Patents by Inventor Steven A. Harp
Steven A. Harp has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 10348500Abstract: Methods and systems for key material management are disclosed. One system can include a virtual machine monitor (VMM) running on a host device and a number of virtual machines (VMs) running on the VMM, wherein the VMM is configured to perform key management to provide access by the number of VMs to key material required for the VMs to perform key management operations.Type: GrantFiled: May 5, 2016Date of Patent: July 9, 2019Assignee: Adventium Enterprises, LLCInventor: Steven A. Harp
-
Publication number: 20170331627Abstract: Methods and systems for key material management are disclosed. One system can include a virtual machine monitor (VMM) running on a host device and a number of virtual machines (VMs) running on the VMM, wherein the VMM is configured to perform key management to provide access by the number of VMs to key material required for the VMs to perform key management operations.Type: ApplicationFiled: May 5, 2016Publication date: November 16, 2017Applicant: Adventium Enterprises, LLCInventor: Steven A. Harp
-
Patent number: 9483302Abstract: The present disclosure includes methods and systems for providing virtual machine services. A number of embodiments can include a user VM with a virtual workstation, a number of service modules that can provide a number of services without communicating with the user VM and/or the virtual workstation, a communication channel that allows the number of service modules to communicate with each other, a computing device, and a manager. A number of embodiments can also include a virtual machine monitor to enforce an isolation policy within the system.Type: GrantFiled: March 19, 2015Date of Patent: November 1, 2016Assignee: Adventium Enterprises, LLCInventors: Jason D. Sonnek, Steven A. Harp, J. Thomas Haigh
-
Publication number: 20150193257Abstract: The present disclosure includes methods and systems for providing virtual machine services. A number of embodiments can include a user VM with a virtual workstation, a number of service modules that can provide a number of services without communicating with the user VM and/or the virtual workstation, a communication channel that allows the number of service modules to communicate with each other, a computing device, and a manager. A number of embodiments can also include a virtual machine monitor to enforce an isolation policy within the system.Type: ApplicationFiled: March 19, 2015Publication date: July 9, 2015Inventors: Jason D. Sonnek, Steven A. Harp, J. Thomas Haigh
-
Patent number: 9003408Abstract: The present disclosure includes methods and systems for providing virtual machine services. A number of embodiments can include a user VM with a virtual workstation, a number of service modules that can provide a number of services without communicating with the user VM and/or the virtual workstation, a communication channel that allows the number of service modules to communicate with each other, a computing device, and a manager. A number of embodiments can also include a virtual machine monitor to enforce an isolation policy within the system.Type: GrantFiled: September 28, 2012Date of Patent: April 7, 2015Assignee: Adventium EnterprisesInventors: Jason D. Sonnek, Steven A. Harp, J. Thomas Haigh
-
Publication number: 20140096131Abstract: The present disclosure includes methods and systems for providing virtual machine services. A number of embodiments can include a user VM with a virtual workstation, a number of service modules that can provide a number of services without communicating with the user VM and/or the virtual workstation, a communication channel that allows the number of service modules to communicate with each other, a computing device, and a manager. A number of embodiments can also include a virtual machine monitor to enforce an isolation policy within the system.Type: ApplicationFiled: September 28, 2012Publication date: April 3, 2014Applicant: ADVENTIUM ENTERPRISESInventors: Jason D. Sonnek, Steven A. Harp, J. Thomas Haigh
-
Patent number: 8590005Abstract: The present disclosure includes methods and systems for multi-domain information sharing. One or more embodiments can include a computing device with a VMM hosting a first information domain VM, a second information domain VM, and a cross-domain solution VM that controls information transfer between the first information domain VM and the second information domain VM. One or more embodiments can also include a hypervisor to enforce an isolation policy within the system.Type: GrantFiled: June 8, 2011Date of Patent: November 19, 2013Assignee: Adventium Enterprises, LLCInventors: Charles N. Payne, Jr., Jason D. Sonnek, Steven A. Harp, Richard C. O'Brien, Johnathan A. Gohde
-
Publication number: 20120317569Abstract: The present disclosure includes methods and systems for multi-domain information sharing. One or more embodiments can include a computing device with a VMM hosting a first information domain VM, a second information domain VM, and a cross-domain solution VM that controls information transfer between the first information domain VM and the second information domain VM. One or more embodiments can also include a hypervisor to enforce an isolation policy within the system.Type: ApplicationFiled: June 8, 2011Publication date: December 13, 2012Applicant: ADVENTIUM LABS, LLC.Inventors: Charles N. Payne, JR., Jason D. Sonnek, Steven A. Harp, Richard C. O'Brien, Johnathan A. Gohde
-
Patent number: 7552030Abstract: A system and method of operating a monitoring and response system for an actor in a daily living environment that relies upon learned models of behavior for adapting system operation. The learned model of behavior preferably includes sequential patterns organized pursuant to assigned partition values that in turn are generated based upon an evaluation of accumulated data. Based upon reference to the learned model of behavior, the system can generate more appropriate response plans based upon expected or unexpected activities, more readily recognize intended activities, recognize abandoned tasks, formulate probabilities of method choice, build probabilities of action success, anticipate and respond to actor movement within the environment, optimize response plan effectiveness, and share learned models across two or more separate system installations.Type: GrantFiled: January 10, 2003Date of Patent: June 23, 2009Assignee: Honeywell International Inc.Inventors: Valerie Guralnik, Karen Z. Haigh, Steven A. Harp
-
Patent number: 7421738Abstract: A skeptical system protects an asset by monitoring commands of a user, predicting a plan of the user based on the monitored commands, inferring an actual plan from the predicted plan, receiving information related to an identity of the user, inferring an actual identity of the user from the information, assessing a threat based on the actual plan and the actual user identity, and selecting, from among a plurality of possible responses, a response that is appropriate to the assessed threat.Type: GrantFiled: November 25, 2002Date of Patent: September 2, 2008Assignee: Honeywell International Inc.Inventors: Steven A. Harp, Christopher W. Geib
