Patents by Inventor Albert Lim
Albert Lim has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 10949873Abstract: Systems and methods are disclosed for enabling incremental reach for an advertising campaign, across multiple screens/channels. In some embodiments, a base TV/media plan is uploaded, and targeted exposed viewers are monitored. Unexposed target viewers are identified. Additional media channels that unexposed viewers use are found. Unexposed viewers are matched with pricing and media avails from one or more media directories. Media avails are then analyzed along with incremental on-target impressions. Targeted avails for unexposed viewers are then determined, based on lowest incremental cost and largest incremental reach are added to a current cross-screen plan. An analysis to find new unexposed viewers is then re-run to determine the next-most cost effective avails. The above steps are repeated or looped until a selected advertisement budget has been allocated. User interface embodiments for these methods are also disclosed.Type: GrantFiled: June 12, 2019Date of Patent: March 16, 2021Assignee: ADOBE INC.Inventors: Antoine Barbier, Greg Collison, Albert Lim, Nikhil Belsare, Alexander R. Hood
-
Patent number: 10873467Abstract: This document discloses a method and system for just-in-time compression and optimization of raw unstructured in-line and in-transit data by identifying low entropy data blocks or duplicated information security information in raw computer security alerts within a series of time windows. In particular, the method and system automatically manages; processes; and optimizes in-line and in-transit data blocks or raw information security alerts received from a plurality of information surveillance sources and/or peripheral monitoring devices simultaneously. The data blocks or raw information security alerts that are found to be unique in the various time windows are transposed into meta-definition tables to be further processed while redundant data blocks or raw alerts contained within each particular time window are identified, marked and processed accordingly.Type: GrantFiled: February 15, 2016Date of Patent: December 22, 2020Assignee: Certis Cisco Security Pte LtdInventor: Keng Leng Albert Lim
-
Patent number: 10740458Abstract: This document discloses a heuristic data analytics method and system for analysing potential information security threats in information security events. In particular, the heuristic data analytics method and system analyses Binary Large Objects (BLOBs) of structured and unstructured information security events at high speed and in real-time to anticipate potential security breaches that will occur in the near future using algorithms and large scale computing systems.Type: GrantFiled: March 24, 2016Date of Patent: August 11, 2020Assignee: Certis Cisco Security Pte LtdInventor: Keng Leng Albert Lim
-
Patent number: 10713586Abstract: This document discloses a system and method for consolidating threat intelligence data for a computer and its related networks. Massive volumes of raw threat intelligence data are collected from a plurality of sources and are partitioned into a common format for cluster analysis whereby the clustering of the data is done using unsupervised machine learning algorithms. The resulting organized threat intelligence data subsequently undergoes a weighted asset based threat severity level correlation process. All the intermediary network vulnerabilities of a particular computer network are utilized as the critical consolidation parameters of this process. The final processed intelligence data gathered through this high speed automated process is then formatted into predefined formats prior to transmission to third parties.Type: GrantFiled: July 24, 2015Date of Patent: July 14, 2020Assignee: Certis CISCO Security Pte LtdInventor: Keng Leng Albert Lim
-
Patent number: 10693904Abstract: A system and method for disrupting an information security threat that constitutes an attack on a computer asset in a computer network is provided. The provided system and method disrupts this information security threat after the attack on the computer asset has been detected by at least one of the monitoring devices on the affected computer network. An intermediate upstream gateway of the affected computer network is then utilized to disrupt this information security threat. As the detected attack is being disrupted, a mitigation action will be automatically initiated if a mitigation action associated with the attack is stored in the system's database; else information about the attack will be sent to a central command centre for further assessment. At the central command centre, a mitigating action will be further developed and executed to address the intention of the attack.Type: GrantFiled: March 18, 2015Date of Patent: June 23, 2020Assignee: CERTIS CISCO SECURITY PTE LTDInventor: Keng Leng Albert Lim
-
Patent number: 10691795Abstract: This document describes a system and method for quantitatively unifying and assimilating all unstructured, unlabelled and/or fragmented real-time and non-real-time cyber threat data generated by a plurality of sources. These sources may include cyber-security surveillance systems that are equipped with machine learning capabilities.Type: GrantFiled: October 24, 2016Date of Patent: June 23, 2020Assignee: Certis Cisco Security Pte LtdInventor: Keng Leng Albert Lim
-
Patent number: 10609045Abstract: This invention relates to a system and method for prioritizing an incident triage process in an autonomic manner. In particular, the system employs performance modifier indicators and temporal decay parameters to autonomously compile, adjust and demonstrate a list of prioritized incidents in a dynamic manner.Type: GrantFiled: June 29, 2017Date of Patent: March 31, 2020Assignee: Certis Cisco Security Pte LtdInventor: Keng Leng Albert Lim
-
Patent number: 10445766Abstract: Systems and methods are disclosed for enabling incremental reach for an advertising campaign, across multiple screens/channels. In some embodiments, a base TV/media plan is uploaded, and targeted exposed viewers are monitored. Unexposed target viewers are identified. Additional media channels that unexposed viewers use are found. Unexposed viewers are matched with pricing and media avails from one or more media directories. Media avails are then analyzed along with incremental on-target impressions. Targeted avails for unexposed viewers are then determined, based on lowest incremental cost and largest incremental reach are added to a current cross-screen plan. An analysis to find new unexposed viewers is then re-run to determine the next-most cost effective avails. The above steps are repeated or looped until a selected advertisement budget has been allocated. User interface embodiments for these methods are also disclosed.Type: GrantFiled: September 30, 2016Date of Patent: October 15, 2019Assignee: ADOBE INC.Inventors: Antoine Barbier, Greg Collison, Albert Lim, Nikhil Belsare, