Jeffrey Brian Hamblin

age ~47

from Issaquah, WA

Also known as:
  • Jeffrey B Hamblin
  • Jeff B Hamblin
  • Jeffrey B Hablin
Phone and address:
26515 172Nd St, Bellevue, WA 98027

Jeffrey Hamblin Phones & Addresses

  • 26515 172Nd St, Issaquah, WA 98027
  • Neenah, WI
  • North Bend, WA
  • Klamath Falls, OR
  • Kiona, WA
  • Snoqualmie, WA
  • 26515 SE 172Nd St, Issaquah, WA 98027 • 4259223985

Work

  • Position:
    Machine Operators, Assemblers, and Inspectors Occupations

Education

  • Degree:
    High school graduate or higher

Emails

Resumes

Jeffrey Hamblin Photo 1

Vice President Security Engineering

view source
Location:
Issaquah, WA
Industry:
Computer Software
Work:
Microsoft
Principal Development Lead

Microsoft 2011 - 2013
Senior Development Lead

Microsoft 2008 - 2011
Senior Software Design Engineer

Securitay 2006 - 2008
Independent Consultant

Microsoft 2000 - 2006
Software Design Engineer
Education:
University of Wisconsin-Madison 1995 - 1999
Bachelor of Science (B.S.), Mathematics and Computer Science
Skills:
Distributed Systems
Cloud Storage
Operating Systems
Storage Virtualization
Static Analysis
C++
C++0X
Authorization
Windows Kernel Programming
Multithreading
Software Engineering
Debugging
Scalability
Arctic
Software Development
Cloud Computing
Storage Architecture
Software Design
Agile Methodologies
Object Oriented Design
C
C#
.Net
Web Services
Jeffrey Hamblin Photo 2

Manufacutring Manager

view source
Work:

Manufacutring Manager
Jeffrey Hamblin Photo 3

Jeffrey Hamblin

view source

Us Patents

  • Hashing Using Multiple Sub-Hashes

    view source
  • US Patent:
    7248691, Jul 24, 2007
  • Filed:
    Oct 31, 2000
  • Appl. No.:
    09/704186
  • Inventors:
    Bhalchandra S. Pandit - Redmond WA, US
    Robert P. Reichel - Redmond WA, US
    Jeffrey B. Hamblin - Redmond WA, US
    Kedarnath A. Dubhashi - Bellevue WA, US
  • Assignee:
    Microsoft Corporation - Redmond WA
  • International Classification:
    H04K 1/00
    H04L 9/00
  • US Classification:
    380 28, 380 44, 380 47, 380273, 380286, 713164, 713165, 713167, 713168, 713180
  • Abstract:
    A hashing structure including multiple sub-hashes is used to determine whether an input value matches one or more of multiple target values. These values can be of any form, such as security identifiers in an access control system. To make the determination, a hash key is obtained from the input value and multiple sub-hash indexes (one for each of the multiple sub-hashes) are generated based on the key. Values are identified from the multiple sub-hashes by indexing into the sub-hashes using respective ones of the sub-hash indexes. These values are then combined to generate a resultant hash value. Each of the multiple target values corresponds to one of multiple portions of the resultant hash value. If the portion corresponding to one of the target values has a particular value, then that target value is a likely match and is compared to the input value to determine if indeed the two match. This comparison can then be repeated for each target value with a corresponding portion in the resultant hash value that has the particular value.
  • System And Methods For Providing Dynamic Authorization In A Computer System

