Patents by Inventor Thomas Markham

Thomas Markham has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20240056025
    Abstract: This disclosure includes various examples of multifunction spacer-wire clips that provide spacing and protection during the shipping of solar panels and can be subsequently used for wire management during installation and solar panel operation.
    Type: Application
    Filed: August 10, 2023
    Publication date: February 15, 2024
    Inventors: Brian Joseph Eglsaer, Matthew Thomas Markham, Ryan Tucker Silvernale
  • Publication number: 20240033068
    Abstract: An endovascular stent graft cover for delivering a stent graft to a target deployment site. The endovascular stent graft cover includes a tubular inner layer and a tubular outer layer. The stent graft cover also includes a tubular torsion layer disposed between the tubular inner layer and the tubular outer layer. The tubular torsion layer includes first wires and second wires. The first wires have a flat profile along a first longitudinal axis of the first wires. The second wires have a circular profile along a second longitudinal axis of the second wires. The tubular torsion layer is configured to radially align at the target deployment site the stent graft loaded into a distal portion of the stent graft cover.
    Type: Application
    Filed: June 22, 2023
    Publication date: February 1, 2024
    Inventors: Zachary E. BORGLIN, Jeremy J. KINKADE, Shukaria RAJABI, April Keiko ANDERSON, Manthan P. PATEL, Olivia P. METCALF, Nolan Thomas MARKHAM
  • Patent number: 9106689
    Abstract: An intrusion detection method, system and computer-readable media are disclosed. The system can include a processor programmed to perform computer network intrusion detection. The intrusion detection can include an identification module and a detection module. The identification module can be adapted to perform semi-supervised machine learning to identify key components of a network attack and develop MDL models representing those attack components. The detection module can cluster the MDL models and use the clustered MDL models to classify network activity and detect polymorphic or zero-day attacks.
    Type: Grant
    Filed: May 6, 2011
    Date of Patent: August 11, 2015
    Assignee: Lockheed Martin Corporation
    Inventors: Eric Steinbrecher, Jeremy Impson, Bruce Barnett, Scott Charles Evans, Bernhard Scholz, Weizhong Yan, Thomas Markham, Stephen J. Dill
  • Patent number: 8572678
    Abstract: A system and method are provided that distill an organization's information security plan into a detailed and unambiguous security object model. The developed security object model provides a visualization of complex relationships between individual elements and levels that is usable to carry into effect the organization's information security plan. Configuration control and a verifiable level of security compliance are provided through implementation of the organization's information security plan by the developed security object model. The developed security object model is hosted on a computing platform in communication with at least the organization's network to provide information security plan compliance, configuration control and gap analysis in a usable form to the organization.
    Type: Grant
    Filed: December 23, 2011
    Date of Patent: October 29, 2013
    Assignee: Lockheed Martin Corporation
    Inventors: Bruce Barnett, Scott Evans, Robert James Mitchell, Jr., Thomas Markham, Stephen Dill, Vincent Hannon, John Patrick Elliott, Andrew Crapo
  • Publication number: 20130167191
    Abstract: A system and method are provided that distill an organization's information security plan into a detailed and unambiguous security object model. The developed security object model provides a visualization of complex relationships between individual elements and levels that is usable to carry into effect the organization's information security plan. Configuration control and a verifiable level of security compliance are provided through implementation of the organization's information security plan by the developed security object model. The developed security object model is hosted on a computing platform in communication with at least the organization's network to provide information security plan compliance, configuration control and gap analysis in a usable form to the organization.
    Type: Application
    Filed: December 23, 2011
    Publication date: June 27, 2013
    Applicant: LOCKHEED MARTIN CORPORATION
    Inventors: Bruce Barnett, Scott Evans, Robert James Mitchell, JR., Thomas Markham, Stephen Dill, Vincent Hannon, John Patrick Elliott, Andrew Crapo
  • Publication number: 20120284793
    Abstract: An intrusion detection method, system and computer-readable media are disclosed. The system can include a processor programmed to perform computer network intrusion detection. The intrusion detection can include an identification module and a detection module. The identification module can be adapted to perform semi-supervised machine learning to identify key components of a network attack and develop MDL models representing those attack components. The detection module can cluster the MDL models and use the clustered MDL models to classify network activity and detect polymorphic or zero-day attacks.
