Patents by Inventor Richard McDowell

Richard McDowell has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 11816458
    Abstract: Various methods, apparatuses/systems, and media for providing IaC templates in a cloud environment are provided. A processor creates a plurality of IaC templates. Each of the plurality of IaC templates includes instructions to build at least a portion of an infrastructure. The plurality of IaC templates is stored in a central repository. The processor collects one or more of the plurality of the created IaC templates from the central repository in order to build a desired infrastructure package. The processor also executes at least one of updating, removing, upgrading, downgrading, and verifying the infrastructure package in the central repository. Each of the plurality of IaC templates also includes metadata identifying at least one of a package, installation instructions of the package, at least one dependency of the package, a version of the package, and a size of the package.
    Type: Grant
    Filed: May 27, 2022
    Date of Patent: November 14, 2023
    Assignee: JPMORGAN CHASE BANK, N.A.
    Inventors: James P White, III, Neil Aitken, Esa Laine, Paul Richard McDowell, Roy M Mpanju, Trupti Anant Gaikwad, Nick Suttle
  • Publication number: 20220283788
    Abstract: Various methods, apparatuses/systems, and media for providing IaC templates in a cloud environment are provided. A processor creates a plurality of IaC templates. Each of the plurality of IaC templates includes instructions to build at least a portion of an infrastructure. The plurality of IaC templates is stored in a central repository. The processor collects one or more of the plurality of the created IaC templates from the central repository in order to build a desired infrastructure package. The processor also executes at least one of updating, removing, upgrading, downgrading, and verifying the infrastructure package in the central repository. Each of the plurality of IaC templates also includes metadata identifying at least one of a package, installation instructions of the package, at least one dependency of the package, a version of the package, and a size of the package.
    Type: Application
    Filed: May 27, 2022
    Publication date: September 8, 2022
    Applicant: JPMorgan Chase Bank, N.A.
    Inventors: James P WHITE, III, Neil AITKEN, Esa LAINE, Paul Richard MCDOWELL, Roy M MPANJU, Trupti Anant GAIKWAD, Nick SUTTLE
  • Patent number: 11372626
    Abstract: Various methods, apparatuses/systems, and media for providing IaC templates in a cloud environment are provided. A processor creates a plurality of IaC templates. Each of the plurality of IaC templates includes instructions to build at least a portion of an infrastructure. The plurality of IaC templates is stored in a central repository. The processor collects one or more of the plurality of the created IaC templates from the central repository in order to build a desired infrastructure package. The processor also executes at least one of updating, removing, upgrading, downgrading, and verifying the infrastructure package in the central repository. Each of the plurality of IaC templates also includes metadata identifying at least one of a package, installation instructions of the package, at least one dependency of the package, a version of the package, and a size of the package.
    Type: Grant
    Filed: July 22, 2020
    Date of Patent: June 28, 2022
    Assignee: JPMORGAN CHASE BANK, N.A.
    Inventors: James P White, III, Neil Aitken, Esa Laine, Paul Richard Mcdowell, Roy M Mpanju, Trupti Anant Gaikwad, Nick Suttle
  • Publication number: 20210042096
    Abstract: Various methods, apparatuses/systems, and media for providing IaC templates in a cloud environment are provided. A processor creates a plurality of IaC templates. Each of the plurality of IaC templates includes instructions to build at least a portion of an infrastructure. The plurality of IaC templates is stored in a central repository. The processor collects one or more of the plurality of the created IaC templates from the central repository in order to build a desired infrastructure package. The processor also executes at least one of updating, removing, upgrading, downgrading, and verifying the infrastructure package in the central repository. Each of the plurality of IaC templates also includes metadata identifying at least one of a package, installation instructions of the package, at least one dependency of the package, a version of the package, and a size of the package.
    Type: Application
    Filed: July 22, 2020
    Publication date: February 11, 2021
    Applicant: JPMorgan Chase Bank, N.A.
