Patents by Inventor Richard McDowell
Richard McDowell has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 11816458Abstract: Various methods, apparatuses/systems, and media for providing IaC templates in a cloud environment are provided. A processor creates a plurality of IaC templates. Each of the plurality of IaC templates includes instructions to build at least a portion of an infrastructure. The plurality of IaC templates is stored in a central repository. The processor collects one or more of the plurality of the created IaC templates from the central repository in order to build a desired infrastructure package. The processor also executes at least one of updating, removing, upgrading, downgrading, and verifying the infrastructure package in the central repository. Each of the plurality of IaC templates also includes metadata identifying at least one of a package, installation instructions of the package, at least one dependency of the package, a version of the package, and a size of the package.Type: GrantFiled: May 27, 2022Date of Patent: November 14, 2023Assignee: JPMORGAN CHASE BANK, N.A.Inventors: James P White, III, Neil Aitken, Esa Laine, Paul Richard McDowell, Roy M Mpanju, Trupti Anant Gaikwad, Nick Suttle
-
Publication number: 20220283788Abstract: Various methods, apparatuses/systems, and media for providing IaC templates in a cloud environment are provided. A processor creates a plurality of IaC templates. Each of the plurality of IaC templates includes instructions to build at least a portion of an infrastructure. The plurality of IaC templates is stored in a central repository. The processor collects one or more of the plurality of the created IaC templates from the central repository in order to build a desired infrastructure package. The processor also executes at least one of updating, removing, upgrading, downgrading, and verifying the infrastructure package in the central repository. Each of the plurality of IaC templates also includes metadata identifying at least one of a package, installation instructions of the package, at least one dependency of the package, a version of the package, and a size of the package.Type: ApplicationFiled: May 27, 2022Publication date: September 8, 2022Applicant: JPMorgan Chase Bank, N.A.Inventors: James P WHITE, III, Neil AITKEN, Esa LAINE, Paul Richard MCDOWELL, Roy M MPANJU, Trupti Anant GAIKWAD, Nick SUTTLE
-
Patent number: 11372626Abstract: Various methods, apparatuses/systems, and media for providing IaC templates in a cloud environment are provided. A processor creates a plurality of IaC templates. Each of the plurality of IaC templates includes instructions to build at least a portion of an infrastructure. The plurality of IaC templates is stored in a central repository. The processor collects one or more of the plurality of the created IaC templates from the central repository in order to build a desired infrastructure package. The processor also executes at least one of updating, removing, upgrading, downgrading, and verifying the infrastructure package in the central repository. Each of the plurality of IaC templates also includes metadata identifying at least one of a package, installation instructions of the package, at least one dependency of the package, a version of the package, and a size of the package.Type: GrantFiled: July 22, 2020Date of Patent: June 28, 2022Assignee: JPMORGAN CHASE BANK, N.A.Inventors: James P White, III, Neil Aitken, Esa Laine, Paul Richard Mcdowell, Roy M Mpanju, Trupti Anant Gaikwad, Nick Suttle
-
Publication number: 20210042096Abstract: Various methods, apparatuses/systems, and media for providing IaC templates in a cloud environment are provided. A processor creates a plurality of IaC templates. Each of the plurality of IaC templates includes instructions to build at least a portion of an infrastructure. The plurality of IaC templates is stored in a central repository. The processor collects one or more of the plurality of the created IaC templates from the central repository in order to build a desired infrastructure package. The processor also executes at least one of updating, removing, upgrading, downgrading, and verifying the infrastructure package in the central repository. Each of the plurality of IaC templates also includes metadata identifying at least one of a package, installation instructions of the package, at least one dependency of the package, a version of the package, and a size of the package.Type: ApplicationFiled: July 22, 2020Publication date: February 11, 2021Applicant: JPMorgan Chase Bank, N.A.Inventors: James P. White, III, Neil Aitken, Esa Laine, Paul Richard Mcdowell, Roy M. Mpanju, Trupti Anant Gaikwad, Nick Suttle
-
