Patents by Inventor Thomas Markham
Thomas Markham has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Publication number: 20240056025Abstract: This disclosure includes various examples of multifunction spacer-wire clips that provide spacing and protection during the shipping of solar panels and can be subsequently used for wire management during installation and solar panel operation.Type: ApplicationFiled: August 10, 2023Publication date: February 15, 2024Inventors: Brian Joseph Eglsaer, Matthew Thomas Markham, Ryan Tucker Silvernale
-
Publication number: 20240033068Abstract: An endovascular stent graft cover for delivering a stent graft to a target deployment site. The endovascular stent graft cover includes a tubular inner layer and a tubular outer layer. The stent graft cover also includes a tubular torsion layer disposed between the tubular inner layer and the tubular outer layer. The tubular torsion layer includes first wires and second wires. The first wires have a flat profile along a first longitudinal axis of the first wires. The second wires have a circular profile along a second longitudinal axis of the second wires. The tubular torsion layer is configured to radially align at the target deployment site the stent graft loaded into a distal portion of the stent graft cover.Type: ApplicationFiled: June 22, 2023Publication date: February 1, 2024Inventors: Zachary E. BORGLIN, Jeremy J. KINKADE, Shukaria RAJABI, April Keiko ANDERSON, Manthan P. PATEL, Olivia P. METCALF, Nolan Thomas MARKHAM
-
Patent number: 9106689Abstract: An intrusion detection method, system and computer-readable media are disclosed. The system can include a processor programmed to perform computer network intrusion detection. The intrusion detection can include an identification module and a detection module. The identification module can be adapted to perform semi-supervised machine learning to identify key components of a network attack and develop MDL models representing those attack components. The detection module can cluster the MDL models and use the clustered MDL models to classify network activity and detect polymorphic or zero-day attacks.Type: GrantFiled: May 6, 2011Date of Patent: August 11, 2015Assignee: Lockheed Martin CorporationInventors: Eric Steinbrecher, Jeremy Impson, Bruce Barnett, Scott Charles Evans, Bernhard Scholz, Weizhong Yan, Thomas Markham, Stephen J. Dill
-
Patent number: 8572678Abstract: A system and method are provided that distill an organization's information security plan into a detailed and unambiguous security object model. The developed security object model provides a visualization of complex relationships between individual elements and levels that is usable to carry into effect the organization's information security plan. Configuration control and a verifiable level of security compliance are provided through implementation of the organization's information security plan by the developed security object model. The developed security object model is hosted on a computing platform in communication with at least the organization's network to provide information security plan compliance, configuration control and gap analysis in a usable form to the organization.Type: GrantFiled: December 23, 2011Date of Patent: October 29, 2013Assignee: Lockheed Martin CorporationInventors: Bruce Barnett, Scott Evans, Robert James Mitchell, Jr., Thomas Markham, Stephen Dill, Vincent Hannon, John Patrick Elliott, Andrew Crapo
-
Publication number: 20130167191Abstract: A system and method are provided that distill an organization's information security plan into a detailed and unambiguous security object model. The developed security object model provides a visualization of complex relationships between individual elements and levels that is usable to carry into effect the organization's information security plan. Configuration control and a verifiable level of security compliance are provided through implementation of the organization's information security plan by the developed security object model. The developed security object model is hosted on a computing platform in communication with at least the organization's network to provide information security plan compliance, configuration control and gap analysis in a usable form to the organization.Type: ApplicationFiled: December 23, 2011Publication date: June 27, 2013Applicant: LOCKHEED MARTIN CORPORATIONInventors: Bruce Barnett, Scott Evans, Robert James Mitchell, JR., Thomas Markham, Stephen Dill, Vincent Hannon, John Patrick Elliott, Andrew Crapo
-
Publication number: 20120284793Abstract: An intrusion detection method, system and computer-readable media are disclosed. The system can include a processor programmed to perform computer network intrusion detection. The intrusion detection can include an identification module and a detection module. The identification module can be adapted to perform semi-supervised machine learning to identify key components of a network attack and develop MDL models representing those attack components. The detection module can cluster the MDL models and use the clustered MDL models to classify network activity and detect polymorphic or zero-day attacks.Type: ApplicationFiled: May 6, 2011Publication date: November 8, 2012Applicant: Lockheed Martin CorporationInventors: Eric Steinbrecher, Jeremy Impson, Bruce Barnett, Scott Charles Evans, Bernhard Scholz, Weizhong Yang, Thomas Markham, Stephen J. Dill
-
