Patents Assigned to Blue Armor Technologies, LLC
-
Patent number: 11503079Abstract: Apparatus to enforce network policy based on identity authentication at a network endpoint device by offloading the authentication to a network attached authentication devices is disclosed. The authentication device may use Statistical Object Identification to perform the authentication. The present disclosure greatly reduces the resources needed by the network endpoint device to perform the authentication and eliminates the topological restrictions found in traditional network appliance based approaches.Type: GrantFiled: June 21, 2021Date of Patent: November 15, 2022Assignee: Blue Armor Technologies, LLCInventors: John William Hayes, Charles Andrew Gram
-
Patent number: 11329971Abstract: A Confidence Broker System is disclosed. One embodiment of the present invention includes a confidence broker (10) which communicates with a plurality of confidence producers (12A, 12B, 12C) and a plurality of confidence consumers (14A, 14B, 14C). Communications between these elements is conducted via a communications infrastructure (16). The confidence broker (10) also includes a communications interface (42) which is connected to a protocol converter (44). The protocol converter (44) is connected to a confidence normalizer (46). The confidence normalizer (46) is connected to a confidence mediator (48). The confidence mediator (48) is connected to a confidence mapper (50). The confidence mapper (50) is connected to the protocol converter (44). Each of the protocol converter (44), the confidence normalizer (46), the confidence mediator (48) and the confidence mapper (50) is connected to a storage device (52).Type: GrantFiled: August 28, 2019Date of Patent: May 10, 2022Assignee: BLUE ARMOR TECHNOLOGIES, LLCInventor: John William Hayes
-
Patent number: 11265249Abstract: The present invention enables the selection of network routes based on a combination of traditional route table entries, identity policy information, and trust level information determined dynamically for each network session. This enables a network operator to apply different policies to network entities presenting differing identity credentials. It also allows network operators to block access to networks and network resources when identity credentials are not provided or are unauthorized.Type: GrantFiled: October 15, 2018Date of Patent: March 1, 2022Assignee: BLUE ARMOR TECHNOLOGIES, LLCInventor: John William Hayes
-
Publication number: 20210314260Abstract: The present invention enables the selection of network routes based on a combination of traditional route table entries, identity policy information, and trust level information determined dynamically for each network session. This enables a network operator to apply different policies to network entities presenting differing identity credentials. It also allows network operators to block access to networks and network resources when identity credentials are not provided or are unauthorized.Type: ApplicationFiled: October 15, 2018Publication date: October 7, 2021Applicant: Blue Armor Technologies, LLCInventor: John William Hayes
-
Publication number: 20210314366Abstract: Apparatus to enforce network policy based on identity authentication at a network endpoint device by offloading the authentication to a network attached authentication devices is disclosed. The authentication device may use Statistical Object Identification to perform the authentication. The present disclosure greatly reduces the resources needed by the network endpoint device to perform the authentication and eliminates the topological restrictions found in traditional network appliance based approaches.Type: ApplicationFiled: June 21, 2021Publication date: October 7, 2021Applicant: Blue Armor Technologies, LLCInventors: John William Hayes, Charles Andrew Gram
-
Patent number: 11095687Abstract: Apparatus to enforce network policy based on identity authentication at a network endpoint device by offloading the authentication to a network attached authentication devices is disclosed. The authentication device may use Statistical Object Identification to perform the authentication. The present invention greatly reduces the resources needed by the network endpoint device to perform the authentication and eliminates the topological restrictions found in traditional network appliance based approaches.Type: GrantFiled: July 24, 2018Date of Patent: August 17, 2021Assignee: Blue Armor Technologies, LLCInventors: Charles Andrew Gram, John William Hayes
-
Publication number: 20210234854Abstract: A Confidence Broker System is disclosed. One embodiment of the present invention includes a confidence broker (10) which communicates with a plurality of confidence producers (12A, 12B, 12C) and a plurality of confidence consumers (14A, 14B, 14C). Communications between these elements is conducted via a communications infrastructure (16). The confidence broker (10) also includes a communications interface (42) which is connected to a protocol converter (44). The protocol converter (44) is connected to a confidence normalizer (46). The confidence normalizer (46) is connected to a confidence mediator (48). The confidence mediator (48) is connected to a confidence mapper (50). The confidence mapper (50) is connected to the protocol converter (44). Each of the protocol converter (44), the confidence normalizer (46), the confidence mediator (48) and the confidence mapper (50) is connected to a storage device (52).Type: ApplicationFiled: August 28, 2019Publication date: July 29, 2021Applicant: Blue Armor Technologies, LLCInventor: John William Hayes
-
Patent number: 10992648Abstract: Methods and apparatus for a Secure Time Communication System (10) are disclosed. One embodiment of the invention provides secure and non-interactive communication of clock information over an unsecured communications channel. This communication provides perfect forward secrecy, while detecting and blocking message spoofing, message replay, denial of service and cryptographic performance attacks. This mechanism also bounds the effect of message delay manipulation. The mechanism consists of two components, a filtered time encryptor (16) and a filtered time decryptor (28). The filtered time encryptor (16) produces a message in two parts; a time token followed by an encrypted message body. The time token is used as a filter to detect most attacks and to determine the message key.Type: GrantFiled: February 16, 2017Date of Patent: April 27, 2021Assignee: Blue Armor Technologies, LLCInventors: John William Hayes, Douglas A. Laird, Charles Andrew Gram