Patents by Inventor Henry R. Tumblin

Henry R. Tumblin has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 11924339
    Abstract: A method performed at a first electronic device includes: (i) storing a privacy table that comprises random numbers at the first electronic device, (ii) transmitting the privacy table to a second electronic device over an encrypted channel, (iii) receiving a first message for transmission to the second electronic device, (iv) generating a map based on the privacy table, (v) generating a primary key based on the map and the privacy table, and (vi) encrypting the first message using the primary key to form an encrypted first message. The method also includes (vii) transmitting the map and the encrypted first message to the second electronic device, thereby enabling the second electronic device to decrypt the encrypted first message by recreating the primary key based on the map and the privacy table and decrypting the encrypted first message using the recreated primary key.
    Type: Grant
    Filed: July 21, 2021
    Date of Patent: March 5, 2024
    Assignee: Real Random IP, LLC
    Inventors: Douglass A. Hill, Henry R. Tumblin
  • Patent number: 11621841
    Abstract: A method performed at a first electronic device includes: (i) storing a privacy table that comprises random numbers at the first electronic device, (ii) transmitting the privacy table to a second electronic device over an encrypted channel, (iii) receiving a first message for transmission to the second electronic device, (iv) generating a map based on the privacy table, (v) generating a primary key based on the map and the privacy table, and (vi) encrypting the first message using the primary key to form an encrypted first message. The method also includes (vii) transmitting the map and the encrypted first message to the second electronic device, thereby enabling the second electronic device to decrypt the encrypted first message by recreating the primary key based on the map and the privacy table and decrypting the encrypted first message using the recreated primary key.
    Type: Grant
    Filed: July 26, 2021
    Date of Patent: April 4, 2023
    Assignee: Real Random IP, LLC
    Inventors: Douglass A. Hill, Henry R. Tumblin
  • Publication number: 20220337407
    Abstract: A method performed at a first electronic device includes: (i) storing a privacy table that comprises random numbers at the first electronic device, (ii) transmitting the privacy table to a second electronic device over an encrypted channel, (iii) receiving a first message for transmission to the second electronic device, (iv) generating a map based on the privacy table, (v) generating a primary key based on the map and the privacy table, and (vi) encrypting the first message using the primary key to form an encrypted first message. The method also includes (vii) transmitting the map and the encrypted first message to the second electronic device, thereby enabling the second electronic device to decrypt the encrypted first message by recreating the primary key based on the map and the privacy table and decrypting the encrypted first message using the recreated primary key.
    Type: Application
    Filed: July 21, 2021
    Publication date: October 20, 2022
    Inventors: Douglass A. Hill, Henry R. Tumblin
  • Publication number: 20220337566
    Abstract: A method performed at a first electronic device includes: (i) storing a privacy table that comprises random numbers at the first electronic device, (ii) transmitting the privacy table to a second electronic device over an encrypted channel, (iii) receiving a first message for transmission to the second electronic device, (iv) generating a map based on the privacy table, (v) generating a primary key based on the map and the privacy table, and (vi) encrypting the first message using the primary key to form an encrypted first message. The method also includes (vii) transmitting the map and the encrypted first message to the second electronic device, thereby enabling the second electronic device to decrypt the encrypted first message by recreating the primary key based on the map and the privacy table and decrypting the encrypted first message using the recreated primary key.
    Type: Application
    Filed: July 26, 2021
    Publication date: October 20, 2022
    Inventors: Douglass A. Hill, Henry R. Tumblin
  • Publication number: 20220258955
    Abstract: A method and system for mitigating a malware attack are disclosed herein. A malware detection module iterates over a virtual memory address space associated with a process executing on a computer system. The malware detection module identifies a region of memory likely to be vulnerable to a malware attack. Responsive to identifying the region of memory, a thread hollowing module determines a specific process thread associated with the identified region of memory. The thread hollowing module renders the specific process thread inoperable.
    Type: Application
    Filed: May 6, 2022
    Publication date: August 18, 2022
    Inventor: Henry R. Tumblin
  • Patent number: 11354413
    Abstract: A method and system for mitigating a malware attack are disclosed herein. A malware detection module iterates over a virtual memory address space associated with a process executing on a computer system. The malware detection module identifies a region of memory likely to be vulnerable to a malware attack. Responsive to identifying the region of memory, a thread hollowing module determines a specific process thread associated with the identified region of memory. The thread hollowing module renders the specific process thread inoperable.
    Type: Grant
    Filed: August 28, 2019
    Date of Patent: June 7, 2022
    Assignee: Digital Immunity LLC
    Inventor: Henry R. Tumblin
  • Publication number: 20220138311
    Abstract: The present disclosure generally relates to computer security and malware protection. In particular, the present disclosure is generally directed towards systems and methods for detecting and mitigating a code injection attack. In one embodiment the systems and methods may detect a code injection attack by scanning identified sections of memory for non-operational machine instructions (“no-ops”), detecting a code injection attack based on the scan(s) and mitigating the code injection attack by taking one or more defensive actions.
    Type: Application
    Filed: January 19, 2022
    Publication date: May 5, 2022
    Applicant: Digital Immunity LLC
    Inventor: Henry R. Tumblin
  • Patent number: 11263307
    Abstract: The present disclosure generally relates to computer security and malware protection. In particular, the present disclosure is generally directed towards systems and methods for detecting and mitigating a code injection attack. In one embodiment the systems and methods may detect a code injection attack by scanning identified sections of memory for non-operational machine instructions (“no-ops”), detecting a code injection attack based on the scan(s) and mitigating the code injection attack by taking one or more defensive actions.
