Patents by Inventor Jamie Hunter
Jamie Hunter has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Publication number: 20210320791Abstract: Systems and methods for adaptive recursive descent data redundancy are described herein. In one embodiment, a method can include identifying the data object or file for Quantum Fragmentation, determining, via a first portion of a Quantum Fragmentation instance, a factor of fragmentation for the data object or file, transforming the data object or file into a plurality of first data fragments according to the factor of fragmentation by applying one or more cryptographic processing, integrity checking, and resilient fragmentation schemes, via the first portion of the Quantum Fragmentation instance, and persisting, via the first portion of the Quantum Fragmentation instance, each of the plurality of first data fragments to a data store of a plurality of available Cloud or other data stores or to a subsequent portion of the Quantum Fragmentation instance, wherein the persistence for each of the first data fragment occurs independently from the other first data fragments.Type: ApplicationFiled: April 10, 2020Publication date: October 14, 2021Inventors: David LANC, Sophie Lanc, Josh Fraser, Lachlan Mackinnon, Jamie Hunter, Iain Sotherland
-
Patent number: 10481929Abstract: A distributed execution environment can provide access to field-programmable device resources. The field-programmable device resources can be provided in association with one or more instances that are instantiated within the distributed execution environment upon request from a computing system. The computing system can be associated with a customer of the distributed execution environment. The customer can program the field-programmable device resources using designs created by or for the customer.Type: GrantFiled: September 18, 2017Date of Patent: November 19, 2019Assignee: Amazon Technologies, Inc.Inventors: Paul William Berg, Eden Grail Adogla, Marc John Brooker, John Clark Coonley Duksta, Robert James Hanson, Jamie Hunter
-
Patent number: 10078754Abstract: Techniques for providing cryptographic keys for encrypted system volumes on machine instances in virtualized and/or distributed systems are described herein. At a time after detecting the requirement for a cryptographic key by a virtual machine instance, one or more computer system entities within a computer system invoke one or more computer system capabilities at least to create one or more virtual hardware devices capable of representing or providing appropriate cryptographic keys. The virtual hardware devices are connected to the machine instance under the control of the computer system so that the encrypted system volumes may be used. After the cryptographic key is no longer needed, it is detached from the machine instance.Type: GrantFiled: September 24, 2013Date of Patent: September 18, 2018Assignee: Amazon Technologies, Inc.Inventors: Eric Jason Brandwine, Gregory Branchek Roth, Jamie Hunter
-
Patent number: 9766910Abstract: A distributed execution environment can provide access to field-programmable device resources. The field-programmable device resources can be provided in association with one or more instances that are instantiated within the distributed execution environment upon request from a computing system. The computing system can be associated with a customer of the distributed execution environment. The customer can program the field-programmable device resources using designs created by or for the customer.Type: GrantFiled: March 7, 2013Date of Patent: September 19, 2017Assignee: Amazon Technologies, Inc.Inventors: Paul William Berg, Eden Grail Adogla, Marc John Brooker, John Clark Coonley Duksta, Robert James Hanson, Jamie Hunter
-
Patent number: 9703793Abstract: Systems and methods aggregate data and use caching techniques. In one implementation, a computer-implemented method aggregates data. A server receives a request for data that includes one or more identifiers. Based on at least one of the one or more identifiers, at least one template defining a view of the data is retrieved. One or more modules are identified based on the at least one template and one or more services are invoked to obtain the one or more modules. The one or more modules are received and processing by applying one or more business logic rules. At least a portion of the one or more processed modules are stored in a data store. The view of the data is generated based on the processed one or more modules and a response is transmitted to a client that includes the view of the data.Type: GrantFiled: May 11, 2015Date of Patent: July 11, 2017Assignee: Amazon Technologies, Inc.Inventors: Gary Paul Raden, II, Antoun Kanawati, Jamie Hunter, Mukul Vijay Karnik, Roshith Rajagopal
-
