Patents by Inventor Eric Ridvan Uner

Eric Ridvan Uner has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20180285578
    Abstract: Embodiments of the present invention provide a method to temporally isolate data accessed by a computing device so that the data accessed by the computing device is limited to a single set of data. The method includes removing any data that is accessed by the computing device when operating in different modes so that the data is inaccessible by the computing device when operating in the mode. The method also includes switching to the mode after the data associated with the modes different from the mode have been removed. The method also includes operating in the mode based on a plurality of rules associated with the security policy in temporal isolation from any other mode associated with the computing device. The computing device is limited to operating in the mode and is prevented from accessing any data that is distinct from the single set of data of the mode.
    Type: Application
    Filed: June 4, 2018
    Publication date: October 4, 2018
    Inventors: Eric Ridvan Üner, Michael J. Collins, Kent H. Hunter, John E. Rosenstengel, James E. Sabin, Kevin S. Woods
  • Patent number: 9990505
    Abstract: Embodiments of the present invention provide a method to temporally isolate data accessed by a computing device so that the data accessed by the computing device is limited to a single set of data. The method includes removing any data that is accessed by the computing device when operating in different modes so that the data is inaccessible by the computing device when operating in the mode. The method also includes switching to the mode after the data associated with the modes different from the mode have been removed. The method also includes operating in the mode based on a plurality of rules associated with the security policy in temporal isolation from any other mode associated with the computing device. The computing device is limited to operating in the mode and is prevented from accessing any data that is distinct from the single set of data of the mode.
    Type: Grant
    Filed: August 12, 2015
    Date of Patent: June 5, 2018
    Assignee: Redwall Technologies, LLC
    Inventors: Eric Ridvan Üner, Michael J. Collins, Kent H. Hunter, John E. Rosenstengel, James E. Sabin, Kevin S. Woods
  • Patent number: 9514300
    Abstract: A communication system having a policy server coupled to a communications network for managing secure communication with and among end instruments (EI). The EI comprises a memory, and a processor coupled to the memory with processor-executable instructions, including instructions for an operating system kernel; and instructions for a protection core that monitors operations of the operating system kernel in accordance with a security policy for the EI. Security policies can intercept calls to an operating system kernel and for each call, determining whether the call is allowed under the security policy(ies). Policies are stored in a policy library and transmitted to an EI over a wireless communication network.
    Type: Grant
    Filed: December 12, 2011
    Date of Patent: December 6, 2016
    Assignee: Redwall Technologies, LLC
    Inventors: Eric Ridvan Uner, Anthony Kobrinetz, Martin H. Singer, Joshua Scott Matthews, Benjamin James Leslie
  • Patent number: 9298917
    Abstract: A system and method for a secure supervisory control and data acquisition (SCADA) system. Secure SCADA elements (SSEs) have individual system security monitoring and enforcement of policies throughout the SCADA system. And isolation core ensures that a system security monitor monitors and takes appropriate action with respect to untrusted applications that may impact an SSE. The system security server provides policy enforcement on all of the SSEs that exist on the system. New security policies are created that are populated to individual SSEs in the system. Biomorphing algorithms allow for system uniqueness to be derived over time further enhancing security of SSEs.
    Type: Grant
    Filed: January 13, 2012
    Date of Patent: March 29, 2016
    Assignee: Redwall Technologies, LLC
    Inventors: Eric Ridvan Uner, Joshua Scott Matthews, Benjamin James Leslie, Anthony Kobrinetz, Martin H. Singer
  • Publication number: 20160048693
    Abstract: Embodiments of the present invention provide a method to temporally isolate data accessed by a computing device so that the data accessed by the computing device is limited to a single set of data. The method includes removing any data that is accessed by the computing device when operating in different modes so that the data is inaccessible by the computing device when operating in the mode. The method also includes switching to the mode after the data associated with the modes different from the mode have been removed. The method also includes operating in the mode based on a plurality of rules associated with the security policy in temporal isolation from any other mode associated with the computing device. The computing device is limited to operating in the mode and is prevented from accessing any data that is distinct from the single set of data of the mode.
    Type: Application
    Filed: August 12, 2015
    Publication date: February 18, 2016
    Inventors: Eric Ridvan Üner, Michael J. Collins, Kent H. Hunter, John E. Rosenstengel, James E. Sabin, Kevin S. Woods
  • Publication number: 20130081103
    Abstract: A system and method for a secure supervisory control and data acquisition (SCADA) system. Secure SCADA elements (SSEs) have individual system security monitoring and enforcement of policies throughout the SCADA system. And isolation core ensures that a system security monitor monitors and takes appropriate action with respect to untrusted applications that may impact an SSE. The system security server provides policy enforcement on all of the SSEs that exist on the system. New security policies are created that are populated to individual SSEs in the system.