    view source
  • US Patent:
    7434257, Oct 7, 2008
  • Filed:
    May 4, 2001
  • Appl. No.:
    09/849093
  • Inventors:
    Praerit Garg - Kirkland WA, US
    Robert P. Reichel - Sammamish WA, US
    Richard B. Ward - Redmond WA, US
    Kedarnath A. Dubhashi - Bellevue WA, US
    Jeffrey B. Hamblin - North Bend WA, US
    Anne C. Hopkins - Seattle WA, US
  • Assignee:
    Microsoft Corporation - Redmond WA
  • International Classification:
    G06F 21/00
  • US Classification:
    726 21, 726 4, 726 17, 709229, 707 9
  • Abstract:
    A dynamic authorization callback mechanism is provided that implements a dynamic authorization model. An application can thus implement virtually any authorization policy by utilizing dynamic data and flexible policy algorithms inherent in the dynamic authorization model. Dynamic data, such as client operation parameter values, client attributes stored in a time-varying or updateable data store, run-time or environmental factors such as time-of-day, and any other static or dynamic data that is managed or retrievable by the application may be evaluated in connection with access control decisions. Hence, applications may define and implement business rules that can be expressed in terms of run-time operations and dynamic data. An application thus has substantial flexibility in defining and implementing custom authorization policy, and at the same time provides standard definitions for such dynamic data and policy.
  • Providing User On Computer Operating System With Full Privileges Token And Limited Privileges Token

    view source
  • US Patent:
    7636851, Dec 22, 2009
  • Filed:
    Jun 30, 2005
  • Appl. No.:
    11/171744
  • Inventors:
    Jeffrey B. Hamblin - Issaquah WA, US
    Jonathan Schwartz - Kirkland WA, US
    Kedarnath A. Dubhashi - Redmond WA, US
    Klaus U. Schutz - Kirkland WA, US
    Peter T. Brundrett - Seattle WA, US
    Richard B. Ward - Redmond WA, US
    Thomas C. Jones - Sammamish WA, US
  • Assignee:
    Microsoft Corporation - Redmond WA
  • International Classification:
    G06F 21/00
  • US Classification:
    713182, 713172, 713185, 709225, 709229, 726 2, 726 4, 726 9, 726 10
  • Abstract:
    An operating system for a computing device has a first session for a user that includes a first base process that has a first privileges token attached thereto. The first privileges token includes substantially a full set of privileges of the user on the operating system. The operating system also has a second session for the user that includes a second base process that has a second privileges token attached thereto. The second privileges token is derived from the first privileges token and includes only a minimum set of privileges of the user on the operating system. Thus, the second, limited token does not have all privileges associated with the first, full token but instead has a limited set of privileges and not extra privileges that could be employed to take actions that would be harmful, deceptive, or malicious.
  • Integrating Security Protection Tools With Computer Device Integrity And Privacy Policy

    view source
  • US Patent:
    8117441, Feb 14, 2012
  • Filed:
    Jun 20, 2006
  • Appl. No.:
    11/472052
  • Inventors:
    Thekkthalackal Varugis Kurien - Sammamish WA, US
    Jeffrey B Hamblin - Issaquah WA, US
    Narasimha Rao Nagampalli - Kirkland WA, US
    Peter T Brundrett - Seattle WA, US
    Scott Field - Redmond WA, US
  • Assignee:
    Microsoft Corporation - Redmond WA
  • International Classification:
    H04L 29/00
    H04L 29/06
  • US Classification:
    713164, 713150, 713165, 713166, 713167, 726 26, 726 27, 726 30
  • Abstract:
    At computer device power on, the operating system of the computer device initiates a monitor. The monitor assigns a monitoring program to each program and object (collectively, “program”) running on the computer device to monitor the activities of the program. When the monitoring program is assigned to a program, the monitoring program is assigned an integrity and/or privacy label (collectively, “integrity label”) based on predetermined criteria applied to the monitored program. The monitoring program, in turn, assigns an integrity label to the program monitored by the monitoring program. The integrity label assigned to the monitored program is less than or equal to the integrity label of the monitoring program. The monitor enforces an integrity policy of the computer device based on the integrity label assigned to monitored programs and the integrity label associated with data, another program, or a remote network resource that the monitored program is seeking to access.
  • Integrating Security Protection Tools With Computer Device Integrity And Privacy Policy

