Skip to main content

IPR Details
Reliable Energy Analytics, LLC's General License Statement

Submitted: June 16, 2022 under the rules in RFC 8179.

Note: Updates to IPR disclosures must only be made by authorized representatives of the original submitters. Updates will automatically be forwarded to the current Patent Holder's Contact and to the Submitter of the original IPR disclosure.

Updates

Updated by

I. Patent Holder/Applicant ("Patent Holder")

Holder legal name Reliable Energy Analytics, LLC

II. Patent Holder's Contact for License Application

Holder contact name Richard Brooks
Holder contact email dick@reliableenergyanalytics.com
Holder contact info

23 Linda, Drive
Westfield, MA 01085
+1 978-696-1788

III. Disclosure of Patent Information
i.e., patents or patent applications required to be disclosed by RFC 8179

A. For granted patents or published pending patent applications, please provide the following information:

Patent, Serial, Publication, Registration, or Application/File number(s)

Number: US16/933161
Inventor: Richard Brooks
Title: Methods for Verification of Software Object Authenticity and Integrity
Date: 2022-06-28
Notes: U.S. Provisional patent application filed July 24, 2019 (62/878,073)
U.S. Utility patent application filed July 20, 2020 (ref: app 16/933161)
U.S. Patent issue notification mailed June 08, 2022, patent number 11,374,961
Patent 11,374,961 Issue Date: June 28, 2022

B. Does this disclosure relate to an unpublished pending patent application?:

Has patent pending No

IV. Statement

Statement

Reliable Energy Analytics, LLC (REA), the owner of patent number 11,374,961, is a very small software engineering firm lacking the full resources needed to broadly expand and support it's software supply chain risk management intellectual property and is exploring pathways to make the Software Assurance Guardian (TM) patent and other intellectual property, i.e. Trademarks, Copyrights, SAG-PM (TM)software and related materials available as broadly as possible to enhance cyber software supply chain security risk management across critical infrastructure. Discussions are currently underway to transfer these REA intellectual properties to a more appropriate, well resourced steward of these materials.

Abstract

A computer-implemented method includes determining, by a processor, an authenticity of a software object and its supply chain and providing an authenticity result indicative thereof; determining, by the processor, an integrity of the software object and its supply chain and providing an integrity result indicative thereof; and determining, by the processor, from the authenticity result and the integrity result, a score indicative of an amount of trust in the supply chain of the software object and in the software object, wherein the score is indicative of an amount of trust that the software object will work correctly if installed in a system that utilizes the software object.

V. Contact Information of Submitter of this Form

Submitter name Richard Brooks
Submitter email dick@reliableenergyanalytics.com

VI. Other Notes

Additional notes

This intellectual property may overlap with current work underway in the IETF, i.e. SCITT.

Only those sections of the relevant entry form where the submitter provided information are displayed above.