Patent number: 8800048Abstract: Methods and a tool or instrument for performing the methods of protecting a computer program with a parameter cloud are disclosed. A parameter cloud comprising a plurality of elements may be created. Called functions of a computer program may have defined expected parameter cloud states so that proper behavior of the called function is achieved when the parameter cloud state is the expected parameter cloud state. An expected parameter cloud state may include a selected set of elements of the parameter cloud having assigned values. Static portions of the called functions may depend on a current parameter cloud state, and calling functions may transform the parameter cloud state prior to calling their respective called functions. The methods and instrument may operate on original source code or post-binary targets of the computer program. A fingerprint may be used to identify a specific computer program from a sequence of state transitions.Type: GrantFiled: May 20, 2008Date of Patent: August 5, 2014Assignee: Microsoft CorporationInventors: Matthias Wollnik, Nathan Ide, Andrey Lelikov, John Richard McDowell, Aaron Payne Goldsmid, Karan Singh Dhillon
-
Patent number: 8010773Abstract: Restricting execution by a computing device of instructions within an application program. The application program is modified such that execution of the selected instructions is dependent upon a corresponding expected state of one or more hardware components in the computing device. In an embodiment, the application program is modified to place the hardware components in the expected states prior to execution of the corresponding selected instructions. Creating the dependency on the hardware components prevents the unintended or malicious execution of the selected instructions.Type: GrantFiled: June 24, 2008Date of Patent: August 30, 2011Assignee: Microsoft CorporationInventors: Hakki Tunc Bostanci, Nathan Jeffrey Ide, Matthias Hermann Wollnik, John Richard McDowell, Karan Singh Dhillon, Aaron Payne Goldsmid
-
Patent number: 8001596Abstract: A method to apply a protection mechanism to a binary object includes using operating system resources to load a binary object from a storage medium along with a manifest and a digital signature. Authentication of the binary object is performed using the digital signature and the manifest is read to determine a category of protection for the binary object. The operating system selects a protection mechanism corresponding to the protection category and injects protection mechanism code, along with the binary object into a binary image on computer RAM. When the binary image is accessed, the protection mechanism executes and either allows full access and functionality to the binary object or prevents proper access and operation of the binary object. The protection mechanisms may be updated independently from the information on the storage medium.Type: GrantFiled: May 3, 2007Date of Patent: August 16, 2011Assignee: Microsoft CorporationInventors: Matthias Wollnik, Nir Ben Zvi, Hakki Tunc Bostanci, John Richard McDowell, Aaron Goldsmid
-
Publication number: 20090319761Abstract: Restricting execution by a computing device of instructions within an application program. The application program is modified such that execution of the selected instructions is dependent upon a corresponding expected state of one or more hardware components in the computing device. In an embodiment, the application program is modified to place the hardware components in the expected states prior to execution of the corresponding selected instructions. Creating the dependency on the hardware components prevents the unintended or malicious execution of the selected instructions.Type: ApplicationFiled: June 24, 2008Publication date: December 24, 2009Applicant: MICROSOFT CORPORATIONInventors: Hakki Tunc Bostanci, Nathan Jeffrey Ide, Matthias Hermann Wollnik, John Richard McDowell, Karan Singh Dhillon, Aaron Payne Goldsmid
-
Publication number: 20090293041Abstract: Methods and a tool or instrument for performing the methods of protecting a computer program with a parameter cloud are disclosed. A parameter cloud comprising a plurality of elements may be created. Called functions of a computer program may have defined expected parameter cloud states so that proper behavior of the called function is achieved when the parameter cloud state is the expected parameter cloud state. An expected parameter cloud state may include a selected set of elements of the parameter cloud having assigned values. Static portions of the called functions may depend on a current parameter cloud state, and calling functions may transform the parameter cloud state prior to calling their respective called functions. The methods and instrument may operate on original source code or post-binary targets of the computer program. A fingerprint may be used to identify a specific computer program from a sequence of state transitions.Type: ApplicationFiled: May 20, 2008Publication date: November 26, 2009Applicant: MICROSOFT CORPORATIONInventors: Matthias Wollnik, Nathan Ide, Andrey Lelikov, John Richard McDowell, Aaron Payne Goldsmid, Karan Singh Dhillon
