Patents Assigned to Lookingglass Cyber Solutions, Inc.
  • Patent number: 11750564
    Abstract: Disclosed are systems and methods for securing a network including one or more network nodes connecting a plurality of network connected devices of the network. A method may include: receiving and temporarily storing a plurality of data packets in a shared buffer of a network node; receiving requests from a first processing engine and a second processing engine to access a temporarily stored data packet; generating a first pointer and a second pointer to the temporarily stored data packet, the second pointer being different from the first pointer while pointing to the same temporarily stored data packet; and enabling the first processing engine to use the generated first pointer to access the temporarily stored data packet and the second processing engine to use the generated second pointer to access the temporarily stored data packet.
    Type: Grant
    Filed: November 4, 2021
    Date of Patent: September 5, 2023
    Assignee: LOOKINGGLASS CYBER SOLUTIONS, INC.
    Inventors: Paolo Fabio Zaino, Bryan Wesley Brown
  • Publication number: 20220255958
    Abstract: Disclosed are systems and methods for securing a network using one or more controllers and one or more network nodes. A method may utilize a packet processing engine configured to process incoming network packets, a processing analysis engine configured to perform relatively more complex processing and analysis, and one or more controllers configured to coordinate one or more packet processing engines and one or more processing analysis engines across a network to perform endpoint threat detection and mitigation.
    Type: Application
    Filed: February 14, 2022
    Publication date: August 11, 2022
    Applicant: LookingGlass Cyber Solutions, Inc.
    Inventors: Bryan Wesley BROWN, Paolo Fabio ZAINO, Allan THOMSON
  • Patent number: 11283823
    Abstract: Disclosed are systems and methods for securing a network using one or more controllers and one or more network nodes. A method may utilize a packet processing engine configured to process incoming network packets, a processing analysis engine configured to perform relatively more complex processing and analysis, and one or more controllers configured to coordinate one or more packet processing engines and one or more processing analysis engines across a network to perform endpoint threat detection and mitigation.
    Type: Grant
    Filed: June 4, 2021
    Date of Patent: March 22, 2022
    Assignee: LookingGlass Cyber Solutions, Inc.
    Inventors: Bryan Wesley Brown, Paolo Fabio Zaino, Allan Thomson
  • Patent number: 11201887
    Abstract: Disclosed are systems and methods for securing a network. A method may include obtaining, by a detection engine, an encapsulated image defining an action for a predetermined data packet of interest; determining, by the detection engine, that the action defined by the encapsulated image should be applied to one or more data packets accessed by the detection engine; generating and deploying, by the detection engine, an action state including one or more attributes associated with the accessed data packet and the encapsulated image; determining, at a first execution engine executing parallel with the detection engine, that the one or more data packets comprises attributes matching the one or more attributes included in the deployed action state; and executing, by the first execution engine, the action included in the deployed action state on a received data packet to generate a processed data packet.
    Type: Grant
    Filed: March 23, 2021
    Date of Patent: December 14, 2021
    Assignee: LookingGlass Cyber Solutions, Inc.
    Inventors: Bryan Wesley Brown, Paolo Fabio Zaino, Allan Thomson
  • Patent number: 11196710
    Abstract: Disclosed are systems and methods for securing a network including one or more network nodes connecting a plurality of network connected devices of the network. A method may include: receiving and temporarily storing a plurality of data packets in a shared buffer of a network node; receiving requests from a first processing engine and a second processing engine to access a temporarily stored data packet; generating a first pointer and a second pointer to the temporarily stored data packet, the second pointer being different from the first pointer while pointing to the same temporarily stored data packet; and enabling the first processing engine to use the generated first pointer to access the temporarily stored data packet and the second processing engine to use the generated second pointer to access the temporarily stored data packet.
    Type: Grant
    Filed: February 5, 2021
    Date of Patent: December 7, 2021
    Assignee: LookingGlass Cyber Solutions, Inc.
    Inventors: Paolo Fabio Zaino, Bryan Wesley Brown
  • Patent number: 11057415
    Abstract: Disclosed are systems and methods for securing a network using one or more controllers and one or more network nodes. A method may utilize a packet processing engine configured to process incoming network packets, a processing analysis engine configured to perform relatively more complex processing and analysis, and one or more controllers configured to coordinate one or more packet processing engines and one or more processing analysis engines across a network to perform endpoint threat detection and mitigation.
