Search

Robert Unoki Phones & Addresses

  • 16459 17Th St, Bellevue, WA 98008
  • Issaquah, WA
  • 7230 148Th Ave, Redmond, WA 98052
  • Seattle, WA
  • Kiona, WA
  • Painted Post, NY
  • West Lafayette, IN
  • W Lafayette, IN
  • 7230 148Th Pl NE, Redmond, WA 98052

Work

Company: Microsoft Apr 2008 Position: Development manager

Education

Degree: BS School / High School: Purdue University 1987 to 1991 Specialities: Computer Science

Industries

Computer Software

Resumes

Resumes

Robert Unoki Photo 1

Xna Development Manager At Microsoft

View page
Position:
Development Manager at Microsoft
Location:
Greater Seattle Area
Industry:
Computer Software
Work:
Microsoft since Apr 2008
Development Manager

Microsoft Corp. - .Net Compact Framework 2005 - 2008
Development Lead

Digicomp Research 1993 - 1995
QA Engineer and System Administrator
Education:
Purdue University 1987 - 1991
BS, Computer Science

Publications

Us Patents

Verification Of Un-Trusted Code For Consumption On An Insecure Device

View page
US Patent:
8196213, Jun 5, 2012
Filed:
Jul 11, 2008
Appl. No.:
12/171936
Inventors:
Michael Klucher - Duvall WA, US
Paul L. Bleisch - Sammamish WA, US
Joerg Raymound Brown - Woodinville WA, US
Robert S. Unoki - Redmond WA, US
Assignee:
Microsoft Corporation - Redmond WA
International Classification:
G06F 17/30
US Classification:
726 27, 726 4, 726 26
Abstract:
Disclosed is a code verification service that detects malformed data in an automated process and rejects submission and distribution if any malicious code is found. Once the submission is verified it may be packaged in container. The container may then be deployed to a mobile device, and the public key may be used to verify that the container authentic. The device can load trusted managed libraries needed to execute the application and a manager can ensure that only trusted libraries access native resources of the device.

Generating Security Validation Code Automatically

View page
US Patent:
8479283, Jul 2, 2013
Filed:
Nov 28, 2006
Appl. No.:
11/564204
Inventors:
David Charles Wrighton - Redmond WA, US
Robert Sadao Unoki - Redmond WA, US
Assignee:
Microsoft Corporation - Redmond WA
International Classification:
G06F 12/14
US Classification:
726 22, 726 23, 726 24, 713164
Abstract:
A security program code generator is configured to automatically generate program code used to perform one or more validation checks of components operating in user mode. In one implementation, for example, the program code generator receives one or more files that include declarative values and parameters regarding one or more function calls made by any user mode component. The program code generator then takes the file of declarative call descriptions and automatically generates a user mode stub and a kernel mode stub for each function call of interest to be handled by a kernel mode component. The file(s) that include the user mode stub and the kernel mode stub can then be compiled and linked into the operating system components.

Restricting Type Access To High-Trust Components

View page
US Patent:
20080126740, May 29, 2008
Filed:
Dec 7, 2006
Appl. No.:
11/567871
Inventors:
David Charles Wrighton - Redmond WA, US
Robert Sadao Unoki - Redmond WA, US
Assignee:
MICROSOFT CORPORATION - Redmond WA
International Classification:
G06F 12/00
US Classification:
711208, 711E12066
Abstract:
Sensitive data structures, such as type data structures, can be used by untrusted application programs without necessarily exposing the sensitive data structures directly. For example, untrusted components, such as application programs that may or may not be type safe, can be allowed to operate in a lower-privilege mode. In addition, the application programs can be associated with an address space with limited permissions (e.g., read-only) to a shared memory heap. Requests by the untrusted components for sensitive data structures can then be handled by trusted components operating in a higher-privilege mode, which may have broader permissions to the shared memory heap. If the requests by the untrusted components are deemed to be valid, the results of the requests can be shared with the lower-privilege mode components through the shared memory heap.

Compiling Executable Code Into A Less-Trusted Address Space

View page
US Patent:
20080127142, May 29, 2008
Filed:
Nov 28, 2006
Appl. No.:
11/564249
Inventors:
David Charles Wrighton - Redmond WA, US
Robert Sadao Unoki - Redmond WA, US
Assignee:
MICROSOFT CORPORATION - Redmond WA
International Classification:
G06F 9/45
US Classification:
717148
Abstract:
Unsafe application programs that implement managed code can be executed in a secure fashion. In particular, an operating system can be configured to execute an application program in user mode, but handle managed code compilation through a type-safe JIT compiler operating in kernel mode. The operating system can also designate a single memory location to be accessed through multiple address spaces with different permission sets. An application program operating in user mode can be executed in the read/execute address space, while the JIT compiler operates in a read/write address space. When encountering one or more pointers to intermediate language code, the application runtime can send one or more compilation requests to a kernel mode security component, which validates the requests. If validated, the JIT compiler will compile the requested intermediate language code, and the application program can access the compiled code from a shared memory heap.

