Patents by Inventor John S. MORRISON
John S. MORRISON has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 11398915Abstract: A method of an enterprise server for performing two-way authentication with a mobile device in a network is provided. The method includes receiving, by an enterprise server of the network, a user context record (UCR) generated by the mobile device when the mobile device initiates a connection request to the network; calculating, by the enterprise server, an authenticity score based on the received UCR; validating, by the enterprise server, the authenticity of the mobile device based on the authenticity score; and generating and transmitting, by the enterprise server, an information to the mobile device for the mobile device to validate the authenticity of the enterprise server based on the transmitted information.Type: GrantFiled: August 26, 2016Date of Patent: July 26, 2022Assignee: Samsung Electronics Co., Ltd.Inventor: John S. Morrison
-
Patent number: 10425819Abstract: A mobile device is provided. The mobile device includes an activity sensor for generating data, a channel controller configured to determine the user presence based on the data obtained through the activity sensor, and a communication interface for communicating with an external network. The channel controller is configured to block or disable the communication between a source on the mobile device and the external network when the channel controller determines a lack of the user presence for a predetermined time.Type: GrantFiled: September 9, 2016Date of Patent: September 24, 2019Assignee: Samsung Electronics Co., Ltd.Inventors: Kunal Patel, John S. Morrison, Robert L. Harrison
-
Publication number: 20180063709Abstract: A method of an enterprise server for performing two-way authentication with a mobile device in a network is provided. The method includes receiving, by an enterprise server of the network, a user context record (UCR) generated by the mobile device when the mobile device initiates a connection request to the network; calculating, by the enterprise server, an authenticity score based on the received UCR; validating, by the enterprise server, the authenticity of the mobile device based on the authenticity score; and generating and transmitting, by the enterprise server, an information to the mobile device for the mobile device to validate the authenticity of the enterprise server based on the transmitted information.Type: ApplicationFiled: August 26, 2016Publication date: March 1, 2018Inventor: John S. MORRISON
-
Publication number: 20170086127Abstract: A mobile device is provided. The mobile device includes an activity sensor for generating data, a channel controller configured to determine the user presence based on the data obtained through the activity sensor, and a communication interface for communicating with an external network. The channel controller is configured to block or disable the communication between a source on the mobile device and the external network when the channel controller determines a lack of the user presence for a predetermined time.Type: ApplicationFiled: September 9, 2016Publication date: March 23, 2017Inventors: Kunal PATEL, John S. MORRISON, Robert L. HARRISON
-
Patent number: 9195813Abstract: Aspects of the disclosure provide a system that includes a protected module, an input module and a gesture engine. The protected module is configured to be accessible based on a specific gesture of a user predetermined to have a right to access the protected module. The input module is configured to receive an input gesture from a requester to access the protected module. The gesture engine is configured to be trained to process the input gesture in order to grant/deny an access to the protected module by the requester.Type: GrantFiled: October 1, 2013Date of Patent: November 24, 2015Assignee: LOCKHEED MARTIN CORPORATIONInventors: Alex Hrybyk, John S. Morrison
-
Patent number: 9027076Abstract: An approach is provided for causing a change in a security policy of a device based on contextual information. The approach involves determining context information associated with a device. The approach also involves determining a security policy of the device. The approach further involves determining a change of the context information. The approach additionally involves processing the determined change of the context information to cause, at least in part, a revision of the security policy of the device.Type: GrantFiled: March 23, 2012Date of Patent: May 5, 2015Assignee: Lockheed Martin CorporationInventors: Kyle J. Roach, Alex Hrybyk, John S. Morrison, Kathleen M. Kauffman, Eric B. Jones, Mark Lohrum, Kenneth R. Good
-
Patent number: 8925049Abstract: A system and method are provided for employing a hand-held wireless device to assess a vulnerability of a wirelessly-accessible target network to intrusion and/or cyber-attack. The system and method are directed at providing discrete, covert and fully-automated wireless access to the target network via one or more wireless access points and to assessing characteristic of the one or more wireless access points and the target network in support of a vulnerability assessment. The hand-held wireless device is configured to collect appropriate data regarding the wirelessly-accessible network, including network and portal scans, and higher-level programmed data collection. The hand-held wireless device is further configured to analyze the collected data and to produce at least a first level vulnerability assessment of the target network without interaction by the user.Type: GrantFiled: November 18, 2011Date of Patent: December 30, 2014Assignee: Lockheed Martin CorporationInventors: John S. Morrison, Kyle J. Roach
-
Publication number: 20140101752Abstract: Aspects of the disclosure provide a system that includes a protected module, an input module and a gesture engine. The protected module is configured to be accessible based on a specific gesture of a user predetermined to have a right to access the protected module. The input module is configured to receive an input gesture from a requester to access the protected module. The gesture engine is configured to be trained to process the input gesture in order to grant/deny an access to the protected module by the requester.Type: ApplicationFiled: October 1, 2013Publication date: April 10, 2014Applicant: LOCKHEED MARTIN CORPORATIONInventors: Alex HRYBYK, JOHN S. MORRISON
-
Publication number: 20130254831Abstract: An approach is provided for causing a change in a security policy of a device based on contextual information. The approach involves determining context information associated with a device. The approach also involves determining a security policy of the device. The approach further involves determining a change of the context information. The approach additionally involves processing the determined change of the context information to cause, at least in part, a revision of the security policy of the device.Type: ApplicationFiled: March 23, 2012Publication date: September 26, 2013Applicant: LOCKHEED MARTIN CORPORATIONInventors: Kyle J. Roach, Alex Hrybyk, John S. Morrison, Kathleen M. Kauffman, Eric B. Jones, Mark Lohrum, Kenneth R. Good
-
Publication number: 20130133044Abstract: A system and method are provided for employing a hand-held wireless device to assess a vulnerability of a wirelessly-accessible target network to intrusion and/or cyber-attack. The system and method are directed at providing discrete, covert and fully-automated wireless access to the target network via one or more wireless access points and to assessing characteristic of the one or more wireless access points and the target network in support of a vulnerability assessment. The hand-held wireless device is configured to collect appropriate data regarding the wirelessly-accessible network, including network and portal scans, and higher-level programmed data collection. The hand-held wireless device is further configured to analyze the collected data and to produce at least a first level vulnerability assessment of the target network without interaction by the user.Type: ApplicationFiled: November 18, 2011Publication date: May 23, 2013Applicant: LOCKHEED MARTIN CORPORATIONInventors: John S. MORRISON, Kyle J. Roach