Patents by Inventor Matthew Kerner
Matthew Kerner has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 11218457Abstract: The disclosed technology is generally directed to blockchain and other security technology. In one example of the technology, a first node is endorsed. During endorsement of a first node, a pre-determined type of blockchain or other security protocol code to be authorized and a pre-determined membership list are stored in a trusted execution environment (TEE) of the first node. A determination is made as to whether the membership lists and pre-determined blockchain or other security protocol code to be authorized from the proposed members match. If so, TEE attestation is used to verify that nodes associated with prospective members of the consortium store the pre-determined type of blockchain or other security protocol code to be authorized. Upon TEE attestation being successful, a consortium network is bootstrapped such that the prospective members become members of the consortium network.Type: GrantFiled: November 17, 2019Date of Patent: January 4, 2022Assignee: Microsoft Technology Licensing, LLCInventors: Mark Russinovich, Manuel Costa, Matthew Kerner, Thomas Moscibroda
-
Patent number: 11173200Abstract: The disclosed compositions and methods provide an approach for the rational development of a live attenuated virus to be used as a vaccine, vaccine seed strain, therapy, and/or research tool. Methods are disclosed to generate a virus that is phenotypically wild-type but genetically attenuated. The virus would ‘look’ like the pathogenic virus and, upon vaccination, the initial viral infection would be largely, if not fully, indistinguishable from that initiated by its pathogenic counterpart, leading to the most relevant and robust immune response. However, because the genome is attenuated, the viruses generated by the initial round of infection would be phenotypically attenuated. This approach can be applied to any virus that, upon the introduction of select mutations, can be propagated with an organism or system that utilizes an alternative genetic code.Type: GrantFiled: June 1, 2018Date of Patent: November 16, 2021Inventors: Laura Shackelton, Matthew Kerner
-
Patent number: 11154607Abstract: The disclosed compositions and methods provide an approach for the rational development of a nucleic acid vaccine. Methods are disclosed to deliver a viral genome, and/or a representative or derivative of such, that is attenuated but can, when co-delivered with unreplicable compensatory translational tools to a host cell, initially generate phenotypically wild-type, genetically attenuated viruses which infect subsequent cells and elicit a relevant and robust immune response. However, progeny of this initial generation, lacking the compensatory tools delivered to the initial host cells, are both phenotypically and genetically attenuated, thereby compromised in their ability to induce disease.Type: GrantFiled: June 1, 2018Date of Patent: October 26, 2021Inventors: Laura Shackelton, Matthew Kerner
-
Patent number: 10764259Abstract: The disclosed technology is generally directed to blockchain and other security technology. In one example of the technology, a pre-determined type of blockchain or other security protocol code is stored in a trusted execution environment (TEE) of the processor. TEE attestation is used to verify that the blockchain or other security protocol code stored in the TEE is the pre-determined type of blockchain or other security protocol code. A blockchain or other transaction is received and processed. Based on the processing of the transaction, an official state of the transaction on a consortium network is directly updated for the network. The updated official state of the processed transaction is broadcasted to the consortium network.Type: GrantFiled: June 29, 2017Date of Patent: September 1, 2020Assignee: Microsoft Technology Licensing, LLCInventors: Mark Russinovich, Manuel Costa, Matthew Kerner, Thomas Moscibroda
-
Publication number: 20200138937Abstract: The disclosed compositions and methods provide an approach for the rational development of a nucleic acid vaccine. Methods are disclosed to deliver a viral genome, and/or a representative or derivative of such, that is attenuated but can, when co-delivered with unreplicable compensatory translational tools to a host cell, initially generate phenotypically wild-type, genetically attenuated viruses which infect subsequent cells and elicit a relevant and robust immune response. However, progeny of this initial generation, lacking the compensatory tools delivered to the initial host cells, are both phenotypically and genetically attenuated, thereby compromised in their ability to induce disease.Type: ApplicationFiled: June 1, 2018Publication date: May 7, 2020Inventors: Laura SHACKELTON, Matthew KERNER
-