Securing Communications With Enhanced Media Platforms

View page
US Patent:
20160330188, Nov 10, 2016
Filed:
Jul 19, 2016
Appl. No.:
15/214294
Inventors:
- Redmond WA, US
Daniel Collins Balma - Paris, FR
Rocco Crea, III - Issaquah WA, US
Michael Brendan Frei - Seattle WA, US
Paul Stephen Hellyar - Kirkland WA, US
Victor Tan - Kirkland WA, US
Kye Hyun Kim - Seattle WA, US
Travis J. Muhlestein - Redmond WA, US
Robert S. Unoki - Redmond WA, US
Kenneth Michael Bayer - Kirkland WA, US
Wes Wahlin - Seattle WA, US
International Classification:
H04L 29/06
Abstract:
Various methods and systems for securing communications with enhanced media platforms, are provided. In particular, an enhanced media platform is authenticated using a trusted location. The authenticated enhanced media platform establishes a bidirectional trust with an enhanced remote location, the enhanced media platform being stored in the enhanced remote location. Upon authentication and establishing the bidirectional trust, the enhanced media platform may securely communicate media content in a media content distribution service infrastructure while supporting custom functionality. The method for securing communications with enhanced media platforms includes communicating authentication credentials to an internal security component at the trusted location. The method further includes receiving validation credentials from the internal security component. The method also includes authenticating the enhanced remote location based on at least a portion of the validation credentials received. The method further includes establishing the bidirectional trust relationship with the enhanced remote location using the validation credentials.

Securing Communications With Enhanced Media Platforms

View page
US Patent:
20150372998, Dec 24, 2015
Filed:
Jun 19, 2014
Appl. No.:
14/309417
Inventors:
- Redmond WA, US
DANIEL COLLINS BALMA - PARIS, FR
ROCCO CREA, III - ISSAQUAH WA, US
MICHAEL BRENDAN FREI - SEATTLE WA, US
PAUL STEPHEN HELLYAR - KIRKLAND WA, US
VICTOR TAN - KIRKLAND WA, US
KYE HYUN KIM - SEATTLE WA, US
TRAVIS J. MUHLESTEIN - REDMOND WA, US
ROBERT S. UNOKI - REDMOND WA, US
KENNETH MICHAEL BAYER - KIRKLAND WA, US
WES WAHLIN - SEATTLE WA, US
International Classification:
H04L 29/06
H04L 9/32
Abstract:
Various methods and systems for securing communications with enhanced media platforms, are provided. In particular, an enhanced media platform is authenticated using a trusted location. The authenticated enhanced media platform establishes a bidirectional trust with an enhanced remote location, the enhanced media platform being stored in the enhanced remote location. Upon authentication and establishing the bidirectional trust, the enhanced media platform may securely communicate media content in a media content distribution service infrastructure while supporting custom functionality. The method for securing communications with enhanced media platforms includes communicating authentication credentials to an internal security component at the trusted location. The method further includes receiving validation credentials from the internal security component. The method also includes authenticating the enhanced remote location based on at least a portion of the validation credentials received. The method further includes establishing the bidirectional trust relationship with the enhanced remote location using the validation credentials.

Management Of Headless Hardware In Data Center

View page
US Patent:
20150350340, Dec 3, 2015
Filed:
May 30, 2014
Appl. No.:
14/291997
Inventors:
- Redmond WA, US
Chad Wesley Wahlin - Issaquah WA, US
Kye Hyun Kim - Bellevue WA, US
Anthony Vincent Discolo - Sammamish WA, US
Russell Alexander - Seattle WA, US
Travis J. Muhlestein - Redmond WA, US
Robert Unoki - Redmond WA, US
Kenneth Michael Bayer - Kirkland WA, US
Assignee:
Microsoft Corporation - Redmond WA
International Classification:
H04L 29/08
Abstract:
A data center controller that maintains operation of at least one of its constituent headless hardware devices. An example of a headless hardware device may be server, or a server blade. The data center controller identifies that a particular headless hardware device has an unmanaged state, which means the headless hardware device is non-bootable without further code. In response, the data center controller decides which of one or more operational supplements are to be installed on the headless hardware device. The one or more operational supplements are sufficient at least to transition the headless hardware device from an unmanaged state to a managed state, thus allowing the headless hardware device to complete the boot process. The operational supplement(s) might include a management interface through which the data center controller might provide further management instructions to the headless hardware device.

Game Progression Using Retrieved Partial User Data

View page
US Patent:
20150297999, Oct 22, 2015
Filed:
Apr 22, 2014
Appl. No.:
14/258962
Inventors:
- Redmond WA, US
Daniel Kyle Taylor - Redmond WA, US
Justin Layne Nordin - Redmond WA, US
Daniel Ryan Mitchell - Redmond WA, US
Malia Rebecca Guerrero - Seattle WA, US
Kurt Mar - Issaquah WA, US
Roger Arthur Roach - Redmond WA, US
Travis J. Muhlestein - Redmond WA, US
Robert Unoki - Redmond WA, US
Kenneth Michael Bayer - Kirkland WA, US
Paul Stephen Hellyar - Kirkland WA, US
Assignee:
Microsoft Corporation - Redmond WA
International Classification:
A63F 13/35
A63F 13/49
Abstract:
A system that contains multiple game servers that have a non-user specific unused state, and a user-specific game state. When the game server is providing a game service on the other hand, the game server first obtains the user data for the user and game that is to be initiated. Accordingly, the game servers may be thought of as a bank of game servers, any one of which being potentially utilizable for incoming game requests. Once the game session is completed, the user data for the gamer may be deleted, and the game server goes back into the pool of available generic game servers. The user data is downloaded from a user data store, and may be quite limited to perhaps just that portion of the user data that relates to the game to be played.
Robert S Unoki from Issaquah, WA, age ~55 Get Report