Patents by Inventor Andrew Michael WESIE

Andrew Michael WESIE has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 10326793
    Abstract: Systems and methods for guarding a controller area network are disclosed. In one embodiment, a system for guarding a controller area network comprises one or more processors. The one or more processors may be configured to receive a message destined for the controller area network. The one or more processors may further be configured to determine whether the message is legitimate. The one or more processors may further be configured to modify the message, if the message is determined as illegitimate, as an error message.
    Type: Grant
    Filed: June 9, 2016
    Date of Patent: June 18, 2019
    Assignee: RUNSAFE SECURITY, INC.
    Inventors: Andrew Michael Wesie, Joseph Michael Saunders
  • Patent number: 10140130
    Abstract: A system and method for obfuscating binary codes are disclosed. In one embodiment, the system for obfuscating binary codes comprises one or more processors. The one or more processors may be configured to receive a binary file. The one or more processor may further be configured to obfuscate the binary file. The obfuscation may be based on rewriting the binary file and generating a second binary-randomized binary file. The binary file and the second binary-randomized binary file are functionally equivalent. The obfuscation may be based on randomizing the binary file at a load time, without changing functionality of the binary file.
    Type: Grant
    Filed: April 7, 2016
    Date of Patent: November 27, 2018
    Assignee: RUNSAFE SECURITY, INC.
    Inventors: Andrew Michael Wesie, Brian Sejoon Pak
  • Patent number: 9848277
    Abstract: The system and method include a high-speed application for installation on mobile devices to enable the configuration of an abstract number of devices simultaneously. The application includes the capability to configure smart devices remotely or via secure local connections. The system and method include a mechanism for creating desired configuration states, an interactive portal through which these configurations may be selected and modified, and an application for installation on each target device that retrieves the desired configuration and applies it to the mobile device before returning verification reports for confirmation and auditing purposes.
    Type: Grant
    Filed: June 3, 2015
    Date of Patent: December 19, 2017
    Assignee: Samsung Electronics Co., Ltd.
    Inventors: Douglas Britton, Andrew Michael Wesie, Brian Sejoon Pak
  • Patent number: 9805188
    Abstract: An improved CFI system and method is described that provides security from attacks to hijack computer software. The improved CFI system and method inserts two tags to execute label identification. The first tag is positioned before any instruction that would result in an indirect control flow transfer and requires the program to execute a check. The second tag is located before the first line of any legitimate transfer destination and when discovered by the tag check allows a program to carry out the indirect transfer. This tag orientation does not prevent transfers to targets other than the origin instruction's specific intended destination but limits transfers to destinations that begin with the proper label dedication. Although, an incorrect address may be called, that will be within the software program's assortment of legitimate indirect transfer targets. Attempts to exploit or reroute indirect transfers outside of the established control flow are eliminated.
    Type: Grant
    Filed: November 11, 2014
    Date of Patent: October 31, 2017
    Assignee: RunSafe Security, Inc.
    Inventors: Andrew Michael Wesie, Brian Sejoon Pak
  • Publication number: 20160366178
    Abstract: Systems and methods for guarding a controller area network are disclosed. In one embodiment, a system for guarding a controller area network comprises one or more processors. The one or more processors may be configured to receive a message destined for the controller area network. The one or more processors may further be configured to determine whether the message is legitimate. The one or more processors may further be configured to modify the message, if the message is determined as illegitimate, as an error message.
    Type: Application
    Filed: June 9, 2016
    Publication date: December 15, 2016
    Applicant: RunSafe Security, Inc.
    Inventors: Andrew Michael WESIE, Joseph Michael SAUNDERS
  • Publication number: 20160299765
    Abstract: A system and method for obfuscating binary codes are disclosed. In one embodiment, the system for obfuscating binary codes comprises one or more processors. The one or more processors may be configured to receive a binary file. The one or more processor may further be configured to obfuscate the binary file. The obfuscation may be based on rewriting the binary file and generating a second binary-randomized binary file. The binary file and the second binary-randomized binary file are functionally equivalent. The obfuscation may be based on randomizing the binary file at a load time, without changing functionality of the binary file.
    Type: Application
    Filed: April 7, 2016
    Publication date: October 13, 2016
    Applicant: Kaprica Security, Inc.
