Patents by Inventor Joshua Edmison

Joshua Edmison has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 9213807
    Abstract: A method for detecting foreign code injected into a computer system including a processor and memory, the processor being configured to execute instructions stored in the memory, includes: detecting, on the computer system, an illegal instruction error; recording the illegal instruction error; determining whether a threshold condition is met; and generating an alert if the threshold condition is met.
    Type: Grant
    Filed: September 4, 2013
    Date of Patent: December 15, 2015
    Assignee: RAYTHEON CYBER PRODUCTS, LLC
    Inventors: Robert Martz, David Matthews, Joshua Edmison, Greg Vorsanger
  • Patent number: 9158584
    Abstract: A method for distributing execution of a computer program to a plurality of hardware architectures of different types including: analyzing the computer program to identify a plurality of execution boundaries; selecting one or more execution boundaries from the plurality of execution boundaries; linking the computer program to the selected one or more execution boundaries; executing the computer program with linked execution boundaries; saving a hardware agnostic state of the execution of the computer program, when the execution encounters a boundary from the selected one or more execution boundaries; and transmitting the hardware agnostic state to a remote hardware architecture to be executed on the remote hardware architecture, responsive to the hardware agnostic state.
    Type: Grant
    Filed: April 3, 2013
    Date of Patent: October 13, 2015
    Assignee: RAYTHEON CYBER PRODUCTS, LLC
    Inventors: Robert Martz, David Matthews, Joshua Edmison
  • Publication number: 20150067409
    Abstract: A method for detecting foreign code injected into a computer system including a processor and memory, the processor being configured to execute instructions stored in the memory, includes: detecting, on the computer system, an illegal instruction error; recording the illegal instruction error; determining whether a threshold condition is met; and generating an alert if the threshold condition is met.
    Type: Application
    Filed: September 4, 2013
    Publication date: March 5, 2015
    Applicant: Raytheon BBN Technologies, Corp.
    Inventors: Robert Martz, David Matthews, Joshua Edmison, Greg Vorsanger
  • Publication number: 20140304708
    Abstract: A method for distributing execution of a computer program to a plurality of hardware architectures of different types including: analyzing the computer program to identify a plurality of execution boundaries; selecting one or more execution boundaries from the plurality of execution boundaries; linking the computer program to the selected one or more execution boundaries; executing the computer program with linked execution boundaries; saving a hardware agnostic state of the execution of the computer program, when the execution encounters a boundary from the selected one or more execution boundaries; and transmitting the hardware agnostic state to a remote hardware architecture to be executed on the remote hardware architecture, responsive to the hardware agnostic state.
    Type: Application
    Filed: April 3, 2013
    Publication date: October 9, 2014
    Applicant: RAYTHEON BBN TECHNOLOGIES CORP.
    Inventors: Robert Martz, David Matthews, Joshua Edmison