Patents by Inventor Damon Luke BARRY
Damon Luke BARRY has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 11354175Abstract: The disclosed technology is generally directed to IoT technology. In one example of the technology, the following actions are performed for each module of a plurality of modules on a first edge device. An identification message that includes information associated with identification of the module is received. The validity of the module is then verified. After the module is verified, based at least in part on the identification message, an IoT support service is selected from a plurality of IoT support services. The module is then caused to be registered with the selected IoT support service. The plurality of modules are compositable together into an application for the first edge device. The modules of the plurality of modules are capable of being used interoperably with other modules without altering the other modules.Type: GrantFiled: August 27, 2020Date of Patent: June 7, 2022Assignee: Microsoft Technology Licensing, LLCInventors: Elio Damaggio, Chipalo Street, Eustace Ngwa Asanghanwa, Angelo Roncalli de Novaes Pires Ribeiro, Damon Luke Barry, Arjmand Samuel, Michael R. Yagley
-
Patent number: 11182224Abstract: The disclosed technology is generally directed to communications in an IoT environment. In one example of the technology, a virtual IoT device is maintained and controlled to act as a representation of a connected device. Communications are received from an IoT support service. The received communications from the IoT support service are acted in response to, including sending communications to the IoT support service in response to the received communications, and changing the virtual IoT device as if the virtual IoT device were the connected device. The connected device is communicated with based on changes in the virtual IoT device.Type: GrantFiled: October 13, 2017Date of Patent: November 23, 2021Assignee: Microsoft Technology Licensing, LLCInventors: Samuel John George, Cameron William Skinner, Chipalo Street, Elio Damaggio, Juan Perez, Olivier Bloch, Damon Luke Barry, Michael R. Yagley
-
Patent number: 11050781Abstract: Example of secure monitoring of modular applications and associated edge devices are described herein. In an example, an accreditation request is initiated to accredit at least one of a modular application and an edge device hosting the modular application. The edge device may a device coupling an IoT device to a cloud server. Based on initiating, accreditation information corresponding to at least one of the modular application and the edge device may be received. The accreditation information are generated by a hardware encryption device associated with the edge device. Further, an accreditation status of the modular application may be monitored during execution of the modular application to ascertain whether the modular application and the edge device have been tampered. In case tampering is detected, a remedial action to address the tampering may be performed.Type: GrantFiled: February 23, 2018Date of Patent: June 29, 2021Assignee: MICROSOFT TECHNOLOGY LICENSING, LLCInventors: Arjmand M. Samuel, Chipalo N. Street, Damon Luke Barry, Eustace Asanghanwa, James W. Osborne
-
Patent number: 10970138Abstract: The disclosed technology is generally directed to IoT technology. In one example of the technology, the following actions are performed for each module of a plurality of modules on a first edge device. An identification message that includes information associated with identification of the module is received. The validity of the module is then verified. After the module is verified, based at least in part on the identification message, an IoT support service is selected from a plurality of IoT support services. The module is then caused to be registered with the selected IoT support service. The plurality of modules are compositable together into an application for the first edge device. The modules of the plurality of modules are capable of being used interoperably with other modules without altering the other modules.Type: GrantFiled: June 30, 2017Date of Patent: April 6, 2021Assignee: Microsoft Technology Licensing, LLCInventors: Elio Damaggio, Chipalo Street, Eustace Ngwa Asanghanwa, Angelo Roncalli de Novaes Pires Ribeiro, Damon Luke Barry, Arjmand Samuel, Michael R. Yagley
-
