Patents by Inventor Jamie Hunter

Jamie Hunter has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20210320791
    Abstract: Systems and methods for adaptive recursive descent data redundancy are described herein. In one embodiment, a method can include identifying the data object or file for Quantum Fragmentation, determining, via a first portion of a Quantum Fragmentation instance, a factor of fragmentation for the data object or file, transforming the data object or file into a plurality of first data fragments according to the factor of fragmentation by applying one or more cryptographic processing, integrity checking, and resilient fragmentation schemes, via the first portion of the Quantum Fragmentation instance, and persisting, via the first portion of the Quantum Fragmentation instance, each of the plurality of first data fragments to a data store of a plurality of available Cloud or other data stores or to a subsequent portion of the Quantum Fragmentation instance, wherein the persistence for each of the first data fragment occurs independently from the other first data fragments.
    Type: Application
    Filed: April 10, 2020
    Publication date: October 14, 2021
    Inventors: David LANC, Sophie Lanc, Josh Fraser, Lachlan Mackinnon, Jamie Hunter, Iain Sotherland
  • Patent number: 10481929
    Abstract: A distributed execution environment can provide access to field-programmable device resources. The field-programmable device resources can be provided in association with one or more instances that are instantiated within the distributed execution environment upon request from a computing system. The computing system can be associated with a customer of the distributed execution environment. The customer can program the field-programmable device resources using designs created by or for the customer.
    Type: Grant
    Filed: September 18, 2017
    Date of Patent: November 19, 2019
    Assignee: Amazon Technologies, Inc.
    Inventors: Paul William Berg, Eden Grail Adogla, Marc John Brooker, John Clark Coonley Duksta, Robert James Hanson, Jamie Hunter
  • Patent number: 10078754
    Abstract: Techniques for providing cryptographic keys for encrypted system volumes on machine instances in virtualized and/or distributed systems are described herein. At a time after detecting the requirement for a cryptographic key by a virtual machine instance, one or more computer system entities within a computer system invoke one or more computer system capabilities at least to create one or more virtual hardware devices capable of representing or providing appropriate cryptographic keys. The virtual hardware devices are connected to the machine instance under the control of the computer system so that the encrypted system volumes may be used. After the cryptographic key is no longer needed, it is detached from the machine instance.
    Type: Grant
    Filed: September 24, 2013
    Date of Patent: September 18, 2018
    Assignee: Amazon Technologies, Inc.
    Inventors: Eric Jason Brandwine, Gregory Branchek Roth, Jamie Hunter
  • Patent number: 9766910
    Abstract: A distributed execution environment can provide access to field-programmable device resources. The field-programmable device resources can be provided in association with one or more instances that are instantiated within the distributed execution environment upon request from a computing system. The computing system can be associated with a customer of the distributed execution environment. The customer can program the field-programmable device resources using designs created by or for the customer.
    Type: Grant
    Filed: March 7, 2013
    Date of Patent: September 19, 2017
    Assignee: Amazon Technologies, Inc.
    Inventors: Paul William Berg, Eden Grail Adogla, Marc John Brooker, John Clark Coonley Duksta, Robert James Hanson, Jamie Hunter
  • Patent number: 9703793
    Abstract: Systems and methods aggregate data and use caching techniques. In one implementation, a computer-implemented method aggregates data. A server receives a request for data that includes one or more identifiers. Based on at least one of the one or more identifiers, at least one template defining a view of the data is retrieved. One or more modules are identified based on the at least one template and one or more services are invoked to obtain the one or more modules. The one or more modules are received and processing by applying one or more business logic rules. At least a portion of the one or more processed modules are stored in a data store. The view of the data is generated based on the processed one or more modules and a response is transmitted to a client that includes the view of the data.
    Type: Grant
    Filed: May 11, 2015
    Date of Patent: July 11, 2017
    Assignee: Amazon Technologies, Inc.