    view source
  • US Patent:
    8347085, Jan 1, 2013
  • Filed:
    Dec 30, 2011
  • Appl. No.:
    13/341855
  • Inventors:
    Thekkthalackal Varugis Kurien - Sammamish WA, US
    Jeffrey B Hamblin - Issaquah WA, US
    Narasimha Rao Nagampalli - Kirkland WA, US
    Peter T Brundrett - Seattle WA, US
    Scott Field - Redmond WA, US
  • Assignee:
    Microsoft Corporation - Redmond WA
  • International Classification:
    H04L 29/06
  • US Classification:
    713164, 713150, 713165, 713166, 713167, 726 26, 726 27, 726 30
  • Abstract:
    At computer device power on, the operating system of the computer device initiates a monitor. The monitor assigns a monitoring program to each program and object (collectively, “program”) running on the computer device to monitor the activities of the program. When the monitoring program is assigned to a program, the monitoring program is assigned an integrity and/or privacy label (collectively, “integrity label”) based on predetermined criteria applied to the monitored program. The monitoring program, in turn, assigns an integrity label to the program monitored by the monitoring program. The integrity label assigned to the monitored program is less than or equal to the integrity label of the monitoring program. The monitor enforces an integrity policy of the computer device based on the integrity label assigned to monitored programs and the integrity label associated with data, another program, or a remote network resource that the monitored program is seeking to access.
  • Resource Access Based On Multiple Scope Levels

    view source
  • US Patent:
    8464319, Jun 11, 2013
  • Filed:
    Jan 8, 2010
  • Appl. No.:
    12/684426
  • Inventors:
    Raja P. Perumal - Issaquah WA, US
    Jeffrey B. Hamblin - Issaquah WA, US
    Paul J. Leach - Seattle WA, US
  • Assignee:
    Microsoft Corporation - Redmond WA
  • International Classification:
    G06F 21/00
  • US Classification:
    726 4, 726 27
  • Abstract:
    A scope hierarchy corresponding to a resource to which a type of access is requested is identified, the scope hierarchy including multiple scope levels each of which has an associated access control list. An access control list associated with a lower scope level can further restrict access permitted to the resource by an access control list associated with a higher scope level. Based at least in part on one or more of the access control lists associated with the multiple scope levels, a determination is made as to whether the requested type of access to the resource is permitted.
  • Mandatory Integrity Control

    view source
  • US Patent:
    8646044, Feb 4, 2014
  • Filed:
    Apr 28, 2005
  • Appl. No.:
    11/117621
  • Inventors:
    Richard B. Ward - Redmond WA, US
    Jeffrey Hamblin - Issaquah WA, US
    Peter T. Brundrett - Seattle WA, US
  • Assignee:
    Microsoft Corporation - Redmond WA
  • International Classification:
    G06F 7/04
  • US Classification:
    726 4, 726 1, 726 2, 726 3, 726 5, 726 6, 726 7, 726 8, 726 9, 726 10, 709225, 380247, 380248, 380249, 380250
  • Abstract:
    The contemplated embodiments of the invention provide a method for implementing a mandatory integrity control (MIC) system that provides access control for each and every object and subject that need access control, but in a way that allows legacy operating systems to continue with little modification. The invention provides a novel method that selects an integrity level designator for a subject, when the subject logs onto the computer system. The selected integrity level designator is then added to an existing data structure in the computer system. The existing data structure may be a part of a security descriptor stored in a system access control list of an object. The existing data structure may be a part of a list of security permissions that constitute an access token for a process executing as a subject.
  • System And Methods For Caching In Connection With Authorization In A Computer System