Publication number: 20200394087Abstract: The disclosed technology is generally directed to IoT technology. In one example of the technology, the following actions are performed for each module of a plurality of modules on a first edge device. An identification message that includes information associated with identification of the module is received. The validity of the module is then verified. After the module is verified, based at least in part on the identification message, an IoT support service is selected from a plurality of IoT support services. The module is then caused to be registered with the selected IoT support service. The plurality of modules are compositable together into an application for the first edge device. The modules of the plurality of modules are capable of being used interoperably with other modules without altering the other modules.Type: ApplicationFiled: August 27, 2020Publication date: December 17, 2020Inventors: Elio DAMAGGIO, Chipalo STREET, Eustace Ngwa ASANGHANWA, Angelo Roncalli de Novaes Pires RIBEIRO, Damon Luke BARRY, Arjmand SAMUEL, Michael R. YAGLEY
-
Publication number: 20190109874Abstract: Example of secure monitoring of modular applications and associated edge devices are described herein. In an example, an accreditation request is initiated to accredit at least one of a modular application and an edge device hosting the modular application. The edge device may a device coupling an IoT device to a cloud server. Based on initiating, accreditation information corresponding to at least one of the modular application and the edge device may be received. The accreditation information are generated by a hardware encryption device associated with the edge device. Further, an accreditation status of the modular application may be monitored during execution of the modular application to ascertain whether the modular application and the edge device have been tampered. In case tampering is detected, a remedial action to address the tampering may be performed.Type: ApplicationFiled: February 23, 2018Publication date: April 11, 2019Applicant: Microsoft Technology Licensing, LLCInventors: Arjmand M. SAMUEL, Chipalo N. STREET, Damon Luke BARRY, Eustace ASANGHANWA, James W. OSBORNE
-
Publication number: 20190109877Abstract: Example of secure metering of modular applications and associated edge devices are described herein. In an example, a request to secure one or more modular applications associated with one or more edge device may be received. The edge device may be a device authorized to couple an IoT device to a cloud server. A modular application may be a discrete application performing device specific functions or a part of a distributed application, the part being hosted on the IoT device. Further, the request may include a security policy. One or more secure enclaves for executing the modular applications may be generated, based on the security policy. Further, resource utilization in the secure enclaves may be determined based on a predefined unit of consumption using a distributed ledger. Based on the resource utilization, a resource utilization receipt indicative of financial units corresponding to the resource utilization may be generated.Type: ApplicationFiled: February 23, 2018Publication date: April 11, 2019Applicant: Microsoft Technology Licensing, LLCInventors: Arjmand M. Samuel, Chipalo N. Street, Damon Luke Barry, Eustace Asanghanwa, James W. Osborne
-
Publication number: 20180331906Abstract: The disclosed technology is generally directed to communications in an IoT environment. In one example of the technology, a virtual IoT device is maintained and controlled to act as a representation of a connected device. Communications are received from an IoT support service. The received communications from the IoT support service are acted in response to, including sending communications to the IoT support service in response to the received communications, and changing the virtual IoT device as if the virtual IoT device were the connected device. The connected device is communicated with based on changes in the virtual IoT device.Type: ApplicationFiled: October 13, 2017Publication date: November 15, 2018Inventors: Samuel John GEORGE, Cameron William SKINNER, Chipalo STREET, Elio DAMAGGIO, Juan PEREZ, Olivier BLOCH, Damon Luke BARRY, Michael R. YAGLEY
-
Publication number: 20180331916Abstract: The disclosed technology is generally directed to IoT technology. In one example of the technology, the following actions are performed for each module of a plurality of modules on a first edge device. An identification message that includes information associated with identification of the module is received. The validity of the module is then verified. After the module is verified, based at least in part on the identification message, an IoT support service is selected from a plurality of IoT support services. The module is then caused to be registered with the selected IoT support service. The plurality of modules are compositable together into an application for the first edge device. The modules of the plurality of modules are capable of being used interoperably with other modules without altering the other modules.Type: ApplicationFiled: June 30, 2017Publication date: November 15, 2018Inventors: Elio DAMAGGIO, Chipalo STREET, Eustace Ngwa ASANGHANWA, Angelo Roncalli de Novaes Pires RIBEIRO, Damon Luke BARRY, Arjmand SAMUEL, Michael R. YAGLEY