    Inventors: Gary Paul Raden, II, Antoun Kanawati, Jamie Hunter, Mukul Vijay Karnik, Roshith Rajagopal
  • Patent number: 9031995
    Abstract: Systems and methods aggregate data and use caching techniques. In one implementation, a computer-implemented method aggregates data. A server receives a request for data that includes one or more identifiers. Based on at least one of the one or more identifiers, at least one template defining a view of the data is retrieved. One or more modules are identified based on the at least one template and one or more services are invoked to obtain the one or more modules. The one or more modules are received and processing by applying one or more business logic rules. At least a portion of the one or more processed modules are stored in a data store. The view of the data is generated based on the processed one or more modules and a response is transmitted to a client that includes the view of the data.
    Type: Grant
    Filed: February 4, 2009
    Date of Patent: May 12, 2015
    Assignee: Amazon Technologies, Inc.
    Inventors: Gary Paul Raden, II, Antoun Kanawati, Jamie Hunter, Mukul Vijay Karnik, Roshith Rajagopal
  • Patent number: 8949535
    Abstract: Technology is described for performing cache data invalidations. The method may include identifying cache update information at a first cache. The cache update information may identify a cache entry (e.g., a trending cache entry). A second cache may be selected to receive the cache update information from the first cache. The cache update information identifying the cache entry may be sent from the first cache to the second cache. For example, the second cache may be populated by adding the trending cache entry into the second cache.
    Type: Grant
    Filed: February 4, 2013
    Date of Patent: February 3, 2015
    Assignee: Amazon Technologies, Inc.
    Inventor: Jamie Hunter
  • Patent number: 8046593
    Abstract: Access to a storage device, such as a disk, is controlled by performing a disk operation using a single cryptographic engine. Keys associated with each layer of a layered structure associated with controlling access to the storage device are combined. The resultant of this combination is used as the key to the cryptographic engine. Data to be retrieved from and written to the storage device are operated on by the cryptographic engine utilizing the combined key. Keys are combined by combining functions associated with layers of the layered structure. A combining function can include an exclusive or function, a cryptographic hash function, or a combination thereof.
    Type: Grant
    Filed: June 7, 2006
    Date of Patent: October 25, 2011
    Assignee: Microsoft Corporation
    Inventors: Carl M. Ellison, Jamie Hunter, Kenneth D. Ray, Niels T. Ferguson, Philip J. Lafornara, Russell Humphries
  • Patent number: 8028172
    Abstract: Systems and methods are provided for maintaining and updating a secure boot process on a computer with a trusted platform module (TPM). A boot process may be maintained by inspecting a log of TPM activity, determining data that prevented a secret to unseal, and returning the data to an original state. In situations where this type of recovery is not workable, techniques for authenticating a user may be used, allowing the authenticated user to bypass the security features of the boot process and reseal the boot secrets to platform configuration register (PCR) values that may have changed. Finally, a secure boot process may be upgraded by migrating TPM sealed secrets to a temporary storage location, updating one or more aspects of a secure boot process, and resealing the secrets to the resulting new platform configuration. Other advantages and features of the invention are described below.
    Type: Grant
    Filed: January 14, 2005
    Date of Patent: September 27, 2011
    Assignee: Microsoft Corporation
    Inventors: Jamie Hunter, Paul England, Russell Humphries, Stefan Thom, James Anthony Schwartz, Jr., Kenneth D. Ray, Jonathan Schwartz
  • Patent number: 7828025
    Abstract: Apparatus for limiting the amount of debris that is disbursed in and around a disc type wood chipper when the disc is being treated with high pressure air. The apparatus includes a casing that surrounds the chipper disc having a stationary section and a removable section that can be detached from the stationary section to provide access to about 90° of the disc. A shield is hinged to the stationary section of the disc that has a vertical wall and an arcuate cover that can be moved over the exposed section of the disc which contains and directs debris in the chippers exhaust system when removed by high pressure air that is directed at the front face of the disc.
    Type: Grant
    Filed: August 4, 2008
    Date of Patent: November 9, 2010
    Assignee: CEM Machine, Inc.
    Inventors: Daniel R. McBride, Jamie Hunter
  • Patent number: 7725703
    Abstract: In a computer with a trusted platform module (TPM), an expected hash value of a boot component may be placed into a platform configuration register (PCR), which allows a TPM to unseal a secret. The secret may then be used to decrypt the boot component. The hash of the decrypted boot component may then be calculated and the result can be placed in a PCR. The PCRs may then be compared. If they do not, access to the an important secret for system operation can be revoked. Also, a first secret may be accessible only when a first plurality of PCR values are extant, while a second secret is accessible only after one or more of the first plurality of PCR values has been replaced with a new value, thereby necessarily revoking further access to the first secret in order to grant access to the second secret.
