Patents by Inventor James N. Potts
James N. Potts has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 11200312Abstract: A dual lock step processor system includes a first processor connected to a first memory, a second processor connected to a second memory, compiler engine, a first instruction engine operably connected to a first memory, and a second instruction engine operably connected to a second memory. The first instruction engine is configured to store a program value; encode the first program value using a first differential encoding and the compiler engine to generate a first encoded program value; and write the first encoded program value into a first address location of a plurality of first address locations. The second instruction engine is configured to store a program value; to encode the first program value using a second differential encoding and the compiler engine to generate a second encoded program value and write the second encoded program value into a second address location of a plurality of second address locations corresponding to the first selected address location.Type: GrantFiled: July 2, 2018Date of Patent: December 14, 2021Assignee: Rockwell Collins, Inc.Inventors: David A. Greve, James N. Potts
-
Patent number: 10523688Abstract: A system for confirming a computing environment includes a remote computing device connected by a communication network to a computing device. The remote computing device generates a nonce, or number used once, and executes an attestation function to determine an attestation measurement value based on the contents of the memory of the remote computing device. The nonce is transmitted by the network to the computing device, which uses the nonce to execute the attestation function based on the contents of the memory of the computing device and determine an attestation measurement value. This attestation measurement value is transmitted to the remote computing device. If the attestation measurement values match, the computing device is designated as trusted. If the attestation measurement values mismatch, the computing device is designated as untrusted.Type: GrantFiled: April 12, 2017Date of Patent: December 31, 2019Assignee: Rockwell Collins, Inc.Inventors: Luke E. Ryon, Gregory W. Rice, James N. Potts, Mark A. Bortz
-
Patent number: 10454968Abstract: Testing a system against fuzzing attacks includes negating all regular expressions used in the corresponding language, and applying those negated regular expressions to a system interface. Only expressions definitively outside the scope of protocol specification implicate vulnerabilities to fuzzing attacks. The system detects fuzzing attacks by continuously monitoring packets of data and only passing through packets that conform to regular expressions of the language.Type: GrantFiled: September 12, 2016Date of Patent: October 22, 2019Assignee: Rockwell Collins, Inc.Inventors: Mark A. Bortz, David S. Hardin, James N. Potts, Konrad L. Slind
-
Patent number: 9836989Abstract: A training data management method and related system is disclosed comprising three integrated elements. A training data network may provide a network linking a remote instructor operating an off-board data network with a student operating an onboard data network. The remote instructor may, via the datalink connection, maintain a level of control of the data set available to the student. A method for providing training data may include an onboard and off-board safety monitor configured for perceiving a safety event and sending a notification thereof to an involved participant. A system for providing training data may include a data guard configured to monitor all communications between two networks and block sensitive information, training data, and classified communications between the networks.Type: GrantFiled: September 10, 2012Date of Patent: December 5, 2017Assignee: Rockwell Collins, Inc.Inventors: Jason C. Wenger, Jaclyn A. Hoke, Brian R. Wolford, Alex Postnikov, James N. Potts, Alex W. Halfpenny
-
Patent number: 9755953Abstract: The present disclosure is directed to a system and method for applying unique routing rules to encrypted data packets being transmitted via a tunneling protocol. Because encrypted data packets are unintelligible at intermediary points along a secured link or “tunnel,” a multi-path router located between the tunnel endpoints is typically unable to apply unique routing rules. To enable unique routing, the disclosed method relies on a unique identifier that is associated with the secured link established between an initiator and a receiver (i.e., the tunnel endpoints). The unique identifier is transmitted with one or more encrypted data packets and is used at intermediary points to differentiate the encrypted data packets so that unique routing rules can be applied.Type: GrantFiled: July 24, 2014Date of Patent: September 5, 2017Assignee: Rockwell Collins, Inc.Inventors: Patrick J. Morrissey, Kesava Srinivas Vunnava, James N. Potts, Justin William Ehm, Rhishi Pratap Singh
-
