Patents by Inventor Michael C. Dapp
Michael C. Dapp has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 8214102Abstract: One embodiment is directed to providing access between external systems and embedded vehicle electronic systems. That is, an interface module may receive information from a system external to the vehicle, determine an embedded system of the vehicle to which to provide the information, and provide the information to the embedded system. Similarly, the interface module may receive information a embedded electronic systems of a vehicle, determine a system external the vehicle to which to provide the information, and provide the information to the external system.Type: GrantFiled: March 8, 2011Date of Patent: July 3, 2012Assignee: Lockheed Martin CorporationInventors: Kenneth B. Donovan, Michael C. Dapp, Jeremy Impson, John Moody
-
Patent number: 8041477Abstract: One embodiment is directed to providing access between external systems and embedded vehicle electronic systems. That is, an interface module may receive information from a system external to the vehicle, determine an embedded system of the vehicle to which to provide the information, and provide the information to the embedded system. Similarly, the interface module may receive information a embedded electronic systems of a vehicle, determine a system external the vehicle to which to provide the information, and provide the information to the external system.Type: GrantFiled: November 21, 2006Date of Patent: October 18, 2011Assignee: Lockheed Martin CorporationInventors: Kenneth B. Donovan, Michael C. Dapp, Jeremy Impson, John Moody
-
Publication number: 20110162063Abstract: One embodiment is directed to providing access between external systems and embedded vehicle electronic systems. That is, an interface module may receive information from a system external to the vehicle, determine an embedded system of the vehicle to which to provide the information, and provide the information to the embedded system. Similarly, the interface module may receive information a embedded electronic systems of a vehicle, determine a system external the vehicle to which to provide the information, and provide the information to the external system.Type: ApplicationFiled: March 8, 2011Publication date: June 30, 2011Applicant: Lockheed Martin CorporationInventors: Kenneth B. Donovan, Michael C. Dapp, Jeremy Impson, John Moody
-
Publication number: 20080209560Abstract: A secure infrastructure system and method with user transparent signaling for communicating detection of signals at a network node having characteristics of a potential attack and for controlling communications at a node from another node in response to the user transparent signals. A processor is connected to routers and the network through an encryption engine and includes a manager object to issue control commands to nodes of a locally lower hierarchical tier and managed objects to detect potential attacks and exercise control over the routers responsive to signals from a node of a locally higher hierarchical tier. Faults or potential attacks are compartmentalized to a node or sector of the network and isolated while normal communications are continued over redundant network links.Type: ApplicationFiled: May 15, 2007Publication date: August 28, 2008Inventor: Michael C. Dapp
-
Patent number: 7415331Abstract: A system ensures safety and security of teams of collaborative autonomous unmanned vehicles in executing a mission plan. The system includes a plurality of components, a first device, a second device, and a third device. The plurality of components perform situation analysis, mission planning, mission replanning, mission plan execution, and collaboration between the autonomous unmanned vehicles. The first device identifies safety critical components of the plurality of components. The second device identifies security sensitive components of the plurality of components. The third device isolates the safety critical components from contamination by other components of the plurality of components. The third device isolates security sensitive data from contaminating non-security sensitive components of the plurality of components.Type: GrantFiled: July 25, 2005Date of Patent: August 19, 2008Assignee: Lockheed Martin CorporationInventors: Michael C. Dapp, Adam Jung, Robert J. Szczerba, Paul W. Thurm, Joel J. Tleon
-
Publication number: 20080120366Abstract: One embodiment is directed to providing access between external systems and embedded vehicle electronic systems. That is, an interface module may receive information from a system external to the vehicle, determine an embedded system of the vehicle to which to provide the information, and provide the information to the embedded system. Similarly, the interface module may receive information a embedded electronic systems of a vehicle, determine a system external the vehicle to which to provide the information, and provide the information to the external system.Type: ApplicationFiled: November 21, 2006Publication date: May 22, 2008Applicant: Lockheed Martin CorporationInventors: Kenneth B. Donovan, Michael C. Dapp, Jeremy Impson, John Moody
-
Patent number: 7225467Abstract: A high level of security and fault tolerance is provided in a digital network by use of highly secure infrastructure of user transparent signalling for communicating detection of signals at a network node having characteristics of a potential attack to another node and controlling communications at routers at the node from another node in response to the user transparent signals. A processor is connected to the routers and the network through an encryption engine and includes a manager object to issue control commands to nodes of a locally lower hierarchy tier and managed objects to detect potential attacks and exercise control over the routers responsive to signals from a node of a locally higher hierarchy tier. Identifications are provided for communications between nodes regardless of whether or not a corresponding user is identified and communications are logged.Type: GrantFiled: October 11, 2001Date of Patent: May 29, 2007Assignee: Lockheed Martin CorporationInventor: Michael C. Dapp