    Type: Grant
    Filed: January 7, 2005
    Date of Patent: May 25, 2010
    Assignee: Microsoft Corporation
    Inventors: Jamie Hunter, Paul England, Russell Humphries, Stefan Thom, James Anthony Schwartz, Jr., Kenneth D Ray, Jonathan Schwartz
  • Patent number: 7694121
    Abstract: A mechanism for protected operating system boot that prevents rogue components from being loaded with the operating system, and thus prevents divulgence of the system key under inappropriate circumstances. After a portion of the machine startup procedure has occurred, the operating system loader is run, the loader is validated, and a correct machine state is either verified to exist and/or created. Once the loader has been verified to be a legitimate loader, and the machine state under which it is running is verified to be correct, the loader's future behavior is known to protect against the loading of rogue components that could cause divulgence of the system key. With the loader's behavior being known to be safe for the system key, the validator may unseal the system key and provides it to the loader.
    Type: Grant
    Filed: June 30, 2004
    Date of Patent: April 6, 2010
    Assignee: Microsoft Corporation
    Inventors: Bryan Mark Willman, Paul England, Kenneth D. Ray, Jamie Hunter, Lonnie Dean McMichael, Derek Norman LaSalle, Pierre Jacomet, Mark Eliot Paley, Thekkthalackal Varugis Kurien, David B. Cross
  • Publication number: 20100024922
    Abstract: Apparatus for limiting the amount of debris that is disbursed in and around a disc type wood chipper when the disc is being treated with high pressure air. The apparatus includes a casing that surrounds the chipper disc having a stationary section and a removable section that can be detached from the stationary section to provide access to about 90° of the disc. A shield is hinged to the stationary section of the disc that has a vertical wall and an arcuate cover that can be moved over the exposed section of the disc which contains and directs debris in the chippers exhaust system when removed by high pressure air that is directed at the front face of the disc.
    Type: Application
    Filed: August 4, 2008
    Publication date: February 4, 2010
    Inventors: Daniel R. McBride, Jamie Hunter
  • Patent number: 7565553
    Abstract: Systems and methods for controlling access to data on a computer with a secure boot process can provide a highly efficient mechanism for preventing future access to encrypted digital resources. This may be advantageous in a range of scenarios, for example where a computer is sold and assurance is desired that no stray private data remains on the hard disk. Data resources, for example all data associated with one or more particular hard disk partitions, may be encrypted. The decryption key may be available through a secure boot process. By erasing, altering, or otherwise disabling a secret, such as a decryption key or a process that obtains a decryption key, the data formerly accessible using such secret becomes inaccessible.
    Type: Grant
    Filed: January 14, 2005
    Date of Patent: July 21, 2009
    Assignee: Microsoft Corporation
    Inventors: Jamie Hunter, Paul England, Russell Humphries, Stefan Thom, James Anthony Schwartz, Jr., Kenneth D. Ray, Jonathan Schwartz
  • Patent number: 7506380
    Abstract: Systems and methods are provided for maintaining and updating a secure boot process on a computer with a trusted platform module (TPM). A boot process may be maintained by inspecting a log of TPM activity, determining data that prevented a secret to unseal, and returning the data to an original state. In situations where this type of recovery is not workable, techniques for authenticating a user may be used, allowing the authenticated user to bypass the security features of the boot process and reseal the boot secrets to platform configuration register (PCR) values that may have changed. Finally, a secure boot process may be upgraded by migrating TPM sealed secrets to a temporary storage location, updating one or more aspects of a secure boot process, and resealing the secrets to the resulting new platform configuration. Other advantages and features of the invention are described below.
    Type: Grant
    Filed: January 14, 2005
    Date of Patent: March 17, 2009
    Assignee: Microsoft Corporation
    Inventors: Jamie Hunter, Paul England, Russell Humphries, Stefan Thom, James Anthony Schwartz, Jr., Kenneth D. Ray, Jonathan Schwartz
  • Publication number: 20080022132
    Abstract: Access to a storage device, such as a disk, is controlled by performing a disk operation using a single cryptographic engine. Keys associated with each layer of a layered structure associated with controlling access to the storage device are combined. The resultant of this combination is used as the key to the cryptographic engine. Data to be retrieved from and written to the storage device are operated on by the cryptographic engine utilizing the combined key. Keys are combined by combining functions associated with layers of the layered structure. A combining function can include an exclusive or function, a cryptographic hash function, or a combination thereof.