    Inventors: James P. White, III, Neil Aitken, Esa Laine, Paul Richard Mcdowell, Roy M. Mpanju, Trupti Anant Gaikwad, Nick Suttle
  • Patent number: 8800048
    Abstract: Methods and a tool or instrument for performing the methods of protecting a computer program with a parameter cloud are disclosed. A parameter cloud comprising a plurality of elements may be created. Called functions of a computer program may have defined expected parameter cloud states so that proper behavior of the called function is achieved when the parameter cloud state is the expected parameter cloud state. An expected parameter cloud state may include a selected set of elements of the parameter cloud having assigned values. Static portions of the called functions may depend on a current parameter cloud state, and calling functions may transform the parameter cloud state prior to calling their respective called functions. The methods and instrument may operate on original source code or post-binary targets of the computer program. A fingerprint may be used to identify a specific computer program from a sequence of state transitions.
    Type: Grant
    Filed: May 20, 2008
    Date of Patent: August 5, 2014
    Assignee: Microsoft Corporation
    Inventors: Matthias Wollnik, Nathan Ide, Andrey Lelikov, John Richard McDowell, Aaron Payne Goldsmid, Karan Singh Dhillon
  • Patent number: 8010773
    Abstract: Restricting execution by a computing device of instructions within an application program. The application program is modified such that execution of the selected instructions is dependent upon a corresponding expected state of one or more hardware components in the computing device. In an embodiment, the application program is modified to place the hardware components in the expected states prior to execution of the corresponding selected instructions. Creating the dependency on the hardware components prevents the unintended or malicious execution of the selected instructions.
    Type: Grant
    Filed: June 24, 2008
    Date of Patent: August 30, 2011
    Assignee: Microsoft Corporation
    Inventors: Hakki Tunc Bostanci, Nathan Jeffrey Ide, Matthias Hermann Wollnik, John Richard McDowell, Karan Singh Dhillon, Aaron Payne Goldsmid
  • Patent number: 8001596
    Abstract: A method to apply a protection mechanism to a binary object includes using operating system resources to load a binary object from a storage medium along with a manifest and a digital signature. Authentication of the binary object is performed using the digital signature and the manifest is read to determine a category of protection for the binary object. The operating system selects a protection mechanism corresponding to the protection category and injects protection mechanism code, along with the binary object into a binary image on computer RAM. When the binary image is accessed, the protection mechanism executes and either allows full access and functionality to the binary object or prevents proper access and operation of the binary object. The protection mechanisms may be updated independently from the information on the storage medium.
    Type: Grant
    Filed: May 3, 2007
    Date of Patent: August 16, 2011
    Assignee: Microsoft Corporation
    Inventors: Matthias Wollnik, Nir Ben Zvi, Hakki Tunc Bostanci, John Richard McDowell, Aaron Goldsmid
  • Publication number: 20090319761
    Abstract: Restricting execution by a computing device of instructions within an application program. The application program is modified such that execution of the selected instructions is dependent upon a corresponding expected state of one or more hardware components in the computing device. In an embodiment, the application program is modified to place the hardware components in the expected states prior to execution of the corresponding selected instructions. Creating the dependency on the hardware components prevents the unintended or malicious execution of the selected instructions.
    Type: Application
    Filed: June 24, 2008
    Publication date: December 24, 2009
    Applicant: MICROSOFT CORPORATION
    Inventors: Hakki Tunc Bostanci, Nathan Jeffrey Ide, Matthias Hermann Wollnik, John Richard McDowell, Karan Singh Dhillon, Aaron Payne Goldsmid
  • Publication number: 20090293041
    Abstract: Methods and a tool or instrument for performing the methods of protecting a computer program with a parameter cloud are disclosed. A parameter cloud comprising a plurality of elements may be created. Called functions of a computer program may have defined expected parameter cloud states so that proper behavior of the called function is achieved when the parameter cloud state is the expected parameter cloud state. An expected parameter cloud state may include a selected set of elements of the parameter cloud having assigned values. Static portions of the called functions may depend on a current parameter cloud state, and calling functions may transform the parameter cloud state prior to calling their respective called functions. The methods and instrument may operate on original source code or post-binary targets of the computer program. A fingerprint may be used to identify a specific computer program from a sequence of state transitions.