Patent number: 8245301Abstract: A network activity visualization system can include a minimum description length (MDL) based network intrusion detection system having an MDL grammar database adapted to store a plurality of MDL grammars, and a pattern matching module adapted to match a received network activity data set against the MDL grammars by calculating a distance of the network activity data set from each MDL grammar. The system can also include an intelligent icon module coupled to the MDL-based intrusion detection system and adapted to receive the MDL grammars and distances of a network data set from each respective MDL grammar, and adapted to generate intelligent icons based on the MDL grammars and distances. The system can further include a display system adapted to display the intelligent icons so as to provide a visual indication of network security.Type: GrantFiled: September 15, 2009Date of Patent: August 14, 2012Assignee: Lockheed Martin CorporationInventors: Scott Charles Evans, Thomas Markham, Richard Bejtlich, Jeremy Impson, Eric Steinbrecher
-
Publication number: 20110067106Abstract: A network activity visualization system can include a minimum description length (MDL) based network intrusion detection system having an MDL grammar database adapted to store a plurality of MDL grammars, and a pattern matching module adapted to match a received network activity data set against the MDL grammars by calculating a distance of the network activity data set from each MDL grammar. The system can also include an intelligent icon module coupled to the MDL-based intrusion detection system and adapted to receive the MDL grammars and distances of a network data set from each respective MDL grammar, and adapted to generate intelligent icons based on the MDL grammars and distances. The system can further include a display system adapted to display the intelligent icons so as to provide a visual indication of network security.Type: ApplicationFiled: September 15, 2009Publication date: March 17, 2011Inventors: Scott Charles Evans, Thomas Markham, Richard Bejtlich, Jeremy Impson, Eric Steinbrecher
-
Patent number: 7778265Abstract: A method (300) and apparatus (200) for local adaptive provisioning at a node is disclosed. The method may include determining (320) a per packet latency for a class of packet network traffic in a queue of a plurality of queues for a plurality of classes of packet network traffic at a node, establishing (330) a reward function for the class of packet network traffic based on a packet latency limit, based on the per packet latency, and based on a source rate for the class of packet network traffic, and adjusting (340) provisioning of a queue at the node based on the reward function.Type: GrantFiled: June 4, 2008Date of Patent: August 17, 2010Assignee: Lockheed Martin CorporationInventors: Scott Charles Evans, Ping Liu, Thomas Markham, Ishan Prabhath Weerakoon, Sergei Dolinsky
-
Publication number: 20060059557Abstract: A physical security system having a plurality of sensors and a sensor report aggregator. The sensors may detect a large number of physical activities. The aggregator may cluster a large number of detected reports to a small number of sets of reports. The sets of reports may be reduced to hypotheses. From the hypotheses, the aggregator may develop hypotheses about the physical environment which the sensors are monitoring in view of a security reference model. The security reference model may include, but not be limited to, facility models, physical security models, and/or attack models. The hypotheses may have probabilities assigned to them according to their certitude of likelihood and severity of danger.Type: ApplicationFiled: October 13, 2005Publication date: March 16, 2006Inventors: Thomas Markham, Walter Heimerdinger
-
Publication number: 20050268111Abstract: An authenticating portable electronic device such as a cellular phone having radio frequency transmission capability, battery power and a keypad. The device further includes a fingerprint reader proximate the keypad of the device for authenticating the user of the device, as well as a transreceiver in the device for communicating authentication signals with a remote location to verify the identity of the user. Remote locations may be gates, doors or badge screening locations. Also included is a transmitter for sending signals to a transceiver receiver having a connection to a wire telephone system within a structure to permit phone calls using the device through the receiver to and from the wire telephone system. The device includes a connector for connecting to a docking cradle operably connected to a computer for authenticating the user before allowing access to the computer, which can also be the battery charging interface.Type: ApplicationFiled: May 13, 2004Publication date: December 1, 2005Inventor: Thomas Markham
-
Publication number: 20050255840Abstract: An authenticating portable electronic device such as a cellular phone having radio frequency transmission capability, battery power and a keypad. The device further includes a biometric reader proximate the keypad of the device for authenticating the user of the device, as well as a transreceiver in the device for communicating authentication signals with a remote location to verify the identity of the user. Remote locations may be gates, doors or badge screening locations. Also included is a transmitter for sending signals to a transceiver receiver having a connection to a wire telephone system within a structure to permit phone calls using the device through the receiver to and from the wire telephone system. The device includes a connector for connecting to a docking cradle operably connected to a computer for authenticating the user before allowing access to the computer, which can also be the battery charging interface.Type: ApplicationFiled: August 13, 2004Publication date: November 17, 2005Inventor: Thomas Markham