Patent number: 9031995Abstract: Systems and methods aggregate data and use caching techniques. In one implementation, a computer-implemented method aggregates data. A server receives a request for data that includes one or more identifiers. Based on at least one of the one or more identifiers, at least one template defining a view of the data is retrieved. One or more modules are identified based on the at least one template and one or more services are invoked to obtain the one or more modules. The one or more modules are received and processing by applying one or more business logic rules. At least a portion of the one or more processed modules are stored in a data store. The view of the data is generated based on the processed one or more modules and a response is transmitted to a client that includes the view of the data.Type: GrantFiled: February 4, 2009Date of Patent: May 12, 2015Assignee: Amazon Technologies, Inc.Inventors: Gary Paul Raden, II, Antoun Kanawati, Jamie Hunter, Mukul Vijay Karnik, Roshith Rajagopal
-
Patent number: 8949535Abstract: Technology is described for performing cache data invalidations. The method may include identifying cache update information at a first cache. The cache update information may identify a cache entry (e.g., a trending cache entry). A second cache may be selected to receive the cache update information from the first cache. The cache update information identifying the cache entry may be sent from the first cache to the second cache. For example, the second cache may be populated by adding the trending cache entry into the second cache.Type: GrantFiled: February 4, 2013Date of Patent: February 3, 2015Assignee: Amazon Technologies, Inc.Inventor: Jamie Hunter
-
Patent number: 8046593Abstract: Access to a storage device, such as a disk, is controlled by performing a disk operation using a single cryptographic engine. Keys associated with each layer of a layered structure associated with controlling access to the storage device are combined. The resultant of this combination is used as the key to the cryptographic engine. Data to be retrieved from and written to the storage device are operated on by the cryptographic engine utilizing the combined key. Keys are combined by combining functions associated with layers of the layered structure. A combining function can include an exclusive or function, a cryptographic hash function, or a combination thereof.Type: GrantFiled: June 7, 2006Date of Patent: October 25, 2011Assignee: Microsoft CorporationInventors: Carl M. Ellison, Jamie Hunter, Kenneth D. Ray, Niels T. Ferguson, Philip J. Lafornara, Russell Humphries
-
Systems and methods for updating a secure boot process on a computer with a hardware security module
Patent number: 8028172Abstract: Systems and methods are provided for maintaining and updating a secure boot process on a computer with a trusted platform module (TPM). A boot process may be maintained by inspecting a log of TPM activity, determining data that prevented a secret to unseal, and returning the data to an original state. In situations where this type of recovery is not workable, techniques for authenticating a user may be used, allowing the authenticated user to bypass the security features of the boot process and reseal the boot secrets to platform configuration register (PCR) values that may have changed. Finally, a secure boot process may be upgraded by migrating TPM sealed secrets to a temporary storage location, updating one or more aspects of a secure boot process, and resealing the secrets to the resulting new platform configuration. Other advantages and features of the invention are described below.Type: GrantFiled: January 14, 2005Date of Patent: September 27, 2011Assignee: Microsoft CorporationInventors: Jamie Hunter, Paul England, Russell Humphries, Stefan Thom, James Anthony Schwartz, Jr., Kenneth D. Ray, Jonathan Schwartz -
Patent number: 7828025Abstract: Apparatus for limiting the amount of debris that is disbursed in and around a disc type wood chipper when the disc is being treated with high pressure air. The apparatus includes a casing that surrounds the chipper disc having a stationary section and a removable section that can be detached from the stationary section to provide access to about 90° of the disc. A shield is hinged to the stationary section of the disc that has a vertical wall and an arcuate cover that can be moved over the exposed section of the disc which contains and directs debris in the chippers exhaust system when removed by high pressure air that is directed at the front face of the disc.Type: GrantFiled: August 4, 2008Date of Patent: November 9, 2010Assignee: CEM Machine, Inc.Inventors: Daniel R. McBride, Jamie Hunter
-