    Type: Application
    Filed: May 20, 2008
    Publication date: November 26, 2009
    Applicant: MICROSOFT CORPORATION
    Inventors: Matthias Wollnik, Nathan Ide, Andrey Lelikov, John Richard McDowell, Aaron Payne Goldsmid, Karan Singh Dhillon
  • Publication number: 20090260064
    Abstract: A user-oriented verification system and method provides for verification and fraud reduction in transactions. Users create verification accounts and register one or more devices with the account. Entity data provided by the user is selectively paired with device identifiers associated with registered devices. The entity/device pairs dictate the type and scope of transactions that may be entered into by each registered device. During a transaction, a requester provides entity/device information collected from a user to the verification system. If the entity/device information matches records stored by the verification system (i.e., the user has previously registered the device and associated selected entity information with the device) then the transaction is verified and notice is provided to the requester.
    Type: Application
    Filed: April 15, 2009
    Publication date: October 15, 2009
    Applicant: PROBLEM RESOLUTION ENTERPRISE, LLC
    Inventors: Joel Richard McDowell, Allan Dean Edeker, Donald Steven Overlander
  • Publication number: 20080276314
    Abstract: A method to apply a protection mechanism to a binary object includes using operating system resources to load a binary object from a storage medium along with a manifest and a digital signature. Authentication of the binary object is performed using the digital signature and the manifest is read to determine a category of protection for the binary object. The operating system selects a protection mechanism corresponding to the protection category and injects protection mechanism code, along with the binary object into a binary image on computer RAM. When the binary image is accessed, the protection mechanism executes and either allows full access and functionality to the binary object or prevents proper access and operation of the binary object. The protection mechanisms may be updated independently from the information on the storage medium.
    Type: Application
    Filed: May 3, 2007
    Publication date: November 6, 2008
    Applicant: Microsoft Corporation
    Inventors: MATTHIAS WOLLNIK, Nir Ben-Zvi, Hakki Tunc Bostanci, John Richard McDowell, Aaron Goldsmid
  • Publication number: 20080229115
    Abstract: In an example embodiment, executable files are individually encrypted utilizing a symmetric cryptographic key. For each user to be given access to the obfuscated file, the symmetric cryptographic key is encrypted utilizing a public key of a respective public/private key pair. A different public key/private key pair is utilized for each user. Obfuscated files are formed comprising the encrypted executable files and a respective encrypted symmetric cryptographic key. The private keys of the public/private key pairs are stored on respective smart cards. The smart cards are distributed to the users. When a user wants to invoke the functionality of an obfuscated file, the user provides the private key via his/her smart card. The private key is retrieved and is utilized to decrypt the appropriate portion of the obfuscated file. The symmetric cryptographic key obtained therefrom is utilized to decrypt the encrypted executable file.
    Type: Application
    Filed: March 16, 2007
    Publication date: September 18, 2008
    Applicant: Microsoft Corporation
    Inventors: Matthias Hermann Wollnik, Nir Ben-Zvi, Aaron Goldsmid, Hakki Tunc Bostanci, Karan Singh Dhillon, Nathan Jeffrey Ide, John Richard McDowell, David John Linsley
  • Publication number: 20060175385
    Abstract: A cartridge for storing a flowable substance in a bulk container is disclosed. The cartridge includes a shell having a breakable score line and configured to sit inside the bulk container and a bag positioned within the shell and configured to be filled with the flowable substance. The bag has a port for introducing the flowable substance into the bag and a drain spout in fluid communication with the bag, allowing the flowable substance to be drained from the bag after filling. The breakable score line is configured to separate due to force exerted on the shell as the bag is filled, allowing the bag to expand inside the bulk container. A method of filling a bulk container with a flowable substance using the cartridge is also disclosed.
    Type: Application
    Filed: February 1, 2005
    Publication date: August 10, 2006
    Inventor: Richard McDowell
  • Publication number: 20060169757
    Abstract: A bulk container is disclosed, having a plurality of substantially planar walls, a plurality of corners connecting the walls, and a top and a bottom both formed by a plurality of foldable flaps. A first corner and a second corner opposite the first corner each have two substantially parallel score lines on an inner side of each corner allowing the corners to fold at an angle of substantially 0° while maintaining the structural integrity of the container. The walls of the container are constructed from a multi-ply corrugated cardboard sleeve made up of two layers of multi-ply corrugated cardboard laminated to each other. Two corrugated cardboard inserts, each having foldable top and bottom flaps are laminated to the sleeve. Also disclosed is a method of manufacturing the container using a number of blanks and inserts.
