Patents by Inventor Jared Karro

Jared Karro has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 9887984
    Abstract: Secure electronic access may be provided by receiving at least one electronic certificate from an electronic device seeking to access a secure resource at a device under protection including at least one security processor, the at least one certificate providing device information related to the security of the electronic device, and comparing with at least one autonomous processor of an autonomous system the device information to the security requirement information. The at least one autonomous processor may instruct the at least one security processor to provide the secure resource to the device when the device information meets the security requirement information. The device under protection may provide the secure resource to the electronic device in response to the instruction.
    Type: Grant
    Filed: November 11, 2015
    Date of Patent: February 6, 2018
    Assignee: TEMPORAL DEFENSE SYSTEMS, LLC
    Inventors: Ronald Lance Justin, Charles Elden, Jared Karro, Mark Tucker
  • Patent number: 9769192
    Abstract: A system may be broken down into one or more components. Each of the components may be evaluated to ascribe a security score to each of the components. A composite security score may be generated for the system based on the security scores and a rate of decay measure characterizing a probabilistic security degradation of the system. The rate of decay measure may be applied to the composite security score to obtain a current composite security score.
    Type: Grant
    Filed: February 27, 2015
    Date of Patent: September 19, 2017
    Assignee: TEMPORAL DEFENSE SYSTEMS, LLC
    Inventors: Mark Tucker, Charles Elden, Jared Karro
  • Publication number: 20160308889
    Abstract: Systems and methods described herein may detect hardware modifications. A test loop may terminate at a transmit pin and a receiver pin of a processor footprint pad. A processor may be coupled to the test loop via the transmit pin and the receiver pin. The processor may cause a signal to be transmitted to the test loop from the transmit pin and receive a modified signal from the test loop at the receiver pin. The processor may analyze the modified signal to detect a hardware modification in communication with the test loop based on the modified signal.
    Type: Application
    Filed: April 15, 2016
    Publication date: October 20, 2016
    Inventors: Ronald Lance Justin, Charles Elden, Jared Karro, Mark Tucker
  • Publication number: 20160219079
    Abstract: A system for autonomous enforcement of rules may comprise a protected system, including infrastructure, operative in response to input signals and an autonomous control system. The autonomous control system may include a monitor circuit which is coupled to the input signals to monitor the input signals for violations of the rules and an action circuit coupled to the protected system which prevents the violating input signals from affecting the protected system.
    Type: Application
    Filed: November 5, 2015
    Publication date: July 28, 2016
    Inventors: Ronald Lance JUSTIN, Charles ELDEN, Jared KARRO, Mark TUCKER
  • Publication number: 20160149900
    Abstract: Secure electronic access may be provided by receiving at least one electronic certificate from an electronic device seeking to access a secure resource at a device under protection including at least one security processor, the at least one certificate providing device information related to the security of the electronic device, and comparing with at least one autonomous processor of an autonomous system the device information to the security requirement information. The at least one autonomous processor may instruct the at least one security processor to provide the secure resource to the device when the device information meets the security requirement information. The device under protection may provide the secure resource to the electronic device in response to the instruction.
    Type: Application
    Filed: November 11, 2015
    Publication date: May 26, 2016
    Inventors: Ronald Lance JUSTIN, Charles ELDEN, Jared KARRO, Mark TUCKER
  • Publication number: 20160116893
    Abstract: A system for autonomous enforcement of rules may comprise a protected system operative in response to input signals and an autonomous control system. The autonomous control system may include a monitor circuit which is coupled to the input signals to monitor the input signals for violations of the rules and an action circuit coupled to the protected system which prevents the violating input signals from affecting the protected system.
    Type: Application
    Filed: October 24, 2014
    Publication date: April 28, 2016
    Inventors: Ronald Lance Justin, Charles Elden, Jared Karro, Mark Tucker
  • Publication number: 20160078247
    Abstract: A system may be broken down into one or more components. Each of the components may be evaluated to ascribe a security score to each of the components. A composite security score may be generated for the system based on the security scores and a rate of decay measure characterizing a probabilistic security degradation of the system. The rate of decay measure may be applied to the composite security score to obtain a current composite security score. The composite security score may be used to control access to a document, either alone or in addition to other criteria.
    Type: Application
    Filed: September 15, 2015
    Publication date: March 17, 2016
    Inventors: Mark TUCKER, Charles ELDEN, Jared KARRO, Ronald Lance Justin
  • Publication number: 20150249677
    Abstract: A system may be broken down into one or more components. Each of the components may be evaluated to ascribe a security score to each of the components. A composite security score may be generated for the system based on the security scores and a rate of decay measure characterizing a probabilistic security degradation of the system. The rate of decay measure may be applied to the composite security score to obtain a current composite security score.
    Type: Application
    Filed: February 27, 2015
    Publication date: September 3, 2015
    Inventors: Mark TUCKER, Charles ELDEN, Jared KARRO
  • Publication number: 20020077885
    Abstract: A method of holding an election including enabling voters to register with a registrar facility by providing encryption keys to registered voters and storing the encryption key with an authenticator facility. The method includes distributing ballots having unique ballot ID's to requesting voters, receiving ballots having voter choices on them and encrypted using voters encryption keys, receiving from voters ballot ID, encrypted vote information and, voter ID at an authenticator facility, indications that votes have been cast with a ballots having indicated ballot ID's at a distributor facility, and an indication that the voter has voted at a registrar facility. The method includes authenticating the voter at the authenticator facility and passing authenticated votes and the ballot ID to a counter facility.
    Type: Application
    Filed: December 6, 2000
    Publication date: June 20, 2002
    Inventors: Jared Karro, Jie Wang