-
Publication number: 20090260064Abstract: A user-oriented verification system and method provides for verification and fraud reduction in transactions. Users create verification accounts and register one or more devices with the account. Entity data provided by the user is selectively paired with device identifiers associated with registered devices. The entity/device pairs dictate the type and scope of transactions that may be entered into by each registered device. During a transaction, a requester provides entity/device information collected from a user to the verification system. If the entity/device information matches records stored by the verification system (i.e., the user has previously registered the device and associated selected entity information with the device) then the transaction is verified and notice is provided to the requester.Type: ApplicationFiled: April 15, 2009Publication date: October 15, 2009Applicant: PROBLEM RESOLUTION ENTERPRISE, LLCInventors: Joel Richard McDowell, Allan Dean Edeker, Donald Steven Overlander
-
Publication number: 20080276314Abstract: A method to apply a protection mechanism to a binary object includes using operating system resources to load a binary object from a storage medium along with a manifest and a digital signature. Authentication of the binary object is performed using the digital signature and the manifest is read to determine a category of protection for the binary object. The operating system selects a protection mechanism corresponding to the protection category and injects protection mechanism code, along with the binary object into a binary image on computer RAM. When the binary image is accessed, the protection mechanism executes and either allows full access and functionality to the binary object or prevents proper access and operation of the binary object. The protection mechanisms may be updated independently from the information on the storage medium.Type: ApplicationFiled: May 3, 2007Publication date: November 6, 2008Applicant: Microsoft CorporationInventors: MATTHIAS WOLLNIK, Nir Ben-Zvi, Hakki Tunc Bostanci, John Richard McDowell, Aaron Goldsmid
-
Publication number: 20080229115Abstract: In an example embodiment, executable files are individually encrypted utilizing a symmetric cryptographic key. For each user to be given access to the obfuscated file, the symmetric cryptographic key is encrypted utilizing a public key of a respective public/private key pair. A different public key/private key pair is utilized for each user. Obfuscated files are formed comprising the encrypted executable files and a respective encrypted symmetric cryptographic key. The private keys of the public/private key pairs are stored on respective smart cards. The smart cards are distributed to the users. When a user wants to invoke the functionality of an obfuscated file, the user provides the private key via his/her smart card. The private key is retrieved and is utilized to decrypt the appropriate portion of the obfuscated file. The symmetric cryptographic key obtained therefrom is utilized to decrypt the encrypted executable file.Type: ApplicationFiled: March 16, 2007Publication date: September 18, 2008Applicant: Microsoft CorporationInventors: Matthias Hermann Wollnik, Nir Ben-Zvi, Aaron Goldsmid, Hakki Tunc Bostanci, Karan Singh Dhillon, Nathan Jeffrey Ide, John Richard McDowell, David John Linsley
-
Publication number: 20060175385Abstract: A cartridge for storing a flowable substance in a bulk container is disclosed. The cartridge includes a shell having a breakable score line and configured to sit inside the bulk container and a bag positioned within the shell and configured to be filled with the flowable substance. The bag has a port for introducing the flowable substance into the bag and a drain spout in fluid communication with the bag, allowing the flowable substance to be drained from the bag after filling. The breakable score line is configured to separate due to force exerted on the shell as the bag is filled, allowing the bag to expand inside the bulk container. A method of filling a bulk container with a flowable substance using the cartridge is also disclosed.Type: ApplicationFiled: February 1, 2005Publication date: August 10, 2006Inventor: Richard McDowell
-
