Patents by Inventor Mark A. Bellmore
Mark A. Bellmore has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 11968243Abstract: A containerized cross-domain solution (CDS) is disclosed herein. In some examples, a first network interface container can be executed on a server to run a first network interface application to receive a data packet that includes data generated by a first process executing at a first security domain. A filter container can be executed on the server to run a data filter to evaluate a data content of the data to determine whether the data content violates a set of data rules. A second network interface container can be executed on the server to run a second network interface application. The data packet can be provided to the second network interface application in response to determining that the data content does not violates the set of data rules. The second network interface application can provide the data packet to a second security domain for a second process executing therein.Type: GrantFiled: June 21, 2021Date of Patent: April 23, 2024Assignee: NORTHROP GRUMMAN SYSTEMS CORPORATIONInventors: Mark A. Bellmore, Matthew T. Kirk, David M. Iodice
-
Publication number: 20220407894Abstract: A containerized cross-domain solution (CDS) is disclosed herein. In some examples, a first network interface container can be executed on a server to run a first network interface application to receive a data packet that includes data generated by a first process executing at a first security domain. A filter container can be executed on the server to run a data filter to evaluate a data content of the data to determine whether the data content violates a set of data rules. A second network interface container can be executed on the server to run a second network interface application. The data packet can be provided to the second network interface application in response to determining that the data content does not violates the set of data rules. The second network interface application can provide the data packet to a second security domain for a second process executing therein.Type: ApplicationFiled: June 21, 2021Publication date: December 22, 2022Applicant: NORTHROP GRUMMAN SYSTEMS CORPORATIONInventors: MARK A. BELLMORE, MATTHEW T. KIRK, DAVID M. IODICE
-
Publication number: 20220217209Abstract: In an example, a system can include a web service interface (WSI) and a service directory for enabling communication between a web and non-web service. The WSI can be configured to communicate with the non-web service to receive reader data and/or writer data. The service directory can be configured to provide the WSI with non-web service subscriber data and/or non-web service publisher data for the non-web service in response to receiving the reader and/or writer data. The non-web service subscriber data identifies a web service as a subscriber of data provided by the non-web service and the non-web service publisher data identifies the web service as a publisher of data from which the non-web service is enabled to retrieve data. The WSI can be configured to provide the web service subscriber and/or publisher data to the non-web service to enable the non-web service to communicate with the web service.Type: ApplicationFiled: January 4, 2021Publication date: July 7, 2022Applicant: NORTHROP GRUMMAN SYSTEMS CORPORATIONInventors: MATTHEW R. LUKER, MARK A. BELLMORE, CHRISTOPHER BEATTIE, DAVID M. IODICE, FORREST BLAND
-
Patent number: 11381664Abstract: In an example, a system can include a web service interface (WSI) and a service directory for enabling communication between a web and non-web service. The WSI can be configured to communicate with the non-web service to receive reader data and/or writer data. The service directory can be configured to provide the WSI with non-web service subscriber data and/or non-web service publisher data for the non-web service in response to receiving the reader and/or writer data. The non-web service subscriber data identifies a web service as a subscriber of data provided by the non-web service and the non-web service publisher data identifies the web service as a publisher of data from which the non-web service is enabled to retrieve data. The WSI can be configured to provide the web service subscriber and/or publisher data to the non-web service to enable the non-web service to communicate with the web service.Type: GrantFiled: January 4, 2021Date of Patent: July 5, 2022Assignee: NORTHROP GRUMMAN SYSTEMS CORPORATIONInventors: Matthew R. Luker, Mark A. Bellmore, Christopher Beattie, David M. Iodice, Forrest Bland
-
Patent number: 8086867Abstract: A process for generating a unique, secure and printable identity document, for authenticating the use of the document, and for granting privileges based on the document, includes generating an identity certificate for an individual. This certificate incorporates a pointer to biometric and other identifying data for the individual which are stored in a reference database. The identity certificate is encoded to produce, for example, a machine-readable printable 2-dimensional barcode as an identity document. The identity document may then be used by the document holder for generation of an encoded privilege document and this, in turn, is compared with the stored reference data, including the stored biometric when the privilege is to be exercised.Type: GrantFiled: May 1, 2002Date of Patent: December 27, 2011Assignee: Northrop Grumman Systems CorporationInventors: William E. Freeman, Mark A. Bellmore, Kenneth W. Aull
-
Patent number: 7475250Abstract: A method and computer program to assign certificates/private keys to a token. This method and computer program allows a user to access a certificate authority and have certificates/private keys that are used for signature, encryption and role purposes generated and downloaded to the token. The use of secure communication lines and computers is not necessary since the token contains a unique token ID and private key, while the certificate authority contains the associated public key for the token. The certificate generated is wrapped in the public key and only the token, having the associated private key, may activate the certificate.Type: GrantFiled: December 19, 2001Date of Patent: January 6, 2009Assignee: Northrop Grumman CorporationInventors: Kenneth W. Aull, Thomas C. Kerr, William E. Freeman, Mark A. Bellmore
-
