Patents Assigned to Assured Information Security, Inc.
  • Patent number: 8478974
    Abstract: Methods for reducing the impact of malware during a booting sequence for an interrupt driven computing device are disclosed. One or more parameters associated with an interrupt vector table (IVT) are manipulated to force the computing device into a clean state following a system level portion of the booting sequence. In another embodiment, occurring prior to the loading of an operating system or a call to a non-returnable main( ) function, one or more unused interrupt vectors in an IVT are replaced. A function filter is implemented for one or more interrupt vectors in the IVT to disallow unnecessary interrupt functions from being executed. One or more required interrupt vector functions are replaced with one or more corresponding custom vector functions. One or more memory locations are wiped if the one or more memory locations do not hold at least a portion of the IVT and/or the interrupt vector functions.
    Type: Grant
    Filed: June 23, 2010
    Date of Patent: July 2, 2013
    Assignee: Assured Information Security, Inc.
    Inventors: Ryan Matthew Wilson, Joseph James Sharkey, Michael Joseph Sieffert
  • Publication number: 20120260345
    Abstract: Verification of trustworthiness of a computing platform is provided. The trustworthiness of the computing platform is dynamically assessed to determine whether a root of trust exists on the computing platform. Responsive to determining existence of the root of trust, data is unsealed from a sealed storage facility. The sealed storage facility is unsealed responsive to a root of trust being determined to exist on the computing platform. The data can be used to attest to the trustworthiness of the computing platform to other device on a network.
    Type: Application
    Filed: March 30, 2012
    Publication date: October 11, 2012
    Applicant: ASSURED INFORMATION SECURITY, INC.
    Inventors: Rian QUINN, Jacob TORREY
  • Patent number: 8098155
    Abstract: A method for locating a target wireless device is disclosed. At least one directional antenna is swept through a field of view at each of a plurality of sensing locations. A position is determined for each of the plurality of sensing locations. During the sweep at each of the plurality of sensing locations, a set of signal strength data for the target wireless device and a set of bearing information are collected. A plurality of lines of bearing are determined, one from each of the plurality of sensing locations to the target wireless device, based on the determined position, the collected set of signal strength data, and bearing information for each of the plurality of sensing locations. A target location of the target wireless device is determined based on an intersection of at least two lines of bearing from the plurality of lines of bearing.
    Type: Grant
    Filed: May 26, 2009
    Date of Patent: January 17, 2012
    Assignee: Assured Information Security, Inc.
    Inventors: Richard Michael Gloo, Jacob Michael Baker, Alexander James Williams, Jason S. Lashure, Robert James Durham, Nicholas Lawrence Owens
  • Publication number: 20110320797
    Abstract: Methods for reducing the impact of malware during a booting sequence for an interrupt driven computing device are disclosed. One or more parameters associated with an interrupt vector table (IVT) are manipulated to force the computing device into a clean state following a system level portion of the booting sequence. In another embodiment, occurring prior to the loading of an operating system or a call to a non-returnable main( ) function, one or more unused interrupt vectors in an IVT are replaced. A function filter is implemented for one or more interrupt vectors in the IVT to disallow unnecessary interrupt functions from being executed. One or more required interrupt vector functions are replaced with one or more corresponding custom vector functions. One or more memory locations are wiped if the one or more memory locations do not hold at least a portion of the IVT and/or the interrupt vector functions.
    Type: Application
    Filed: June 23, 2010
    Publication date: December 29, 2011
    Applicant: Assured Information Security, Inc.
    Inventors: Ryan Matthew WILSON, Joseph James Sharkey, Michael Joseph Sieffert
  • Publication number: 20110197256
    Abstract: A method, computer readable medium, and apparatus for securing a processing system includes implementing a virtual machine manager (VMM) using a hardware assisted handler in secure processing apparatus. One or more critical events are monitored with the VMM in the secure processing apparatus. One or more behaviors in response to the one or more monitored critical events are controlled with VMM.
    Type: Application
    Filed: December 20, 2010
    Publication date: August 11, 2011
    Applicant: ASSURED INFORMATION SECURITY, INC.
    Inventors: Joseph James Sharkey, Rian Patrick Quinn
  • Publication number: 20110154493
    Abstract: A method, computer readable medium, and apparatus that inspects data includes isolating retrieved target data within a protected construct with the data inspection processing apparatus. The security software is isolated such that the security software is able to access the target data within the protected construct with the data inspection processing apparatus. The data inspection processing apparatus scans the isolated target data with the isolated security software. The data inspection processing apparatus reports whether one or more security threats have been identified from the scan of the isolated retrieved target data.
    Type: Application
    Filed: December 20, 2010
    Publication date: June 23, 2011
    Applicant: ASSURED INFORMATION SECURITY, INC.
    Inventor: Eric Matthew Thayer