Patents by Inventor Jeffrey Sutherland

Jeffrey Sutherland has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20240115781
    Abstract: Systems and apparatuses for blood oxygenation are disclosed. A system includes a first layer defining a plurality of banks of first channels each extending in a first direction. The plurality of banks of first channels are configured to receive blood via a trunk channel. The system includes a second layer defining a bank of second channels extending in a second direction. The bank of second channels are configured to receive oxygen. The first direction is different from the second direction. The system includes a membrane disposed between the first layer and the second layer and configured to cause the oxygen to permeate from the second layer to the first layer to oxygenate the blood.
    Type: Application
    Filed: October 3, 2023
    Publication date: April 11, 2024
    Applicant: The Charles Stark Draper Laboratory, Inc.
    Inventors: Brett Isenberg, Else Vedula, David Sutherland, Diana Lewis, Jose Santos, WeiXuan Lai, Ernie Kim, Beau Landis, Jeffrey Borenstein, Bryan Teece, Samuel Blumenstiel, Joseph Urban
  • Publication number: 20240048615
    Abstract: An application is installed on a computing device from an application package. An origin of the application (e.g., a managed installer for an enterprise, a reputation checking service) is propagated to files written to a storage device of the computing device as part of the installation, such as by writing origin information to the storage device as metadata associated with the file. The origin information for a file, in conjunction with a policy on the computing device specifying one or more trusted origins for applications on the computing device, is used to identify whether a particular action can be taken with and/or by the file. These actions can include, for example, execution of an application from an executable file. If the origin information for a file indicates an origin that is a trusted origin specified by the policy, then the action can be performed.
    Type: Application
    Filed: July 5, 2023
    Publication date: February 8, 2024
    Applicant: Microsoft Technology Licensing, LLC
    Inventors: Scott R. Shell, Kinshumann Kinshumann, Thomas W. Caldwell, Jeffrey A. Sutherland, Jeffrey R. McKune, Deskin M. Miller, Scott D. Anderson, Md. Nazmus Sakib
  • Patent number: 11722566
    Abstract: An application is installed on a computing device from an application package. An origin of the application (e.g., a managed installer for an enterprise, a reputation checking service) is propagated to files written to a storage device of the computing device as part of the installation, such as by writing origin information to the storage device as metadata associated with the file. The origin information for a file, in conjunction with a policy on the computing device specifying one or more trusted origins for applications on the computing device, is used to identify whether a particular action can be taken with and/or by the file. These actions can include, for example, execution of an application from an executable file. If the origin information for a file indicates an origin that is a trusted origin specified by the policy, then the action can be performed.
    Type: Grant
    Filed: July 19, 2021
    Date of Patent: August 8, 2023
    Assignee: Microsoft Technology Licensing, LLC
    Inventors: Scott R. Shell, Kinshumann Kinshumann, Thomas W. Caldwell, Jeffrey A. Sutherland, Jeffrey R. McKune, Deskin M. Miller, Scott D. Anderson, Md. Nazmus Sakib
  • Patent number: 11263309
    Abstract: Integrity verification of a containerized application using a block device signature is described. For example, a container deployed to a host system is signed with a single block device signature. The operating system of the host system implements an integrity policy to verify the integrity of the container when the container is loaded into memory and when its program code executes. During such events, the operating system verifies whether the block device signature is valid. If the block device signature is determined to be valid, the operating system enables the program code to successfully execute. Otherwise, the program code is prevented from being executed. By doing so, certain program code or processes that are not properly signed are prevented from executing, thereby protecting the host system from such processes. Moreover, by using a single block device signature for a container, the enforcement of the integrity policy is greatly simplified.
    Type: Grant
    Filed: October 31, 2019
    Date of Patent: March 1, 2022
    Assignee: MICROSOFT TECHNOLOGY LICENSING, LLC
    Inventors: Md Nazmus Sakib, Jeffrey A. Sutherland, Deven Robert Desai, Jaskaran Singh Khurana, Scott Randall Shell, Jessica M. Krynitsky
  • Publication number: 20220014587
    Abstract: An application is installed on a computing device from an application package. An origin of the application (e.g., a managed installer for an enterprise, a reputation checking service) is propagated to files written to a storage device of the computing device as part of the installation, such as by writing origin information to the storage device as metadata associated with the file. The origin information for a file, in conjunction with a policy on the computing device specifying one or more trusted origins for applications on the computing device, is used to identify whether a particular action can be taken with and/or by the file. These actions can include, for example, execution of an application from an executable file. If the origin information for a file indicates an origin that is a trusted origin specified by the policy, then the action can be performed.
