Patents by Inventor JAMES DANIEL HARMS

JAMES DANIEL HARMS has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20250005133
    Abstract: Methods and systems for securing endpoint devices are disclosed. Overtime, the functionality of endpoint devices may be modified as new software is developed. To secure endpoint devices, software images of the new software may be verified prior to execution. Information usable to verify the software images may be stored in a database. A set of rules may be used to verify the trustworthiness of the software images based on the content of the database. Another set of rules may be used to verify the content of the database.
    Type: Application
    Filed: June 27, 2023
    Publication date: January 2, 2025
    Inventors: BRADLEY K. GOODMAN, JOSEPH CAISSE, JAMES DANIEL HARMS
  • Publication number: 20240364539
    Abstract: Systems, devices, and methods for managing data processing systems are disclosed. The data processing systems may provide computer implemented services based on communications between the data processing systems. To manage the data processing systems, a signing framework may be enforced to interpret and/or resolve operations invoked by the communications. The signing framework may be used by data processing systems to reduce the likelihood of undesired use and/or interaction with the data processing systems caused by unsecure communications.
    Type: Application
    Filed: April 25, 2023
    Publication date: October 31, 2024
    Inventors: BRADLEY K. GOODMAN, JAMES DANIEL HARMS
  • Publication number: 20240348458
    Abstract: Methods and systems for verifying authority in distributed systems are disclosed. Authority may be delegated to various entities within a distributed system to invoke performance of operations within the distributed systems. To verify that authority has been delegated, a security framework may be used that limits computing resource consumption for the verifications. The computing resource consumption may be limited by using cryptographically verifiable data structures that establish chains of delegation of authority. The cryptographically verifiable data structures may be limited in size and content to reduce the computational cost for implementing the security framework.
    Type: Application
    Filed: April 17, 2023
    Publication date: October 17, 2024
    Inventors: BRADLEY K. GOODMAN, JAMES DANIEL HARMS