Patents by Inventor Jeffrey Sutherland
Jeffrey Sutherland has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Publication number: 20240115781Abstract: Systems and apparatuses for blood oxygenation are disclosed. A system includes a first layer defining a plurality of banks of first channels each extending in a first direction. The plurality of banks of first channels are configured to receive blood via a trunk channel. The system includes a second layer defining a bank of second channels extending in a second direction. The bank of second channels are configured to receive oxygen. The first direction is different from the second direction. The system includes a membrane disposed between the first layer and the second layer and configured to cause the oxygen to permeate from the second layer to the first layer to oxygenate the blood.Type: ApplicationFiled: October 3, 2023Publication date: April 11, 2024Applicant: The Charles Stark Draper Laboratory, Inc.Inventors: Brett Isenberg, Else Vedula, David Sutherland, Diana Lewis, Jose Santos, WeiXuan Lai, Ernie Kim, Beau Landis, Jeffrey Borenstein, Bryan Teece, Samuel Blumenstiel, Joseph Urban
-
Publication number: 20240048615Abstract: An application is installed on a computing device from an application package. An origin of the application (e.g., a managed installer for an enterprise, a reputation checking service) is propagated to files written to a storage device of the computing device as part of the installation, such as by writing origin information to the storage device as metadata associated with the file. The origin information for a file, in conjunction with a policy on the computing device specifying one or more trusted origins for applications on the computing device, is used to identify whether a particular action can be taken with and/or by the file. These actions can include, for example, execution of an application from an executable file. If the origin information for a file indicates an origin that is a trusted origin specified by the policy, then the action can be performed.Type: ApplicationFiled: July 5, 2023Publication date: February 8, 2024Applicant: Microsoft Technology Licensing, LLCInventors: Scott R. Shell, Kinshumann Kinshumann, Thomas W. Caldwell, Jeffrey A. Sutherland, Jeffrey R. McKune, Deskin M. Miller, Scott D. Anderson, Md. Nazmus Sakib
-
Patent number: 11722566Abstract: An application is installed on a computing device from an application package. An origin of the application (e.g., a managed installer for an enterprise, a reputation checking service) is propagated to files written to a storage device of the computing device as part of the installation, such as by writing origin information to the storage device as metadata associated with the file. The origin information for a file, in conjunction with a policy on the computing device specifying one or more trusted origins for applications on the computing device, is used to identify whether a particular action can be taken with and/or by the file. These actions can include, for example, execution of an application from an executable file. If the origin information for a file indicates an origin that is a trusted origin specified by the policy, then the action can be performed.Type: GrantFiled: July 19, 2021Date of Patent: August 8, 2023Assignee: Microsoft Technology Licensing, LLCInventors: Scott R. Shell, Kinshumann Kinshumann, Thomas W. Caldwell, Jeffrey A. Sutherland, Jeffrey R. McKune, Deskin M. Miller, Scott D. Anderson, Md. Nazmus Sakib
-
Patent number: 11263309Abstract: Integrity verification of a containerized application using a block device signature is described. For example, a container deployed to a host system is signed with a single block device signature. The operating system of the host system implements an integrity policy to verify the integrity of the container when the container is loaded into memory and when its program code executes. During such events, the operating system verifies whether the block device signature is valid. If the block device signature is determined to be valid, the operating system enables the program code to successfully execute. Otherwise, the program code is prevented from being executed. By doing so, certain program code or processes that are not properly signed are prevented from executing, thereby protecting the host system from such processes. Moreover, by using a single block device signature for a container, the enforcement of the integrity policy is greatly simplified.Type: GrantFiled: October 31, 2019Date of Patent: March 1, 2022Assignee: MICROSOFT TECHNOLOGY LICENSING, LLCInventors: Md Nazmus Sakib, Jeffrey A. Sutherland, Deven Robert Desai, Jaskaran Singh Khurana, Scott Randall Shell, Jessica M. Krynitsky
-
Publication number: 20220014587Abstract: An application is installed on a computing device from an application package. An origin of the application (e.g., a managed installer for an enterprise, a reputation checking service) is propagated to files written to a storage device of the computing device as part of the installation, such as by writing origin information to the storage device as metadata associated with the file. The origin information for a file, in conjunction with a policy on the computing device specifying one or more trusted origins for applications on the computing device, is used to identify whether a particular action can be taken with and/or by the file. These actions can include, for example, execution of an application from an executable file. If the origin information for a file indicates an origin that is a trusted origin specified by the policy, then the action can be performed.Type: ApplicationFiled: July 19, 2021Publication date: January 13, 2022Inventors: Scott R. Shell, Kinshumann Kinshumann, Thomas W. Caldwell, Jeffrey A. Sutherland, Jeffrey R. McKune, Deskin M. Miller, Scott D. Anderson, Md. Nazmus Sakib
