Patents by Inventor Kevin L. Cariker

Kevin L. Cariker has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 9762595
    Abstract: Generally discussed herein are systems, apparatuses, and methods for secure transfer of content across a security boundary. A system can include a high side domain communicatively coupled to a transfer guard module, the high side domain comprising a high side data repository, a first review module executable by processing circuitry to determine whether a permission level of first content violates a permission level of the high side domain, a second review module executable by the processing circuitry to determine whether second content from the high side data repository includes a permission level that violates a permission level of a low side domain, a first data diode module communicatively coupled between the first review module and the high side data repository, and a second data diode module communicatively coupled between the second review module and the high side data repository.
    Type: Grant
    Filed: August 11, 2015
    Date of Patent: September 12, 2017
    Assignee: Raytheon Company
    Inventors: Eric Dodge, Daniel E. Abramson, Monty D. McDougal, Julian A. Zottl, Stephen R. Welke, Kevin L. Cariker
  • Publication number: 20170048259
    Abstract: Generally discussed herein are systems, apparatuses, and methods for secure transfer of content across a security boundary. A system can include a high side domain communicatively coupled to a transfer guard module, the high side domain comprising a high side data repository, a first review module executable by processing circuitry to determine whether a permission level of first content violates a permission level of the high side domain, a second review module executable by the processing circuitry to determine whether second content from the high side data repository includes a permission level that violates a permission level of a low side domain, a first data diode module communicatively coupled between the first review module and the high side data repository, and a second data diode module communicatively coupled between the second review module and the high side data repository.
    Type: Application
    Filed: August 11, 2015
    Publication date: February 16, 2017
    Inventors: Eric Dodge, Daniel E. Abramson, Monty D. McDougal, Julian A. Zottl, Stephen R. Welke, Kevin L. Cariker
  • Patent number: 8863279
    Abstract: According to one embodiment, a computer-implemented method for execution on one or more processors includes receiving a first file and determining a file type of the first file. The method also includes determining, according to a first policy, a plurality of malware detection schemes to apply to the first file based on the determined file type of the first file. In addition, the method includes scheduling the application of the determined plurality of malware detection schemes to the first file amongst a plurality of detection nodes according to a second policy. Further, the method includes determining, in response to determining the results of applying the plurality of malware detection schemes, that the first file is malware or determining that the first file is suspected malware according to a third policy.
    Type: Grant
    Filed: March 8, 2010
    Date of Patent: October 14, 2014
    Assignee: Raytheon Company
    Inventors: Monty D. McDougal, Randy S. Jennings, Jeffrey C. Brown, Jesse J. Lee, Brian N. Smith, Darin J. De Rita, Kevin L. Cariker, William E. Sterns, Michael K. Daly
  • Publication number: 20110219450
    Abstract: According to one embodiment, a computer-implemented method for execution on one or more processors includes receiving a first file and determining a file type of the first file. The method also includes determining, according to a first policy, a plurality of malware detection schemes to apply to the first file based on the determined file type of the first file. In addition, the method includes scheduling the application of the determined plurality of malware detection schemes to the first file amongst a plurality of detection nodes according to a second policy. Further, the method includes determining, in response to determining the results of applying the plurality of malware detection schemes, that the first file is malware or determining that the first file is suspected malware according to a third policy.
    Type: Application
    Filed: March 8, 2010
    Publication date: September 8, 2011
    Applicant: Raytheon Company
    Inventors: Monty D. McDougal, Randy S. Jennings, Jeffrey C. Brown, Jesse J. Lee, Brian N. Smith, Darin J. De Rita, Kevin L. Cariker, William E. Sterns, Michael K. Daly