Patents by Inventor Bruce Barnett
Bruce Barnett has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 9106689Abstract: An intrusion detection method, system and computer-readable media are disclosed. The system can include a processor programmed to perform computer network intrusion detection. The intrusion detection can include an identification module and a detection module. The identification module can be adapted to perform semi-supervised machine learning to identify key components of a network attack and develop MDL models representing those attack components. The detection module can cluster the MDL models and use the clustered MDL models to classify network activity and detect polymorphic or zero-day attacks.Type: GrantFiled: May 6, 2011Date of Patent: August 11, 2015Assignee: Lockheed Martin CorporationInventors: Eric Steinbrecher, Jeremy Impson, Bruce Barnett, Scott Charles Evans, Bernhard Scholz, Weizhong Yan, Thomas Markham, Stephen J. Dill
-
Patent number: 8572678Abstract: A system and method are provided that distill an organization's information security plan into a detailed and unambiguous security object model. The developed security object model provides a visualization of complex relationships between individual elements and levels that is usable to carry into effect the organization's information security plan. Configuration control and a verifiable level of security compliance are provided through implementation of the organization's information security plan by the developed security object model. The developed security object model is hosted on a computing platform in communication with at least the organization's network to provide information security plan compliance, configuration control and gap analysis in a usable form to the organization.Type: GrantFiled: December 23, 2011Date of Patent: October 29, 2013Assignee: Lockheed Martin CorporationInventors: Bruce Barnett, Scott Evans, Robert James Mitchell, Jr., Thomas Markham, Stephen Dill, Vincent Hannon, John Patrick Elliott, Andrew Crapo
-
Patent number: 8495736Abstract: A method and apparatus that provides information assurance attributes through a data providence architecture is disclosed. The method may include receiving a message having a data provenance wrapper, examining each data provenance record of the message and any attachments for discrepancies, identifying any discrepancies in the examination of each data provenance record of the message and any attachments; calculating a degree of trust based on any discrepancies identified in the examination of each data provenance record of the message and any attachments, and outputting the degree of trust to the user.Type: GrantFiled: January 5, 2010Date of Patent: July 23, 2013Assignee: Lockheed Martin CorporationInventors: Stephen J. Dill, Bruce Barnett, Andrew Crapo, Abha Moitra
-
Publication number: 20130167191Abstract: A system and method are provided that distill an organization's information security plan into a detailed and unambiguous security object model. The developed security object model provides a visualization of complex relationships between individual elements and levels that is usable to carry into effect the organization's information security plan. Configuration control and a verifiable level of security compliance are provided through implementation of the organization's information security plan by the developed security object model. The developed security object model is hosted on a computing platform in communication with at least the organization's network to provide information security plan compliance, configuration control and gap analysis in a usable form to the organization.Type: ApplicationFiled: December 23, 2011Publication date: June 27, 2013Applicant: LOCKHEED MARTIN CORPORATIONInventors: Bruce Barnett, Scott Evans, Robert James Mitchell, JR., Thomas Markham, Stephen Dill, Vincent Hannon, John Patrick Elliott, Andrew Crapo
-
Patent number: 8452962Abstract: A method and apparatus that simulates a workflow and analyzes the behavior of information assurance attributes through a data providence architecture is disclosed. The method may include injecting one or more faults into a simulated workflow, receiving a message in the simulated workflow having a data provenance wrapper, examining each data provenance record of the message and any attachments for discrepancies, identifying any discrepancies in the examination of each data provenance record of the message and any attachments; calculating a degree of trust based on any discrepancies identified in the examination of each data provenance record of the message and any attachments, analyzing the calculated degree of trust with respect to the one or more injected faults and the information assurance attributes, and outputting the analysis to a user.Type: GrantFiled: January 5, 2010Date of Patent: May 28, 2013Assignee: Lockheed Martin CorporationInventors: Stephen J. Dill, Bruce Barnett, Andrew Crapo, Abha Moitra
-
Publication number: 20120284793Abstract: An intrusion detection method, system and computer-readable media are disclosed. The system can include a processor programmed to perform computer network intrusion detection. The intrusion detection can include an identification module and a detection module. The identification module can be adapted to perform semi-supervised machine learning to identify key components of a network attack and develop MDL models representing those attack components. The detection module can cluster the MDL models and use the clustered MDL models to classify network activity and detect polymorphic or zero-day attacks.Type: ApplicationFiled: May 6, 2011Publication date: November 8, 2012Applicant: Lockheed Martin CorporationInventors: Eric Steinbrecher, Jeremy Impson, Bruce Barnett, Scott Charles Evans, Bernhard Scholz, Weizhong Yang, Thomas Markham, Stephen J. Dill
-
Patent number: 8281141Abstract: A method and apparatus that monitors and analyzes degree of trust and information assurance attributes information in a data providence architecture workflow is disclosed. The method may include receiving a message having a data provenance wrapper, examining each data provenance record of the message and any attachments for discrepancies, identifying any discrepancies in the examination of each data provenance record of the message and any attachments; calculating a degree of trust based on any discrepancies identified in the examination of each data provenance record of the message and any attachments, and presenting the degree of trust and information assurance attributes information to the user on a display.Type: GrantFiled: January 5, 2010Date of Patent: October 2, 2012Assignee: Lockheed Martin CorporationInventors: Stephen J. Dill, Bruce Barnett, Andrew Crapo, Abha Moitra
-
