Patents by Inventor Nathan T. Palmer

Nathan T. Palmer has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 11886350
    Abstract: Techniques are disclosed for context-aware monitoring of the system memory to provide system integrity. An example methodology implementing the techniques includes determining a type of operating system (OS) that is loaded on system memory, examining contents of at least one system memory page, and assigning at least one tag to the at least one system memory page based on the determined type of OS and the examination of the contents of the at least one system memory page. The at least one tag indicates the characteristics of the contents of the at least one system memory page.
    Type: Grant
    Filed: September 28, 2020
    Date of Patent: January 30, 2024
    Assignee: Raytheon Company
    Inventor: Nathan T. Palmer
  • Patent number: 11630784
    Abstract: An integrated circuit, comprising: a volatile memory module configured to store a cryptographic key; a capacitor array for providing power to the volatile memory module; and a power switching logic arranged to connect and disconnect the memory module from the capacitor array, the power switching logic being configured to operate in at least one of a first operating mode and a second operating mode, wherein, when the power switching logic operates in the first operating mode, the power switching logic is configured to disconnect the capacitor array from the volatile memory module in response to detecting a change of state of a break line, and, when the power switching logic operates in the second operating mode, the power switching logic is configured to disconnect the capacitor array from the volatile memory module in response to detecting that a voltage at a connection terminal of the integrated circuit exceeds a threshold.
    Type: Grant
    Filed: November 20, 2019
    Date of Patent: April 18, 2023
    Assignee: Raytheon Company
    Inventor: Nathan T. Palmer
  • Patent number: 11599480
    Abstract: A method for use in a computing system, comprising: storing, in a random-access memory, a working copy of a data item, the working copy of the data item being stored in the random-access memory by a first processor; registering, with a second processor, a respective address in the random-access memory where the working copy of the data item is stored; and correcting, by the second processor, any modifications to the working copy of the data item that are made after the working copy of the data item is stored in the random-access memory, the modifications being corrected in parallel with the first processor executing software based on the working copy of the data item.
    Type: Grant
    Filed: March 11, 2021
    Date of Patent: March 7, 2023
    Assignee: Raytheon Company
    Inventors: Paul Gryting, Cody L. Tankersley, Nathan T. Palmer
  • Patent number: 11513698
    Abstract: A system for data protection includes a computing device comprising a processor, a Hardware Root of Trust (HRoT) module and a storage device. The HRoT device is configured to: validate integrity of the computing device; authenticate the computing device to communicate with the storage device; and take over control of storage device access and behaviour whenever suspicious or unauthorized data access from local or remote computing devices is detected. The HRoT device is further configured to, in response to detecting a security risk to at least one of the computing device and the storage device, block communication of the storage device.
    Type: Grant
    Filed: March 27, 2020
    Date of Patent: November 29, 2022
    Assignee: Raytheon Company
    Inventors: Torsten Staab, Nathan T. Palmer
  • Publication number: 20210311885
    Abstract: A method for use in a computing system, comprising: storing, in a random-access memory, a working copy of a data item, the working copy of the data item being stored in the random-access memory by a first processor; registering, with a second processor, a respective address in the random-access memory where the working copy of the data item is stored; and correcting, by the second processor, any modifications to the working copy of the data item that are made after the working copy of the data item is stored in the random-access memory, the modifications being corrected in parallel with the first processor executing software based on the working copy of the data item.
    Type: Application
    Filed: March 11, 2021
    Publication date: October 7, 2021
    Applicant: Raytheon Company
    Inventors: Paul Gryting, Cody L. Tankersley, Nathan T. Palmer
  • Publication number: 20210182208
    Abstract: Techniques are disclosed for context-aware monitoring of the system memory to provide system integrity. An example methodology implementing the techniques includes determining a type of operating system (OS) that is loaded on system memory, examining contents of at least one system memory page, and assigning at least one tag to the at least one system memory page based on the determined type of OS and the examination of the contents of the at least one system memory page. The at least one tag indicates the characteristics of the contents of the at least one system memory page.
    Type: Application
    Filed: September 28, 2020
    Publication date: June 17, 2021
    Applicant: Raytheon Company
    Inventor: Nathan T. Palmer
  • Publication number: 20210149823
    Abstract: An integrated circuit, comprising: a volatile memory module configured to store a cryptographic key; a capacitor array for providing power to the volatile memory module; and a power switching logic arranged to connect and disconnect the memory module from the capacitor array, the power switching logic being configured to operate in at least one of a first operating mode and a second operating mode, wherein, when the power switching logic operates in the first operating mode, the power switching logic is configured to disconnect the capacitor array from the volatile memory module in response to detecting a change of state of a break line, and, when the power switching logic operates in the second operating mode, the power switching logic is configured to disconnect the capacitor array from the volatile memory module in response to detecting that a voltage at a connection terminal of the integrated circuit exceeds a threshold.
    Type: Application
    Filed: November 20, 2019
    Publication date: May 20, 2021
    Applicant: Raytheon Company
    Inventor: Nathan T. Palmer
  • Patent number: 10878101
    Abstract: The concepts, systems and methods described herein are directed towards a method running on a security device. The method is provided to including: executing a first secure boot code from a first memory by one of a plurality of cores of a processor, wherein the plurality of cores runs in a secure world; executing a first-stage boot loader (FSBL) from a second memory; executing a security monitoring application to validate the security device; in response to the security device being validated, switching some of the plurality of cores from the secure world to a normal world, wherein at least one of the plurality of cores remains in the secure world to communicate with the security monitoring application; executing a second-stage boot loader (SSBL); and monitoring, via the security monitoring application, status of the security device and communications between the security device and at least one external system.
    Type: Grant
    Filed: December 10, 2018
    Date of Patent: December 29, 2020
    Assignee: Raytheon Company
    Inventors: Matthew C. Areno, John C. Hoffman, Trevor B. Hird, Eric P. Egalite, Nathan T. Palmer
  • Publication number: 20200310662
    Abstract: A system for data protection includes a computing device comprising a processor, a Hardware Root of Trust (HRoT) module and a storage device. The HRoT device is configured to: validate integrity of the computing device; authenticate the computing device to communicate with the storage device; and take over control of storage device access and behaviour whenever suspicious or unauthorized data access from local or remote computing devices is detected. The HRoT device is further configured to, in response to detecting a security risk to at least one of the computing device and the storage device, block communication of the storage device.
    Type: Application
    Filed: March 27, 2020
    Publication date: October 1, 2020
    Applicant: Raytheon Company
    Inventors: Torsten Staab, Nathan T. Palmer
  • Publication number: 20200082091
    Abstract: The concepts, systems and methods described herein are directed towards a method running on a security device. The method is provided to including: executing a first secure boot code from a first memory by one of a plurality of cores of a processor, wherein the plurality of cores runs in a secure world; executing a first-stage boot loader (FSBL) from a second memory; executing a security monitoring application to validate the security device; in response to the security device being validated, switching some of the plurality of cores from the secure world to a normal world, wherein at least one of the plurality of cores remains in the secure world to communicate with the security monitoring application; executing a second-stage boot loader (SSBL); and monitoring, via the security monitoring application, status of the security device and communications between the security device and at least one external system.
    Type: Application
    Filed: December 10, 2018
    Publication date: March 12, 2020
    Applicant: Raytheon Company
    Inventors: Matthew C. Areno, John C. Hoffman, Trevor B. Hird, Eric P. Egalite, Nathan T. Palmer