    Type: Grant
    Filed: February 9, 2021
    Date of Patent: July 6, 2021
    Assignee: LOOKINGGLASS CYBER SOLUTIONS, INC.
    Inventors: Bryan Wesley Brown, Paolo Fabio Zaino, Allan Thomson
  • Patent number: 10614131
    Abstract: Apparatus and methods described herein relate to a processor that can convert intelligence data into a data structure, and that can store the data structure in a data store. The processor can calculate an identity value for the data structure. The data structure can be immutable such that data represented in the data structure is not modified. A query engine implemented by the processor can receive a request for intelligence status data, and can query an index data store for a set of identity values correlated with data included in the request. The query engine can retrieve, from the data store, intelligence status data correlated with each identity value in the set of identity values. The query engine can also return a snapshot data structure representing at least a portion of the intelligence status data correlated with each identity value in the set of identity values, in response to the request.
    Type: Grant
    Filed: October 26, 2016
    Date of Patent: April 7, 2020
    Assignee: Lookingglass Cyber Solutions, Inc.
    Inventor: Bryan Wesley Brown
  • Patent number: 10574658
    Abstract: In some embodiments, an apparatus includes a memory, storing processor-executable instructions, blacklist terms, and credential dump records, and a processor. The processor receives repository data from targeted remote repositories and stores the repository data as a potential credential dump in the memory when the repository data includes a credential dump attribute. The processor stores the potential credential dump as a probable credential dump when the potential credential dump does not include a blacklist term, in which case the processor also detects a format and delimiter of the probable credential dump. Based on the format and delimiter, pairs of usernames and associated passwords are identified and hashed. If a percentage of the hashes not associated with the credential dump records exceeds a predetermined threshold, the probable credential dump is deemed authentic.
    Type: Grant
    Filed: November 14, 2017
    Date of Patent: February 25, 2020
    Assignee: Lookingglass Cyber Solutions, Inc.
    Inventors: Steven Weinstein, Jason Lewis, Douglas Parker
  • Patent number: 10511621
    Abstract: The cyber threat intelligence confidence rating visualization and editing user interface technology (hereinafter “TIC”) provides a user interface that allows a user (e.g., a cyber threat analyst, etc.) to submit ratings for various characteristics associated with a cyber threat indicator. In one embodiment, the TIC may instantiate a user interactive risk evaluation component having a user interface input element for a user to submit calculation weights for one or more characteristics of a cyber threat; generate a graphical representation of a cyber threat confidence score for user interface display via the user interactive risk evaluation component; and dynamically adjust the graphical representation of the threat confidence score using at least one of the one or more characteristics weighted by the user configured weight.
    Type: Grant
    Filed: March 10, 2017
    Date of Patent: December 17, 2019
    Assignee: Lookingglass Cyber Solutions, Inc.
    Inventors: Allan Thomson, Christopher D. Coleman
  • Patent number: 10469515
    Abstract: Apparatus and methods described herein relate to a global workspace management compute device that can generate a workspace hierarchy tree representing a hierarchy of a set of workspaces in a network. A local workspace management compute device operatively coupled to the global workspace management compute device can, when operative, calculate workspace cyber-threat data for a local workspace in the set of workspaces based on data from a global workspace, and can provide the calculated workspace cyber-threat data to a local workspace interface so that the local workspace interface displays a representation of the set of workspaces in the network. After receiving modifications of portions of the local workspace cyber-threat data, the local workspace management compute device can define a child node of the local workspace based on the modifications. The local workspace interface can modify the representation of the set of workspaces in the network based on the child node.
    Type: Grant
    Filed: February 22, 2016
    Date of Patent: November 5, 2019
    Assignee: Lookingglass Cyber Solutions, Inc.
    Inventors: John Joseph Helmsen, Bryan Wesley Brown, Christopher Paul Pinney Wood, Allan Thomson
  • Patent number: 10033754
    Abstract: The cyber threat monitor and control apparatuses, methods and systems (hereinafter “CTMC”) determines risk across a global Internet network graph model for various virtual or physical network elements. In one embodiment, the CTMC defines a factor mechanism representing interactions among the set of network elements, the factor mechanism including a factor indicative of a correlation between a pair of network elements from the set of network elements, and dynamically calculate the probabilistic network security measure for each network element in the global Internet graph model based at least in part on the factor mechanism and any observed threat indicators related to the global Internet graph model.
