Patents by Inventor John S. MORRISON

John S. MORRISON has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 11398915
    Abstract: A method of an enterprise server for performing two-way authentication with a mobile device in a network is provided. The method includes receiving, by an enterprise server of the network, a user context record (UCR) generated by the mobile device when the mobile device initiates a connection request to the network; calculating, by the enterprise server, an authenticity score based on the received UCR; validating, by the enterprise server, the authenticity of the mobile device based on the authenticity score; and generating and transmitting, by the enterprise server, an information to the mobile device for the mobile device to validate the authenticity of the enterprise server based on the transmitted information.
    Type: Grant
    Filed: August 26, 2016
    Date of Patent: July 26, 2022
    Assignee: Samsung Electronics Co., Ltd.
    Inventor: John S. Morrison
  • Patent number: 10425819
    Abstract: A mobile device is provided. The mobile device includes an activity sensor for generating data, a channel controller configured to determine the user presence based on the data obtained through the activity sensor, and a communication interface for communicating with an external network. The channel controller is configured to block or disable the communication between a source on the mobile device and the external network when the channel controller determines a lack of the user presence for a predetermined time.
    Type: Grant
    Filed: September 9, 2016
    Date of Patent: September 24, 2019
    Assignee: Samsung Electronics Co., Ltd.
    Inventors: Kunal Patel, John S. Morrison, Robert L. Harrison
  • Publication number: 20180063709
    Abstract: A method of an enterprise server for performing two-way authentication with a mobile device in a network is provided. The method includes receiving, by an enterprise server of the network, a user context record (UCR) generated by the mobile device when the mobile device initiates a connection request to the network; calculating, by the enterprise server, an authenticity score based on the received UCR; validating, by the enterprise server, the authenticity of the mobile device based on the authenticity score; and generating and transmitting, by the enterprise server, an information to the mobile device for the mobile device to validate the authenticity of the enterprise server based on the transmitted information.
    Type: Application
    Filed: August 26, 2016
    Publication date: March 1, 2018
    Inventor: John S. MORRISON
  • Publication number: 20170086127
    Abstract: A mobile device is provided. The mobile device includes an activity sensor for generating data, a channel controller configured to determine the user presence based on the data obtained through the activity sensor, and a communication interface for communicating with an external network. The channel controller is configured to block or disable the communication between a source on the mobile device and the external network when the channel controller determines a lack of the user presence for a predetermined time.
    Type: Application
    Filed: September 9, 2016
    Publication date: March 23, 2017
    Inventors: Kunal PATEL, John S. MORRISON, Robert L. HARRISON
  • Patent number: 9195813
    Abstract: Aspects of the disclosure provide a system that includes a protected module, an input module and a gesture engine. The protected module is configured to be accessible based on a specific gesture of a user predetermined to have a right to access the protected module. The input module is configured to receive an input gesture from a requester to access the protected module. The gesture engine is configured to be trained to process the input gesture in order to grant/deny an access to the protected module by the requester.
    Type: Grant
    Filed: October 1, 2013
    Date of Patent: November 24, 2015
    Assignee: LOCKHEED MARTIN CORPORATION
    Inventors: Alex Hrybyk, John S. Morrison
  • Patent number: 9027076
    Abstract: An approach is provided for causing a change in a security policy of a device based on contextual information. The approach involves determining context information associated with a device. The approach also involves determining a security policy of the device. The approach further involves determining a change of the context information. The approach additionally involves processing the determined change of the context information to cause, at least in part, a revision of the security policy of the device.
    Type: Grant
    Filed: March 23, 2012
    Date of Patent: May 5, 2015
    Assignee: Lockheed Martin Corporation
    Inventors: Kyle J. Roach, Alex Hrybyk, John S. Morrison, Kathleen M. Kauffman, Eric B. Jones, Mark Lohrum, Kenneth R. Good
  • Patent number: 8925049
    Abstract: A system and method are provided for employing a hand-held wireless device to assess a vulnerability of a wirelessly-accessible target network to intrusion and/or cyber-attack. The system and method are directed at providing discrete, covert and fully-automated wireless access to the target network via one or more wireless access points and to assessing characteristic of the one or more wireless access points and the target network in support of a vulnerability assessment. The hand-held wireless device is configured to collect appropriate data regarding the wirelessly-accessible network, including network and portal scans, and higher-level programmed data collection. The hand-held wireless device is further configured to analyze the collected data and to produce at least a first level vulnerability assessment of the target network without interaction by the user.
    Type: Grant
    Filed: November 18, 2011
    Date of Patent: December 30, 2014
    Assignee: Lockheed Martin Corporation
    Inventors: John S. Morrison, Kyle J. Roach
  • Publication number: 20140101752
    Abstract: Aspects of the disclosure provide a system that includes a protected module, an input module and a gesture engine. The protected module is configured to be accessible based on a specific gesture of a user predetermined to have a right to access the protected module. The input module is configured to receive an input gesture from a requester to access the protected module. The gesture engine is configured to be trained to process the input gesture in order to grant/deny an access to the protected module by the requester.
    Type: Application
    Filed: October 1, 2013
    Publication date: April 10, 2014
    Applicant: LOCKHEED MARTIN CORPORATION
    Inventors: Alex HRYBYK, JOHN S. MORRISON
  • Publication number: 20130254831
    Abstract: An approach is provided for causing a change in a security policy of a device based on contextual information. The approach involves determining context information associated with a device. The approach also involves determining a security policy of the device. The approach further involves determining a change of the context information. The approach additionally involves processing the determined change of the context information to cause, at least in part, a revision of the security policy of the device.
    Type: Application
    Filed: March 23, 2012
    Publication date: September 26, 2013
    Applicant: LOCKHEED MARTIN CORPORATION
    Inventors: Kyle J. Roach, Alex Hrybyk, John S. Morrison, Kathleen M. Kauffman, Eric B. Jones, Mark Lohrum, Kenneth R. Good
  • Publication number: 20130133044
    Abstract: A system and method are provided for employing a hand-held wireless device to assess a vulnerability of a wirelessly-accessible target network to intrusion and/or cyber-attack. The system and method are directed at providing discrete, covert and fully-automated wireless access to the target network via one or more wireless access points and to assessing characteristic of the one or more wireless access points and the target network in support of a vulnerability assessment. The hand-held wireless device is configured to collect appropriate data regarding the wirelessly-accessible network, including network and portal scans, and higher-level programmed data collection. The hand-held wireless device is further configured to analyze the collected data and to produce at least a first level vulnerability assessment of the target network without interaction by the user.
    Type: Application
    Filed: November 18, 2011
    Publication date: May 23, 2013
    Applicant: LOCKHEED MARTIN CORPORATION
    Inventors: John S. MORRISON, Kyle J. Roach