Patents by Inventor John D. Halpin

John D. Halpin has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 9785768
    Abstract: A method is disclosed for deterring the reverse engineering of computer software code. The method involves the recognition of an unauthorized access attempt by one of a plurality of linked sub-processes embedded in the computer software code. In response to the unauthorized attempt, each of the sub-processes begins a recursive execution, resulting in computer system resources being increasingly diverted to the linked sub-processes, making it difficult to continue unauthorized attempts to access the computer software code.
    Type: Grant
    Filed: February 16, 2015
    Date of Patent: October 10, 2017
    Assignee: LOCKHEED MARTIN CORPORATION
    Inventors: John D. Halpin, Joseph P. Russell, Scott M. Sobieski
  • Patent number: 8959636
    Abstract: A method is disclosed for deterring the reverse engineering of computer software code. The method involves the recognition of an unauthorized access attempt by one of a plurality of linked sub-processes embedded in the computer software code. In response to the unauthorized attempt, each of the sub-processes begins a recursive execution, resulting in computer system resources being increasingly diverted to the linked sub-processes, making it difficult to continue unauthorized attempts to access the computer software code.
    Type: Grant
    Filed: August 30, 2004
    Date of Patent: February 17, 2015
    Assignee: Lockheed Martin Corporation
    Inventors: John D. Halpin, Joseph P. Russell, Scott M. Sobieski
  • Publication number: 20130179967
    Abstract: A method is disclosed for deterring the reverse engineering of computer software code. The method involves the recognition of an unauthorized access attempt by one of a plurality of linked sub-processes embedded in the computer software code. In response to the unauthorized attempt, each of the sub-processes begins a recursive execution, resulting in computer system resources being increasingly diverted to the linked sub-processes, making it difficult to continue unauthorized attempts to access the computer software code.
    Type: Application
    Filed: August 30, 2004
    Publication date: July 11, 2013
    Inventors: John D. Halpin, Joseph P. Russell
  • Patent number: 8112636
    Abstract: A method for operating a binary executable in which some of the data or code is to be protected includes the step of pruning the binary executable of the code andor data to be protected. Nonfunctional code is substituted for the code pruned from the binary executable, to form a pruned executable which does not contain the code to be protected. The code pruned from the binary executable is loaded into a code injection service or program (CIS). The binary executable is placed in memory as with any application. Invoking the pruned executable alone results in crash. The CIS is made part of the operating system service, and is loaded into RAM when the computer starts. When the pruned executable is invoked, the CIS detects its presence, and as the pruned executable runs, the CIS substitutes the actual data or code into the pruned executable, whereby it operates normally.
    Type: Grant
    Filed: November 6, 2007
    Date of Patent: February 7, 2012
    Assignee: Lockheed Martin Corporation
    Inventors: Raymond J. Canzanese, John D. Halpin