-
Publication number: 20080060239Abstract: An apparatus comprised of a support plate adapted to support a vehicle plate, and at least one arm, each arm having a forward portion and a rearward portion, the forward portion supporting the support plate and the rearward portion non-permanently clamping the apparatus to a vehicle below the vehicle's grille. The apparatus can further include a pad disposed on each arm or on the back of the support plate to protect the vehicle from scratching. The arms can be a fixed length, adapted for a particular make and model of a vehicle, or the arms can be adjustable in length, adapted to fit multiple makes and models of vehicles. In an embodiment of the apparatus in which multiple arms are used, the arms can be connected with a crossbar, and the crossbar can further include one or more posts disposed thereon to aid in the non-permanent clamping of the apparatus to the vehicle.Type: ApplicationFiled: August 12, 2006Publication date: March 13, 2008Inventor: Steven Harp
-
Patent number: 6754388Abstract: A graphical user interface (GUI) is used to quickly and easily find data patterns within a data sequence that match a target data pattern representing an event of interest. The user first specifies the target data pattern either by dragging a cursor over the target or by selecting the target from a palette of predefined trend patterns. Search criteria, such as a match threshold and amplitude and duration constraints, are then specified. A pattern recognition technique is then used to find data patterns within the data sequence that satisfy the search criteria. These matching data patterns are then presented to the user ranked by similarity, avoiding the need for the user to sift through large amounts of irrelevant data. Particular pattern recognition algorithms are also disclosed.Type: GrantFiled: July 1, 1999Date of Patent: June 22, 2004Assignee: Honeywell Inc.Inventors: Wendy K. Foslien, Steven A. Harp, Kamakshi Lakshminarayan, Dinkar A. Mylaraswamy
-
Publication number: 20040103296Abstract: A skeptical system protects an asset by monitoring commands of a user, predicting a plan of the user based on the monitored commands, inferring an actual plan from the predicted plan, receiving information related to an identity of the user, inferring an actual identity of the user from the information, assessing a threat based on the actual plan and the actual user identity, and selecting, from among a plurality of possible responses, a response that is appropriate to the assessed threat.Type: ApplicationFiled: November 25, 2002Publication date: May 27, 2004Inventors: Steven A. Harp, Christopher W. Geib
-
Publication number: 20030229471Abstract: A system and method of operating a monitoring and response system for an actor in a daily living environment that relies upon learned models of behavior for adapting system operation. The learned model of behavior preferably includes sequential patterns organized pursuant to assigned partition values that in turn are generated based upon an evaluation of accumulated data. Based upon reference to the learned model of behavior, the system can generate more appropriate response plans based upon expected or unexpected activities, more readily recognize intended activities, recognize abandoned tasks, formulate probabilities of method choice, build probabilities of action success, anticipate and respond to actor movement within the environment, optimize response plan effectiveness, and share learned models across two or more separate system installations.Type: ApplicationFiled: January 10, 2003Publication date: December 11, 2003Applicant: Honeywell International Inc.Inventors: Valerie Guralnik, Karen Z. Haigh, Steven A. Harp
-
Publication number: 20030053659Abstract: A method and system for use in monitoring a search area includes the provision of object path data representative of at least one object path of one or more moving objects in the search area. Defined normal and/or abnormal object path feature models are provided based on one or more characteristics associated with normal or abnormal object paths of moving objects in the search area. The feature models may be based on a clustering process. The object path data is compared to the one or more defined normal and/or abnormal object path feature models for use in determining whether the object path is normal or abnormal.Type: ApplicationFiled: December 27, 2001Publication date: March 20, 2003Applicant: Honeywell International Inc.Inventors: Ioannis Pavlidis, Steven A. Harp, Karen Z. Haigh
-
Publication number: 20030046583Abstract: Network reference models and configuration tools utilizing a database engine providing deduction facilitate automatic or semi-automatic configuration of security software packages based on security policies. One or more associated databases provide a central repository of information about the network and its security goals. The associated databases may further provide a central repository of information about network events, such as possible attacks and benign events that could be confused with attacks. Taken together, the database engine and associated databases facilitate automated generation of detailed security goals. The security goals can then be used by various configuration modules to configure security software packages installed within the network.Type: ApplicationFiled: August 30, 2001Publication date: March 6, 2003Applicant: Honeywell International Inc.Inventors: Robert P. Goldman, Steven A. Harp, Vicraj T. Thomas
-
Patent number: 5396415Abstract: PID controllers form a large proportion of controllers in use in many controlled systems today. This application describes how to use a neural network which receives PID inputs to be a controller and operate as a PID controller to save on retraining and provide other efficiencies in control. Also shown is the user selectability between PID conventional controllers and Neural Network controllers.Type: GrantFiled: January 31, 1992Date of Patent: March 7, 1995Assignee: Honeywell Inc.Inventors: Ahmet F. Konar, Tariq Samad, Steven A. Harp
-
Patent number: 5140530Abstract: The disclosure relates to the use of genetic learning techniques to evolve neural network architectures for specific applications in which a general representation of neural network architecture is linked with a genetic learning strategy to create a very flexible environment for the construction of custom neural networks.Type: GrantFiled: March 28, 1989Date of Patent: August 18, 1992Assignee: Honeywell Inc.Inventors: Aloke Guha, Steven A. Harp, Tariq Samad