    Type: Application
    Filed: July 19, 2021
    Publication date: January 13, 2022
    Inventors: Scott R. Shell, Kinshumann Kinshumann, Thomas W. Caldwell, Jeffrey A. Sutherland, Jeffrey R. McKune, Deskin M. Miller, Scott D. Anderson, Md. Nazmus Sakib
  • Patent number: 11086985
    Abstract: Examples described herein generally relate to a computer device including a memory, and at least one processor configured to determine whether to allow execution of an application file on the computer device. The processor receives a command to execute a file. The processor determines whether the file is associated with a package reputation of an installation package. The processor determines a file reputation of the file. The processor determines whether to allow execution of the file based on a combination of the file reputation of the file and whether the file is associated with the good package reputation.
    Type: Grant
    Filed: December 4, 2017
    Date of Patent: August 10, 2021
    Assignee: Microsoft Technology Licensing, LLC
    Inventors: Md. Nazmus Sakib, Thomas Walter Caldwell, III, Jeffrey Sutherland, Deskin Miller, Scott Anderson, Deepak Jagannathan Manohar, Adrian Marinescu
  • Patent number: 11082491
    Abstract: An application is installed on a computing device from an application package. An origin of the application (e.g., a managed installer for an enterprise, a reputation checking service) is propagated to files written to a storage device of the computing device as part of the installation, such as by writing origin information to the storage device as metadata associated with the file. The origin information for a file, in conjunction with a policy on the computing device specifying one or more trusted origins for applications on the computing device, is used to identify whether a particular action can be taken with and/or by the file. These actions can include, for example, execution of an application from an executable file. If the origin information for a file indicates an origin that is a trusted origin specified by the policy, then the action can be performed.
    Type: Grant
    Filed: October 7, 2016
    Date of Patent: August 3, 2021
    Assignee: Microsoft Technology Licensing, LLC
    Inventors: Scott R. Shell, Kinshumann Kinshumann, Thomas W. Caldwell, Jeffrey A. Sutherland, Jeffrey R. McKune, Deskin M. Miller, Scott D. Anderson, Md. Nazmus Sakib
  • Publication number: 20210133313
    Abstract: Integrity verification of a containerized application using a block device signature is described. For example, a container deployed to a host system is signed with a single block device signature. The operating system of the host system implements an integrity policy to verify the integrity of the container when the container is loaded into memory and when its program code executes. During such events, the operating system verifies whether the block device signature is valid. If the block device signature is determined to be valid, the operating system enables the program code to successfully execute. Otherwise, the program code is prevented from being executed. By doing so, certain program code or processes that are not properly signed are prevented from executing, thereby protecting the host system from such processes. Moreover, by using a single block device signature for a container, the enforcement of the integrity policy is greatly simplified.
    Type: Application
    Filed: October 31, 2019
    Publication date: May 6, 2021
    Inventors: Md Nazmus Sakib, Jeffrey A. Sutherland, Deven Robert Desai, Jaskaran Singh Khurana, Scott Randall Shell, Jessica M. Krynitsky
  • Publication number: 20190171809
    Abstract: Examples described herein generally relate to a computer device including a memory, and at least one processor configured to determine whether to allow execution of an application file on the computer device. The processor receives a command to execute a file. The processor determines whether the file is associated with a package reputation of an installation package. The processor determines a file reputation of the file. The processor determines whether to allow execution of the file based on a combination of the file reputation of the file and whether the file is associated with the good package reputation.
    Type: Application
    Filed: December 4, 2017
    Publication date: June 6, 2019
    Inventors: Md. Nazmus SAKIB, Thomas Walter CALDWELL, III, Jeffrey SUTHERLAND, Deskin MILLER, Scott ANDERSON, Deepak Jagannathan MANOHAR, Adrian MARINESCU
  • Publication number: 20180103097
    Abstract: An application is installed on a computing device from an application package. An origin of the application (e.g., a managed installer for an enterprise, a reputation checking service) is propagated to files written to a storage device of the computing device as part of the installation, such as by writing origin information to the storage device as metadata associated with the file. The origin information for a file, in conjunction with a policy on the computing device specifying one or more trusted origins for applications on the computing device, is used to identify whether a particular action can be taken with and/or by the file. These actions can include, for example, execution of an application from an executable file. If the origin information for a file indicates an origin that is a trusted origin specified by the policy, then the action can be performed.