    Type: Application
    Filed: January 13, 2012
    Publication date: March 28, 2013
    Applicant: PCTEL Secure LLC
    Inventors: Eric Ridvan Uner, Joshua Scott Matthews, Benjamin James Leslie, Anthony Kobrinetz, Martin H. Singer
  • Publication number: 20120216281
    Abstract: A method and apparatus for resisting malicious code in a computing device. A software component corresponding to an operating system kernel is analyzed prior to executing the software component to detect the presence of one or more specific instructions such as malicious code, a change in mode permissions or instructions to modify or turn off security monitoring software, and taking a graduated action in response to the detection of one or more specific instructions. The graduated action taken is specified by a security policy (or policies) stored on the computing device. The analyzing may include off-line scanning of a particular code or portion of code for certain instructions, op codes, or patterns, and includes scanning in real-time as the kernel or kernel module is loading while the code being scanned is not yet executing (i.e., it is not yet “on-line”). Analysis of other code proceeds according to policies.
    Type: Application
    Filed: December 9, 2011
    Publication date: August 23, 2012
    Applicant: PCTEL Secure LLC
    Inventors: Eric Ridvan Uner, Benjamin James Leslie, Joshua Scott Matthews, Changhua Chen, Thomas Smigelski, Anthony Kobrinetz
  • Publication number: 20120216242
    Abstract: A communication system having a policy server coupled to a communications network for managing secure communication with and among end instruments (EI). The EI comprises a memory, and a processor coupled to the memory with processor-executable instructions, including instructions for an operating system kernel; and instructions for a protection core that monitors operations of the operating system kernel in accordance with a security policy for the EI. Security policies can intercept calls to an operating system kernel and for each call, determining whether the call is allowed under the security policy(ies). Policies are stored in a policy library and transmitted to an EI over a wireless communication network.
    Type: Application
    Filed: December 12, 2011
    Publication date: August 23, 2012
    Applicant: PCTEL Secure LLC
    Inventors: Eric Ridvan Uner, Anthony Kobrinetz, Martin H. Singer, Joshua Scott Matthews, Benjamin James Leslie
  • Publication number: 20080282346
    Abstract: A data type management unit. The data type management unit is configured to include a rules module which includes at least one identification standard paired with an associated code type, an interface module configured to receive a code signal, and an analysis module coupled to the interface module and to the rules module. Each identification standard includes a comparison rule paired with an associated rejection criteria; the comparison rule of each identification standard includes at least one code pattern representative of the associated code type; and the rejection criteria of each identification standard includes at least one rejection rule. The analysis module is configured to compare the received code signal to each code pattern in each identification standard and to recognize if one or more of the comparison results violates one or more of the rejection rules.
    Type: Application
    Filed: May 10, 2007
    Publication date: November 13, 2008
    Applicant: MOTOROLA, INC.
    Inventors: Kevin S. Gudeth, Eric Ridvan Uner
  • Publication number: 20080263256
    Abstract: A logic device. The logic device includes a control module, a memory management unit, a memory module, and at least one first register. The memory management unit controls flow of software code between the control module and the memory module; the control module programs at least one of the first registers during start-up procedures of the logic device to specify at least one data memory section in the memory module. The memory management unit communicates with the first registers to identify the at least one data memory section, and the memory management unit excludes executable code from storage in the at least one data memory section. After completion of the start-up procedures, the first registers are write protected, thereby preventing subsequent programming of the first registers, and the memory management unit cannot be disabled without shutting down the logic device.
    Type: Application
    Filed: April 20, 2007
    Publication date: October 23, 2008
    Applicant: MOTOROLA, INC.
    Inventors: Kevin S. Gudeth, Eric Ridvan Uner
  • Publication number: 20080244275
    Abstract: A method and structure of instruction transformation. Applying the principals of biodiversity to instruction transformation applicable to devices and embedded systems and networks containing many devices not only protects individual devices from attack from unauthorized code, but additionally retards propagation of such unauthorized code to other devices in the system or network in communication with a potentially infected device.
    Type: Application
    Filed: March 30, 2007
    Publication date: October 2, 2008
    Applicant: MOTOROLA, INC.
    Inventor: Eric Ridvan Uner
  • Publication number: 20080244753
    Abstract: A method and structure of instruction transformation. Applying the principals of biodiversity to instruction transformation applicable to devices and embedded systems and networks containing many devices not only protects individual devices from attack from unauthorized code, but additionally retards propagation of such unauthorized code to other devices in the system or network in communication with a potentially infected device.
    Type: Application
    Filed: March 30, 2007
    Publication date: October 2, 2008
    Applicant: MOTOROLA, INC.
    Inventor: Eric Ridvan Uner