Patents by Inventor Michael C. Dapp

Michael C. Dapp has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 8214102
    Abstract: One embodiment is directed to providing access between external systems and embedded vehicle electronic systems. That is, an interface module may receive information from a system external to the vehicle, determine an embedded system of the vehicle to which to provide the information, and provide the information to the embedded system. Similarly, the interface module may receive information a embedded electronic systems of a vehicle, determine a system external the vehicle to which to provide the information, and provide the information to the external system.
    Type: Grant
    Filed: March 8, 2011
    Date of Patent: July 3, 2012
    Assignee: Lockheed Martin Corporation
    Inventors: Kenneth B. Donovan, Michael C. Dapp, Jeremy Impson, John Moody
  • Patent number: 8041477
    Abstract: One embodiment is directed to providing access between external systems and embedded vehicle electronic systems. That is, an interface module may receive information from a system external to the vehicle, determine an embedded system of the vehicle to which to provide the information, and provide the information to the embedded system. Similarly, the interface module may receive information a embedded electronic systems of a vehicle, determine a system external the vehicle to which to provide the information, and provide the information to the external system.
    Type: Grant
    Filed: November 21, 2006
    Date of Patent: October 18, 2011
    Assignee: Lockheed Martin Corporation
    Inventors: Kenneth B. Donovan, Michael C. Dapp, Jeremy Impson, John Moody
  • Publication number: 20110162063
    Abstract: One embodiment is directed to providing access between external systems and embedded vehicle electronic systems. That is, an interface module may receive information from a system external to the vehicle, determine an embedded system of the vehicle to which to provide the information, and provide the information to the embedded system. Similarly, the interface module may receive information a embedded electronic systems of a vehicle, determine a system external the vehicle to which to provide the information, and provide the information to the external system.
    Type: Application
    Filed: March 8, 2011
    Publication date: June 30, 2011
    Applicant: Lockheed Martin Corporation
    Inventors: Kenneth B. Donovan, Michael C. Dapp, Jeremy Impson, John Moody
  • Publication number: 20080209560
    Abstract: A secure infrastructure system and method with user transparent signaling for communicating detection of signals at a network node having characteristics of a potential attack and for controlling communications at a node from another node in response to the user transparent signals. A processor is connected to routers and the network through an encryption engine and includes a manager object to issue control commands to nodes of a locally lower hierarchical tier and managed objects to detect potential attacks and exercise control over the routers responsive to signals from a node of a locally higher hierarchical tier. Faults or potential attacks are compartmentalized to a node or sector of the network and isolated while normal communications are continued over redundant network links.
    Type: Application
    Filed: May 15, 2007
    Publication date: August 28, 2008
    Inventor: Michael C. Dapp
  • Patent number: 7415331
    Abstract: A system ensures safety and security of teams of collaborative autonomous unmanned vehicles in executing a mission plan. The system includes a plurality of components, a first device, a second device, and a third device. The plurality of components perform situation analysis, mission planning, mission replanning, mission plan execution, and collaboration between the autonomous unmanned vehicles. The first device identifies safety critical components of the plurality of components. The second device identifies security sensitive components of the plurality of components. The third device isolates the safety critical components from contamination by other components of the plurality of components. The third device isolates security sensitive data from contaminating non-security sensitive components of the plurality of components.
    Type: Grant
    Filed: July 25, 2005
    Date of Patent: August 19, 2008
    Assignee: Lockheed Martin Corporation
    Inventors: Michael C. Dapp, Adam Jung, Robert J. Szczerba, Paul W. Thurm, Joel J. Tleon
  • Publication number: 20080120366
    Abstract: One embodiment is directed to providing access between external systems and embedded vehicle electronic systems. That is, an interface module may receive information from a system external to the vehicle, determine an embedded system of the vehicle to which to provide the information, and provide the information to the embedded system. Similarly, the interface module may receive information a embedded electronic systems of a vehicle, determine a system external the vehicle to which to provide the information, and provide the information to the external system.
    Type: Application
    Filed: November 21, 2006
    Publication date: May 22, 2008
    Applicant: Lockheed Martin Corporation
    Inventors: Kenneth B. Donovan, Michael C. Dapp, Jeremy Impson, John Moody
  • Patent number: 7225467
    Abstract: A high level of security and fault tolerance is provided in a digital network by use of highly secure infrastructure of user transparent signalling for communicating detection of signals at a network node having characteristics of a potential attack to another node and controlling communications at routers at the node from another node in response to the user transparent signals. A processor is connected to the routers and the network through an encryption engine and includes a manager object to issue control commands to nodes of a locally lower hierarchy tier and managed objects to detect potential attacks and exercise control over the routers responsive to signals from a node of a locally higher hierarchy tier. Identifications are provided for communications between nodes regardless of whether or not a corresponding user is identified and communications are logged.