Publication number: 20060169757Abstract: A bulk container is disclosed, having a plurality of substantially planar walls, a plurality of corners connecting the walls, and a top and a bottom both formed by a plurality of foldable flaps. A first corner and a second corner opposite the first corner each have two substantially parallel score lines on an inner side of each corner allowing the corners to fold at an angle of substantially 0° while maintaining the structural integrity of the container. The walls of the container are constructed from a multi-ply corrugated cardboard sleeve made up of two layers of multi-ply corrugated cardboard laminated to each other. Two corrugated cardboard inserts, each having foldable top and bottom flaps are laminated to the sleeve. Also disclosed is a method of manufacturing the container using a number of blanks and inserts.Type: ApplicationFiled: February 1, 2005Publication date: August 3, 2006Inventor: Richard McDowell
-
Publication number: 20060161533Abstract: A user interface is provided that allows users to create queries interactively. The user interface operates by creating a source query (or, for example, SQL commands) for the user while they select fields from a data source. This provides users with an alternative to using conventional designers, wizards, or other tools to manually generate a query.Type: ApplicationFiled: December 22, 2005Publication date: July 20, 2006Applicant: Microsoft CorporationInventors: Vitore Selca, Christopher Bryant, Richard Dickinson, Richard McDowell, Zachary Woodall, Michael McCormack
-
Publication number: 20060154687Abstract: Proximity regulation systems for use with a portable cell phone, a portable cell phone and a method of operating the same. In one embodiment, the proximity regulation system includes a location sensing subsystem configured to determine a location of a portable cell phone proximate a user by determining a mode of operation of the portable cell phone. A power governing subsystem is coupled to the location sensing subsystem and configured to determine a proximity transmit power level of the portable cell phone based on the location.Type: ApplicationFiled: March 7, 2006Publication date: July 13, 2006Applicant: Agere Systems IncorporatedInventors: Richard McDowell, Philip Mooney
-
Publication number: 20060129592Abstract: A received reply email document enables some action to be effectuated using data included in the email document responsive to field identifiers associated with the data and corresponding to fields of metadata. The associated field identifiers that correspond to known fields of the metadata provide some expectation as to the semantic meaning and/or syntactic constraints of the data to which the field identifiers are associated. In a described implementation, an actionable email documents module creates an email document having blocks that are mapped to fields of metadata. The email document is transmitted to one or more recipients. Each recipient adds data to the blocks so that the data becomes mapped to the fields of the metadata. The recipients return a reply email document having the field-mapped data. Upon receipt, the module can effectuate some action using the field-mapped data responsive to the mappings.Type: ApplicationFiled: December 15, 2004Publication date: June 15, 2006Applicant: Microsoft CorporationInventors: Suraj Poozhiyil, Cyrus Balsara, Jason Bould, Mark Lucovsky, Richard McDowell
-
Patent number: 7051651Abstract: Baling apparatus (2) for preparing highly compressed bales of materials such as silage, wool, paper, cardboard, plastics materials and scrap metal, the baling apparatus including a compression chamber (5) which includes two opposed gates (6, 7) which can be moved towards or away from each other by moving means (15, 16, 17, 18), to compress material between the gates into a bale; the gates being moved by moving means (15, 16, 18) which are mounted alongside the compression chamber (5).Type: GrantFiled: December 20, 2002Date of Patent: May 30, 2006Inventor: Bruce Richard McDowell
-
Patent number: 5645200Abstract: A garment hanger for garments and the like such as a jacket, wherein the garments are suspended from the same hanger, includes a hanger body member having arms extending in generally opposite directions and inclined with respect to each other and adapted to receive and support a jacket and the like. Pivotable rod means are mounted on the hanger body member below the arms for receiving another garment and supporting the same in spaced relation to the arms. Hook means on the hanger body member support the garment hanger on a hook receiving support. The rod means include a rod section located vertically below said arms whereby a garment may be positioned on the rod means absent displacement of a jacket supported by the arms in order to place a garment on the rod means. The arms include angled apertured mating end faces received in the body member and spring biased means are received in the body member, the hook including a portion which passes through the aperture in the end faces.Type: GrantFiled: July 14, 1995Date of Patent: July 8, 1997Assignee: McDowell Bros.Inventors: Philip Richard McDowell, Robert Wilson McDowell, Matthew Fife McDowell