    Type: Application
    Filed: February 1, 2005
    Publication date: August 3, 2006
    Inventor: Richard McDowell
  • Publication number: 20060161533
    Abstract: A user interface is provided that allows users to create queries interactively. The user interface operates by creating a source query (or, for example, SQL commands) for the user while they select fields from a data source. This provides users with an alternative to using conventional designers, wizards, or other tools to manually generate a query.
    Type: Application
    Filed: December 22, 2005
    Publication date: July 20, 2006
    Applicant: Microsoft Corporation
    Inventors: Vitore Selca, Christopher Bryant, Richard Dickinson, Richard McDowell, Zachary Woodall, Michael McCormack
  • Publication number: 20060154687
    Abstract: Proximity regulation systems for use with a portable cell phone, a portable cell phone and a method of operating the same. In one embodiment, the proximity regulation system includes a location sensing subsystem configured to determine a location of a portable cell phone proximate a user by determining a mode of operation of the portable cell phone. A power governing subsystem is coupled to the location sensing subsystem and configured to determine a proximity transmit power level of the portable cell phone based on the location.
    Type: Application
    Filed: March 7, 2006
    Publication date: July 13, 2006
    Applicant: Agere Systems Incorporated
    Inventors: Richard McDowell, Philip Mooney
  • Publication number: 20060129592
    Abstract: A received reply email document enables some action to be effectuated using data included in the email document responsive to field identifiers associated with the data and corresponding to fields of metadata. The associated field identifiers that correspond to known fields of the metadata provide some expectation as to the semantic meaning and/or syntactic constraints of the data to which the field identifiers are associated. In a described implementation, an actionable email documents module creates an email document having blocks that are mapped to fields of metadata. The email document is transmitted to one or more recipients. Each recipient adds data to the blocks so that the data becomes mapped to the fields of the metadata. The recipients return a reply email document having the field-mapped data. Upon receipt, the module can effectuate some action using the field-mapped data responsive to the mappings.
    Type: Application
    Filed: December 15, 2004
    Publication date: June 15, 2006
    Applicant: Microsoft Corporation
    Inventors: Suraj Poozhiyil, Cyrus Balsara, Jason Bould, Mark Lucovsky, Richard McDowell
  • Patent number: 7051651
    Abstract: Baling apparatus (2) for preparing highly compressed bales of materials such as silage, wool, paper, cardboard, plastics materials and scrap metal, the baling apparatus including a compression chamber (5) which includes two opposed gates (6, 7) which can be moved towards or away from each other by moving means (15, 16, 17, 18), to compress material between the gates into a bale; the gates being moved by moving means (15, 16, 18) which are mounted alongside the compression chamber (5).
    Type: Grant
    Filed: December 20, 2002
    Date of Patent: May 30, 2006
    Inventor: Bruce Richard McDowell
  • Patent number: 5645200
    Abstract: A garment hanger for garments and the like such as a jacket, wherein the garments are suspended from the same hanger, includes a hanger body member having arms extending in generally opposite directions and inclined with respect to each other and adapted to receive and support a jacket and the like. Pivotable rod means are mounted on the hanger body member below the arms for receiving another garment and supporting the same in spaced relation to the arms. Hook means on the hanger body member support the garment hanger on a hook receiving support. The rod means include a rod section located vertically below said arms whereby a garment may be positioned on the rod means absent displacement of a jacket supported by the arms in order to place a garment on the rod means. The arms include angled apertured mating end faces received in the body member and spring biased means are received in the body member, the hook including a portion which passes through the aperture in the end faces.
    Type: Grant
    Filed: July 14, 1995
    Date of Patent: July 8, 1997
    Assignee: McDowell Bros.
    Inventors: Philip Richard McDowell, Robert Wilson McDowell, Matthew Fife McDowell