    Type: Grant
    Filed: January 8, 2019
    Date of Patent: March 1, 2022
    Assignee: Digital Immunity LLC
    Inventor: Henry R. Tumblin
  • Publication number: 20200074082
    Abstract: A method and system for mitigating a malware attack are disclosed herein. A malware detection module iterates over a virtual memory address space associated with a process executing on a computer system. The malware detection module identifies a region of memory likely to be vulnerable to a malware attack. Responsive to identifying the region of memory, a thread hollowing module determines a specific process thread associated with the identified region of memory. The thread hollowing module renders the specific process thread inoperable.
    Type: Application
    Filed: August 28, 2019
    Publication date: March 5, 2020
    Applicant: Digital Immunity LLC
    Inventor: Henry R. Tumblin
  • Publication number: 20190213323
    Abstract: The present disclosure generally relates to computer security and malware protection. In particular, the present disclosure is generally directed towards systems and methods for detecting and mitigating a code injection attack. In one embodiment the systems and methods may detect a code injection attack by scanning identified sections of memory for non-operational machine instructions (“no-ops”), detecting a code injection attack based on the scan(s) and mitigating the code injection attack by taking one or more defensive actions.
    Type: Application
    Filed: January 8, 2019
    Publication date: July 11, 2019
    Applicant: Digital Immunity LLC
    Inventor: Henry R. Tumblin
  • Patent number: 9892661
    Abstract: A method for digital immunity includes identifying a call graph of an executable entity, and mapping nodes of the call graph to a cipher table of obscured information, such that each node based on invariants in the executable entity. A cipher table maintains associations between the invariants and the obscured information. Construction of an obscured information item, such as a executable set of instructions or a program, involves extracting, from the cipher table, ordered portions of the obscured information, in which the ordered portions have a sequence based on the ordering of the invariants, and ensuring that the obscured information matches a predetermined ordering corresponding to acceptable operation, such as by execution of the instructions represented by the obscured information, or steganographic target program (to distinguish from the executable entity being evaluated). The unmodified nature of the executable entity is assured by successful execution of the steganographic target program.
    Type: Grant
    Filed: February 1, 2017
    Date of Patent: February 13, 2018
    Assignee: DIGITAL IMMUNITY LLC
    Inventors: Thomas H. Probert, Henry R. Tumblin
  • Patent number: 6490358
    Abstract: A system for creating a log of a conversation includes a convener computer and a plurality of conversation computers interconnected by a computer network. The system includes an arbiter computer and a plurality of conversation computers interconnected by a computer network. The arbiter computer creates a public key pair comprising a new public key and a new private key, and causes the new public key to be transmitted to the conversation computers. The conversation computers receive the public key and transmit messages during the conversation. The arbiter computer uses the new private key to encrypt messages transmitted by at least some of the conversation computers during a conversation among the conversation computers, and to store the encrypted messages in a message log. The conversation computers cause messages in the message log to be decrypted using the new public key.
    Type: Grant
    Filed: August 16, 2000
    Date of Patent: December 3, 2002
    Assignee: Open Market, Inc.
    Inventors: Daniel E. Geer, Jr., Henry R. Tumblin
  • Patent number: 6490679
    Abstract: The invention is a method and system for integrating a security key infrastructure with applications programs on a computer system. A security key infrastructure service request is transmitted from a first application program to a security integration module. In the security integration module, a first policy is requested from a policy server and a first security key infrastructure is selected to service the security key infrastructure service request, according to the first policy. The security key infrastructure service request is transmitted from the security integration module to the selected first security key infrastructure.
    Type: Grant
    Filed: January 18, 1999
    Date of Patent: December 3, 2002
    Assignee: Shym Technology, Inc.
    Inventors: Henry R. Tumblin, Michael S. Rothman, Fred J. Pinkett, James M. Geary, Steve R. Artick
  • Patent number: 6212634
    Abstract: A system for certifying authorizations includes an authorizing computer and an authorized computer interconnected by a computer network. The authorizing computer creates a public key pair comprising a new public key and a new private key, and creates an authorization certificate that certifies that a holder of the authorization certificate is authorized to perform an action referred to in the authorization certificate. The authorization certificate includes the new public key. The authorizing computer causes the authorization certificate and the new private key to be transmitted to the authorized computer. The authorized computer receives the authorization certificate and the new private key and decrypts messages using the new private key as evidence that the authorized computer has obtained the authorization certificate legitimately.
    Type: Grant
    Filed: November 15, 1996
    Date of Patent: April 3, 2001
    Assignee: Open Market, Inc.
    Inventors: Daniel E. Geer, Jr., Henry R. Tumblin
  • Patent number: 6192131
    Abstract: A system for creating a log of a conversation includes a convener computer and a plurality of conversation computers interconnected by a computer network. The system includes an arbiter computer and a plurality of conversation computers interconnected by a computer network. The arbiter computer creates a public key pair comprising a new public key and a new private key, and causes the new public key to be transmitted to the conversation computers. The conversation computers receive the public key and transmit messages during the conversation. The arbiter computer uses the new private key to encrypt messages transmitted by at least some of the conversation computers during a conversation among the conversation computers, and to store the encrypted messages in a message log. The conversation computers cause messages in the message log to be decrypted using the new public key.
    Type: Grant
    Filed: November 15, 1996
    Date of Patent: February 20, 2001
    Assignee: Securities Industry Automation Corporation
    Inventors: Daniel E. Geer, Jr., Henry R. Tumblin, Eliot M. Solomon