Patents by Inventor Glenn Coleman
Glenn Coleman has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 11601467Abstract: Methods and systems are disclosed for service provider based advanced threat protection. A service provider network may include one or more network devices. The service provider network may be configured to determine network isolation configuration information for a client device, on a local area network (LAN), associated with a client account. The network isolation configuration information may include an identification of trusted network destination and/or untrusted network destinations for the client device. The service provider network may send the network isolation configuration information to the client device. The service provider network may be configured to authenticate a segregated memory space operating on the client device.Type: GrantFiled: August 22, 2018Date of Patent: March 7, 2023Assignee: L3 Technologies, Inc.Inventors: Glenn Coleman, Peter Martz, Kenneth Moritz
-
Publication number: 20230040385Abstract: Technology for turning selected portions of a workpiece by a cutting tool is described. The described technology can provide methods and apparatuses for turning areas of a part so that corner strikes are avoided upon material entry, burr formation upon material exit is eliminated or significantly reduced, and/or the instantaneous cut depth continuously changes to avoid notch formation. The resulting superior machining conditions can enable more aggressive machining parameters to be used in the tool path, thereby resulting in reduced machining time and load.Type: ApplicationFiled: June 14, 2022Publication date: February 9, 2023Inventors: Glenn Coleman, Joseph McChesney, Evan C. Sherbrooke
-
Patent number: 11552987Abstract: A host computer system may be configured to connect to a network. The host computer system may be configured to implement a workspace and an isolated computing environment. The host computer system may be configured to isolate the isolated computing environment from the workspace using an internal isolation firewall. The internal isolation firewall may be configured to prevent data from being communicated between the isolated computing environment and the workspace, for example, without an explicit user input. The host computer system may be configured to implement one or more mechanisms that prevent malware received by the host computer system from receiving external communications from an external source. The one or more mechanisms may be configured to prevent control of the malware by the external source. The one or more mechanisms may be configured to prevent the malware from establishing a command channel with the external source.Type: GrantFiled: September 28, 2018Date of Patent: January 10, 2023Assignee: L3 Technologies, Inc.Inventors: Peter Martz, Kenneth Moritz, Glenn Coleman
-
Patent number: 11550898Abstract: Methods and systems are disclosed for an internet isolation system implemented using a browser application. The host computer system may be configured to receive a request to communicate with a first network destination. The host computer system may determine whether the first network destination is trusted or untrusted. The host computer system may instantiate a browser application. The browser application may be configured to, on a condition that the first network destination is determined to be trusted, enable communication with the first network destination via a first browser process executed in a workspace of the host computer system. The browser application may be configured to, on a condition that the first network destination is determined to be untrusted, implement an isolated computing environment using an internal isolation firewall and enable communication with the first destination via a second browser process executed in the isolated computing environment.Type: GrantFiled: October 18, 2018Date of Patent: January 10, 2023Assignee: L3 Technologies, Inc.Inventors: Glenn Coleman, Peter Martz, Kenneth Moritz
-
Patent number: 11374906Abstract: A host computer system may be configured to connect to a network. The host computer system may be configured to implement a workspace and an isolated computing environment. The host computer system may be configured to isolate the isolated computing environment from the workspace using an internal isolation firewall. The internal isolation firewall may be configured to prevent data from being communicated between the isolated computing environment and the workspace, for example, without an explicit user input. When malware is received by the isolated computing environment, the internal isolation firewall may be configured to prevent the malware from accessing data on the workspace of the host computer system. The host computer system may be configured to implement one or more mechanisms that prevent malware received by the host computer system from exfiltrating, to a network destination, data from the host computer system and data from other devices on the network.Type: GrantFiled: September 27, 2018Date of Patent: June 28, 2022Assignee: L3 TECHNOLOGIES, INC.Inventors: Peter Martz, Kenneth Moritz, Glenn Coleman