    Type: Application
    Filed: May 6, 2011
    Publication date: November 8, 2012
    Applicant: Lockheed Martin Corporation
    Inventors: Eric Steinbrecher, Jeremy Impson, Bruce Barnett, Scott Charles Evans, Bernhard Scholz, Weizhong Yang, Thomas Markham, Stephen J. Dill
  • Patent number: 8245301
    Abstract: A network activity visualization system can include a minimum description length (MDL) based network intrusion detection system having an MDL grammar database adapted to store a plurality of MDL grammars, and a pattern matching module adapted to match a received network activity data set against the MDL grammars by calculating a distance of the network activity data set from each MDL grammar. The system can also include an intelligent icon module coupled to the MDL-based intrusion detection system and adapted to receive the MDL grammars and distances of a network data set from each respective MDL grammar, and adapted to generate intelligent icons based on the MDL grammars and distances. The system can further include a display system adapted to display the intelligent icons so as to provide a visual indication of network security.
    Type: Grant
    Filed: September 15, 2009
    Date of Patent: August 14, 2012
    Assignee: Lockheed Martin Corporation
    Inventors: Scott Charles Evans, Thomas Markham, Richard Bejtlich, Jeremy Impson, Eric Steinbrecher
  • Publication number: 20110067106
    Abstract: A network activity visualization system can include a minimum description length (MDL) based network intrusion detection system having an MDL grammar database adapted to store a plurality of MDL grammars, and a pattern matching module adapted to match a received network activity data set against the MDL grammars by calculating a distance of the network activity data set from each MDL grammar. The system can also include an intelligent icon module coupled to the MDL-based intrusion detection system and adapted to receive the MDL grammars and distances of a network data set from each respective MDL grammar, and adapted to generate intelligent icons based on the MDL grammars and distances. The system can further include a display system adapted to display the intelligent icons so as to provide a visual indication of network security.
    Type: Application
    Filed: September 15, 2009
    Publication date: March 17, 2011
    Inventors: Scott Charles Evans, Thomas Markham, Richard Bejtlich, Jeremy Impson, Eric Steinbrecher
  • Patent number: 7778265
    Abstract: A method (300) and apparatus (200) for local adaptive provisioning at a node is disclosed. The method may include determining (320) a per packet latency for a class of packet network traffic in a queue of a plurality of queues for a plurality of classes of packet network traffic at a node, establishing (330) a reward function for the class of packet network traffic based on a packet latency limit, based on the per packet latency, and based on a source rate for the class of packet network traffic, and adjusting (340) provisioning of a queue at the node based on the reward function.
    Type: Grant
    Filed: June 4, 2008
    Date of Patent: August 17, 2010
    Assignee: Lockheed Martin Corporation
    Inventors: Scott Charles Evans, Ping Liu, Thomas Markham, Ishan Prabhath Weerakoon, Sergei Dolinsky
  • Publication number: 20060059557
    Abstract: A physical security system having a plurality of sensors and a sensor report aggregator. The sensors may detect a large number of physical activities. The aggregator may cluster a large number of detected reports to a small number of sets of reports. The sets of reports may be reduced to hypotheses. From the hypotheses, the aggregator may develop hypotheses about the physical environment which the sensors are monitoring in view of a security reference model. The security reference model may include, but not be limited to, facility models, physical security models, and/or attack models. The hypotheses may have probabilities assigned to them according to their certitude of likelihood and severity of danger.
    Type: Application
    Filed: October 13, 2005
    Publication date: March 16, 2006
    Inventors: Thomas Markham, Walter Heimerdinger
  • Publication number: 20050268111
    Abstract: An authenticating portable electronic device such as a cellular phone having radio frequency transmission capability, battery power and a keypad. The device further includes a fingerprint reader proximate the keypad of the device for authenticating the user of the device, as well as a transreceiver in the device for communicating authentication signals with a remote location to verify the identity of the user. Remote locations may be gates, doors or badge screening locations. Also included is a transmitter for sending signals to a transceiver receiver having a connection to a wire telephone system within a structure to permit phone calls using the device through the receiver to and from the wire telephone system. The device includes a connector for connecting to a docking cradle operably connected to a computer for authenticating the user before allowing access to the computer, which can also be the battery charging interface.
    Type: Application
    Filed: May 13, 2004
    Publication date: December 1, 2005
    Inventor: Thomas Markham
  • Publication number: 20050255840
    Abstract: An authenticating portable electronic device such as a cellular phone having radio frequency transmission capability, battery power and a keypad. The device further includes a biometric reader proximate the keypad of the device for authenticating the user of the device, as well as a transreceiver in the device for communicating authentication signals with a remote location to verify the identity of the user. Remote locations may be gates, doors or badge screening locations. Also included is a transmitter for sending signals to a transceiver receiver having a connection to a wire telephone system within a structure to permit phone calls using the device through the receiver to and from the wire telephone system. The device includes a connector for connecting to a docking cradle operably connected to a computer for authenticating the user before allowing access to the computer, which can also be the battery charging interface.
    Type: Application
    Filed: August 13, 2004
    Publication date: November 17, 2005
    Inventor: Thomas Markham