Patents by Inventor Jason E. Ostermann

Jason E. Ostermann has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 9130937
    Abstract: In certain embodiments, a method includes receiving a message at a first network interface of a first node. The first network interface communicates with a first network while a second network interface communicates with a second network. The method includes determining a set of expected tokens and an expected order of tokens. A plurality of tokens are accessed that were generated for the message, each of the plurality of tokens associated with a policy service of a plurality of policy services. The method includes generating a plurality of decrypted tokens from the plurality of tokens using a first parameter associated with the plurality of policy services and validating the decrypted tokens by comparing the decrypted tokens to the set of expected tokens. In response to validating the decrypted tokens and determining that the decrypted tokens are in the expected order, an approval is generated.
    Type: Grant
    Filed: March 7, 2011
    Date of Patent: September 8, 2015
    Assignee: Raytheon Company
    Inventors: Jason E. Ostermann, Teresa M. Bieda, Matthew J. Hicks, Alan T. Huch, Richard J. Ernst, Shelli J. Richard
  • Patent number: 8640189
    Abstract: In certain embodiments, a method includes receiving from a validation system a request to apply a first policy service to a message. The validation system determines whether the message may be transmitted to a second network by validating a plurality of tokens associated with the message. The method includes receiving at least one result from a policy service engine of applying the first policy service to the message and determining at least one predefined assertion based on the received at least one result. The message includes generating a first token by encrypting the at least one predefined assertion using a first parameter associated with the first service node and not the second service node. The method includes sending the message and the first token to the validation system.
    Type: Grant
    Filed: March 7, 2011
    Date of Patent: January 28, 2014
    Assignee: Raytheon Company
    Inventors: Richard J. Ernst, James H. Swedberg, Matthew J. Hicks, Herbert T. Riggs, III, Matt A. Powers, Jason E. Ostermann
  • Patent number: 8621223
    Abstract: A method of verifying integrity of a digital file includes receiving the digital file subsequent to exposure to a foreign environment and validating the digital file. The received digital file has an appended signature label that includes one or both of a first hash value and a digital signature. Validating the digital file includes hashing the digital file to obtain a second hash value, retrieving the first hash value from the signature label, and comparing the first hash value and second hash value.
    Type: Grant
    Filed: June 30, 2008
    Date of Patent: December 31, 2013
    Assignee: Raytheon Company
    Inventors: Monty D. McDougal, Jason E. Ostermann, Brian N. Smith
  • Publication number: 20090327733
    Abstract: A method of verifying integrity of a digital file includes receiving the digital file subsequent to exposure to a foreign environment and validating the digital file. The received digital file has an appended signature label that includes one or both of a first hash value and a digital signature. Validating the digital file includes hashing the digital file to obtain a second hash value, retrieving the first hash value from the signature label, and comparing the first hash value and second hash value.
    Type: Application
    Filed: June 30, 2008
    Publication date: December 31, 2009
    Applicant: Raytheon Company
    Inventors: Monty D. McDougal, Jason E. Ostermann, Brian N. Smith
  • Publication number: 20080082832
    Abstract: In a method embodiment, a method for providing access to data includes intercepting a user request for access to data. In response to intercepting the user request, the method includes validating the user request by: authenticating an identification of the user; authenticating a password of the user; storing a first session identification locally; storing a second session identification in a system database; validating that the first session identification is consistent with the second session identification; and performing the user request upon successful completion of the validation process.
    Type: Application
    Filed: September 29, 2006
    Publication date: April 3, 2008
    Inventors: Monty D. McDougal, William E. Sterns, Jason E. Ostermann
  • Publication number: 20080082960
    Abstract: In a method embodiment, a method for controlling the release of data includes providing a list of a plurality of modules. Each module is operable to perform a task related to releasing data. The method further includes receiving a selection of an ordered set of the plurality of modules to use in a workflow. The workflow defines a procedure for releasing the data. The method also includes automatically generating a program implementing the workflow.
    Type: Application
    Filed: September 29, 2006
    Publication date: April 3, 2008
    Inventors: Monty D. McDougal, William E. Sterns, Jason E. Ostermann