    Type: Application
    Filed: October 7, 2016
    Publication date: April 12, 2018
    Applicant: Microsoft Technology Licensing, LLC
    Inventors: Scott R. Shell, Kinshumann Kinshumann, Thomas W. Caldwell, Jeffrey A. Sutherland, Jeffrey R. McKune, Deskin M. Miller, Scott D. Anderson, Md. Nazmus Sakib
  • Patent number: 9805189
    Abstract: Registering a computer system for use in an enterprise. A method includes receiving, from a device management infrastructure of the enterprise, an executable system management component (SMC), and installing the SMC at a storage device. The method also includes executing the SMC, causing the computer system to register with the device management infrastructure, including applying a device settings policy to a configuration of the computer system. Executing the SMC also causes the computer system to configure itself to periodically execute a maintenance task received from the device management infrastructure.
    Type: Grant
    Filed: January 25, 2016
    Date of Patent: October 31, 2017
    Assignee: Microsoft Technology Licensing, LLC
    Inventors: Hassen Karaa, Michael Healy, Brett D. A. Flegg, Gaurav Dhawan, Jeffrey Sutherland
  • Publication number: 20160300055
    Abstract: Registering a computer system for use in an enterprise. A method includes receiving, from a device management infrastructure of the enterprise, an executable system management component (SMC), and installing the SMC at a storage device. The method also includes executing the SMC, causing the computer system to register with the device management infrastructure, including applying a device settings policy to a configuration of the computer system. Executing the SMC also causes the computer system to configure itself to periodically execute a maintenance task received from the device management infrastructure.
    Type: Application
    Filed: January 25, 2016
    Publication date: October 13, 2016
    Inventors: Hassen Karaa, Michael Healy, Brett D.A. Flegg, Gaurav Dhawan, Jeffrey Sutherland
  • Patent number: 9361083
    Abstract: Installing apps on a device. The device is generally configured to be used in a closed market environment that only allows generally available apps of the closed market to be installed. The method includes determining that the device has been authorized to install apps outside of a set of apps generally available from the closed market and from a set of apps available only to users of a particular enterprise. The method further includes determining that an app, that is not generally available from the closed market, has been verified by a central authority. The method further includes installing the app on the device in spite of the fact that the device is generally configured to be used in a closed market environment.
    Type: Grant
    Filed: March 6, 2013
    Date of Patent: June 7, 2016
    Assignee: Microsoft Technology Licensing, LLC
    Inventors: Hassen Karaa, Michael Healy, Brett D. A. Flegg, Gaurav Dhawan, Jeffrey Sutherland
  • Patent number: 9245128
    Abstract: Installing apps and setting configuration on a device. A method includes receiving user input. The user input indicates a level of control that a user is willing to give an enterprise over the device. The method further includes determining, based on the level of control indicated by the user input, a set of apps allowed to install on the device. The set of apps allowed to install on the device is limited by the level of control indicated by the user. The method further includes authorizing installation of the set of apps on the device while restricting installation of other apps that would be authorized had the user selected a different level of control that the user is willing to give the enterprise over the device.
    Type: Grant
    Filed: March 6, 2013
    Date of Patent: January 26, 2016
    Assignee: Microsoft Technology Licensing, LLC
    Inventors: Hassen Karaa, Michael Healy, Brett D. A. Flegg, Gaurav Dhawan, Jeffrey Sutherland
  • Patent number: 9143360
    Abstract: A method, system, and architecture for managing computer systems is provided. A management system employs management objects (MOs) to provide administrators the ability to intuitively express the administrative intent in an information technology (IT) environment, and to act out the administrative intent based on the information gathered by the management system. Managed elements of an IT environment, such as, by way of example, hardware components, software applications, software updates, software distribution policies, configurations, settings, etc., may be expressed as MOs. Actions, such as, by way of example, detect, install/apply, remove, remediate, enumerate, etc., may be associated with the MOs. The management system manages the computer systems by deploying the appropriate MOs and their associated actions onto the computer systems, and performing the actions on the computer systems.
    Type: Grant
    Filed: January 5, 2011
    Date of Patent: September 22, 2015
    Assignee: Microsoft Technology Licensing, LLC
    Inventors: Bruce W. Copeland, David C. James, Donald Y. Song, Dustin M. Ingalls, Jeffrey A. Sutherland, Jeffry B. Phillips, Joseph S. Calabig, Khuzaima Iqbal, Michael J. Healy, Rajagopalan Badri Narayanan, Zhengkai Kenneth Pan
  • Publication number: 20140259007
    Abstract: Installing apps on a device. The device is generally configured to be used in a closed market environment that only allows generally available apps of the closed market to be installed. The method includes determining that the device has been authorized to install apps outside of a set of apps generally available from the closed market and from a set of apps available only to users of a particular enterprise. The method further includes determining that an app, that is not generally available from the closed market, has been verified by a central authority. The method further includes installing the app on the device in spite of the fact that the device is generally configured to be used in a closed market environment.