Publication number: 20200138936Abstract: The disclosed compositions and methods provide an approach for the rational development of a live attenuated virus to be used as a vaccine, vaccine seed strain, therapy, and/or research tool. Methods are disclosed to generate a virus that is phenotypically wild-type but genetically attenuated. The virus would ‘look’ like the pathogenic virus and, upon vaccination, the initial viral infection would be largely, if not fully, indistinguishable from that initiated by its pathogenic counterpart, leading to the most relevant and robust immune response. However, because the genome is attenuated, the viruses generated by the initial round of infection would be phenotypically attenuated. This approach can be applied to any virus that, upon the introduction of select mutations, can be propagated with an organism or system that utilizes an alternative genetic code.Type: ApplicationFiled: June 1, 2018Publication date: May 7, 2020Inventors: Laura SHACKELTON, Matthew KERNER
-
Publication number: 20200084189Abstract: The disclosed technology is generally directed to blockchain and other security technology. In one example of the technology, a first node is endorsed. During endorsement of a first node, a pre-determined type of blockchain or other security protocol code to be authorized and a pre-determined membership list are stored in a trusted execution environment (TEE) of the first node. A determination is made as to whether the membership lists and pre-determined blockchain or other security protocol code to be authorized from the proposed members match. If so, TEE attestation is used to verify that nodes associated with prospective members of the consortium store the pre-determined type of blockchain or other security protocol code to be authorized. Upon TEE attestation being successful, a consortium network is bootstrapped such that the prospective members become members of the consortium network.Type: ApplicationFiled: November 17, 2019Publication date: March 12, 2020Inventors: Mark RUSSINOVICH, Manuel COSTA, Matthew KERNER, Thomas MOSCIBRODA
-
Patent number: 10484346Abstract: The disclosed technology is generally directed to blockchain and other security technology. In one example of the technology, a first node is endorsed. During endorsement of a first node, a pre-determined type of blockchain or other security protocol code to be authorized and a pre-determined membership list are stored in a trusted execution environment (TEE) of the first node. A determination is made as to whether the membership lists and pre-determined blockchain or other security protocol code to be authorized from the proposed members match. If so, TEE attestation is used to verify that nodes associated with prospective members of the consortium store the pre-determined type of blockchain or other security protocol code to be authorized. Upon TEE attestation being successful, a consortium network is bootstrapped such that the prospective members become members of the consortium network.Type: GrantFiled: June 29, 2017Date of Patent: November 19, 2019Assignee: Microsoft Technology Licensing, LLCInventors: Mark Russinovich, Manuel Costa, Matthew Kerner, Thomas Moscibroda
-
Publication number: 20180225448Abstract: The disclosed technology is generally directed to blockchain and other security technology. In one example of the technology, a pre-determined type of blockchain or other security protocol code is stored in a trusted execution environment (TEE) of the processor. TEE attestation is used to verify that the blockchain or other security protocol code stored in the TEE is the pre-determined type of blockchain or other security protocol code. A blockchain or other transaction is received and processed. Based on the processing of the transaction, an official state of the transaction on a consortium network is directly updated for the network. The updated official state of the processed transaction is broadcasted to the consortium network.Type: ApplicationFiled: June 29, 2017Publication date: August 9, 2018Inventors: Mark RUSSINOVICH, Manuel COSTA, Matthew KERNER, Thomas MOSCIBRODA
-
Publication number: 20180227275Abstract: The disclosed technology is generally directed to blockchain and other security technology. In one example of the technology, a first node is endorsed. During endorsement of a first node, a pre-determined type of blockchain or other security protocol code to be authorized and a pre-determined membership list are stored in a trusted execution environment (TEE) of the first node. A determination is made as to whether the membership lists and pre-determined blockchain or other security protocol code to be authorized from the proposed members match. If so, TEE attestation is used to verify that nodes associated with prospective members of the consortium store the pre-determined type of blockchain or other security protocol code to be authorized. Upon TEE attestation being successful, a consortium network is bootstrapped such that the prospective members become members of the consortium network.Type: ApplicationFiled: June 29, 2017Publication date: August 9, 2018Inventors: Mark RUSSINOVICH, Manuel COSTA, Matthew KERNER, Thomas MOSCIBRODA
-
