Search

Jason Garms Phones & Addresses

  • Kirkland, WA
  • Cle Elum, WA
  • Roslyn, WA
  • Redmond, WA
  • Woodinville, WA
  • Kittitas, WA
  • Ames, IA
  • Port Ludlow, WA

Resumes

Resumes

Jason Garms Photo 1

Jason Garms

View page
Jason Garms Photo 2

Director Of Software Development - Retail Systems Subsidiary Integration At Amazon

View page
Location:
Greater Seattle Area
Industry:
Computer Software

Publications

Us Patents

Automatic Re-Authentication

View page
US Patent:
7383571, Jun 3, 2008
Filed:
Jan 24, 2006
Appl. No.:
11/275681
Inventors:
Nadim Y. Abdo - Redmond WA, US
Adam J. Overton - Redmond WA, US
Jason Garms - Woodinville WA, US
Alvin Loh - Sammamish WA, US
Scott A. Field - Redmond WA, US
Assignee:
Microsoft Corporation - Redmond WA
International Classification:
H04L 9/00
G06F 15/16
G06F 21/00
US Classification:
726 3, 713176, 709227
Abstract:
Upon successfully authenticating a client device with a server system, the client device and server system share auto-reconnect data. Upon subsequently losing and re-establishing communications with the server system, the client sends an auto-authenticate request to the server. The auto-authenticate request includes a session verifier that is based at least in part on the shared auto-reconnect data. The server validates the session verifier. If the validation is successful, the server automatically re-authenticates the client device.

Computer Security Management, Such As In A Virtual Machine Or Hardened Operating System

View page
US Patent:
7409719, Aug 5, 2008
Filed:
Dec 21, 2004
Appl. No.:
11/019094
Inventors:
Benjamin Armstrong - Redmond WA, US
Paul England - Bellevue WA, US
Scott A. Field - Redmond WA, US
Jason Garms - Woodinville WA, US
Michael Kramer - Redmond WA, US
Kenneth D. Ray - Seattle WA, US
Assignee:
Microsoft Corporation - Redmond WA
International Classification:
G06F 21/00
US Classification:
726 24, 713 1, 713187, 713188
Abstract:
A security scheme provides security to one or more self-contained operating environment instances executing on a computer. The security scheme may include implementing a set of security applications that may be controlled by a supervisory process, or the like. Both the set of security applications and the supervisory process may operate on a host system of the computer, which may also provide a platform for execution of the one or more self-contained operating environments. The security scheme protects processes running in the one or more self-contained operating environment and processes running on the computer outside of the self-contained operating environments.

Automatic Re-Authentication

View page
US Patent:
7475421, Jan 6, 2009
Filed:
Jan 25, 2006
Appl. No.:
11/275711
Inventors:
Nadim Y. Abdo - Redmond WA, US
Adam J. Overton - Redmond WA, US
Jason Garms - Woodinville WA, US
Alvin Loh - Sammamish WA, US
Scott A. Field - Redmond WA, US
Assignee:
Microsoft Corporation - Redmond WA
International Classification:
H04L 9/00
G06F 21/00
G06F 15/16
US Classification:
726 3, 713176, 709227
Abstract:
Upon successfully authenticating a client device with a server system, the client device and server system share auto-reconnect data. Upon subsequently losing and re-establishing communications with the server system, the client sends an auto-authenticate request to the server. The auto-authenticate request includes a session verifier that is based at least in part on the shared auto-reconnect data. The server validates the session verifier. If the validation is successful, the server automatically re-authenticates the client device.

Hardware Assist For Pattern Matches

View page
US Patent:
7526804, Apr 28, 2009
Filed:
Feb 2, 2004
Appl. No.:
10/770329
Inventors:
Art Shelest - Sammamish WA, US
Jason Garms - Woodinville WA, US
Assignee:
Microsoft Corporation - Redmond WA
International Classification:
G06F 11/00
H04L 9/32
US Classification:
726 22, 726 23, 726 24, 726 25, 713187, 713188
Abstract:
An application contacts the Application Specific Integrated Circuit (ASIC) with a request for a job, along with the name or identifier of a data stream to pattern match against, the name or identifier of the pattern set to use, and whether the job is partial or full. Depending on the priority rules set by the ASIC administrator, the ASIC may stop the job it is currently doing and begin work on the new job, or wait until the current job is finished before starting the new job. The ASIC determines if the pattern set for the new job is already stored in the cache, and contacts the calling application if it is not. Once the correct pattern set is loaded, the ASIC begins pattern matching on the requested data stream. The data stream is compared byte by byte with the each of the patterns in the loaded set. The ASIC will return a match to the calling application if a match has been made with one of the patterns in the pattern set.