-
Patent number: 11086985Abstract: Examples described herein generally relate to a computer device including a memory, and at least one processor configured to determine whether to allow execution of an application file on the computer device. The processor receives a command to execute a file. The processor determines whether the file is associated with a package reputation of an installation package. The processor determines a file reputation of the file. The processor determines whether to allow execution of the file based on a combination of the file reputation of the file and whether the file is associated with the good package reputation.Type: GrantFiled: December 4, 2017Date of Patent: August 10, 2021Assignee: Microsoft Technology Licensing, LLCInventors: Md. Nazmus Sakib, Thomas Walter Caldwell, III, Jeffrey Sutherland, Deskin Miller, Scott Anderson, Deepak Jagannathan Manohar, Adrian Marinescu
-
Patent number: 11082491Abstract: An application is installed on a computing device from an application package. An origin of the application (e.g., a managed installer for an enterprise, a reputation checking service) is propagated to files written to a storage device of the computing device as part of the installation, such as by writing origin information to the storage device as metadata associated with the file. The origin information for a file, in conjunction with a policy on the computing device specifying one or more trusted origins for applications on the computing device, is used to identify whether a particular action can be taken with and/or by the file. These actions can include, for example, execution of an application from an executable file. If the origin information for a file indicates an origin that is a trusted origin specified by the policy, then the action can be performed.Type: GrantFiled: October 7, 2016Date of Patent: August 3, 2021Assignee: Microsoft Technology Licensing, LLCInventors: Scott R. Shell, Kinshumann Kinshumann, Thomas W. Caldwell, Jeffrey A. Sutherland, Jeffrey R. McKune, Deskin M. Miller, Scott D. Anderson, Md. Nazmus Sakib
-
Publication number: 20210133313Abstract: Integrity verification of a containerized application using a block device signature is described. For example, a container deployed to a host system is signed with a single block device signature. The operating system of the host system implements an integrity policy to verify the integrity of the container when the container is loaded into memory and when its program code executes. During such events, the operating system verifies whether the block device signature is valid. If the block device signature is determined to be valid, the operating system enables the program code to successfully execute. Otherwise, the program code is prevented from being executed. By doing so, certain program code or processes that are not properly signed are prevented from executing, thereby protecting the host system from such processes. Moreover, by using a single block device signature for a container, the enforcement of the integrity policy is greatly simplified.Type: ApplicationFiled: October 31, 2019Publication date: May 6, 2021Inventors: Md Nazmus Sakib, Jeffrey A. Sutherland, Deven Robert Desai, Jaskaran Singh Khurana, Scott Randall Shell, Jessica M. Krynitsky
-
Publication number: 20190171809Abstract: Examples described herein generally relate to a computer device including a memory, and at least one processor configured to determine whether to allow execution of an application file on the computer device. The processor receives a command to execute a file. The processor determines whether the file is associated with a package reputation of an installation package. The processor determines a file reputation of the file. The processor determines whether to allow execution of the file based on a combination of the file reputation of the file and whether the file is associated with the good package reputation.Type: ApplicationFiled: December 4, 2017Publication date: June 6, 2019Inventors: Md. Nazmus SAKIB, Thomas Walter CALDWELL, III, Jeffrey SUTHERLAND, Deskin MILLER, Scott ANDERSON, Deepak Jagannathan MANOHAR, Adrian MARINESCU
-
Publication number: 20180103097Abstract: An application is installed on a computing device from an application package. An origin of the application (e.g., a managed installer for an enterprise, a reputation checking service) is propagated to files written to a storage device of the computing device as part of the installation, such as by writing origin information to the storage device as metadata associated with the file. The origin information for a file, in conjunction with a policy on the computing device specifying one or more trusted origins for applications on the computing device, is used to identify whether a particular action can be taken with and/or by the file. These actions can include, for example, execution of an application from an executable file. If the origin information for a file indicates an origin that is a trusted origin specified by the policy, then the action can be performed.Type: ApplicationFiled: October 7, 2016Publication date: April 12, 2018Applicant: Microsoft Technology Licensing, LLCInventors: Scott R. Shell, Kinshumann Kinshumann, Thomas W. Caldwell, Jeffrey A. Sutherland, Jeffrey R. McKune, Deskin M. Miller, Scott D. Anderson, Md. Nazmus Sakib