-
Patent number: 7213265Abstract: Security policy manager devices are leveraged by manager objects to use highly secure user transparent communications to provide detection of questionable activities at every node, automatic collection of information related to any potential attack, isolation of the offending object with arbitrary flexibility of response (e.g. flexibly determining the level of certainty of an attack for initiation of a response in accordance with the number of nodes to be partitioned that is determined by the collected data concerning the potential attack), changing trust relationships between security domains, limiting the attack and launching offensive information warfare capabilities (e.g. outbound from the compromised node while limiting or eliminating inbound communications) in log time and simultaneously and/or concurrently in different but possibly overlapping sections or segments of a digital network of arbitrary configuration.Type: GrantFiled: October 11, 2001Date of Patent: May 1, 2007Assignee: Lockheed Martin CorporationInventor: Michael C. Dapp
-
Patent number: 7146643Abstract: Signatures of character strings in a document which may indicate a possible intrusion into or attack on a networked computer system or node thereof or other security breach are detected at high speed using a hardware accelerator within the environment of a hardware parser accelerator. An interrupt or exception can thus be issued to a host CPU before a command which may constitute such a security breach, intrusion or attack can be made executable by parsing of a document. The CPU can initiate network control measures to prevent or limit the intrusion.Type: GrantFiled: December 31, 2002Date of Patent: December 5, 2006Assignee: Lockheed Martin CorporationInventors: Michael C. Dapp, Eric C. Lett
-
Patent number: 7080094Abstract: A hardware accelerated validation parser is provided to remove a large portion if not all of the processing and overhead burden of validation parsing from a host processor by parallel access to both a state table and a data dictionary based on a token and merging and selective redirection of the respective outputs thereof; a portion of a transition control word (TCW) formed by the merged data being used to advance through the state table and a portion of the TCW being used to control formation of a tree structured data object (TSDO) corresponding to a text document in a language such as XML™ which supports interoperability and platform independence. A stack is provided to accommodate nesting of elements and aggregate elements. The formation of the TSDO can be and preferably is performed asynchronously and autonomously in parallel with the validation parsing.Type: GrantFiled: December 31, 2002Date of Patent: July 18, 2006Assignee: Lockheed Martin CorporationInventors: Michael C. Dapp, Eric C. Lett, Sai Lun Ng
-
Publication number: 20040172234Abstract: Error-free state tables are automatically generated from a specification of a group of desired performable functions, such as are provided in a programming language in a formal notation such as Backus-Naur form or a derivative thereof by discriminating tokens corresponding to respective performable functions, identifications, arguments, syntax, grammar rules, special symbols and the like. The tokens may be recursive (e.g. infinite), in which case they are transformed into a finite automata which may be deterministic or non-deterministic. Non-deterministic finite automata are transformed into deterministic finite automata and then into state transitions which are used to build a state table which can then be stored or, preferably, loaded into a finite state machine of a hardware parser accelerator to define its personality.Type: ApplicationFiled: October 3, 2003Publication date: September 2, 2004Inventors: Michael C. Dapp, Sai Lun Ng
-
Publication number: 20040083221Abstract: A hardware accelerated validation parser is provided to remove a large portion if not all of the processing and overhead burden of validation parsing from a host processor by parallel access to both a state table and a data dictionary based on a token and merging and selective redirection of the respective outputs thereof; a portion of a transition control word (TCW) formed by the merged data being used to advance through the state table and a portion of the TCW being used to control formation of a tree structured data object (TSDO) corresponding to a text document in a language such as XML™ which supports interoperability and platform independence. A stack is provided to accommodate nesting of elements and aggregate elements. The formation of the TSDO can be and preferably is performed asynchronously and autonomously in parallel with the validation parsing.Type: ApplicationFiled: December 31, 2002Publication date: April 29, 2004Inventors: Michael C. Dapp, Eric C. Lett, Sai Lun Ng
-
Publication number: 20040083466Abstract: Dedicated hardware is employed to perform parsing of documents such as XML™ documents in much reduced time while removing a substantial processing burden from the host CPU. The conventional use of a state table is divided into a character palette, a state table in abbreviated form, and a next state palette. The palettes may be implemented in dedicated high speed memory and a cache arrangement may be used to accelerate accesses to the abbreviated state table. Processing is performed in parallel pipelines which may be partially concurrent. dedicated registers may be updated in parallel as well and strings of special characters of arbitrary length accommodated by a character palette skip feature under control of a flag bit to further accelerate parsing of a document.Type: ApplicationFiled: December 31, 2002Publication date: April 29, 2004Inventors: Michael C. Dapp, Eric C. Lett
-