Patent number: 8166122Abstract: A method and apparatus that generate a figure of merit for use in transmission of messages in a multi-level secure environment. The method may include receiving a message having a data provenance wrapper, examining each data provenance record of the message and any attachments for discrepancies, identifying any discrepancies in the examination of each data provenance record of the message and any attachments, generating a figure of merit based on objective and subjective information, substituting the figure of merit for the data provenance information, and transmitting the figure of merit with the message across the security domain.Type: GrantFiled: January 5, 2010Date of Patent: April 24, 2012Assignee: Lockheed Martin CorporationInventors: Stephen J. Dill, Bruce Barnett, Andrew Crapo, Abha Moitra
-
Publication number: 20100280955Abstract: Systems and methods of verifying identity through the use of a plurality of identifying devices is provided. The identity information may be acquired electronically from a plurality of identity devices, which may include credit cards, cell phones, or other personal items fitted with wireless communicators such as RFID tags, for example. In various embodiments, the transaction may be approved or denied based on a number of factors, including the number identity devices, the types of identity information provided by the identity devices, and the level of security specified for the requested transaction.Type: ApplicationFiled: April 30, 2009Publication date: November 4, 2010Applicant: General Electric CompanyInventors: John Anderson Fergus Ross, Michael Hartman, Bruce Barnett, John Erik Hershey
-
Publication number: 20100250932Abstract: A method and apparatus that simulates a workflow and analyzes the behavior of information assurance attributes through a data providence architecture is disclosed. The method may include injecting one or more faults into a simulated workflow, receiving a message in the simulated workflow having a data provenance wrapper, examining each data provenance record of the message and any attachments for discrepancies, identifying any discrepancies in the examination of each data provenance record of the message and any attachments; calculating a degree of trust based on any discrepancies identified in the examination of each data provenance record of the message and any attachments, analyzing the calculated degree of trust with respect to the one or more injected faults and the information assurance attributes, and outputting the analysis to a user.Type: ApplicationFiled: January 5, 2010Publication date: September 30, 2010Applicant: LOCKHEED MARTIN CORPORATIONInventors: Stephen J. DILL, Bruce BARNETT, Andrew CRAPO, Abha MOITRA
-
Publication number: 20100250689Abstract: A method and apparatus that generate a figure of merit for use in transmission of messages in a multi-level secure environment. The method may include receiving a message having a data provenance wrapper, examining each data provenance record of the message and any attachments for discrepancies, identifying any discrepancies in the examination of each data provenance record of the message and any attachments, generating a figure of merit based on objective and subjective information, substituting the figure of merit for the data provenance information, and transmitting the figure of merit with the message across the security domain.Type: ApplicationFiled: January 5, 2010Publication date: September 30, 2010Applicant: LOCKHEED MARTIN CORPORATIONInventors: Stephen J. DILL, Bruce BARNETT, Andrew CRAPO, Abha MOITRA
-
Publication number: 20100251367Abstract: A method and apparatus that provides information assurance attributes through a data providence architecture is disclosed. The method may include receiving a message having a data provenance wrapper, examining each data provenance record of the message and any attachments for discrepancies, identifying any discrepancies in the examination of each data provenance record of the message and any attachments; calculating a degree of trust based on any discrepancies identified in the examination of each data provenance record of the message and any attachments, and outputting the degree of trust to the user.Type: ApplicationFiled: January 5, 2010Publication date: September 30, 2010Applicant: LOCKHEED MARTIN CORPORATIONInventors: Stephen J. DILL, Bruce BARNETT, Andrew CRAPO, Abha MOITRA
-
Publication number: 20100251374Abstract: A method and apparatus that monitors and analyzes degree of trust and information assurance attributes information in a data providence architecture workflow is disclosed. The method may include receiving a message having a data provenance wrapper, examining each data provenance record of the message and any attachments for discrepancies, identifying any discrepancies in the examination of each data provenance record of the message and any attachments; calculating a degree of trust based on any discrepancies identified in the examination of each data provenance record of the message and any attachments, and presenting the degree of trust and information assurance attributes information to the user on a display.Type: ApplicationFiled: January 5, 2010Publication date: September 30, 2010Applicant: LOCKHEED MARTIN CORPORATIONInventors: Stephen J. DILL, Bruce BARNETT, Andrew CRAPO, Abha MOITRA
-
Patent number: 7409716Abstract: A system a wireless ad hoc network. The system includes a plurality of nodes and a plurality of protocols for governing transmission of data between the plurality of nodes. The operation of the protocols is quantified by a complexity metric for determining whether an external source has altered the operation of the system.Type: GrantFiled: February 3, 2004Date of Patent: August 5, 2008Assignee: Lockheed Martin CorporationInventors: Bruce Barnett, Scott Evans
-
Publication number: 20040157556Abstract: A system a wireless ad hoc network. The system includes a plurality of nodes and a plurality of protocols for governing transmission of data between the plurality of nodes. The operation of the protocols is quantified by a complexity metric for determining whether an external source has altered the operation of the system.Type: ApplicationFiled: February 3, 2004Publication date: August 12, 2004Applicants: General Electric Company, Lockheed Martin CorporationInventors: Bruce Barnett, Scott Evans
-
Publication number: 20040157557Abstract: A system operates a wireless ad hoc network. The system includes a plurality of nodes and a plurality of packets for transmission between the plurality of nodes. The packets contain code for routing the packets between the plurality of nodes. The code adapts to a changing configuration of the plurality of nodes.Type: ApplicationFiled: February 3, 2004Publication date: August 12, 2004Applicant: Lockheed Martin CorporationInventors: Bruce Barnett, Stephen F. Bush, Scott Evans, Amit Kulkarni, Richard Spackmann, Harold Tomlinson