-
Patent number: 9805189Abstract: Registering a computer system for use in an enterprise. A method includes receiving, from a device management infrastructure of the enterprise, an executable system management component (SMC), and installing the SMC at a storage device. The method also includes executing the SMC, causing the computer system to register with the device management infrastructure, including applying a device settings policy to a configuration of the computer system. Executing the SMC also causes the computer system to configure itself to periodically execute a maintenance task received from the device management infrastructure.Type: GrantFiled: January 25, 2016Date of Patent: October 31, 2017Assignee: Microsoft Technology Licensing, LLCInventors: Hassen Karaa, Michael Healy, Brett D. A. Flegg, Gaurav Dhawan, Jeffrey Sutherland
-
Publication number: 20160300055Abstract: Registering a computer system for use in an enterprise. A method includes receiving, from a device management infrastructure of the enterprise, an executable system management component (SMC), and installing the SMC at a storage device. The method also includes executing the SMC, causing the computer system to register with the device management infrastructure, including applying a device settings policy to a configuration of the computer system. Executing the SMC also causes the computer system to configure itself to periodically execute a maintenance task received from the device management infrastructure.Type: ApplicationFiled: January 25, 2016Publication date: October 13, 2016Inventors: Hassen Karaa, Michael Healy, Brett D.A. Flegg, Gaurav Dhawan, Jeffrey Sutherland
-
Patent number: 9361083Abstract: Installing apps on a device. The device is generally configured to be used in a closed market environment that only allows generally available apps of the closed market to be installed. The method includes determining that the device has been authorized to install apps outside of a set of apps generally available from the closed market and from a set of apps available only to users of a particular enterprise. The method further includes determining that an app, that is not generally available from the closed market, has been verified by a central authority. The method further includes installing the app on the device in spite of the fact that the device is generally configured to be used in a closed market environment.Type: GrantFiled: March 6, 2013Date of Patent: June 7, 2016Assignee: Microsoft Technology Licensing, LLCInventors: Hassen Karaa, Michael Healy, Brett D. A. Flegg, Gaurav Dhawan, Jeffrey Sutherland
-
Patent number: 9245128Abstract: Installing apps and setting configuration on a device. A method includes receiving user input. The user input indicates a level of control that a user is willing to give an enterprise over the device. The method further includes determining, based on the level of control indicated by the user input, a set of apps allowed to install on the device. The set of apps allowed to install on the device is limited by the level of control indicated by the user. The method further includes authorizing installation of the set of apps on the device while restricting installation of other apps that would be authorized had the user selected a different level of control that the user is willing to give the enterprise over the device.Type: GrantFiled: March 6, 2013Date of Patent: January 26, 2016Assignee: Microsoft Technology Licensing, LLCInventors: Hassen Karaa, Michael Healy, Brett D. A. Flegg, Gaurav Dhawan, Jeffrey Sutherland
-
Patent number: 9143360Abstract: A method, system, and architecture for managing computer systems is provided. A management system employs management objects (MOs) to provide administrators the ability to intuitively express the administrative intent in an information technology (IT) environment, and to act out the administrative intent based on the information gathered by the management system. Managed elements of an IT environment, such as, by way of example, hardware components, software applications, software updates, software distribution policies, configurations, settings, etc., may be expressed as MOs. Actions, such as, by way of example, detect, install/apply, remove, remediate, enumerate, etc., may be associated with the MOs. The management system manages the computer systems by deploying the appropriate MOs and their associated actions onto the computer systems, and performing the actions on the computer systems.Type: GrantFiled: January 5, 2011Date of Patent: September 22, 2015Assignee: Microsoft Technology Licensing, LLCInventors: Bruce W. Copeland, David C. James, Donald Y. Song, Dustin M. Ingalls, Jeffrey A. Sutherland, Jeffry B. Phillips, Joseph S. Calabig, Khuzaima Iqbal, Michael J. Healy, Rajagopalan Badri Narayanan, Zhengkai Kenneth Pan
-