Patent number: 9059853Abstract: A system for preventing a computing device from obtaining unauthorized access to a secure network includes a client agent operably connected to the computing device configured to intercept network traffic information from applications running on the computing device and transmit a network request including application information and the network traffic information. A network token broker operably connected to the network client agent contains a database of application information. The network token broker is configured to cooperate with the network client agent for i) verifying whether the network request should be granted access to the secure network, and ii) cryptographically signing the intercepted network traffic information with a network authorization token, to authorize network access for the intercepted network traffic information.Type: GrantFiled: February 22, 2012Date of Patent: June 16, 2015Assignee: Rockwell Collins, Inc.Inventors: Mark A. Bortz, James N. Potts, Gregory W. Rice, Karl F. Hoech
-
Patent number: 8842940Abstract: The present invention includes an image processing system with several data compression processing units connected together with a communication bus. Each data compression processing unit includes a wavelet transform processing unit, a shared register file and an address computation processing unit. The wavelet transform processing unit decomposes data from one or more segments of an image into wavelets using a discrete wavelet transform. The shared register stores the intermediate wavelet coefficient computations. The address computation processing unit identifies addresses of wavelets to be decomposed by subsequent operation of the wavelet transform processing unit. The system also includes storage where the resultant wavelet coefficients from each segment may be stored. The present invention also includes methods of compressing image data using multiple processors where each processor operates on a segment of the image data.Type: GrantFiled: October 2, 2009Date of Patent: September 23, 2014Assignee: Rockwell Collins, Inc.Inventors: John K. Gee, Jennifer A. Davis, David W. Jensen, James N. Potts
-
Patent number: 8661246Abstract: A system for preventing computer software from communicating from a user computer in a network to untrusted remote computers. A host-based credential management agent is operably connected to a user computer for intercepting network traffic information from the user computer and transmitting a network request including credentials of the remote computer and the network traffic information. A trusted credential database contains information identifying trusted entities and corresponding cryptographic certificates. A server cooperates with the management agent for i) verifying whether the user computer in the network request should have network access, and ii) cryptographically signing the intercepted network traffic information with an authorization server key, to authorize network access for the intercepted information. A firewall is operably connected to the user computer and the authorization server.Type: GrantFiled: April 9, 2012Date of Patent: February 25, 2014Assignee: Rockwell Collins, Inc.Inventors: Karl F. Hoech, James N. Potts, Gregory W. Rice, Mark A. Bortz
-
Patent number: 8631244Abstract: A system for preventing computer malware from exfiltrating data from a user computer in a network via the internet. A host-based network process monitor intercepts network traffic information from the user computer and transmits a network request including user and application information including the network traffic information. An authorization server cooperates with the host-based network process monitor for i) verifying whether the user and process in the network request should have network access, and ii) cryptographically signing the intercepted network traffic information with an authorization server key, to authorize network access for the intercepted network traffic information. A firewall system is operably connected to the user computer and the authorization server configured to inspect the network traffic information from the user computer and reject any traffic information not signed with the authorization server key.Type: GrantFiled: August 11, 2011Date of Patent: January 14, 2014Assignee: Rockwell Collins, Inc.Inventors: James N. Potts, Sung J. Kim, Julianne R. Crosmer, Karl F. Hoech
-
Publication number: 20130323687Abstract: A training data management method and related system is disclosed comprising three integrated elements. A training data network may provide a network linking a remote instructor operating an off-board data network with a student operating an onboard data network. The remote instructor may, via the datalink connection, maintain a level of control of the data set available to the student. A method for providing training data may include an onboard and off-board safety monitor configured for perceiving a safety event and sending a notification thereof to an involved participant. A system for providing training data may include a data guard configured to monitor all communications between two networks and block sensitive information, training data, and classified communications between the networks.Type: ApplicationFiled: September 10, 2012Publication date: December 5, 2013Applicant: Rockwell Collins, Inc.Inventors: Jason C. Wenger, Jaclyn A. Hoke, Brian R. Wolford, Alex Postnikov, James N. Potts, Alex W. Halfpenny