Bryan Mark Willman - Kirkland WA, US Paul England - Bellevue WA, US Kenneth D. Ray - Seattle WA, US Jamie Hunter - Bothell WA, US Lonnie Dean McMichael - Redmond WA, US Derek Norman LaSalle - Redmond WA, US Pierre Jacomet - Sammamish WA, US Mark Eliot Paley - Sammamish WA, US Thekkthalackal Varugis Kurien - Sammamish WA, US David B. Cross - Redmond WA, US
Assignee:
Microsoft Corporation - Redmond WA
International Classification:
G06F 9/00
US Classification:
713 2, 713161, 713165, 713172
Abstract:
A mechanism for protected operating system boot that prevents rogue components from being loaded with the operating system, and thus prevents divulgence of the system key under inappropriate circumstances. After a portion of the machine startup procedure has occurred, the operating system loader is run, the loader is validated, and a correct machine state is either verified to exist and/or created. Once the loader has been verified to be a legitimate loader, and the machine state under which it is running is verified to be correct, the loader's future behavior is known to protect against the loading of rogue components that could cause divulgence of the system key. With the loader's behavior being known to be safe for the system key, the validator may unseal the system key and provides it to the loader.
Carl M. Ellison - Seattle WA, US Jamie Hunter - Bothell WA, US Kenneth D. Ray - Seattle WA, US Niels T. Ferguson - Redmond WA, US Philip J. Lafornara - Bellevue WA, US Russell Humphries - Redmond WA, US
Assignee:
Microsoft Corporation - Redmond WA
International Classification:
G06F 12/14
US Classification:
713193, 713189, 726 26, 726 27, 726 31
Abstract:
Access to a storage device, such as a disk, is controlled by performing a disk operation using a single cryptographic engine. Keys associated with each layer of a layered structure associated with controlling access to the storage device are combined. The resultant of this combination is used as the key to the cryptographic engine. Data to be retrieved from and written to the storage device are operated on by the cryptographic engine utilizing the combined key. Keys are combined by combining functions associated with layers of the layered structure. A combining function can include an exclusive or function, a cryptographic hash function, or a combination thereof.
Kaiser Permanente Dec 2018 - Apr 2019
Temporary Clinical Research Assistant
Madrona Nutrition Dec 2018 - Apr 2019
Owner
Fresenius Medical Care Mar 2014 - Jun 2016
Renal Dietitian
Providence Health & Services Jul 2013 - Aug 2014
Registered Dietitian
Answers Counseling Feb 2011 - Jul 2013
Case Manger- Maternity Support Services and Infant Case Management
Education:
Bastry University 2009 - 2010
Oregon State University 2006 - 2008
Auburn University 1995 - 2000
Bachelors, Bachelor of Arts
Skills:
Nutrition Education Nutrition Diabetes Food Service Medical Nutrition Therapy Nutritional Counseling Dietetics Wellness Healthcare Weight Management Clinical Nutrition Health Promotion Acute Care
Amazon.com - Seattle, Washington since Sep 2011
Principal Software Engineer
NVIDIA Jul 2009 - Sep 2011
Senior Systems Software Engineer
Amazon.com Nov 2007 - Jul 2009
Senior Software Developer
Microsoft Nov 2006 - Oct 2007
SDE Lead / Sr SDE, Many-Core Strategies and Incubation
Microsoft Oct 2003 - Nov 2006
Senior SDE, BitLocker Drive Encryption
Skills:
C++ C Device Drivers APIs C# Java Operating Systems Cloud Computing XML JavaScript Multithreading Software Engineering Distributed Systems Software Design Embedded Systems Debugging
I am a very experienced hairstylist that works with every type of hair. I am creative and strive to give lots of information to care for and maintain your beautiful hair and skin. I also am passionate...
Tagline:
Hair/ make up artist and Avon Rep!
Jamie Hunter
Work:
The Social Practice - Avid Listener (2011)
About:
Headphones in the sun. Staring at the stars. Snow, water, and mostly late.