Patents by Inventor Thomas Gavin

Thomas Gavin has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 11976102
    Abstract: Provided herein are IL-2 muteins and IL-2 mutein Fc-fusion molecules that preferentially expand and activate T regulatory cells and are amenable to large scale production. Also provided herein are variant human IgG1 Fc molecules lacking or with highly reduced effector function and high stability despite lacking glycosylation at N297. Also, provided herein are linker peptides that are glycosylated when expressed in mammalian cells.
    Type: Grant
    Filed: October 5, 2020
    Date of Patent: May 7, 2024
    Assignee: Amgen Inc.
    Inventors: Marc Alain Gavin, Gunasekaran Kannan, Li Li, Joshua Thomas Pearson, Margaret Karow
  • Patent number: 11979376
    Abstract: A method of and system for utilizing an access token to authenticate a client device for accessing a resource server include generating a session key for a communication session between the device and a resource server, deriving a nonce from the session key, and transmitting a request to an identity platform for authenticating the device to access the resource server, where the request includes the nonce. Upon confirmation of authentication, the method and system may include receiving an access token from the identity platform, the access token including information that confirms authentication of the device, and transmitting the access token to the resource server to enable access to the resource server, where the access token includes the nonce.
    Type: Grant
    Filed: June 30, 2020
    Date of Patent: May 7, 2024
    Assignee: Microsoft Technology Licensing, LLC
    Inventors: Alan Thomas Gavin Jowett, Andrew Albert Hodgkinson, Lance Vernon Crandall, Jeffrey Scott Pinkston
  • Publication number: 20230418647
    Abstract: Technologies are disclosed for providing name resolution services to components executing in a virtualized environment. A name resolution request generated by a component executing within a virtualized environment is intercepted and forwarded from the virtualized environment to a host operating system (“OS”). A user process is then executed that requests that the host OS resolve a name specified by the intercepted name resolution request. Once the user process has received a response to the name resolution request made to the host OS, a response to the original name resolution request made by the component executing within the virtualized environment can be generated based on the response received by the user process. The response to the original name resolution request can then be provided to the component executing in the virtualized environment that requested name resolution.
    Type: Application
    Filed: June 28, 2022
    Publication date: December 28, 2023
    Inventors: Keith Edgar HORTON, Alan Thomas Gavin JOWETT, Andrew Mario BELTRANO, Catalin-Emil FETOIU, Guillaume Philippe Adrien HETIER, Matthew Yutaka IGE, Mitchell James SCHMIDT, Randy Joseph MILLER
  • Publication number: 20230370427
    Abstract: A network firewall is disclosed that operates between a virtualized environment and the processing system that provides the virtualized environment. The network firewall filters network traffic generated by and destined for program components executing in the virtualized environment. The network firewall can be located in a hypervisor, a flow steering engine, or at another location between the virtualized environment and the processing system. The network firewall utilizes a firewall policy that can be shared with a network firewall on the processing system that filters network traffic originating at or destined for the processing system. The network firewall can filter network traffic based upon a unique identifier assigned to a virtualized environment, upon port numbers assigned to program components in a virtualized environment, or upon profiles assigned to network interfaces. The network firewall can also filter loopback traffic between a guest operating system (OS) and a host OS.
    Type: Application
    Filed: December 20, 2022
    Publication date: November 16, 2023
    Inventors: Keith Edgar HORTON, Alan Thomas Gavin JOWETT, Andrew Mario BELTRANO, Catalin-Emil FETOIU, Guillaume Philippe Adrien HETIER, Matthew Yutaka IGE, Mitchell James SCHMIDT, Randy Joseph MILLER
  • Publication number: 20230370378
    Abstract: Technologies are disclosed for providing compatible network resources to program components executing in a virtualized environment. Virtual network adapters are created in a virtualized environment that correspond to network interfaces present on a host processing system. A virtual network interface is created in the virtualized environment and exposed to program components executing in the virtualized environment. Network packets are routed between the program components executing in the virtualized environment, the virtual network interface, the active virtual network adapter, and the network interface on the host processing system corresponding to the active virtual network adapter. Network control messages generated by program components executing in a virtualized environment are intercepted and forwarded to a host processing system for processing.
    Type: Application
    Filed: October 28, 2022
    Publication date: November 16, 2023
    Inventors: Keith Edgar HORTON, Alan Thomas Gavin JOWETT, Andrew Mario BELTRANO, Catalin-Emil FETOIU, Guillaume Philippe Adrien HETIER, Matthew Yutaka IGE, Mitchell James SCHMIDT, Randy Joseph MILLER
  • Publication number: 20230370306
    Abstract: Technologies are disclosed for enabling virtual private network (VPN) support in a virtualized environment. The presence or creation of a host VPN adapter on a host processing system providing a virtualized environment is detected and, in response thereto, a virtual network adapter is created in the virtualized environment. A guest operating system (OS) creates a guest VPN adapter in the virtualized environment. A software component is inserted between the guest VPN adapter and the virtual network adapter. The software component adds Ethernet frames to point-to-point protocol (PPP) packets received from the guest VPN adapter and removes Ethernet frames from packets received from the virtual network adapter.
    Type: Application
    Filed: November 17, 2022
    Publication date: November 16, 2023
    Inventors: Keith Edgar HORTON, Alan Thomas Gavin JOWETT, Andrew Mario BELTRANO, Catalin-Emil FETOIU, Guillaume Philippe Adrien HETIER, Matthew Yutaka IGE, Mitchell James SCHMIDT, Randy Joseph MILLER
  • Publication number: 20210409378
    Abstract: A method of and system for utilizing an access token to authenticate a client device for accessing a resource server include generating a session key for a communication session between the device and a resource server, deriving a nonce from the session key, and transmitting a request to an identity platform for authenticating the device to access the resource server, where the request includes the nonce. Upon confirmation of authentication, the method and system may include receiving an access token from the identity platform, the access token including information that confirms authentication of the device, and transmitting the access token to the resource server to enable access to the resource server, where the access token includes the nonce.
