Patents by Inventor Edwin Wrench
Edwin Wrench has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Publication number: 20080028212Abstract: Methods for providing communication security between computerized devices in, for example, an ad hoc or temporary networked environment. In one embodiment, the network comprises an untrusted network, and the method includes providing network security apparatus adapted to create security associations between devices on the network, including mutual authentication. The method further may comprise encrypting traffic between the associated devices for e.g., data confidentiality and integrity protection by running one or more computer programs on the respective devices. In one variant, the network security apparatus comprises a software entity disposed at least partly within the software stack of the devices. The associated devices may be for example fixed or portable, and may be untrusted (e.g., have an untrusted operating systems).Type: ApplicationFiled: July 11, 2007Publication date: January 31, 2008Applicant: MICRON TECHNOLOGY, INC.Inventors: James Holden, Stephen Levin, James Nickel, Edwin Wrench
-
Publication number: 20080016332Abstract: A system for providing communications security and authentication to a plurality of computerized devices is disclosed. In one embodiment, the system is useful with an untrusted network, and comprises security apparatus adapted to create associations with a plurality of security devices on the network. Traffic between the associated devices may be encrypted and residue-protected for e.g., data confidentiality and integrity protection. In one variant, the security apparatus of the system comprises a software entity disposed at least partly within the software stack of a host. A security card may also be used as part of the security apparatus system. The computerized devices of the system may be untrusted (e.g., have an untrusted operating system) and also be physically unsecure.Type: ApplicationFiled: July 11, 2007Publication date: January 17, 2008Applicant: MICRON TECHNOLOGY, INC.Inventors: James Holden, Stephen Levin, James Nickel, Edwin Wrench
-
Publication number: 20080016340Abstract: A system adapted to provide communication security between computerized devices in, for example, an ad hoc or temporary networked environment. In one embodiment, the network comprises an untrusted network, and the system includes network security apparatus adapted to create security associations between devices on the network, including mutual authentication. Traffic between the associated devices may be encrypted for e.g., data confidentiality and integrity protection. In one variant, the network security apparatus comprises a software entity disposed at least partly within the software stack of the devices. The associated devices may be for example fixed or portable, and may be untrusted (e.g., have an untrusted operating system).Type: ApplicationFiled: July 11, 2007Publication date: January 17, 2008Applicant: MICRON TECHNOLOGY, INC.Inventors: James Holden, Stephen Levin, James Nickel, Edwin Wrench
-
Publication number: 20080016227Abstract: A multi-level network security system is disclosed for a computer host device coupled to at least one computer network. The system including a secure network interface Unit (SNIU) contained within a communications stack of the computer device that operates at a user layer communications protocol. The SNIU communicates with other like SNIU devices on the network by establishing an association, thereby creating a global security perimeter for end-to-end communications and wherein the network may be individually secure or non-secure without compromising security of communications within the global security perimeter. The SNIU includes a host/network interface for receiving messages sent between the computer device and network. The interface operative to convert the received messages to and from a format utilized by the network. A message parser for determining whether the association already exists with another SNIU device.Type: ApplicationFiled: July 11, 2007Publication date: January 17, 2008Applicant: MICRON TECHNOLOGY, INC.Inventors: James Holden, Stephen Levin, James Nickel, Edwin Wrench
-
Publication number: 20080016343Abstract: Methods of operating a portable communications device so as to provide communications security and user identification and authentication. In one embodiment, the method comprises placing the device in communication with an untrusted network, and using its security apparatus for creating associations with one or more security devices on the network. Traffic between the associated devices may be encrypted and protected for e.g., data confidentiality and integrity protection. In one variant, the security apparatus comprises a software entity disposed at least partly within the software stack of a host, and a removable security card. The portable device may be untrusted (e.g., have an untrusted operating system) and also be physically unsecure.Type: ApplicationFiled: July 11, 2007Publication date: January 17, 2008Applicant: MICRON TECHNOLOGY, INC.Inventors: James Holden, Stephen Levin, James Nickel, Edwin Wrench
-
Publication number: 20080016345Abstract: A portable computerized device useful within a network and adapted to provide communication security. In one embodiment, the network comprises an untrusted network, and the portable device comprises network security apparatus adapted to create associations with other network security devices on the network. Traffic between the associated devices may be encrypted for e.g., data confidentiality and integrity protection. In one variant, the network security apparatus comprises a software entity disposed at least partly within the software stack of a host computer. A card-like hardware structure may also be used as part of the security apparatus. The host computer may be untrusted (e.g., have an untrusted operating system).Type: ApplicationFiled: July 11, 2007Publication date: January 17, 2008Applicant: MICRON TECHNOLOGY, INC.Inventors: James Holden, Stephen Levin, James Nickel, Edwin Wrench
-
Publication number: 20080016344Abstract: A system useful within a network and adapted to provide communication security. In one embodiment, the network comprises an untrusted network, and the system includes network security apparatus adapted to create security associations between devices on the network, including mutual authentication. Traffic between the associated devices may be encrypted for e.g., data confidentiality and integrity protection. In one variant, the network security apparatus comprises a software entity disposed at least partly within the software stack of the devices. The associated devices may be for example fixed or portable, and may also act as a gateway to other networks (including the Internet). The portable devices may be untrusted (e.g., have an untrusted operating system).Type: ApplicationFiled: July 11, 2007Publication date: January 17, 2008Applicant: MICRON TECHNOLOGY, INC.Inventors: James Holden, Stephen Levin, James Nickel, Edwin Wrench