Publication number: 20180225661Abstract: The disclosed technology is generally directed to blockchain and other authentication technology. In one example of the technology, a pre-determined type of blockchain or other authentication protocol code and a pre-determined type of consensus code are stored in a trusted execution environment (TEE) of a processor. In some examples, TEE attestation is used to verify that the blockchain or other authentication protocol code stored in the TEE is the pre-determined type of blockchain or other authentication protocol code, and to verify that the consensus code stored in the TEE is the pre-determined type of consensus code. A request to alter the pre-determined type of blockchain or other authentication protocol code may be received. A determination may be made as to whether to change the pre-determined type of blockchain or other authentication protocol code based on the pre-determined consensus code.Type: ApplicationFiled: June 29, 2017Publication date: August 9, 2018Inventors: Mark RUSSINOVICH, Manuel COSTA, Matthew KERNER, Thomas MOSCIBRODA
-
Patent number: 8769494Abstract: Datacenter configuration needs to be managed. A configuration engine (CE) manages configuration data of clusters and/or datacenters. The CE allows users to check out, edit, and check in configuration components. Versioned interfaces are placed between configuration components through data contracts. The CE supports the expression of constraints that ensure global consistency across configuration components and versions, isolates changes in the datacenter from structural changes in configuration components, and enables partial configuration branching to allow for active snapshots that enable configuration rollback. The CE ensures that types are consistent and constraints are satisfied at check-in time to eliminate unsound or inconsistent configuration in the first place. When the active configuration in the datacenter changes, multiple versions of configuration may be simultaneously deployed for a window of time.Type: GrantFiled: December 14, 2010Date of Patent: July 1, 2014Assignee: Microsoft CorporationInventors: Henning Rohde, Matthew Kerner, Kenneth Kai-Baun Ma
-
Publication number: 20120151443Abstract: Datacenter configuration needs to be managed. A configuration engine (CE) manages configuration data of clusters and/or datacenters. The CE allows users to check out, edit, and check in configuration components. Versioned interfaces are placed between configuration components through data contracts. The CE supports the expression of constraints that ensure global consistency across configuration components and versions, isolates changes in the datacenter from structural changes in configuration components, and enables partial configuration branching to allow for active snapshots that enable configuration rollback. The CE ensures that types are consistent and constraints are satisfied at check-in time to eliminate unsound or inconsistent configuration in the first place. When the active configuration in the datacenter changes, multiple versions of configuration may be simultaneously deployed for a window of time.Type: ApplicationFiled: December 14, 2010Publication date: June 14, 2012Applicant: MICROSOFT CORPORATIONInventors: HENNING KORSHOLM ROHDE, MATTHEW KERNER, KENNETH KAI-BAUN MA
-
Patent number: 7805630Abstract: A method and apparatus to detect and mitigate disk failure is disclosed. The method may collect data from a disk from time to time and by analyzing the data, may provide an alert that there is a bad disk.Type: GrantFiled: July 27, 2006Date of Patent: September 28, 2010Assignee: Microsoft CorporationInventors: Matthew Kerner, Swetha Narayanaswamy, Barbara Kess, Yi Meng, Weijuan Shi, Michael Ryan Berg, Randall K. Winjum
-
Patent number: 7594136Abstract: When a user-mode inpage error occurs after the system has booted up, the inpage error handling method attempts to prevent future crashes by repairing the faulting file. The fault may be a corrupt file or may be a disk I/O problem. The next time the now-repaired file is requested, execution should continue normally.Type: GrantFiled: April 19, 2006Date of Patent: September 22, 2009Assignee: Microsoft CorporationInventors: Matthew Kerner, Kai Chen, Chandramouli Natesa Srinivasan, Jonathan Au
-
Publication number: 20080028264Abstract: A method and apparatus to detect and mitigate disk failure is disclosed. The method may collect data from a disk from time to time and by analyzing the data, may provide an alert that there is a bad disk.Type: ApplicationFiled: July 27, 2006Publication date: January 31, 2008Applicant: MICROSOFT CORPORATIONInventors: Matthew Kerner, Swetha Narayanaswamy, Barbara Kess, Yi Meng, Weijuan Shi, Michael Ryan Berg, Randall K. Winjum
-
Publication number: 20070260919Abstract: When a user-mode inpage error occurs after the system has booted up, the inpage error handling method attempts to prevent future crashes by repairing the faulting file. The fault may be a corrupt file or may be a disk I/O problem.Type: ApplicationFiled: April 19, 2006Publication date: November 8, 2007Applicant: MICROSOFT CORPORATIONInventors: Matthew Kerner, Kai Chen, Chandramouli Srinivasan, Jonathan Au