Patents by Inventor Dennis Hain McCallam

Dennis Hain McCallam has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 8201249
    Abstract: A system and method provide for detecting intrusion and misuse of a computer in a computer network. The system includes an agent manager that directs actions of software agents to collect computer performance parameters from the computer, and a data analyzer that summarizes the collected computer performance parameters and generates a user profile. The system further includes a comparator that compares the summarized computer performance data and the user profile and generates a prompt based on a set of criteria related to the computer performance data and the user profile.
    Type: Grant
    Filed: May 14, 2003
    Date of Patent: June 12, 2012
    Assignee: Northrop Grumman Systems Corporation
    Inventor: Dennis Hain McCallam
  • Patent number: 7698738
    Abstract: A method, and a corresponding apparatus, provide for real-time network-based recovery from information warfare (IW) attacks on a network that includes subnets, with each subnet including one or more nodes. The method includes executing a pre-IW attack routine to identify IW attack recovery information, in response to an IW attack, executing an IW attack response routine, and executing a real-time network-based recovery routine. The pre-IW attack routine includes monitoring conditions on the network and at each of the subnets and nodes. When an IW attack occurs at an entity in the network, a condition flags are set to indicate the specific entity or entities being attacked. A condition flag set to 0 implies full operational capability of the entity, a condition flag set to 1 implies recent IW attack or IW attack in progress at the entity, and a condition flag set to 2 implies recovery of the entity from the IW attack.
    Type: Grant
    Filed: May 14, 2003
    Date of Patent: April 13, 2010
    Assignee: Northrop Grumman Systems Corporation
    Inventors: Dennis Hain McCallam, Ronald Kenneth Newland
  • Patent number: 7441275
    Abstract: An apparatus and a corresponding method provide for real-time recovery of compromised information in a computer network. The method includes analyzing data objects in the computer network to determine data objects that comprise minimal essential information, collecting the minimal essential information, and storing the minimal essential information. To limit potential exposure of the minimal essential information, the stored minimal essential information is hidden in the computer network.
    Type: Grant
    Filed: May 14, 2003
    Date of Patent: October 21, 2008
    Assignee: Northrop Grumman Corporation
    Inventors: Dennis Hain McCallam, Ronald Kenneth Newland
  • Publication number: 20040230834
    Abstract: A system and method provide for detecting intrusion and misuse of a computer in a computer network. The system includes an agent manager that directs actions of software agents to collect computer performance parameters from the computer, and a data analyzer that summarizes the collected computer performance parameters and generates a user profile. The system further includes a comparator that compares the summarized computer performance data and the user profile and generates a prompt based on a set of criteria related to the computer performance data and the user profile.
    Type: Application
    Filed: May 14, 2003
    Publication date: November 18, 2004
    Inventor: Dennis Hain McCallam
  • Publication number: 20040230832
    Abstract: A method, and a corresponding apparatus, provide for real-time network-based recovery from information warfare (IW) attacks on a network that includes subnets, with each subnet including one or more nodes. The method includes executing a pre-IW attack routine to identify IW attack recovery information, in response to an IW attack, executing an IW attack response routine, and executing a real-time network-based recovery routine. The pre-IW attack routine includes monitoring conditions on the network and at each of the subnets and nodes. When an IW attack occurs at an entity in the network, a condition flags are set to indicate the specific entity or entities being attacked. A condition flag set to 0 implies full operational capability of the entity, a condition flag set to 1 implies recent IW attack or IW attack in progress at the entity, and a condition flag set to 2 implies recovery of the entity from the IW attack.
    Type: Application
    Filed: May 14, 2003
    Publication date: November 18, 2004
    Inventors: Dennis Hain McCallam, Ronald Kenneth Newland
  • Publication number: 20040230833
    Abstract: An apparatus and a corresponding method provide for real-time recovery of compromised information in a computer network. The method includes analyzing data objects in the computer network to determine data objects that comprise minimal essential information, collecting the minimal essential information, and storing the minimal essential information. To limit potential exposure of the minimal essential information, the stored minimal essential information is hidden in the computer network.
    Type: Application
    Filed: May 14, 2003
    Publication date: November 18, 2004
    Inventors: Dennis Hain McCallam, Ronald Kenneth Newland