Publication number: 20040083387Abstract: Signatures of character strings in a document which may indicate a possible intrusion into or attack on a networked computer system or node thereof or other security breach are detected at high speed using a hardware accelerator within the environment of a hardware parser accelerator. An interrupt or exception can thus be issued to a host CPU before a command which may constitute such a security breach, intrusion or attack can be made executable by parsing of a document. The CPU can initiate network control measures to prevent or limit the intrusion.Type: ApplicationFiled: December 31, 2002Publication date: April 29, 2004Inventors: Michael C. Dapp, Eric C. Lett
-
Publication number: 20020066035Abstract: A high level of security and fault tolerance is provided in a digital network by use of highly secure infrastructure of user transparent signalling for communicating detection of signals at a network node having characteristics of a potential attack to another node and controlling communications at routers at the node from another node in response to the user transparent signals. A processor is connected to the routers and the network through an encryption engine and includes a manager object to issue control commands to nodes of a locally lower hierarchy tier and managed objects to detect potential attacks and exercise control over the routers responsive to signals from a node of a locally higher hierarchy tier. Identifications are provided for communications between nodes regardless of whether or not a corresponding user is identified and communications are logged.Type: ApplicationFiled: October 11, 2001Publication date: May 30, 2002Inventor: Michael C. Dapp
-
Publication number: 20020059528Abstract: Security policy manager devices are leveraged by manager objects to use highly secure user transparent communications to provide detection of questionable activities at every node, automatic collection of information related to any potential attack, isolation of the offending object with arbitrary flexibility of response (e.g. flexibly determining the level of certainty of an attack for initiation of a response in accordance with the number of nodes to be partitioned that is determined by the collected data concerning the potential attack), changing trust relationships between security domains, limiting the attack and launching offensive information warfare capabilities (e.g. outbound from the compromised node while limiting or eliminating inbound communications) in log time and simultaneously and/or concurrently in different but possibly overlapping sections or segments of a digital network of arbitrary configuration.Type: ApplicationFiled: October 11, 2001Publication date: May 16, 2002Inventor: Michael C. Dapp
-
Patent number: 5625836Abstract: A parallel array processor for massively parallel applications is formed with low power CMOS with DRAM processing while incorporating processing elements on a single chip. Eight processors on a single chip have their own associated processing element, significant memory, and I/O and are interconnected with a hypercube based, but modified, topology. These nodes are then interconnected, either by a hypercube, modified hypercube, or ring, or ring within ring network topology. Conventional microprocessor MMPs consume pins and time going to memory. The new architecture merges processor and memory with multiple PMEs (eight 16 bit processors with 32K and I/O) in DRAM and has no memory access delays and uses all the pins for networking. The chip can be a single node of a fine-grained parallel processor. Each chip will have eight 16 bit processors, each processor providing 5 MIPs performance. I/O has three internal ports and one external port shared by the plural processors on the chip.Type: GrantFiled: June 2, 1995Date of Patent: April 29, 1997Assignee: International Business Machines CorporationInventors: Thomas N. Barker, Clive A. Collins, Michael C. Dapp, James W. Dieffenderfer, Donald M. Lesmeister, Richard E. Nier, Eric E. Retter, Robert R. Richardson, Vincent J. Smoral
-
Patent number: 5617577Abstract: A fast I/O for a multi-PME computer system provides a way to break into a network coupling to alternate network couplings. The system coupling is called a zipper.Our I/O zipper concept can be used to implement the concept that the port into a node could be driven by the port out of a node or by data coming from the system bus. Conversely, data being put out of a node would be available to both the input to another node and to the system bus. Outputting data to both the system bus and another node is not done simultaneously but in different cycles. The zipper passes data into and out of a network of interconnected nodes is used in a system of interconnecting nodes in a mesh, rings of wrapped tori. such that there is no edge to the network, the zipper mechanism logically breaks the the rings along a dimension orthogonal to the rings such that an edge to the network is established. The coupling dynamically toggles the network between a network without an edge and a network with an edge.Type: GrantFiled: March 8, 1995Date of Patent: April 1, 1997Assignee: International Business Machines CorporationInventors: Thomas N. Barker, Clive A. Collins, Michael C. Dapp, James W. Dieffenderfer, Donald G. Grice, Billy J. Knowles, Donald M. Lesmeister, Richard E. Nier, Eric E. Retter, David B. Rolfe, Vincent J. Smoral
-
Patent number: 5590345Abstract: A computer system having a plurality of processors and memory including a plurality of scalable nodes having multiple like processor memory elements. Each of the processor memory elements has a plurality of communication paths for communication within a node to other like processor memory elements within the node. Each of the processor memory elements also has a communication path for communication external to the node to another like scalable node of the computer system.Type: GrantFiled: May 22, 1992Date of Patent: December 31, 1996Assignee: International Business Machines CorporationInventors: Thomas N. Barker, Clive A. Collins, Michael C. Dapp, James W. Dieffenderfer, Donald G. Grice, Peter M. Kogge, David C. Kuchinski, Billy J. Knowles, Donald M. Lesmeister, Richard E. Miles, Richard E. Nier, Eric E. Retter, Robert R. Richardson, David B. Rolfe, Nicholas J. Schoonover, Vincent J. Smoral, James R. Stupp, Paul A. Wilkinson