-
Patent number: 11336619Abstract: A host computer system may be configured to connect to a network. The host computer system may be configured to implement a workspace, an isolated computing environment, and a host-based firewall. The host computer system may be configured to isolate the isolated computing environment from the workspace using an internal isolation firewall. The internal isolation firewall may be configured to prevent data from being communicated between the isolated computing environment and the workspace, for example, without an explicit user input. The host computer system may be configured to determine, using one or more environmental indicators, a relative location of the host computer system. The processor may be configured to select a firewall policy based on the relative location of the host computer system. The firewall policy may include a configuration to apply to one or more of the internal isolation firewall or the host-based firewall.Type: GrantFiled: September 27, 2018Date of Patent: May 17, 2022Assignee: L3 Technologies, Inc.Inventors: Peter Martz, Kenneth Moritz, Glenn Coleman
-
Patent number: 11240207Abstract: Methods and systems are disclosed for isolation of communications between a host computer system and one or more untrusted network destinations. An Internet isolation system may include a network, one or more host computer systems, a border firewall, an authorization device, and/or a proxy device. The Internet isolation system may be configured to implement network isolation between one or more untrusted network destinations, the one or more host computer systems, and/or the network. The network isolation may be implemented via one or more of a host-based firewall on each of the one or more host computer systems, the border firewall, the authorization device, the proxy device, an internal isolation firewall on each of the one or more host computer systems, and/or a segregation of a trusted memory space and an untrusted memory space on each of the one or more host computer systems.Type: GrantFiled: August 9, 2018Date of Patent: February 1, 2022Assignee: L3 Technologies, Inc.Inventors: Glenn Coleman, Peter Martz, Kenneth Moritz
-
Patent number: 11223601Abstract: Methods and systems are disclosed for isolation of collaboration software on a host computer system. A networked computer system may include a network, a first host computer system, a border firewall and/or a web proxy. The host computer system may be configured to run a collaboration software application or process that enables interaction with one or more other host computer systems. The collaboration software application or process may be run within an untrusted memory space. The collaboration software application or process may enable interaction between a second host computer system and the untrusted memory space such that the second host computer system may access meeting data within a sandboxed computing environment operating within the untrusted memory space.Type: GrantFiled: September 25, 2018Date of Patent: January 11, 2022Assignee: L3 Technologies, Inc.Inventors: Glenn Coleman, Peter Martz, Kenneth Moritz
-
Patent number: 11184323Abstract: Methods and systems are disclosed for implementing one or more isolated computing environment via one or more memory spaces. The isolated computing environment may be configured to execute one or more sandboxed applications and/or processes associated with the isolated computing environment. One or more firewalls may be associated with the one or more sandboxed containers. One or more firewalls may be configured to apply a set of criteria (e.g., policies) to each of the applications and/or processes. In examples, the one or more sandbox firewalls may exist for each of the applications and/or processes and may prevent unauthorized communications between the applications and/or processes. In examples, a sandbox firewall may be configured to apply a set of criteria to one or more applications and/or processes associated with the one or more isolated computing environments. The sandbox firewall may be configured to allow authorized communications between the applications and/or processes.Type: GrantFiled: September 26, 2018Date of Patent: November 23, 2021Assignee: L3 Technologies, IncInventors: Glenn Coleman, Peter Martz, Kenneth Moritz
-
Patent number: 11178104Abstract: Systems and methods are disclosed for a sandbox based network isolation system configured to protect cloud based assets. A host computer system may include a processor and a memory. The host computer system may include a workspace. One or more applications may run in the workspace via a first memory space (e.g., a trusted memory space). The host computer system may include an isolated computing environment. One or more isolated applications may run in the isolated computing environment via a second memory space (e.g., an untrusted memory space). The isolated computing environment may be isolated from the workspace by an internal isolation firewall. The internal isolation firewall may prevent communication between the isolated computing environment and the workspace.Type: GrantFiled: September 25, 2018Date of Patent: November 16, 2021Assignee: L3 Technologies, Inc.Inventors: Glenn Coleman, Peter Martz, Kenneth Moritz