    Type: Application
    Filed: June 7, 2006
    Publication date: January 24, 2008
    Applicant: Microsoft Corporation
    Inventors: Carl M. Ellison, Jamie Hunter, Kenneth D. Ray, Niels T. Ferguson, Philip J. Lafornara, Russell Humphries
  • Patent number: 7216344
    Abstract: A method and system for avoiding the overwriting of drivers by subsequent versions or other commonly named drivers includes generating a unique identity for every eligible driver package. Driver files from the driver package, or the entire driver package itself, are then installed in a subdirectory location in a common storage based on the unique identity. The driver files may be loaded to a memory from the subdirectory location. Thus, multiple driver packages and driver files having the same name may be installed and loaded side-by-side.
    Type: Grant
    Filed: March 2, 2004
    Date of Patent: May 8, 2007
    Assignee: Microsoft Corporation
    Inventors: Jason T. Cobb, James G. Cavalaris, Santosh Jodh, Jamie Hunter, Lonny D. McMichael
  • Publication number: 20060161769
    Abstract: Systems and methods are provided for maintaining and updating a secure boot process on a computer with a trusted platform module (TPM). A boot process may be maintained by inspecting a log of TPM activity, determining data that prevented a secret to unseal, and returning the data to an original state. In situations where this type of recovery is not workable, techniques for authenticating a user may be used, allowing the authenticated user to bypass the security features of the boot process and reseal the boot secrets to platform configuration register (PCR) values that may have changed. Finally, a secure boot process may be upgraded by migrating TPM sealed secrets to a temporary storage location, updating one or more aspects of a secure boot process, and resealing the secrets to the resulting new platform configuration. Other advantages and features of the invention are described below.
    Type: Application
    Filed: January 14, 2005
    Publication date: July 20, 2006
    Applicant: Microsoft Corporation
    Inventors: Jamie Hunter, Paul England, Russell Humphries, Stefan Thom, James Schwartz, Kenneth Ray, Jonathan Schwartz
  • Publication number: 20060161790
    Abstract: Systems and methods for controlling access to data on a computer with a secure boot process can provide a highly efficient mechanism for preventing future access to encrypted digital resources. This may be advantageous in a range of scenarios, for example where a computer is sold and assurance is desired that no stray private data remains on the hard disk. Data resources, for example all data associated with one or more particular hard disk partitions, may be encrypted. The decryption key may be available through a secure boot process. By erasing, altering, or otherwise disabling a secret, such as a decryption key or a process that obtains a decryption key, the data formerly accessible using such secret becomes inaccessible.
    Type: Application
    Filed: January 14, 2005
    Publication date: July 20, 2006
    Applicant: Microsoft Corporation
    Inventors: Jamie Hunter, Paul England, Russell Humphries, Stefan Thom, James Schwartz, Kenneth Ray, Jonathan Schwartz
  • Publication number: 20060161784
    Abstract: Systems and methods are provided for maintaining and updating a secure boot process on a computer with a trusted platform module (TPM). A boot process may be maintained by inspecting a log of TPM activity, determining data that prevented a secret to unseal, and returning the data to an original state. In situations where this type of recovery is not workable, techniques for authenticating a user may be used, allowing the authenticated user to bypass the security features of the boot process and reseal the boot secrets to platform configuration register (PCR) values that may have changed. Finally, a secure boot process may be upgraded by migrating TPM sealed secrets to a temporary storage location, updating one or more aspects of a secure boot process, and resealing the secrets to the resulting new platform configuration. Other advantages and features of the invention are described below.
    Type: Application
    Filed: January 14, 2005
    Publication date: July 20, 2006
    Applicant: Microsoft Corporation
    Inventors: Jamie Hunter, Paul England, Russell Humphries, Stefan Thom, James Schwartz, Kenneth Ray, Jonathan Schwartz