    Type: Grant
    Filed: July 28, 2017
    Date of Patent: July 24, 2018
    Assignee: Lookingglass Cyber Solutions, Inc.
    Inventors: Christopher Paul Pinney Wood, John Joseph Helmsen, Allan Thomson, Christopher D. Coleman
  • Patent number: 10027705
    Abstract: The real-time cyber threat indicator verification mechanism technology (hereinafter “TIVM”) instantiates one or more virtual client emulators to access a source of a threat, in response to a received threat indicator, so as to evaluate validity and/or severity of the potential threat. In one embodiment, the TIVM may receive a cyber threat indicator having identifying information of a cyber threat source; instantiate, in response to the cyber threat indicator, a virtual client emulator; send a control message to cause the virtual client emulator to interact with the cyber threat source based on the identifying information; obtain a confidence indicator relating to the cyber threat indicator based on interaction between the virtual client emulator and the cyber threat source; and generate a cyber threat indicator confirmation report including the confidence indicator.
    Type: Grant
    Filed: March 13, 2017
    Date of Patent: July 17, 2018
    Assignee: Lookingglass Cyber Solutions, Inc.
    Inventors: Christopher D. Coleman, Allan Thomson, Jason A. Lewis
  • Patent number: 9930059
    Abstract: Apparatus and methods described herein relate to a global workspace manager that can dynamically update historical cyber-threat data for a network. The global workspace manager can receive cyber-threat event data including a time of a cyber-threat event. The global workspace manager can identify a workspace node in a workspace graph associated with the cyber-threat event data, and can identify a threat score interval including a set of times that includes the time of the cyber-threat event. The global workspace manager can retrieve, from the workspace node, a threat score calculation function associated with the threat score interval, and can calculate a threat score for the workspace node during the threat score interval using the threat score calculation function and the cyber-threat event data.
    Type: Grant
    Filed: March 31, 2016
    Date of Patent: March 27, 2018
    Assignee: Lookingglass Cyber Solutions, Inc.
    Inventors: John Joseph Helmsen, Ken Allen, Christopher Paul Pinney Wood
  • Publication number: 20180083974
    Abstract: In some embodiments, an apparatus includes a memory, storing processor-executable instructions, blacklist terms, and credential dump records, and a processor. The processor receives repository data from targeted remote repositories and stores the repository data as a potential credential dump in the memory when the repository data includes a credential dump attribute. The processor stores the potential credential dump as a probable credential dump when the potential credential dump does not include a blacklist term, in which case the processor also detects a format and delimiter of the probable credential dump. Based on the format and delimiter, pairs of usernames and associated passwords are identified and hashed. If a percentage of the hashes not associated with the credential dump records exceeds a predetermined threshold, the probable credential dump is deemed authentic.
    Type: Application
    Filed: November 14, 2017
    Publication date: March 22, 2018
    Applicant: Lookingglass Cyber Solutions, Inc.
    Inventors: Steven WEINSTEIN, Jason LEWIS, Douglas PARKER
  • Patent number: 9871797
    Abstract: In some embodiments, an apparatus includes a memory, storing processor-executable instructions, blacklist terms, and credential dump records, and a processor. The processor receives repository data from targeted remote repositories and stores the repository data as a potential credential dump in the memory when the repository data includes a credential dump attribute. The processor stores the potential credential dump as a probable credential dump when the potential credential dump does not include a blacklist term, in which case the processor also detects a format and delimiter of the probable credential dump. Based on the format and delimiter, pairs of usernames and associated passwords are identified and hashed. If a percentage of the hashes not associated with the credential dump records exceeds a predetermined threshold, the probable credential dump is deemed authentic.
    Type: Grant
    Filed: February 9, 2016
    Date of Patent: January 16, 2018
    Assignee: Lookingglass Cyber Solutions, Inc.