    Type: Application
    Filed: March 6, 2013
    Publication date: September 11, 2014
    Applicant: Microsoft Corporation
    Inventors: Hassen Karaa, Michael Healy, Brett D. A. Flegg, Gaurav Dhawan, Jeffrey Sutherland
  • Publication number: 20140259178
    Abstract: Installing apps and setting configuration on a device. A method includes receiving user input. The user input indicates a level of control that a user is willing to give an enterprise over the device. The method further includes determining, based on the level of control indicated by the user input, a set of apps allowed to install on the device. The set of apps allowed to install on the device is limited by the level of control indicated by the user. The method further includes authorizing installation of the set of apps on the device while restricting installation of other apps that would be authorized had the user selected a different level of control that the user is willing to give the enterprise over the device.
    Type: Application
    Filed: March 6, 2013
    Publication date: September 11, 2014
    Applicant: Microsoft Corporation
    Inventors: Hassen Karaa, Michael Healy, Brett D.A. Flegg, Gaurav Dhawan, Jeffrey Sutherland
  • Patent number: 8282328
    Abstract: The present invention includes various embodiments directed to apparatus and methods surrounding a fastener device. In particular embodiments, the fastener device is a quick charging and discharging device that includes a solenoid, a fastener striker, a flash capacitor, and a control circuit. Other novel features of the fastener device exist. In particular embodiments, the present invention also includes apparatus and methods related to deforming staples for securing conduit and the like, and staple insulation and insulated staples that may be discharged by the fastener device. The insulation may be provided in an ordinary staple strip for use in the fastener device. Each insulation form may include deformation voids to assist the adaptation of the insulation about a target object that is being secured by the insulated staple.
    Type: Grant
    Filed: July 28, 2009
    Date of Patent: October 9, 2012
    Assignee: Halex/Scott Fetzer Company
    Inventors: Michael J. Gardner, Glenn A. Baker, Mirko Champa, Jim Bias, Jeffrey Sutherland
  • Publication number: 20110099247
    Abstract: A method, system, and architecture for managing computer systems is provided. A management system employs management objects (MOs) to provide administrators the ability to intuitively express the administrative intent in an information technology (IT) environment, and to act out the administrative intent based on the information gathered by the management system. Managed elements of an IT environment, such as, by way of example, hardware components, software applications, software updates, software distribution policies, configurations, settings, etc., may be expressed as MOs. Actions, such as, by way of example, detect, install/apply, remove, remediate, enumerate, etc., may be associated with the MOs. The management system manages the computer systems by deploying the appropriate MOs and their associated actions onto the computer systems, and performing the actions on the computer systems.
    Type: Application
    Filed: January 5, 2011
    Publication date: April 28, 2011
    Applicant: Microsoft Corporation
    Inventors: Bruce W. Copeland, David C. James, Donald Y. Song, Dustin M. Ingalls, Jeffrey A. Sutherland, Jeffry B. Phillips, Joseph S. Calabig, Khuzaima Iqbal, Michael J. Healy, Rajagopalan Badri Narayanan, Zhengkai Kenneth Pan
  • Patent number: 7870564
    Abstract: A method, system, and architecture for managing computer systems is provided. A management system employs management objects (MOs) to provide administrators the ability to intuitively express the administrative intent in an information technology (IT) environment, and to act out the administrative intent based on the information gathered by the management system. Managed elements of an IT environment, such as, by way of example, hardware components, software applications, software updates, software distribution policies, configurations, settings, etc., may be expressed as MOs. Actions, such as, by way of example, detect, install/apply, remove, remediate, enumerate, etc., may be associated with the MOs. The management system manages the computer systems by deploying the appropriate MOs and their associated actions onto the computer systems, and performing the actions on the computer systems.
    Type: Grant
    Filed: February 16, 2006
    Date of Patent: January 11, 2011
    Assignee: Microsoft Corporation
    Inventors: Bruce W. Copeland, David C. James, Donald Y. Song, Dustin M. Ingalls, Jeffrey A. Sutherland, Jeffry B. Phillips, Joseph S. Calabig, Khuzaima Iqbal, Michael J. Healy, Rajagopalan Badri Narayanan, Zhengkai Kenneth Pan