Patent number: 7421079Abstract: A method, and a corresponding apparatus, provide for remote, secure replacement of private keys in a private key infrastructure. The method is implemented as a secure key replacement protocol (SKRP), which includes the steps of receiving a rekey request, where the rekey request identifies a private key for replacement, authenticating the rekey request, replacing the identified private key with a SKRP key, signing the challenge with the SKRP key, and returning the signed challenge. The rekey request includes the SKRP key and the challenge.Type: GrantFiled: December 9, 2003Date of Patent: September 2, 2008Assignee: Northrop Grumman CorporationInventors: William E. Freeman, Mark A. Bellmore
-
Patent number: 7206936Abstract: A method and computer program to revoke and update a token (130) having several encryption, signature and role certificates/private keys contained in the token (130). The certificates/private keys in the token 130 are transmitted wrapped by a public key and may only be activated by a private key contained in the token (130). The activation of any certificate/private key requires the entry of a passphrase by a user (132). Further, all certificates/private keys contained in a token (130) are stored in an authoritative database 104. In the event that a token (130) is lost then all certificates/private keys associated with the token (130) are revoked. Further, when new certificates/private keys are issued to a user (132) these certificates/private keys are encrypted using the token's (130) public key and downloaded to the token (130).Type: GrantFiled: December 19, 2001Date of Patent: April 17, 2007Assignee: Northrop Grumman CorporationInventors: Kenneth W. Aull, Thomas C. Kerr, William E. Freeman, Mark A. Bellmore
-
Publication number: 20050123142Abstract: A method, and a corresponding apparatus, provide for remote, secure replacement of private keys in a private key infrastructure. The method is implemented as a secure key replacement protocol (SKRP), which includes the steps of receiving a rekey request, where the rekey request identifies a private key for replacement, authenticating the rekey request, replacing the identified private key with a SKRP key, signing the challenge with the SKRP key, and returning the signed challenge. The rekey request includes the SKRP key and the challenge.Type: ApplicationFiled: December 9, 2003Publication date: June 9, 2005Inventors: William Freeman, Mark Bellmore
-
Publication number: 20040162984Abstract: A process for generating a unique, secure and printable identity document, for authenticating the use of the document, and for granting privileges based on the document, includes generating an identity certificate for an individual. This certificate incorporates a pointer to biometric and other identifying data for the individual which are stored in a reference database. The identity certificate is encoded to produce, for example, a machine-readable printable 2-dimensional barcode as an identity document. The identity document may then be used by the document holder for generation of an encoded privilege document and this, in turn, is compared with the stored reference data, including the stored biometric when the privilege is to be exercised.Type: ApplicationFiled: May 1, 2002Publication date: August 19, 2004Inventors: William E. Freeman, Mark A. Bellmore, Kenneth W. Aull
-
Publication number: 20030115468Abstract: A method and computer program to assign certificates/private keys to a token (130). This method and computer program allows a user (132) to access a certificate authority (110) and have certificates/private keys that are used for signature, encryption and role purposes generated and downloaded to the token (130). The use of secure communication lines and computers is not necessary since the token (132) contains a unique token ID and private key, while the certificate authority (110) contains the associated public key for the token (130). The certificate generated is wrapped in the public key and only the token (130), having the associated private key, may activate the certificate.Type: ApplicationFiled: December 19, 2001Publication date: June 19, 2003Inventors: Kenneth W. Aull, Thomas C. Kerr, William E. Freeman, Mark A. Bellmore
-
Publication number: 20030115466Abstract: A method and computer program to revoke and update a token (130) having several encryption, signature and role certificates/private keys contained in the token (130). The certificates/private keys in the token 130 are transmitted wrapped by a public key and may only be activated by a private key contained in the token (130). The activation of any certificate/private key requires the entry of a passphrase by a user (132). Further, all certificates/private keys contained in a token (130) are stored in an authoritative database 104. In the event that a token (130) is lost then all certificates/private keys associated with the token (130) are revoked. Further, when new certificates/private keys are issued to a user (132) these certificates/private keys are encrypted using the token's (130) public key and downloaded to the token (130).Type: ApplicationFiled: December 19, 2001Publication date: June 19, 2003Inventors: Kenneth W. Aull, Thomas C. Kerr, William E. Freeman, Mark A. Bellmore
-
Publication number: 20030115455Abstract: Method and apparatus for centralized processing of hardware tokens for a public key infrastructure (PKI). A commercially available token is received at a secure processing facility. An operating system is installed on the token. A unique key encipherment certificate is created that includes a public key for the token. The unique key encipherment certificate is written onto the token. A Root Certificate Authority certificate is also written onto the token. A unique private key is written onto the token where the unique private key is the matching key for the unique key encipherment certificate. A software package is loaded onto the token. The software package is capable of cryptologically validating future keys and certificates, decrypting the keys and certificates, and installing the keys and certificates in the token.Type: ApplicationFiled: December 19, 2001Publication date: June 19, 2003Inventors: Kenneth W. Aull, Thomas C. Kerr, William E. Freeman, Mark A. Bellmore
-
Publication number: 20030115467Abstract: A token issuance and binding process includes providing a plurality of tokens, each token having a unique ID number stored therein. A unique public/private key pair is generated for each token and each token ID number and corresponding public key is stored in a directory/database. Each private key is stored in its respective token and a unique ID number of a user is bound to a corresponding one of the plurality of tokens by storing the correspondence there between in the directory/database.Type: ApplicationFiled: December 19, 2001Publication date: June 19, 2003Inventors: Kenneth W. Aull, Thomas C. Kerr, William E. Freeman, Mark A. Bellmore