Patent number: 7725703Abstract: In a computer with a trusted platform module (TPM), an expected hash value of a boot component may be placed into a platform configuration register (PCR), which allows a TPM to unseal a secret. The secret may then be used to decrypt the boot component. The hash of the decrypted boot component may then be calculated and the result can be placed in a PCR. The PCRs may then be compared. If they do not, access to the an important secret for system operation can be revoked. Also, a first secret may be accessible only when a first plurality of PCR values are extant, while a second secret is accessible only after one or more of the first plurality of PCR values has been replaced with a new value, thereby necessarily revoking further access to the first secret in order to grant access to the second secret.Type: GrantFiled: January 7, 2005Date of Patent: May 25, 2010Assignee: Microsoft CorporationInventors: Jamie Hunter, Paul England, Russell Humphries, Stefan Thom, James Anthony Schwartz, Jr., Kenneth D Ray, Jonathan Schwartz
-
Patent number: 7694121Abstract: A mechanism for protected operating system boot that prevents rogue components from being loaded with the operating system, and thus prevents divulgence of the system key under inappropriate circumstances. After a portion of the machine startup procedure has occurred, the operating system loader is run, the loader is validated, and a correct machine state is either verified to exist and/or created. Once the loader has been verified to be a legitimate loader, and the machine state under which it is running is verified to be correct, the loader's future behavior is known to protect against the loading of rogue components that could cause divulgence of the system key. With the loader's behavior being known to be safe for the system key, the validator may unseal the system key and provides it to the loader.Type: GrantFiled: June 30, 2004Date of Patent: April 6, 2010Assignee: Microsoft CorporationInventors: Bryan Mark Willman, Paul England, Kenneth D. Ray, Jamie Hunter, Lonnie Dean McMichael, Derek Norman LaSalle, Pierre Jacomet, Mark Eliot Paley, Thekkthalackal Varugis Kurien, David B. Cross
-
Publication number: 20100024922Abstract: Apparatus for limiting the amount of debris that is disbursed in and around a disc type wood chipper when the disc is being treated with high pressure air. The apparatus includes a casing that surrounds the chipper disc having a stationary section and a removable section that can be detached from the stationary section to provide access to about 90° of the disc. A shield is hinged to the stationary section of the disc that has a vertical wall and an arcuate cover that can be moved over the exposed section of the disc which contains and directs debris in the chippers exhaust system when removed by high pressure air that is directed at the front face of the disc.Type: ApplicationFiled: August 4, 2008Publication date: February 4, 2010Inventors: Daniel R. McBride, Jamie Hunter
-
Patent number: 7565553Abstract: Systems and methods for controlling access to data on a computer with a secure boot process can provide a highly efficient mechanism for preventing future access to encrypted digital resources. This may be advantageous in a range of scenarios, for example where a computer is sold and assurance is desired that no stray private data remains on the hard disk. Data resources, for example all data associated with one or more particular hard disk partitions, may be encrypted. The decryption key may be available through a secure boot process. By erasing, altering, or otherwise disabling a secret, such as a decryption key or a process that obtains a decryption key, the data formerly accessible using such secret becomes inaccessible.Type: GrantFiled: January 14, 2005Date of Patent: July 21, 2009Assignee: Microsoft CorporationInventors: Jamie Hunter, Paul England, Russell Humphries, Stefan Thom, James Anthony Schwartz, Jr., Kenneth D. Ray, Jonathan Schwartz
-
Patent number: 7506380Abstract: Systems and methods are provided for maintaining and updating a secure boot process on a computer with a trusted platform module (TPM). A boot process may be maintained by inspecting a log of TPM activity, determining data that prevented a secret to unseal, and returning the data to an original state. In situations where this type of recovery is not workable, techniques for authenticating a user may be used, allowing the authenticated user to bypass the security features of the boot process and reseal the boot secrets to platform configuration register (PCR) values that may have changed. Finally, a secure boot process may be upgraded by migrating TPM sealed secrets to a temporary storage location, updating one or more aspects of a secure boot process, and resealing the secrets to the resulting new platform configuration. Other advantages and features of the invention are described below.Type: GrantFiled: January 14, 2005Date of Patent: March 17, 2009Assignee: Microsoft CorporationInventors: Jamie Hunter, Paul England, Russell Humphries, Stefan Thom, James Anthony Schwartz, Jr., Kenneth D. Ray, Jonathan Schwartz
-