    Inventors: Andrew Michael WESIE, Brian Sejoon PAK
  • Publication number: 20150350806
    Abstract: The system and method include a high-speed application for installation on mobile devices to enable the configuration of an abstract number of devices simultaneously. The application includes the capability to configure smart devices remotely or via secure local connections. The system and method include a mechanism for creating desired configuration states, an interactive portal through which these configurations may be selected and modified, and an application for installation on each target device that retrieves the desired configuration and applies it to the mobile device before returning verification reports for confirmation and auditing purposes.
    Type: Application
    Filed: June 3, 2015
    Publication date: December 3, 2015
    Inventors: Douglas BRITTON, Andrew Michael WESIE, Brian Sejoon PAK
  • Patent number: 9092626
    Abstract: A system and method are described that will enable mobile smart devices, such as a cellular phones, PDAs, or iPads, smartphones, mobile payment systems, mobile healthcare systems, handheld law enforcement systems, and other types of tablet devices, to trust download applications and for the download applications to trust the mobile smart devices onto which they are downloaded. The system and method enables charging a mobile smart device and while charging the mobile smart device scans for malware and other viruses in the applications and the operating system on the mobile smart device.
    Type: Grant
    Filed: May 7, 2013
    Date of Patent: July 28, 2015
    Assignee: Kaprica Security, Inc.
    Inventors: Douglas Britton, Andrew Michael Wesie, Brian Sejoon Pak
  • Patent number: 9092623
    Abstract: A system and method are described that will enable mobile smart devices, such as a cellular phones, PDAs, or iPads, smartphones, mobile payment systems, mobile healthcare systems, handheld law enforcement systems, and other types of tablet devices, to trust download applications and for the download applications to trust the mobile smart devices onto which they are downloaded. The system and method enables charging a mobile smart device and while charging the mobile smart device scans for malware and other viruses in the applications and the operating system on the mobile smart device.
    Type: Grant
    Filed: November 26, 2013
    Date of Patent: July 28, 2015
    Assignee: Kaprica Security, Inc.
    Inventors: Douglas Britton, Andrew Michael Wesie
  • Publication number: 20150135313
    Abstract: An improved CFI system and method is described that provides security from attacks to hijack computer software. The improved CFI system and method inserts two tags to execute label identification. The first tag is positioned before any instruction that would result in an indirect control flow transfer and requires the program to execute a check. The second tag is located before the first line of any legitimate transfer destination and when discovered by the tag check allows a program to carry out the indirect transfer. This tag orientation does not prevent transfers to targets other than the origin instruction's specific intended destination but limits transfers to destinations that begin with the proper label dedication. Although, an incorrect address may be called, that will be within the software program's assortment of legitimate indirect transfer targets. Attempts to exploit or reroute indirect transfers outside of the established control flow are eliminated.
    Type: Application
    Filed: November 11, 2014
    Publication date: May 14, 2015
    Inventors: Andrew Michael WESIE, Brian Sejoon PAK
  • Publication number: 20140082732
    Abstract: A system and method are described that will enable mobile smart devices, such as a cellular phones, PDAs, or iPads, smartphones, mobile payment systems, mobile healthcare systems, handheld law enforcement systems, and other types of tablet devices, to trust download applications and for the download applications to trust the mobile smart devices onto which they are downloaded. The system and method enables charging a mobile smart device and while charging the mobile smart device scans for malware and other viruses in the applications and the operating system on the mobile smart device.
    Type: Application
    Filed: November 26, 2013
    Publication date: March 20, 2014
    Applicant: KAPRICA SECURITY, INC.
    Inventors: Douglas BRITTON, Andrew Michael WESIE
  • Publication number: 20130239216
    Abstract: A system and method are described that will enable mobile smart devices, such as a cellular phones, PDAs, or iPads, smartphones, mobile payment systems, mobile healthcare systems, handheld law enforcement systems, and other types of tablet devices, to trust download applications and for the download applications to trust the mobile smart devices onto which they are downloaded. The system and method enables charging a mobile smart device and while charging the mobile smart device scans for malware and other viruses in the applications and the operating system on the mobile smart device.
    Type: Application
    Filed: May 7, 2013
    Publication date: September 12, 2013
    Inventors: Douglas BRITTON, Andrew Michael WESIE, Brian Sejoon PAK