    Type: Grant
    Filed: October 11, 2001
    Date of Patent: May 29, 2007
    Assignee: Lockheed Martin Corporation
    Inventor: Michael C. Dapp
  • Patent number: 7213265
    Abstract: Security policy manager devices are leveraged by manager objects to use highly secure user transparent communications to provide detection of questionable activities at every node, automatic collection of information related to any potential attack, isolation of the offending object with arbitrary flexibility of response (e.g. flexibly determining the level of certainty of an attack for initiation of a response in accordance with the number of nodes to be partitioned that is determined by the collected data concerning the potential attack), changing trust relationships between security domains, limiting the attack and launching offensive information warfare capabilities (e.g. outbound from the compromised node while limiting or eliminating inbound communications) in log time and simultaneously and/or concurrently in different but possibly overlapping sections or segments of a digital network of arbitrary configuration.
    Type: Grant
    Filed: October 11, 2001
    Date of Patent: May 1, 2007
    Assignee: Lockheed Martin Corporation
    Inventor: Michael C. Dapp
  • Patent number: 7146643
    Abstract: Signatures of character strings in a document which may indicate a possible intrusion into or attack on a networked computer system or node thereof or other security breach are detected at high speed using a hardware accelerator within the environment of a hardware parser accelerator. An interrupt or exception can thus be issued to a host CPU before a command which may constitute such a security breach, intrusion or attack can be made executable by parsing of a document. The CPU can initiate network control measures to prevent or limit the intrusion.
    Type: Grant
    Filed: December 31, 2002
    Date of Patent: December 5, 2006
    Assignee: Lockheed Martin Corporation
    Inventors: Michael C. Dapp, Eric C. Lett
  • Patent number: 7080094
    Abstract: A hardware accelerated validation parser is provided to remove a large portion if not all of the processing and overhead burden of validation parsing from a host processor by parallel access to both a state table and a data dictionary based on a token and merging and selective redirection of the respective outputs thereof; a portion of a transition control word (TCW) formed by the merged data being used to advance through the state table and a portion of the TCW being used to control formation of a tree structured data object (TSDO) corresponding to a text document in a language such as XML™ which supports interoperability and platform independence. A stack is provided to accommodate nesting of elements and aggregate elements. The formation of the TSDO can be and preferably is performed asynchronously and autonomously in parallel with the validation parsing.
    Type: Grant
    Filed: December 31, 2002
    Date of Patent: July 18, 2006
    Assignee: Lockheed Martin Corporation
    Inventors: Michael C. Dapp, Eric C. Lett, Sai Lun Ng
  • Publication number: 20040172234
    Abstract: Error-free state tables are automatically generated from a specification of a group of desired performable functions, such as are provided in a programming language in a formal notation such as Backus-Naur form or a derivative thereof by discriminating tokens corresponding to respective performable functions, identifications, arguments, syntax, grammar rules, special symbols and the like. The tokens may be recursive (e.g. infinite), in which case they are transformed into a finite automata which may be deterministic or non-deterministic. Non-deterministic finite automata are transformed into deterministic finite automata and then into state transitions which are used to build a state table which can then be stored or, preferably, loaded into a finite state machine of a hardware parser accelerator to define its personality.
    Type: Application
    Filed: October 3, 2003
    Publication date: September 2, 2004
    Inventors: Michael C. Dapp, Sai Lun Ng
  • Publication number: 20040083221
    Abstract: A hardware accelerated validation parser is provided to remove a large portion if not all of the processing and overhead burden of validation parsing from a host processor by parallel access to both a state table and a data dictionary based on a token and merging and selective redirection of the respective outputs thereof; a portion of a transition control word (TCW) formed by the merged data being used to advance through the state table and a portion of the TCW being used to control formation of a tree structured data object (TSDO) corresponding to a text document in a language such as XML™ which supports interoperability and platform independence. A stack is provided to accommodate nesting of elements and aggregate elements. The formation of the TSDO can be and preferably is performed asynchronously and autonomously in parallel with the validation parsing.
    Type: Application
    Filed: December 31, 2002
    Publication date: April 29, 2004
    Inventors: Michael C. Dapp, Eric C. Lett, Sai Lun Ng
  • Publication number: 20040083466
    Abstract: Dedicated hardware is employed to perform parsing of documents such as XML™ documents in much reduced time while removing a substantial processing burden from the host CPU. The conventional use of a state table is divided into a character palette, a state table in abbreviated form, and a next state palette. The palettes may be implemented in dedicated high speed memory and a cache arrangement may be used to accelerate accesses to the abbreviated state table. Processing is performed in parallel pipelines which may be partially concurrent. dedicated registers may be updated in parallel as well and strings of special characters of arbitrary length accommodated by a character palette skip feature under control of a flag bit to further accelerate parsing of a document.
    Type: Application
    Filed: December 31, 2002
    Publication date: April 29, 2004
    Inventors: Michael C. Dapp, Eric C. Lett
  • Publication number: 20040083387
    Abstract: Signatures of character strings in a document which may indicate a possible intrusion into or attack on a networked computer system or node thereof or other security breach are detected at high speed using a hardware accelerator within the environment of a hardware parser accelerator. An interrupt or exception can thus be issued to a host CPU before a command which may constitute such a security breach, intrusion or attack can be made executable by parsing of a document. The CPU can initiate network control measures to prevent or limit the intrusion.