-
Patent number: 11170096Abstract: Systems, methods, and instrumentalities are disclosed for providing configurable and customizable internet isolation and security schemes for a mobile device. A mobile device (e.g., a cell phone, smart phone, tablet, Internet of Things (IoT) device, etc.) may include a processor and a memory. The mobile device may be configured to implement a workspace and an isolated computing environment. The workspace may enable operation of a set of applications (e.g., trusted applications) via a memory space (e.g., a trusted memory space). The isolated computing environment may enable operation of a set of one or more applications (e.g., untrusted applications) via a memory space (e.g., an untrusted memory space). The untrusted applications may include, for example, one or more of an Internet browser, an email application, a document editing application, or a social media application. The untrusted applications may communicate with one or more untrusted network destinations via a network.Type: GrantFiled: October 18, 2018Date of Patent: November 9, 2021Assignee: L3 Technologies, Inc.Inventors: Glenn Coleman, Peter Martz, Kenneth Moritz
-
Patent number: 11120125Abstract: Methods and systems are disclosed for internet isolation and security schemes for a host computer system having an internet isolation system. The internet isolation system may be installed on a laptop computer and/or similar devices at or during the time of manufacture, sale, and/or prior to delivery of the laptop computer. The internet isolation system may be pre-installed with a generic configuration. Upon delivery to a user or enterprise, the internet isolation system may be configured with specific rules tailored to the needs of the user. The configuration may identify which applications or processes should be isolated in the laptop computer using a container and/or virtual machine. The configuration may identify which addresses or sites may or may not be accessed from outside an isolated computing system (e.g., from outside a container or virtual machine). The configuration may configure proxy settings and devices for the isolated computing systems.Type: GrantFiled: October 18, 2018Date of Patent: September 14, 2021Assignee: L3 Technologies, Inc.Inventors: Glenn Coleman, Peter Martz, Kenneth Moritz
-
Patent number: 11044233Abstract: A host computer system may be configured to connect to a network. The host computer system may be configured to implement a workspace and an isolated computing environment. The host computer system may be configured to isolate the isolated computing environment from the workspace using an internal isolation firewall. The host computer system may be configured to receive a request to communicate with a first network destination. On a condition that the first network destination is determined to be trusted, the processor may be configured to communicate with the first network destination via a first browser process executed in the workspace. On a condition that the first network destination is determined to be untrusted, the processor may be configured to communicate with the first network destination via a second browser process executed in the isolated computing environment.Type: GrantFiled: September 28, 2018Date of Patent: June 22, 2021Assignee: L3 Technologies, Inc.Inventors: Peter Martz, Kenneth Moritz, Glenn Coleman
-
Patent number: 10992642Abstract: Methods and systems are disclosed for document isolation. A host computer system may be configured to implement document isolation via one or more of a host-based firewall, an internet isolation firewall, and/or a segregation of a trusted memory space and an untrusted memory space. The host computer system may be configured to access one or more files using a first set of one or more applications and/or processes operating within the trusted memory space and/or a second set of one or more applications and/or processes operating within an untrusted memory space. The host computer system may be configured to open (e.g., always open) the one or more accessed files in the trusted memory space of the host computer system.Type: GrantFiled: September 21, 2018Date of Patent: April 27, 2021Assignee: L3 Technologies, Inc.Inventors: Glenn Coleman, Peter Martz, Kenneth Moritz
-
Patent number: 10987774Abstract: Technology for milling selected portions of a workpiece by a cutting tool of a numerical control machine is described. The described technology provides methods and apparatuses for milling areas of a part so that more aggressive machining parameters can be used in the toolpath, thereby resulting in reduced machining time and load. The described technology additionally determines directions of the tool axis vector at points along a toolpath in order to achieve a desired part shape while optionally maintaining high material removal rates.Type: GrantFiled: July 2, 2018Date of Patent: April 27, 2021Assignee: Celeritive Technologies, Inc.Inventors: Evan C. Sherbrooke, Glenn Coleman
