellen E. Cram, Julian Federico Gonzalez

Device booting with an initial protection component

05/08/14 - 20140129817 - Booting a computing device includes executing one or more firmware components followed by a boot loader component. A protection component for the computing device, such as an anti-malware program, is identified and executed as an initial component after executing the boot loader component. One or more boot components are also
Inventors: Mark F. Novak, Robert Karl Spiger, Stefan Thom, David J. Linsley, Scott A. Field, Anil Francis Thomas

Efficient patching

04/03/14 - 20140096122 - A facility for applying a software patch is described. Using an automatic patching agent, the facility receives the software patch. In response to receiving the software patch, without user intervention, the facility performs the following acts: First, the facility identifies an instance of an executable module that is currently loaded,
Inventors: Anthony Blumfield, Gilad Golan, Jason Garms, Saud Alshibani, Scott A. Field

Device booting with an initial protection component

12/15/11 - 20110307711 - Booting a computing device includes executing one or more firmware components followed by a boot loader component. A protection component for the computing device, such as an anti-malware program, is identified and executed as an initial component after executing the boot loader component. One or more boot components are also
Inventors: Mark F. Novak, Robert Karl Spiger, Stefan Thom, David J. Linsley, Scott A. Field, Anil Francis Thomas

Unobtrusive assurance of authentic user intent

06/23/11 - 20110154505 - Computer-executable instructions that are directed to the performance of consequential actions and automatically elevate to execute at a higher privilege level to do so can perform such consequential actions only after user notification. Doing so can enable monitoring processes to avoid presenting duplicative user notification upon detection of such auto-elevation.
Inventors: Crispin Cowan, Matthew Z. Tamayo-rios, Tanmoy Dutta, John Lambert, Paul J. Leach, Scott A. Field, Thomas C. Jones

Entropy pools for virtual machines

02/24/11 - 20110047545 - In the host operating system of a computing device, entropy data is collected based at least in part on each of one or more hardware components of the computing device. An entropy pool is updated based at least in part on the collected entropy data, and data from the entropy
Inventors: Carl M. Ellison, Scott A. Field, Brandon S. Baker

Using scenario-related information to customize user experiences

01/13/11 - 20110010354 - Methods for using scenario solution-related information to generate customized user experiences are provided. Upon receiving a user query, a plurality of results is returned, each result being representative of a scenario solution which may be utilized to address a particular issue relevant to the received query. At the time of
Inventors: Thekkthalackal Varugis Kurien, Steven E. Jackson, Scott A. Field

Isolation of services or processes using credential managed accounts

12/31/09 - 20090328154 - This disclosure describes methods, systems, and application programming interfaces for creating a credential managed account. This disclosure describes creating a new password managed account, defining the password managed account, wherein the password managed account is to access a service on a managed computing device, identifying the password managed account for
Inventors: Scott A. Field, Ramesh Chinta, Liqiang Zhu, Umit Akkus, Siddharth Bhai, Gopinathan Kannan, James J. Simmons, Qi Cao, Paul Miller, Ryan Fairfax, Alexandru Hanganu

Enhanced computer intrusion detection methods and systems

09/24/09 - 20090241193 - Improved intrusion detection and/or tracking methods and systems are provided for use across various computing devices and networks. Certain methods, for example, form a substantially unique audit identifier during each authentication/logon process. One method includes identifying one or more substantially unique parameters that are associated with the authentication/logon process and
Inventors: Bhalchandra S. Pandit, Praerit Garg, Richard B. Ward, Paul J. Leach, Scott A. Field, Robert P. Reichel, John E. Brezak

System for running potentially malicious code

08/13/09 - 20090205034 - Systems and methods for creating a secure process on a web server can include creating an application manager process, and creating an application host process, the application host process being created under control of the application manager process. Example methods can also include restricting attributes of the application host process,
Inventors: S. Franklin Williams, Kiran Akella Venkata, David C. Leblanc, Juraj Gottweis, Gareth A. Howell, Scott A. Field, Ramesh Chinta

File access in multi-protocol environment

02/26/09 - 20090055921 - Aspects of the subject matter described herein relate to providing file access in a multi-protocol environment. In aspects, a file server is operable to receive requests formatted according to two or more file access protocols. If a request is formatted according to a first file access protocol, the file server
Inventors: Scott A. Field, Paul J. Leach, Roopesh C. Battepati, Michael C. Johnson


### Scott A. Field patent invention listings

The bibliographic references displayed about Scott A. Field's patents are for a recent sample of Scott A. Field's publicly published patent applications. The inventor/author may have additional bibliographic citations listed at the USPTO.gov. FreshPatents.com is not associated or affiliated in any way with the author/inventor or the United States Patent/Trademark Office but is providing this non-comprehensive sample listing for educational and research purposes using public bibliographic data published and disseminated from the United States Patent/Trademark Office public datafeed. This information is also available for free on the USPTO.gov website. If Scott A. Field filed recent patent applications under another name, spelling or location then those applications could be listed on an alternate page. If no bibliographic references are listed here, it is possible there are no recent filings or there is a technical issue with the listing--in that case, we recommend doing a search on the USPTO.gov website.

###



Sign up for the FreshPatents.com FREE Keyword Monitor and check for keyword phrases (ie. "RFID" , "wireless", "web development", "fuel cells" etc.)...You will be notified when new patent applications and inventions are published that match your keywords. Also you can save for later research public patent/invention documents using our FREE Organizer. It takes only 30 seconds to sign up or login.

Advertise on FreshPatents.com - Rates & Info

###

FreshPatents.com Support - Terms & Conditions