    view source
  • US Patent:
    20020166052, Nov 7, 2002
  • Filed:
    May 4, 2001
  • Appl. No.:
    09/849099
  • Inventors:
    Praerit Garg - Kirkland WA, US
    Robert Reichel - Sammamish WA, US
    Richard Ward - Redmond WA, US
    Kedarnath Dubhashi - Bellevue WA, US
    Jeffrey Hamblin - North Bend WA, US
    Anne Hopkins - Seattle WA, US
  • Assignee:
    Microsoft Corporation
  • International Classification:
    H04L009/00
  • US Classification:
    713/182000, 713/166000
  • Abstract:
    An authorization handle is supported for each access policy determination that is likely to be repeated. In particular, an authorization handle may be assigned to access check results associated with the same discretionary access control list and the same client context. This likelihood may be determined based upon pre-set criteria for the application or service, based on usage history and the like. Once an access policy determination is assigned an authorization handle, the static maximum allowed access is cached for that policy determination. From access check to access check, the set of permissions desired by the client may change, and dynamic factors that might affect the overall privilege grant may also change; however, generally there is still a set of policies that is unaffected by the changes and common across access requests. The cached static maximum allowed access data is thus used to provide efficient operations for the evaluation of common policy sets. In systems having access policy evaluations that are repeated, authorization policy evaluations are more efficient, computer resources are free for other tasks, and performance improvements are observed.

Medicine Doctors

Jeffrey Hamblin Photo 4

Jeffrey L. Hamblin

view source
Specialties:
Psychiatry
Work:
HEAT Program
470 Clarkson Ave FL 4, Brooklyn, NY 11203
7184674446 (phone), 7184671718 (fax)
Education:
Medical School
American University of the Caribbean School of Medicine
Graduated: 1992
Procedures:
Psychiatric Diagnosis or Evaluation
Psychiatric Therapeutic Procedures
Conditions:
Attention Deficit Disorder (ADD)
Autism
Post Traumatic Stress Disorder (PTSD)
Anxiety Phobic Disorders
Bipolar Disorder
Languages:
English
French
Spanish
Description:
Dr. Hamblin graduated from the American University of the Caribbean School of Medicine in 1992. He works in Brooklyn, NY and specializes in Psychiatry.

Classmates

Jeffrey Hamblin Photo 5

Jeffrey Hamblin Lansing ...

view source
Jeffrey Hamblin 1971 graduate of Thornton Fractional South High School in Lansing, IL is on Classmates.com. See pictures, plan your class reunion and get caught up with Jeffrey and ...
Jeffrey Hamblin Photo 6

Jeffrey Hamblin Mooresvi...

view source
Jeffrey Hamblin 1994 graduate of Mooresville High School in Mooresville, NC is on Classmates.com. See pictures, plan your class reunion and get caught up with Jeffrey and other ...
Jeffrey Hamblin Photo 7

Jeffrey Hamblin

view source
Schools:
Sky View Middle School Leominster MA 2001-2005
Community:
Ruth Wankyo, Cheslea Kemembin, Brandy Benda, Kristy Corliss, Betty Boop
Jeffrey Hamblin Photo 8

Mooresville High School, ...

view source
Graduates:
Jeffrey Hamblin (1990-1994),
Rhonda Miller (1987-1991),
Robbie Newman (1990-1994),
Chad Moose (1986-1990),
Dale Shuemaker (1970-1973)
Jeffrey Hamblin Photo 9

University of Kansas - Li...

view source
Graduates:
Jeffrey Hamblin (1998-2002),
Marilyn Blackman (1960-1964),
Daniel S Henry (1984-1988),
Jennifer Whitenight (1992-1996),
Ronald Westfall (1960-1965)
Jeffrey Hamblin Photo 10

Lathrop High School, Lath...

view source
Graduates:
Jeff Hamblin (1983-1987),
Mike Partain (1976-1980),
Jo Ann Irby (1961-1965),
Eric Lovelace (1981-1985),
Patricia Hanlon (1979-1983)
Jeffrey Hamblin Photo 11

Potter Elementary School,...