Publication number: 20080022132Abstract: Access to a storage device, such as a disk, is controlled by performing a disk operation using a single cryptographic engine. Keys associated with each layer of a layered structure associated with controlling access to the storage device are combined. The resultant of this combination is used as the key to the cryptographic engine. Data to be retrieved from and written to the storage device are operated on by the cryptographic engine utilizing the combined key. Keys are combined by combining functions associated with layers of the layered structure. A combining function can include an exclusive or function, a cryptographic hash function, or a combination thereof.Type: ApplicationFiled: June 7, 2006Publication date: January 24, 2008Applicant: Microsoft CorporationInventors: Carl M. Ellison, Jamie Hunter, Kenneth D. Ray, Niels T. Ferguson, Philip J. Lafornara, Russell Humphries
-
Patent number: 7216344Abstract: A method and system for avoiding the overwriting of drivers by subsequent versions or other commonly named drivers includes generating a unique identity for every eligible driver package. Driver files from the driver package, or the entire driver package itself, are then installed in a subdirectory location in a common storage based on the unique identity. The driver files may be loaded to a memory from the subdirectory location. Thus, multiple driver packages and driver files having the same name may be installed and loaded side-by-side.Type: GrantFiled: March 2, 2004Date of Patent: May 8, 2007Assignee: Microsoft CorporationInventors: Jason T. Cobb, James G. Cavalaris, Santosh Jodh, Jamie Hunter, Lonny D. McMichael
-
Publication number: 20060161769Abstract: Systems and methods are provided for maintaining and updating a secure boot process on a computer with a trusted platform module (TPM). A boot process may be maintained by inspecting a log of TPM activity, determining data that prevented a secret to unseal, and returning the data to an original state. In situations where this type of recovery is not workable, techniques for authenticating a user may be used, allowing the authenticated user to bypass the security features of the boot process and reseal the boot secrets to platform configuration register (PCR) values that may have changed. Finally, a secure boot process may be upgraded by migrating TPM sealed secrets to a temporary storage location, updating one or more aspects of a secure boot process, and resealing the secrets to the resulting new platform configuration. Other advantages and features of the invention are described below.Type: ApplicationFiled: January 14, 2005Publication date: July 20, 2006Applicant: Microsoft CorporationInventors: Jamie Hunter, Paul England, Russell Humphries, Stefan Thom, James Schwartz, Kenneth Ray, Jonathan Schwartz
-
Publication number: 20060161790Abstract: Systems and methods for controlling access to data on a computer with a secure boot process can provide a highly efficient mechanism for preventing future access to encrypted digital resources. This may be advantageous in a range of scenarios, for example where a computer is sold and assurance is desired that no stray private data remains on the hard disk. Data resources, for example all data associated with one or more particular hard disk partitions, may be encrypted. The decryption key may be available through a secure boot process. By erasing, altering, or otherwise disabling a secret, such as a decryption key or a process that obtains a decryption key, the data formerly accessible using such secret becomes inaccessible.Type: ApplicationFiled: January 14, 2005Publication date: July 20, 2006Applicant: Microsoft CorporationInventors: Jamie Hunter, Paul England, Russell Humphries, Stefan Thom, James Schwartz, Kenneth Ray, Jonathan Schwartz
-
Systems and methods for updating a secure boot process on a computer with a hardware security module
Publication number: 20060161784Abstract: Systems and methods are provided for maintaining and updating a secure boot process on a computer with a trusted platform module (TPM). A boot process may be maintained by inspecting a log of TPM activity, determining data that prevented a secret to unseal, and returning the data to an original state. In situations where this type of recovery is not workable, techniques for authenticating a user may be used, allowing the authenticated user to bypass the security features of the boot process and reseal the boot secrets to platform configuration register (PCR) values that may have changed. Finally, a secure boot process may be upgraded by migrating TPM sealed secrets to a temporary storage location, updating one or more aspects of a secure boot process, and resealing the secrets to the resulting new platform configuration. Other advantages and features of the invention are described below.Type: ApplicationFiled: January 14, 2005Publication date: July 20, 2006Applicant: Microsoft CorporationInventors: Jamie Hunter, Paul England, Russell Humphries, Stefan Thom, James Schwartz, Kenneth Ray, Jonathan Schwartz