Patents by Inventor Daniel B. Jump
Daniel B. Jump has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 10515208Abstract: Architecture that provides a secure environment in which data (e.g., code, instructions, files, images, etc.) can be opened and run by a client application. Once opened the data can be viewed (in a “protected view”) by the user without incurring risk to other client processing and systems. Accordingly, the architecture mitigates malicious attacks by enabling users to preview untrusted and potentially harmful data (e.g., files) in a low risk manner. Files opened in the protected view are isolated from accessing key resources on the client computer and provides the user a safer way to read files that can contain dangerous content. The protected view also provides a seamless user experience. The user is unaware that the client is operating on data in a different mode and allows for the reduction of security prompts.Type: GrantFiled: March 7, 2018Date of Patent: December 24, 2019Assignee: Microsoft Technology Licensing, LLCInventors: Vikas Malhotra, Benjamin E. Canning, Daniel B. Jump, David C. LeBlanc, Benjamen E. Ross, James Campbell, Brian Carver, Joshua Pollock
-
Publication number: 20180196940Abstract: Architecture that provides a secure environment in which data (e.g., code, instructions, files, images, etc.) can be opened and run by a client application. Once opened the data can be viewed (in a “protected view”) by the user without incurring risk to other client processing and systems. Accordingly, the architecture mitigates malicious attacks by enabling users to preview untrusted and potentially harmful data (e.g., files) in a low risk manner. Files opened in the protected view are isolated from accessing key resources on the client computer and provides the user a safer way to read files that can contain dangerous content. The protected view also provides a seamless user experience. The user is unaware that the client is operating on data in a different mode and allows for the reduction of security prompts.Type: ApplicationFiled: March 7, 2018Publication date: July 12, 2018Inventors: Vikas MALHOTRA, Benjamin E. CANNING, Daniel B. JUMP, David C. LeBLANC, Benjamen E. ROSS, James CAMPBELL, Brian CARVER, Joshua POLLOCK
-
Patent number: 9946871Abstract: Architecture that provides a secure environment in which data (e.g., code, instructions, files, images, etc.) can be opened and run by a client application. Once opened the data can be viewed (in a “protected view”) by the user without incurring risk to other client processing and systems. Accordingly, the architecture mitigates malicious attacks by enabling users to preview untrusted and potentially harmful data (e.g., files) in a low risk manner. Files opened in the protected view are isolated from accessing key resources on the client computer and provides the user a safer way to read files that can contain dangerous content. The protected view also provides a seamless user experience. The user is unaware that the client is operating on data in a different mode and allows for the reduction of security prompts.Type: GrantFiled: February 23, 2017Date of Patent: April 17, 2018Assignee: MICROSOFT TECHNOLOGY LICENSING, LLCInventors: Vikas Malhotra, Benjamin E. Canning, Daniel B. Jump, David C LeBlanc, Benjamen E. Ross, James Campbell, Brian Carver, Joshua Pollock
-
Publication number: 20170228536Abstract: Architecture that provides a secure environment in which data (e.g., code, instructions, files, images, etc.) can be opened and run by a client application. Once opened the data can be viewed (in a “protected view”) by the user without incurring risk to other client processing and systems. Accordingly, the architecture mitigates malicious attacks by enabling users to preview untrusted and potentially harmful data (e.g., files) in a low risk manner. Files opened in the protected view are isolated from accessing key resources on the client computer and provides the user a safer way to read files that can contain dangerous content. The protected view also provides a seamless user experience. The user is unaware that the client is operating on data in a different mode and allows for the reduction of security prompts.Type: ApplicationFiled: February 23, 2017Publication date: August 10, 2017Inventors: Vikas Malhotra, Benjamin E. Canning, Daniel B. Jump, David C LeBlanc, Benjamen E. Ross, James Campbell, Brian Carver, Joshua Pollock
-
Patent number: 9613228Abstract: Architecture that provides a secure environment in which data (e.g., code, instructions, files, images, etc.) can be opened and run by a client application. Once opened the data can be viewed (in a “protected view”) by the user without incurring risk to other client processing and systems. Accordingly, the architecture mitigates malicious attacks by enabling users to preview untrusted and potentially harmful data (e.g., files) in a low risk manner. Files opened in the protected view are isolated from accessing key resources on the client computer and provides the user a safer way to read files that can contain dangerous content. The protected view also provides a seamless user experience. The user is unaware that the client is operating on data in a different mode and allows for the reduction of security prompts.Type: GrantFiled: March 18, 2015Date of Patent: April 4, 2017Assignee: MICROSOFT TECHNOLOGY LICENSING, LLCInventors: Vikas Malhotra, Benjamin E. Canning, Daniel B. Jump, David C LeBlanc, Benjamen E. Ross, James Campbell, Brian Carver, Joshua Pollock
-
Patent number: 9298499Abstract: A candidate identifier for a process is generated and an attempt is made to have a named object created that has a name that is the candidate identifier. In response to the attempt succeeding and the named object being created, the candidate identifier is used as an identifier for the process. In response to the attempt not succeeding and the named object not being created, the generating and attempting are repeated.Type: GrantFiled: January 27, 2012Date of Patent: March 29, 2016Assignee: Microsoft Technology Licensing, LLCInventors: Daniel B. Jump, Brian T. Carver, David C. LeBlanc