view source
Graduates:
Sherry Buckland (1952-1958),
Anika Wilborn (1987-1989),
Timothy Pfeiffer (1970-1971),
Jeff Hamblin (1965-1972),
Kimberly Woods (1972-1979)
Jeffrey Hamblin Photo 12

Floyd Light Middle School...

view source
Graduates:
Michael Ramsten (1967-1968),
Taylor Lieb (1998-1999),
Jeff Hamblin (1968-1969),
Pauline Luckenbaugh (1974-1976)

Googleplus

Jeffrey Hamblin Photo 13

Jeffrey Hamblin

Tagline:
Santa Clara, CA
Jeffrey Hamblin Photo 14

Jeffrey Hamblin

Myspace

Jeffrey Hamblin Photo 15

Jeffrey Hamblin

view source
Locality:
LEOMINSTER, Massachusetts
Birthday:
1946
Jeffrey Hamblin Photo 16

Jeffrey Hamblin

view source
Locality:
BROOKVILLE, Indiana
Birthday:
1952

Youtube

Jeff Hamblin Wins Shovel Races

Jeff Hamblin wins World Downhill Shovel Races and sets new course reco...

  • Category:
    Sports
  • Uploaded:
    24 Mar, 2010
  • Duration:
    55s

The Call

Steve Schalchlin and Jake Wesley Stewart debut "The Call." Written in ...

  • Category:
    Music
  • Uploaded:
    18 Dec, 2010
  • Duration:
    3m 39s

David Vito Gregoli/Doug Hamblin "Slow Blues f...

David Vito Gregoli solos on electric guitar in "Slow Blues for Jeff", ...

  • Category:
    Music
  • Uploaded:
    25 Apr, 2010
  • Duration:
    1m 54s

Dark Hotel

ks Rhoads Directed by Jeff Wilson for Wyattfilmz DP-Ryan Hamblin

  • Category:
    Music
  • Uploaded:
    21 Jun, 2007
  • Duration:
    4m 14s

Good Time Saturday Night (The Johnny Wood Band)

This is another song I wrote! Playing with me are Jeff Lacy on the dru...

  • Category:
    Music
  • Uploaded:
    25 Jan, 2011
  • Duration:
    4m 48s

Beards and Plaid (Comedy Short)

Short film about a group of bearded Echo Park (Los Angeles) hipsters l...

  • Category:
    Comedy
  • Uploaded:
    21 Dec, 2009
  • Duration:
    4m 56s

Sean Hamblin crash Unadilla

Sean Hamblin big crash. Unadilla 2004 Ama Motocross.

  • Category:
    Sports
  • Uploaded:
    03 Mar, 2008
  • Duration:
    1m 7s

THE DARK KNIGHT with Christian Bale

You know where this is going, right? Shouts out to Ben Acker, Josh Gol...

  • Category:
    Comedy
  • Uploaded:
    17 Jul, 2008
  • Duration:
    1m 28s

Facebook

Jeffrey Hamblin Photo 17

Jeffrey Hamblin

view source
Friends:
Da Silva Santos Emeric, Steve Migot, Allison Boitard, Fabienne Ducrocq
Jeffrey Hamblin Photo 18

Jeff Hamblin

view source
Friends:
Victoria Rizzo, Jj Lehmann, Jim Weber, Julie DesJardins, Jennifer R. Slate
Jeffrey Hamblin Photo 19

Jeffrey Lee Hamblin

view source
Friends:
Kendra Jones, Jada Michele Imhoff, Cleta Collins, Missy Pepper, Taylor Day
Jeffrey Hamblin Photo 20

Jeff Hamblin

view source
Friends:
Melissa McCurley, Hadley Hamblin, Tony Rapini, Charlotte Towle Rush, Bob Johns
Jeffrey Hamblin Photo 21

Jeffrey Hamblin

view source
Friends:
Kathie Glenn, Craig Van Nieuwenhuyse, Basem Tartir

Get Report for Jeffrey Brian Hamblin from Issaquah, WA, age ~47
Control profile