Patents by Inventor Frank L. Mayer

Frank L. Mayer has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20090222880
    Abstract: Provided are systems and methods for applying access controls to separate and contain virtual machines in a flexible, configurable manner. Access can be granted or removed to a variety of system resources—including network cards, shared folders, and external devices. Operations, such as cut and paste, between the virtual machines can be restricted or allowed. Virtual machines are run in containers. This allows more than one virtual machine to share the same access profile. Containers can be configured to allow a user to instantiate a virtual machine at run time. This allows the user to dynamically define which virtual machines run in various containers. An administrator determines which containers (if any) allow dynamic instantiation, and specifies the list of virtual machines the user can choose from. A container, and/or virtual machines within the container, can be restricted to particular users.
    Type: Application
    Filed: March 3, 2008
    Publication date: September 3, 2009
    Applicant: Tresys Technology, LLC
    Inventors: Frank L. Mayer, James L. Athey, Kenneth M. Walker, Spencer R. Shimko, Charles D. Sellers
  • Publication number: 20080209501
    Abstract: Provided are systems and methods for implementing mandatory access control in a computer, and applications thereof. An embodiment provides a security policy generator that generates security policies for one or more machines of a network based on a single set of enterprise configuration parameters. This single set of enterprise configuration parameters comprises relatively few lines of text compared to a typical security policy file. The present invention makes it possible to easily configure, change, and adapt mandatory access control security policies to enforce application-specific security goals across many networked systems to create a single, distributed, secure enterprise. With the present invention, a network administrator, for example, can set familiar network and file configuration options that automatically result in security changes without requiring extensive knowledge of the operating system kernel or how to develop a mandatory access control security policy.
    Type: Application
    Filed: February 28, 2007
    Publication date: August 28, 2008
    Applicant: Tresys Technology, LLC
    Inventors: Frank L. Mayer, Spencer R. Shimko, Karl W. MacMillan