    Type: Application
    Filed: December 31, 2002
    Publication date: April 29, 2004
    Inventors: Michael C. Dapp, Eric C. Lett
  • Publication number: 20020066035
    Abstract: A high level of security and fault tolerance is provided in a digital network by use of highly secure infrastructure of user transparent signalling for communicating detection of signals at a network node having characteristics of a potential attack to another node and controlling communications at routers at the node from another node in response to the user transparent signals. A processor is connected to the routers and the network through an encryption engine and includes a manager object to issue control commands to nodes of a locally lower hierarchy tier and managed objects to detect potential attacks and exercise control over the routers responsive to signals from a node of a locally higher hierarchy tier. Identifications are provided for communications between nodes regardless of whether or not a corresponding user is identified and communications are logged.
    Type: Application
    Filed: October 11, 2001
    Publication date: May 30, 2002
    Inventor: Michael C. Dapp
  • Publication number: 20020059528
    Abstract: Security policy manager devices are leveraged by manager objects to use highly secure user transparent communications to provide detection of questionable activities at every node, automatic collection of information related to any potential attack, isolation of the offending object with arbitrary flexibility of response (e.g. flexibly determining the level of certainty of an attack for initiation of a response in accordance with the number of nodes to be partitioned that is determined by the collected data concerning the potential attack), changing trust relationships between security domains, limiting the attack and launching offensive information warfare capabilities (e.g. outbound from the compromised node while limiting or eliminating inbound communications) in log time and simultaneously and/or concurrently in different but possibly overlapping sections or segments of a digital network of arbitrary configuration.
    Type: Application
    Filed: October 11, 2001
    Publication date: May 16, 2002
    Inventor: Michael C. Dapp
  • Patent number: 5625836
    Abstract: A parallel array processor for massively parallel applications is formed with low power CMOS with DRAM processing while incorporating processing elements on a single chip. Eight processors on a single chip have their own associated processing element, significant memory, and I/O and are interconnected with a hypercube based, but modified, topology. These nodes are then interconnected, either by a hypercube, modified hypercube, or ring, or ring within ring network topology. Conventional microprocessor MMPs consume pins and time going to memory. The new architecture merges processor and memory with multiple PMEs (eight 16 bit processors with 32K and I/O) in DRAM and has no memory access delays and uses all the pins for networking. The chip can be a single node of a fine-grained parallel processor. Each chip will have eight 16 bit processors, each processor providing 5 MIPs performance. I/O has three internal ports and one external port shared by the plural processors on the chip.
    Type: Grant
    Filed: June 2, 1995
    Date of Patent: April 29, 1997
    Assignee: International Business Machines Corporation
    Inventors: Thomas N. Barker, Clive A. Collins, Michael C. Dapp, James W. Dieffenderfer, Donald M. Lesmeister, Richard E. Nier, Eric E. Retter, Robert R. Richardson, Vincent J. Smoral
  • Patent number: 5617577
    Abstract: A fast I/O for a multi-PME computer system provides a way to break into a network coupling to alternate network couplings. The system coupling is called a zipper.Our I/O zipper concept can be used to implement the concept that the port into a node could be driven by the port out of a node or by data coming from the system bus. Conversely, data being put out of a node would be available to both the input to another node and to the system bus. Outputting data to both the system bus and another node is not done simultaneously but in different cycles. The zipper passes data into and out of a network of interconnected nodes is used in a system of interconnecting nodes in a mesh, rings of wrapped tori. such that there is no edge to the network, the zipper mechanism logically breaks the the rings along a dimension orthogonal to the rings such that an edge to the network is established. The coupling dynamically toggles the network between a network without an edge and a network with an edge.
    Type: Grant
    Filed: March 8, 1995
    Date of Patent: April 1, 1997
    Assignee: International Business Machines Corporation
    Inventors: Thomas N. Barker, Clive A. Collins, Michael C. Dapp, James W. Dieffenderfer, Donald G. Grice, Billy J. Knowles, Donald M. Lesmeister, Richard E. Nier, Eric E. Retter, David B. Rolfe, Vincent J. Smoral
  • Patent number: 5590345
    Abstract: A computer system having a plurality of processors and memory including a plurality of scalable nodes having multiple like processor memory elements. Each of the processor memory elements has a plurality of communication paths for communication within a node to other like processor memory elements within the node. Each of the processor memory elements also has a communication path for communication external to the node to another like scalable node of the computer system.
    Type: Grant
    Filed: May 22, 1992
    Date of Patent: December 31, 1996
    Assignee: International Business Machines Corporation
    Inventors: Thomas N. Barker, Clive A. Collins, Michael C. Dapp, James W. Dieffenderfer, Donald G. Grice, Peter M. Kogge, David C. Kuchinski, Billy J. Knowles, Donald M. Lesmeister, Richard E. Miles, Richard E. Nier, Eric E. Retter, Robert R. Richardson, David B. Rolfe, Nicholas J. Schoonover, Vincent J. Smoral, James R. Stupp, Paul A. Wilkinson