Publication number: 20140259007Abstract: Installing apps on a device. The device is generally configured to be used in a closed market environment that only allows generally available apps of the closed market to be installed. The method includes determining that the device has been authorized to install apps outside of a set of apps generally available from the closed market and from a set of apps available only to users of a particular enterprise. The method further includes determining that an app, that is not generally available from the closed market, has been verified by a central authority. The method further includes installing the app on the device in spite of the fact that the device is generally configured to be used in a closed market environment.Type: ApplicationFiled: March 6, 2013Publication date: September 11, 2014Applicant: Microsoft CorporationInventors: Hassen Karaa, Michael Healy, Brett D. A. Flegg, Gaurav Dhawan, Jeffrey Sutherland
-
Publication number: 20140259178Abstract: Installing apps and setting configuration on a device. A method includes receiving user input. The user input indicates a level of control that a user is willing to give an enterprise over the device. The method further includes determining, based on the level of control indicated by the user input, a set of apps allowed to install on the device. The set of apps allowed to install on the device is limited by the level of control indicated by the user. The method further includes authorizing installation of the set of apps on the device while restricting installation of other apps that would be authorized had the user selected a different level of control that the user is willing to give the enterprise over the device.Type: ApplicationFiled: March 6, 2013Publication date: September 11, 2014Applicant: Microsoft CorporationInventors: Hassen Karaa, Michael Healy, Brett D.A. Flegg, Gaurav Dhawan, Jeffrey Sutherland
-
Patent number: 8282328Abstract: The present invention includes various embodiments directed to apparatus and methods surrounding a fastener device. In particular embodiments, the fastener device is a quick charging and discharging device that includes a solenoid, a fastener striker, a flash capacitor, and a control circuit. Other novel features of the fastener device exist. In particular embodiments, the present invention also includes apparatus and methods related to deforming staples for securing conduit and the like, and staple insulation and insulated staples that may be discharged by the fastener device. The insulation may be provided in an ordinary staple strip for use in the fastener device. Each insulation form may include deformation voids to assist the adaptation of the insulation about a target object that is being secured by the insulated staple.Type: GrantFiled: July 28, 2009Date of Patent: October 9, 2012Assignee: Halex/Scott Fetzer CompanyInventors: Michael J. Gardner, Glenn A. Baker, Mirko Champa, Jim Bias, Jeffrey Sutherland
-
Publication number: 20110099247Abstract: A method, system, and architecture for managing computer systems is provided. A management system employs management objects (MOs) to provide administrators the ability to intuitively express the administrative intent in an information technology (IT) environment, and to act out the administrative intent based on the information gathered by the management system. Managed elements of an IT environment, such as, by way of example, hardware components, software applications, software updates, software distribution policies, configurations, settings, etc., may be expressed as MOs. Actions, such as, by way of example, detect, install/apply, remove, remediate, enumerate, etc., may be associated with the MOs. The management system manages the computer systems by deploying the appropriate MOs and their associated actions onto the computer systems, and performing the actions on the computer systems.Type: ApplicationFiled: January 5, 2011Publication date: April 28, 2011Applicant: Microsoft CorporationInventors: Bruce W. Copeland, David C. James, Donald Y. Song, Dustin M. Ingalls, Jeffrey A. Sutherland, Jeffry B. Phillips, Joseph S. Calabig, Khuzaima Iqbal, Michael J. Healy, Rajagopalan Badri Narayanan, Zhengkai Kenneth Pan
-
Patent number: 7870564Abstract: A method, system, and architecture for managing computer systems is provided. A management system employs management objects (MOs) to provide administrators the ability to intuitively express the administrative intent in an information technology (IT) environment, and to act out the administrative intent based on the information gathered by the management system. Managed elements of an IT environment, such as, by way of example, hardware components, software applications, software updates, software distribution policies, configurations, settings, etc., may be expressed as MOs. Actions, such as, by way of example, detect, install/apply, remove, remediate, enumerate, etc., may be associated with the MOs. The management system manages the computer systems by deploying the appropriate MOs and their associated actions onto the computer systems, and performing the actions on the computer systems.Type: GrantFiled: February 16, 2006Date of Patent: January 11, 2011Assignee: Microsoft CorporationInventors: Bruce W. Copeland, David C. James, Donald Y. Song, Dustin M. Ingalls, Jeffrey A. Sutherland, Jeffry B. Phillips, Joseph S. Calabig, Khuzaima Iqbal, Michael J. Healy, Rajagopalan Badri Narayanan, Zhengkai Kenneth Pan