Patents by Inventor Arlen Baker
Arlen Baker has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 11748484Abstract: A high assurance kernel executed by a safety certified hypervised system using a separation kernel. The high assurance kernel includes a first level of the separation kernel configured to perform first security features associated with a hypervisor, the first level configured to run on a primary core and a second level of the separation kernel configured to augment the first security features with second security features, the second level implemented on a separate protected component from the primary core, the first level and the second level communicating with one another through a physical separation between the first and second levels. The high assurance kernel may further include a third level of the separation kernel configured as a virtual machine to perform third security features associated with the hypervisor.Type: GrantFiled: January 21, 2020Date of Patent: September 5, 2023Assignee: WIND RIVER SYSTEMS, INC.Inventor: Arlen Baker
-
Publication number: 20230062521Abstract: A gateway device configured to receive, from an integrated development environment (IDE), a system configuration for a target device including application code for execution on the target device, the configuration being received via an encrypted network connection. The gateway device provisions the target device with the application code, receives, from the IDE, instructions via the encrypted network connection to execute the application code on the remote device and instructs the application code to execute on the remote device.Type: ApplicationFiled: September 1, 2021Publication date: March 2, 2023Inventors: Matt JONES, Arlen BAKER, Robert Williams ABELE, Robert WOOLLEY
-
Patent number: 11544054Abstract: Application Programming Interfaces (APIs) for a computer program can be verified to be correct. The verification includes receiving updated source code for an application, receiving an application programming interface (API) corresponding to the application, scanning the updated source code, determining if the API has changed from a previous version of the API and determining if a change in the API is an intended change based on a comparison of the API with a predetermined benchmark.Type: GrantFiled: March 22, 2021Date of Patent: January 3, 2023Inventors: Arlen Baker, Matt Jones
-
Publication number: 20220300256Abstract: A binary image of a computer program can be verified as accurate. The verification includes receiving one or more requirements corresponding to source code changes for a program to be loaded on a processing device, generating a representation of the program including the source code changes, determining a change in the representation based on a comparison of the representation with one or more previously stored representations of the program and determining whether the change in the representation corresponds to the one or more requirements.Type: ApplicationFiled: March 22, 2021Publication date: September 22, 2022Inventors: Arlen BAKER, Matt JONES
-
Publication number: 20220300632Abstract: A manner of securing data that includes receiving a first plurality of hashes corresponding to data stored in a database, writing the first plurality of hashes to a private distributed ledger technology (DLT), sealing each block of the private DLT when a predetermined criteria is met to create a plurality of sealed blocks and writing a second plurality hashes corresponding to the plurality of sealed blocks to a public DLT.Type: ApplicationFiled: March 22, 2021Publication date: September 22, 2022Inventors: Arlen BAKER, Matt JONES
-
Publication number: 20220300279Abstract: Application Programming Interfaces (APIs) for a computer program can be verified to be correct. The verification includes receiving updated source code for an application, receiving an application programming interface (API) corresponding to the application, scanning the updated source code, determining if the API has changed from a previous version of the API and determining if a change in the API is an intended change based on a comparison of the API with a predetermined benchmark.Type: ApplicationFiled: March 22, 2021Publication date: September 22, 2022Inventors: Arlen BAKER, Matt JONES
-
Publication number: 20210224392Abstract: A high assurance kernel executed by a safety certified hypervised system using a separation kernel. The high assurance kernel includes a first level of the separation kernel configured to perform first security features associated with a hypervisor, the first level configured to run on a primary core and a second level of the separation kernel configured to augment the first security features with second security features, the second level implemented on a separate protected component from the primary core, the first level and the second level communicating with one another through a physical separation between the first and second levels. The high assurance kernel may further include a third level of the separation kernel configured as a virtual machine to perform third security features associated with the hypervisor.Type: ApplicationFiled: January 21, 2020Publication date: July 22, 2021Inventor: Arlen Baker
-
Patent number: 10438005Abstract: A device, system, and method protects cryptographic keying material. The method is performed at an electronic device including a plurality of components housed in an enclosure. The method includes determining a tamper state of the enclosure, the tamper state being one of a secure state in which the enclosure has not been physically tampered or an unsecure state in which the enclosure has been physically tampered. When the tamper state is the secure state, the method includes associating a first value with the application. When the tamper state is the unsecure state, the method includes associating a second value with the application. The first value is configured to enable access to the data in the data storage unit. The second value prevents access to the data in the data storage unit.Type: GrantFiled: April 10, 2017Date of Patent: October 8, 2019Assignee: Wind River Systems, Inc.Inventor: Arlen Baker
-
Patent number: 10268823Abstract: A device, system, and method secures executable operations through verification of an operation prior to execution. The method performed at an electronic device comprising a processor in an execution state and a memory representable with a memory map includes receiving a request for the operation from an application installed on the electronic device, the request including a location in the memory map. The method includes determining whether the location is within one of at least one address range included in a security policy register generated prior to the execution phase, the at least one address range respectively corresponding to at least one authorized operation. The method includes, when the location is within one of the at least one address range, servicing the request to perform the operation.Type: GrantFiled: October 27, 2016Date of Patent: April 23, 2019Assignee: WIND RIVER SYSTEMS, INC.Inventor: Arlen Baker