-
Patent number: 10931669Abstract: Methods and systems are disclosed for endpoint protection and authentication schemes for a host computer system having an internet isolation system. A first host computer system may include a first memory space and a second memory space. The first memory space may be configured to enable storage and operation of a workspace configured to execute a first set of one or more applications and processes running on an operating system of the first host computer system. The second memory space may be configured to enable storage and operation of a second set of one or more applications and processes associated with an isolated computing environment (e.g., a sandboxed computing environment) configured to run on the operating system. When the first host computer system is connected to a network that is known or associated with a predetermined security policy, the first host computer system may instantiate a predetermined security policy configuration.Type: GrantFiled: September 26, 2018Date of Patent: February 23, 2021Assignee: L3 Technologies, Inc.Inventors: Glenn Coleman, Peter Martz, Kenneth Moritz
-
Patent number: 10579040Abstract: Technology for milling selected portions of a workpiece by a cutting tool of a numerical control machine is described. The described technology provides methods and apparatuses for milling areas of a part so that more aggressive machining parameters can be used in the toolpath, thereby resulting in reduced machining time and load. The technology creates a series of toolpath contours where arcs in the toolpath contours are non-concentric with arcs in other toolpath contours. The selected portions of the workpiece are milled by moving the cutting tool in accordance with the toolpath.Type: GrantFiled: October 19, 2018Date of Patent: March 3, 2020Assignee: Celeritive Technologies, Inc.Inventors: Evan C. Sherbrooke, Glenn Coleman
-
Publication number: 20190250583Abstract: Technology for milling selected portions of a workpiece by a cutting tool of a numerical control machine is described. The described technology provides methods and apparatuses for milling areas of a part so that more aggressive machining parameters can be used in the toolpath, thereby resulting in reduced machining time and load. The technology creates a series of toolpath contours where arcs in the toolpath contours are non-concentric with arcs in other toolpath contours. The selected portions of the workpiece are milled by moving the cutting tool in accordance with the toolpath.Type: ApplicationFiled: October 19, 2018Publication date: August 15, 2019Inventors: Evan C. Sherbrooke, Glenn Coleman
-
Publication number: 20190121962Abstract: Systems, methods, and instrumentalities are disclosed for providing configurable and customizable internet isolation and security schemes for a mobile device. A mobile device (e.g., a cell phone, smart phone, tablet, Internet of Things (IoT) device, etc.) may include a processor and a memory. The mobile device may be configured to implement a workspace and an isolated computing environment. The workspace may enable operation of a set of applications (e.g., trusted applications) via a memory space (e.g., a trusted memory space). The isolated computing environment may enable operation of a set of one or more applications (e.g., untrusted applications) via a memory space (e.g., an untrusted memory space). The untrusted applications may include, for example, one or more of an Internet browser, an email application, a document editing application, or a social media application. The untrusted applications may communicate with one or more untrusted network destinations via a network.Type: ApplicationFiled: October 18, 2018Publication date: April 25, 2019Applicant: L3 Technologies, Inc.Inventors: Glenn Coleman, Peter Martz, Kenneth Moritz
-
Publication number: 20190121961Abstract: Methods and systems are disclosed for internet isolation and security schemes for a host computer system having an internet isolation system. The internet isolation system may be installed on a laptop computer and/or similar devices at or during the time of manufacture, sale, and/or prior to delivery of the laptop computer. The internet isolation system may be pre-installed with a generic configuration. Upon delivery to a user or enterprise, the internet isolation system may be configured with specific rules tailored to the needs of the user. The configuration may identify which applications or processes should be isolated in the laptop computer using a container and/or virtual machine. The configuration may identify which addresses or sites may or may not be accessed from outside an isolated computing system (e.g., from outside a container or virtual machine). The configuration may configure proxy settings and devices for the isolated computing systems.Type: ApplicationFiled: October 18, 2018Publication date: April 25, 2019Applicant: L3 Technologies, Inc.Inventors: Glenn Coleman, Peter Martz, Kenneth Moritz