-
Publication number: 20150347771Abstract: Architecture that provides a secure environment in which data (e.g., code, instructions, files, images, etc.) can be opened and run by a client application. Once opened the data can be viewed (in a “protected view”) by the user without incurring risk to other client processing and systems. Accordingly, the architecture mitigates malicious attacks by enabling users to preview untrusted and potentially harmful data (e.g., files) in a low risk manner. Files opened in the protected view are isolated from accessing key resources on the client computer and provides the user a safer way to read files that can contain dangerous content. The protected view also provides a seamless user experience. The user is unaware that the client is operating on data in a different mode and allows for the reduction of security prompts.Type: ApplicationFiled: March 18, 2015Publication date: December 3, 2015Inventors: Vikas Malhotra, Benjamin E. Canning, Daniel B. Jump, David C. LeBlanc, Benjamen E. Ross, James Campbell, Brian Carver, Joshua Pollock
-
Patent number: 9003517Abstract: Architecture that provides a secure environment in which data (e.g., code, instructions, files, images, etc.) can be opened and run by a client application. Once opened the data can be viewed (in a “protected view”) by the user without incurring risk to other client processing and systems. Accordingly, the architecture mitigates malicious attacks by enabling users to preview untrusted and potentially harmful data (e.g., files) in a low risk manner. Files opened in the protected view are isolated from accessing key resources on the client computer and provides the user a safer way to read files that can contain dangerous content. The protected view also provides a seamless user experience. The user is unaware that the client is operating on data in a different mode and allows for the reduction of security prompts.Type: GrantFiled: October 28, 2009Date of Patent: April 7, 2015Assignee: Microsoft Technology Licensing, LLCInventors: Vikas Malhotra, Benjamin E. Canning, Daniel B. Jump, David C. LeBlanc, Benjamen E. Ross, James Campbell, Brian Carver, Joshua Pollock
-
Publication number: 20130198831Abstract: A candidate identifier for a process is generated and an attempt is made to have a named object created that has a name that is the candidate identifier. In response to the attempt succeeding and the named object being created, the candidate identifier is used as an identifier for the process. In response to the attempt not succeeding and the named object not being created, the generating and attempting are repeated.Type: ApplicationFiled: January 27, 2012Publication date: August 1, 2013Applicant: MICROSOFT CORPORATIONInventors: Daniel B. Jump, Brian T. Carver, David C. LeBlanc
-
Publication number: 20110099609Abstract: Architecture that provides a secure environment in which data (e.g., code, instructions, files, images, etc.) can be opened and run by a client application. Once opened the data can be viewed (in a “protected view”) by the user without incurring risk to other client processing and systems. Accordingly, the architecture mitigates malicious attacks by enabling users to preview untrusted and potentially harmful data (e.g., files) in a low risk manner. Files opened in the protected view are isolated from accessing key resources on the client computer and provides the user a safer way to read files that can contain dangerous content. The protected view also provides a seamless user experience. The user is unaware that the client is operating on data in a different mode and allows for the reduction of security prompts.Type: ApplicationFiled: October 28, 2009Publication date: April 28, 2011Applicant: Microsoft CorporationInventors: Vikas Malhotra, Benjamin E. Canning, Daniel B. Jump, David C. LeBlanc, Benjamen E. Ross, James Campbell, Brian Carver, Joshua Pollock
-
Patent number: 7395269Abstract: Systems and methods for changing items of a computer file, such as an archive file, can include an application programmed to create a file including a first item and a second item, the application storing the file on a storage medium. Systems can also include an input/output module associated with the application, the input/output module retiring the first item upon a change to the first item resulting in an increase or a decrease in a size of the first item. Upon retiring the first item, the input/output module can write a third item at an end of the file, the third item including the change to the first item. Methods can include retiring the first item upon a change to the first item, and writing a third item after the second item, the third item including the change to the first item.Type: GrantFiled: December 20, 2004Date of Patent: July 1, 2008Assignee: Microsoft CorporationInventors: Li Hua, Daniel B. Jump, Isaac E. Nichols, Joshua M. Pollock, Ravishankar Shanmugam
-
Patent number: 7383278Abstract: Systems and methods for changing items of a computer file can include a storage medium, and an application programmed to create a file including a first item and a second item, the application storing the file on the storage medium, and the first item including padding. The system can also include an input/output module associated with the application, the input/output module being programmed to use at least a portion of the padding of the first item to accommodate a change in a size of the first item. A method can include providing a file including at least a first item and a second item, the first item including padding, changing the first item, and using at least a portion of the padding of the first item to accommodate a change in a size of the first item.Type: GrantFiled: December 20, 2004Date of Patent: June 3, 2008Assignee: Microsoft CorporationInventors: Li Hua, Daniel B. Jump, Isaac E. Nichols, David B. Ornstein, Joshua M. Pollock, Ravishankar Shanmugam