-
Publication number: 20180293390Abstract: A device, system, and method protects cryptographic keying material. The method is performed at an electronic device including a plurality of components housed in an enclosure. The method includes determining a tamper state of the enclosure, the tamper state being one of a secure state in which the enclosure has not been physically tampered or an unsecure state in which the enclosure has been physically tampered. When the tamper state is the secure state, the method includes associating a first value with the application. When the tamper state is the unsecure state, the method includes associating a second value with the application. The first value is configured to enable access to the data in the data storage unit. The second value prevents access to the data in the data storage unit.Type: ApplicationFiled: April 10, 2017Publication date: October 11, 2018Inventor: Arlen BAKER
-
Publication number: 20180121644Abstract: A device, system, and method secures executable operations through verification of an operation prior to execution. The method performed at an electronic device comprising a processor in an execution state and a memory representable with a memory map includes receiving a request for the operation from an application installed on the electronic device, the request including a location in the memory map. The method includes determining whether the location is within one of at least one address range included in a security policy register generated prior to the execution phase, the at least one address range respectively corresponding to at least one authorized operation. The method includes, when the location is within one of the at least one address range, servicing the request to perform the operation.Type: ApplicationFiled: October 27, 2016Publication date: May 3, 2018Inventor: Arlen BAKER
-
Publication number: 20180124064Abstract: A virtualization environment is provided to include a security management instance and an application instance. The application instance is separated from the security management instance and includes a first operating system and a particular software application. The security management instance includes a second operating system and one or more security tools to provide security for the particular application. Data for the application instance is received at the security management instance, the data is processed using at least one of the security tools, and the processed data is securely passed from the security management instance to the application instance.Type: ApplicationFiled: June 8, 2017Publication date: May 3, 2018Inventors: Sven Schrecker, Aric Shipley, Arlen Baker
-
Publication number: 20170177863Abstract: A device, system, and method detects a malicious module using a memory of an electronic device. The method performed by an electronic device includes generating a first parameter corresponding to first unallocated regions of the memory in a trusted state, wherein the memory in the trusted state includes at least one memory allocation, each memory allocation corresponding to a module or an action previously determined as trusted. The method includes generating a second parameter corresponding to second unallocated regions of the memory in a current state, wherein the memory in the current state corresponds to a subsequent allocation of the memory at a time subsequent to the trusted state. The method includes comparing the second parameter to the first parameter. The method includes indicating that the malicious module is detected in the second unallocated regions if the comparing step determines that the second parameter is different from the first parameter.Type: ApplicationFiled: December 16, 2015Publication date: June 22, 2017Inventor: Arlen BAKER
-
Publication number: 20160014159Abstract: A plurality of devices in a system are identified, each device having an operational context. One of a plurality of agents are identified for each of the plurality of devices, which correspond to the device. Data is received from the plurality of agents that describes security attributes of the plurality of devices. Policy data is sent to each of the plurality of agents to cause a set of security policies to be applied to the plurality of devices through the security management instances. Each of the plurality of agents can be provided in a respective security management instance separate from the operational context.Type: ApplicationFiled: December 26, 2014Publication date: January 14, 2016Inventors: Sven Schrecker, Charles Speicher, John Reynolds, Aric Shipley, Arlen Baker
-
Publication number: 20160014158Abstract: A virtualization environment is provided to include a security management instance and an application instance. The application instance is separated from the security management instance and includes a first operating system and a particular software application. The security management instance includes a second operating system and one or more security tools to provide security for the particular application. Data for the application instance is received at the security management instance, the data is processed using at least one of the security tools, and the processed data is securely passed from the security management instance to the application instance.Type: ApplicationFiled: December 26, 2014Publication date: January 14, 2016Inventors: Sven Schrecker, Charles Speicher, John Reynolds, Aric Shipley, Arlen Baker
-
Publication number: 20160014078Abstract: A connection is established between a network gateway and a particular device. An identity is generated for the particular device and a secure communication tunnel is established with another device at the network gateway using the identity. The secure communication tunnel can be established by the network gateway on behalf of the other device and is for use by the particular device to communicate with the other device. Data to be received from the other device over the secure communication tunnel can be sent on the connection to the particular device.Type: ApplicationFiled: December 26, 2014Publication date: January 14, 2016Inventors: Sven Schrecker, Charles Speicher, John Reynolds, Aric Shipley, Arlen Baker