    Type: Application
    Filed: June 30, 2020
    Publication date: December 30, 2021
    Applicant: Microsoft Technology Licensing, LLC
    Inventors: Alan Thomas Gavin Jowett, Andrew Albert Hodgkinson, Lance Vernon Crandall, Jeffrey Scott Pinkston
  • Patent number: 10771439
    Abstract: Embodiments relate to a host encrypting network communications of virtual machines (VMs) in ways that minimize exposure of the network communications in cleartext form. The host captures and registers a measure of a secure state of the host. The measure is registered with a guardian service communicable via a network. The guardian service also securely stores keys of the VMs. Each VM's key is associated with authorization information indicating which machines are authorized to obtain the corresponding VM's key. The host obtains access to a VM's key based on a confirmation that its state matches the registered measured state and based on the authorization information of the VM indicating that the host is authorized to access the key. The VM's key is then used to transparently encrypt/decrypt network communications of the VM as they pass through a virtualization layer on the host that executes the VMs.
    Type: Grant
    Filed: June 28, 2017
    Date of Patent: September 8, 2020
    Assignee: MICROSOFT TECHNOLOGY LICENSING, LLC
    Inventors: Alan Thomas Gavin Jowett, Ravi T. Rao, Gregory M. Cusanza, Nir Ben-Zvi, Dean A. Wells
  • Patent number: 10476841
    Abstract: A method of tunneling a data packet through a network communicatively coupled to a datacenter is provided. The datacenter is uniquely addressed within the network. The datacenter has a different internal address space than the network. Transformation rules are recorded for a programmable packet filter in the datacenter. The data packet is received in the programmable packet filter of a host computing device in the datacenter. The received data packet is converted in the programmable packet filter of the host computing device between a stateless tunneling data packet and a datacenter data packet according to the recorded transformation rules. The datacenter data packet is uniquely addressed within the internal address space of the datacenter. The received data packet bypasses any virtual machine processing in the host computing device during the converting. The converted data packet is transmitted from the programmable packet filter in the datacenter.
    Type: Grant
    Filed: March 23, 2018
    Date of Patent: November 12, 2019
    Assignee: Microsoft Technology Licensing, LLC
    Inventors: Poornananda R. Gaddehosur, Alan Thomas Gavin Jowett, Anurag Saxena, Sravanth Bangari
  • Publication number: 20190297053
    Abstract: A method of tunneling a data packet through a network communicatively coupled to a datacenter is provided. The datacenter is uniquely addressed within the network. The datacenter has a different internal address space than the network. Transformation rules are recorded for a programmable packet filter in the datacenter. The data packet is received in the programmable packet filter of a host computing device in the datacenter. The received data packet is converted in the programmable packet filter of the host computing device between a stateless tunneling data packet and a datacenter data packet according to the recorded transformation rules. The datacenter data packet is uniquely addressed within the internal address space of the datacenter. The received data packet bypasses any virtual machine processing in the host computing device during the converting. The converted data packet is transmitted from the programmable packet filter in the datacenter.
    Type: Application
    Filed: March 23, 2018
    Publication date: September 26, 2019
    Inventors: Poornananda R. GADDEHOSUR, Alan Thomas Gavin JOWETT, Anurag SAXENA, Sravanth BANGARI
  • Publication number: 20190007378
    Abstract: Embodiments relate to a host encrypting network communications of virtual machines (VMs) in ways that minimize exposure of the network communications in cleartext form. The host captures and registers a measure of a secure state of the host. The measure is registered with a guardian service communicable via a network. The guardian service also securely stores keys of the VMs. Each VM's key is associated with authorization information indicating which machines are authorized to obtain the corresponding VM's key. The host obtains access to a VM's key based on a confirmation that its state matches the registered measured state and based on the authorization information of the VM indicating that the host is authorized to access the key. The VM's key is then used to transparently encrypt/decrypt network communications of the VM as they pass through a virtualization layer on the host that executes the VMs.
    Type: Application
    Filed: June 28, 2017
    Publication date: January 3, 2019
    Inventors: Alan Thomas Gavin JOWETT, Ravi T. RAO, Gregory M. CUSANZA, Nir BEN-ZVI, Dean A. WELLS
  • Publication number: 20050220637
    Abstract: A hydrostatic apparatus is disclosed. The hydrostatic apparatus comprises a pump, an input shaft, a fan and a fan shroud. The pump comprises a housing, an end cap, a first end and a second end. The input shaft extending from the first end and the second end of the pump. The fan is attached to one end of the input shaft. The fan shroud is also attached to the pump.
    Type: Application
    Filed: March 24, 2005
    Publication date: October 6, 2005
    Applicant: Hydro-Gear Limited Partnership
    Inventors: Thomas Kopel, Thomas Roth, Thomas Gavin, Keith Harshman, Bryce Steenburg, Raymond Hauser, Lonnie Holder
  • Publication number: 20040029448
    Abstract: An electrical adapter to control a light source. The adapter includes a housing having a male connection at one end and a female connection at another end, wherein the male connection is configured to connect with a light socket and the female connection is configured to connect with a light source. A circuit within the housing is provided for controlling the light source. Preferably, the circuit uses one of a random and a preprogrammed set of cycles to control the light source.
    Type: Application
    Filed: August 8, 2003
    Publication date: February 12, 2004
    Inventor: Thomas Gavin Melia