Efficient Patching

View page
US Patent:
7559058, Jul 7, 2009
Filed:
Jun 30, 2004
Appl. No.:
10/881810
Inventors:
Anthony Blumfield - Redmond WA, US
Gilad Golan - Redmond WA, US
Jason Garms - Woodinville WA, US
Saud Alshibani - Issaquah WA, US
Assignee:
Microsoft Corporation - Redmond WA
International Classification:
G06F 9/44
US Classification:
717172, 717171, 717168, 717174, 717176, 719191
Abstract:
A facility for automatically processing software patches is described. The facility receives in a computing system a distinguished patch package for modifying the behavior of a programmatic entity. The facility automatically extracts from the distinguished patch package (1) patch application information that identifies a distinguished programmatic entity against which the patches to be applied, and (2) patch behavior information that specifies a manner in which to modify the behavior of the distinguished programmatic entity. The facility automatically adds to a patch table a distinguished entry containing the extracted patch application information and patch behavior information.

Identifying And Removing Potentially Unwanted Software

View page
US Patent:
7685149, Mar 23, 2010
Filed:
Mar 28, 2005
Appl. No.:
11/092995
Inventors:
Angela K. Butcher - Duvall WA, US
Jason Garms - Woodinville WA, US
Kalid M. Azad - Bellevue WA, US
Marc E. Seinfeld - Mid Levels, HK
Paul J. Bryan - Kenmore WA, US
Sterling M. Reasor - Bellevue WA, US
Alvin Loh - Sammamish WA, US
Assignee:
Microsoft Corporation - Redmond WA
International Classification:
G06F 17/00
G06F 15/173
G06F 11/32
US Classification:
707102, 7071041, 709223, 713188, 726 23
Abstract:
A system and method for identifying and removing potentially unwanted software. A mechanism is provided that identifies suspect programs to a user and allows the user to prevent the suspect programs from running without actually deleting them. In one embodiment, scanner data identifying potentially unwanted software is displayed in a GUI that allows the user to inhibit its continued execution. For example, any software not on a list of known, benign applications/processes may be identified as potentially unwanted. Similarly, software that displays one or more suspect behaviors may be so identified, allowing the user to distinguish between normal and suspect software without irreversibly altering the user's system.

Method And System For Filtering Communications To Prevent Exploitation Of A Software Vulnerability

View page
US Patent:
7694022, Apr 6, 2010
Filed:
Sep 30, 2004
Appl. No.:
10/955963
Inventors:
Jason Garms - Woodinville WA, US
Chuanxiong Guo - Nanjing, CN
Daniel R. Simon - Seattle WA, US
Jiahe Helen Wang - Issaquah WA, US
Alf Peter Zugenmaier - Cambs, GB
Assignee:
Microsoft Corporation - Redmond WA
International Classification:
G06F 15/173
G06F 15/16
G06F 11/00
US Classification:
709249, 709224, 709230, 714 4, 714 39
Abstract:
A method and system for protecting an application that implements a communication protocol against exploitation of a communication-based vulnerability is provided. A protection system provides a protection policy that specifies how to recognize messages that expose a specific vulnerability and specifies actions to take when the vulnerability is exposed. A protection policy specifies the sequence of messages and their payload characteristics that expose a vulnerability. The protection system may specify the sequences of messages using a message protocol state machine. A message protocol state machine of an application represents the states that the application transitions through as it receives various messages. The message protocol state machine of the protection policy may be a portion of the message protocol state machine of the application relating to the vulnerability. The protection system uses the message protocol state machine to track the states that lead up to the exposing of the vulnerability.

Feedback-Driven Malware Detector

View page
US Patent:
7730040, Jun 1, 2010
Filed:
Jul 27, 2005
Appl. No.:
11/190749
Inventors:
Sterling M Reasor - Bellevue WA, US
Andrew J Newman - Kirkland WA, US
Ronald A Franczyk - Kirkland WA, US
Jason Garms - Woodinville WA, US
Christopher Ryan Jones - Kirkland WA, US
Assignee:
Microsoft Corporation - Redmond WA
International Classification:
G07F 17/30
US Classification:
707690, 726 24
Abstract:
Embodiments of a feedback-driven malware detector are directed to protecting a computer from programs that perform actions that are malicious or not expected by a user. In one embodiment, the feedback-driven malware detector performs a method that initially determines whether the state of an application program scheduled to be added to an extensibility point on a computer is already known. If the state of the object is not already known, the user is informed that an application program is being installed on the computer and that the application program is being added to an extensibility point. Then, input is obtained from the user that assists in determining whether the application program is malware.

Isbn (Books And Publications)

Windows NT 4.0 Server Unleashed, with CD-ROM : Professional Reference Edition

View page
Author

Jason Garms

ISBN #

0672310023

Windows Nt Server 4 Unleashed

View page
Author

Jason Garms

ISBN #

0672312492

Jason M Garms from Kirkland, WA, age ~53 Get Report