Patents by Inventor James T. Lynn

James T. Lynn has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 6925566
    Abstract: The integrity of a remote communication unit (14) in a communication system is verified by comparing a hash value generated within the remote unit (14) to a hash value generated within a local unit (24). An interrogation message is generated within an interrogating entity (10) that includes a random seed value, memory range information identifying a memory range within the remote unit that is to be hashed, and position information identifying a position at which the random seed value is to be located within a data stream generated within the remote unit (14). The interrogation message is then delivered to the remote unit (14) which then performs a hashing operation based upon the parameters within the interrogation message to generate a hash value. The hash value is then returned to the interrogating entity (10) for comparison with a control value.
    Type: Grant
    Filed: July 7, 2000
    Date of Patent: August 2, 2005
    Assignee: Motorola, Inc.
    Inventors: Ronald Glen Feigen, Richard Allen Perona, James T. Lynn, Erwin Perry Comer
  • Publication number: 20020138757
    Abstract: A method for securely transmitting information from a network appliance is disclosed. The method includes initially executing a secure kernel and a configuration file containing a load file onto the network appliance. The secure kernel is used to verify the authenticity of the configuration file and a load table within the configuration file.
    Type: Application
    Filed: March 23, 2001
    Publication date: September 26, 2002
    Applicant: Motorola, Inc.
    Inventors: James T. Lynn, Todd C. Shaneyfelt, Michael T. Smith, James E. Greenwood
  • Publication number: 20020138554
    Abstract: A method of verifying the integrity of software resident on a remote network appliance is disclosed. The method includes providing a secure hash algorithm coupled with a seed value that may be employed by a network host to verify the integrity of the software associated with one or more network appliances.
    Type: Application
    Filed: March 26, 2001
    Publication date: September 26, 2002
    Applicant: Motorola, Inc.
    Inventors: Ronald G. Feigen, Richard A. Perona, James T. Lynn, Erwin P. Comer
  • Patent number: 6144739
    Abstract: A method and apparatus for protecting software objects from external modification is described. A cryptographic seal protects the object at the object level and also supports secure inter-object communication. A software object (101) is packaged in a crypto seal (103), which provides a cryptographic code hasher (105) for performing a cryptographic form of hashing on the code of object (101), a crypto seal communications authenticator (107) which authenticates communications received by object (101), a crypto seal encryptor (108) which encrypts communications sent by the object (101), a challenge manager (106) which causes the cryptographic code hasher (105) to perform its hashing function on the code of object (101) periodically and on demand when a challenge message is received, and a communications interface (109) which controls inter-object communication. A system (100) which employs crypto sealed objects includes a crypto seal coordinator (119).
    Type: Grant
    Filed: January 20, 1998
    Date of Patent: November 7, 2000
    Assignee: Motorola, Inc.
    Inventors: Don Earl Witt, James T. Lynn
  • Patent number: 6088804
    Abstract: A dynamic network security system (20) responds to a security attack (92) on a computer network (22) having a multiplicity of computer nodes (24). The security system (20) includes a plurality of security agents (36) that concurrently detect occurrences of security events (50) on associated computer nodes (24). A processor (40) processes the security events (50) that are received from the security agents (36) to form an attack signature (94) of the attack (92). A network status display (42) displays multi-dimensional attack status information representing the attack (92) in a two dimensional image to indicate the overall nature and severity of the attack (92). The network status display (42) also includes a list of recommended actions (112) for mitigating the attack. The security system (20) is adapted to respond to a subsequent attack that has a subsequent signature most closely resembling the attack signature (94).
    Type: Grant
    Filed: January 12, 1998
    Date of Patent: July 11, 2000
    Assignee: Motorola, Inc.
    Inventors: Douglas W. Hill, James T. Lynn