    Inventors: Steven Weinstein, Jason Lewis, Douglas Parker
  • Publication number: 20170331851
    Abstract: The cyber threat monitor and control apparatuses, methods and systems (hereinafter “CTMC”) determines risk across a global Internet network graph model for various virtual or physical network elements. In one embodiment, the CTMC defines a factor mechanism representing interactions among the set of network elements, the factor mechanism including a factor indicative of a correlation between a pair of network elements from the set of network elements, and dynamically calculate the probabilistic network security measure for each network element in the global Internet graph model based at least in part on the factor mechanism and any observed threat indicators related to the global Internet graph model.
    Type: Application
    Filed: July 28, 2017
    Publication date: November 16, 2017
    Applicant: Lookingglass Cyber Solutions, Inc.
    Inventors: Christopher Paul PINNEY WOOD, John Joseph HELMSEN, Allan THOMSON, Christopher D. COLEMAN
  • Patent number: 9807108
    Abstract: Current approaches to managing security intelligence data often address both threat and malicious behavior at the individual computer level, tracked by the Internet Protocol (IP) address. For example, important facts, observed behavior, and other indications that are tracked by security organizations are only tracked with respect to individual IP addresses. Bilateral network inheritance generally refers to inheriting a variety of attributes from parents to children and from children to parents in a computer network hierarchy. The computer network hierarchy may comprise various entities such as, for example, top level entities, autonomous systems, address ranges, and individual IP addresses.
    Type: Grant
    Filed: August 18, 2016
    Date of Patent: October 31, 2017
    Assignee: Lookingglass Cyber Solutions, Inc.
    Inventors: Jason A. Lewis, Kenneth B. Hoxworth, Christopher D. Coleman, Derek M. Gabbard
  • Patent number: 9749347
    Abstract: The cyber threat monitor and control apparatuses, methods and systems (hereinafter “CTMC”) determines risk across a global Internet network graph model for various virtual or physical network elements. In one embodiment, the CTMC defines a factor mechanism representing interactions among the set of network elements, the factor mechanism including a factor indicative of a correlation between a pair of network elements from the set of network elements, and dynamically calculate the probabilistic network security measure for each network element in the global Internet graph model based at least in part on the factor mechanism and any observed threat indicators related to the global Internet graph model.
    Type: Grant
    Filed: November 18, 2015
    Date of Patent: August 29, 2017
    Assignee: LOOKINGGLASS CYBER SOLUTIONS, INC.
    Inventors: Christopher Paul Pinney Wood, John Joseph Helmsen, Allan Thomson, Christopher D. Coleman
  • Publication number: 20170244742
    Abstract: Apparatus and methods described herein relate to a global workspace management compute device that can generate a workspace hierarchy tree representing a hierarchy of a set of workspaces in a network. A local workspace management compute device operatively coupled to the global workspace management compute device can, when operative, calculate workspace cyber-threat data for a local workspace in the set of workspaces based on data from a global workspace, and can provide the calculated workspace cyber-threat data to a local workspace interface so that the local workspace interface displays a representation of the set of workspaces in the network. After receiving modifications of portions of the local workspace cyber-threat data, the local workspace management compute device can define a child node of the local workspace based on the modifications. The local workspace interface can modify the representation of the set of workspaces in the network based on the child node.
    Type: Application
    Filed: February 22, 2016
    Publication date: August 24, 2017
    Applicant: Lookingglass Cyber Solutions, Inc.
    Inventors: John Joseph Helmsen, Bryan Wesley Brown, Christopher Paul Pinney Wood, Allan Thomson
  • Patent number: 9596256
    Abstract: The cyber threat intelligence confidence rating visualization and editing user interface technology (hereinafter “TIC”) provides a user interface that allows a user (e.g., a cyber threat analyst, etc.) to submit ratings for various characteristics associated with a cyber threat indicator. In one embodiment, the TIC may instantiate a user interactive risk evaluation component having a user interface input element for a user to submit calculation weights for one or more characteristics of a cyber threat; generate a graphical representation of a cyber threat confidence score for user interface display via the user interactive risk evaluation component; and dynamically adjust the graphical representation of the threat confidence score using at least one of the one or more characteristics weighted by the user configured weight.
    Type: Grant
    Filed: August 24, 2015
    Date of Patent: March 14, 2017
    Assignee: Lookingglass Cyber Solutions, Inc.
    Inventors: Allan Thomson, Christopher D. Coleman