-
Publication number: 20080016226Abstract: A portable communications device adapted to provide communication security in, for example, an ad hoc or temporary networked environment. In one embodiment, the network comprises an untrusted medium, and the device includes network security apparatus adapted to create security associations between devices on the network, including mutual authentication. Traffic between the associated devices may be encrypted for e.g., data confidentiality and integrity protection. In one variant, the network security apparatus comprises a software entity disposed at least partly within the software stack of the device. The device may be untrusted (e.g., have an untrusted operating system). User identification or validation may also be provided, for example via inputs received via a user interface.Type: ApplicationFiled: July 11, 2007Publication date: January 17, 2008Applicant: MICRON TECHNOLOGY, INC.Inventors: James Holden, Stephen Levin, James Nickel, Edwin Wrench
-
Publication number: 20080010454Abstract: A computerized access device useful within a network and adapted to provide communication security. In one embodiment, the network comprises an untrusted network, and the access device comprises stand-alone network security apparatus adapted to create associations with other network security devices on the network. Traffic between the associated devices may be encrypted for e.g., data confidentiality and integrity protection. In one variant, the network security apparatus comprises a software entity disposed at least partly within the software stack of a stand-alone hardware device. In another variant, the device functions as a gateway or portal to another network (e.g., the Internet or another untrusted network), or to another device within the same network.Type: ApplicationFiled: July 11, 2007Publication date: January 10, 2008Applicant: MICRON TECHNOLOGY, INC.Inventors: James Holden, Stephen Levin, James Nickel, Edwin Wrench
-
Publication number: 20080010461Abstract: A portable communications device adapted to provide communications security and user identification, and authentication. In one embodiment, the device is useful with an untrusted network, and comprises security apparatus adapted to create associations with one or more security devices on the network. Traffic between the associated devices may be encrypted and residue-protected for e.g., data confidentiality and integrity protection. In one variant, the security apparatus comprises a software entity disposed at least partly within the software stack of a host. A security card may also be used as part of the security apparatus. The portable device may be untrusted (e.g., have an untrusted operating system) and also be physically unsecure. In one variant, the security apparatus is also agnostic to the portable device with which it is used.Type: ApplicationFiled: July 11, 2007Publication date: January 10, 2008Applicant: MICRON TECHNOLOGY, INC.Inventors: James Holden, Stephen Levin, James Nickel, Edwin Wrench
-
Publication number: 20070250708Abstract: A multi-level network security system is disclosed for a computer host device coupled to at least one computer network. The system including a secure network interface Unit (SNIU) contained within a communications stack of the computer device that operates at a user layer communications protocol. The SNIU communicates with other like SNIU devices on the network by establishing an association, thereby creating a global security perimeter for end-to-end communications and wherein the network may be individually secure or non-secure without compromising security of communications within the global security perimeter. The SNIU includes a host/network interface for receiving messages sent between the computer device and network. The interface operative to convert the received messages to and from a format utilized by the network. A message parser for determining whether the association already exists with another SNIU device.Type: ApplicationFiled: June 25, 2004Publication date: October 25, 2007Applicant: Micron Technology, Inc.Inventors: James Holden, Stephen Levin, James Nickel, Edwin Wrench
-
Publication number: 20060020800Abstract: A method is disclosed for mixed enclave operation of a computer network with users employing a multi-level network security interface and users without any network security interface. Either the network security user selects or the network security interface automatically selects whether communications are permissible with other unsecured users. Where a mixed enclave operation is selected, the network security user identifies when communications are being undertaken with another secured user or a non-secured user. Communications with a non-secured user at a lower security level entail securing the data residing with the secured user from transmission back to the non-secured user.Type: ApplicationFiled: September 28, 2005Publication date: January 26, 2006Inventors: James Holden, Stephen Levin, David Snow, Edwin Wrench
-
Publication number: 20050010766Abstract: A multi-level network security system is disclosed for a computer host device coupled to at least one computer network. The system including a secure network interface Unit (SNIU) contained within a communications stack of the computer device that operates at a user layer communications protocol. The SNIU communicates with other like SNIU devices on the network by establishing an association, thereby creating a global security perimeter for end-to-end communications and wherein the network may be individually secure or non-secure without compromising security of communications within the global security perimeter. The SNIU includes a host/network interface for receiving messages sent between the computer device and network. The interface operative to convert the received messages to and from a format utilized by the network. A message parser for determining whether the association already exists with another SNIU device.Type: ApplicationFiled: June 25, 2004Publication date: January 13, 2005Inventors: James Holden, Stephen Levin, James Nickel, Edwin Wrench