Patents by Inventor Joseph James Sharkey

Joseph James Sharkey has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 10891167
    Abstract: A method of protecting software in a computer system includes defining a memory fractionation configuration for an application software program in the computer system, fractionating at least one page of the application software program into fractions according to the memory fractionation configuration, and running the application in such a manner that, at any particular point in time when the application is running, at least a first one of the fractions is stored in a manner that is not accessible from a user space or a kernel space of the computer system.
    Type: Grant
    Filed: December 20, 2016
    Date of Patent: January 12, 2021
    Assignee: Siege Technologies, LLC
    Inventor: Joseph James Sharkey
  • Publication number: 20180046516
    Abstract: A method of protecting software in a computer system includes defining a memory fractionation configuration for an application software program in the computer system, fractionating at least one page of the application software program into fractions according to the memory fractionation configuration, and running the application in such a manner that, at any particular point in time when the application is running, at least a first one of the fractions is stored in a manner that is not accessible from a user space or a kernel space of the computer system.
    Type: Application
    Filed: December 20, 2016
    Publication date: February 15, 2018
    Inventor: Joseph James Sharkey
  • Patent number: 8478974
    Abstract: Methods for reducing the impact of malware during a booting sequence for an interrupt driven computing device are disclosed. One or more parameters associated with an interrupt vector table (IVT) are manipulated to force the computing device into a clean state following a system level portion of the booting sequence. In another embodiment, occurring prior to the loading of an operating system or a call to a non-returnable main( ) function, one or more unused interrupt vectors in an IVT are replaced. A function filter is implemented for one or more interrupt vectors in the IVT to disallow unnecessary interrupt functions from being executed. One or more required interrupt vector functions are replaced with one or more corresponding custom vector functions. One or more memory locations are wiped if the one or more memory locations do not hold at least a portion of the IVT and/or the interrupt vector functions.
    Type: Grant
    Filed: June 23, 2010
    Date of Patent: July 2, 2013
    Assignee: Assured Information Security, Inc.
    Inventors: Ryan Matthew Wilson, Joseph James Sharkey, Michael Joseph Sieffert
  • Publication number: 20110320797
    Abstract: Methods for reducing the impact of malware during a booting sequence for an interrupt driven computing device are disclosed. One or more parameters associated with an interrupt vector table (IVT) are manipulated to force the computing device into a clean state following a system level portion of the booting sequence. In another embodiment, occurring prior to the loading of an operating system or a call to a non-returnable main( ) function, one or more unused interrupt vectors in an IVT are replaced. A function filter is implemented for one or more interrupt vectors in the IVT to disallow unnecessary interrupt functions from being executed. One or more required interrupt vector functions are replaced with one or more corresponding custom vector functions. One or more memory locations are wiped if the one or more memory locations do not hold at least a portion of the IVT and/or the interrupt vector functions.
    Type: Application
    Filed: June 23, 2010
    Publication date: December 29, 2011
    Applicant: Assured Information Security, Inc.
    Inventors: Ryan Matthew WILSON, Joseph James Sharkey, Michael Joseph Sieffert
  • Publication number: 20110197256
    Abstract: A method, computer readable medium, and apparatus for securing a processing system includes implementing a virtual machine manager (VMM) using a hardware assisted handler in secure processing apparatus. One or more critical events are monitored with the VMM in the secure processing apparatus. One or more behaviors in response to the one or more monitored critical events are controlled with VMM.
    Type: Application
    Filed: December 20, 2010
    Publication date: August 11, 2011
    Applicant: ASSURED INFORMATION SECURITY, INC.
    Inventors: Joseph James Sharkey, Rian Patrick Quinn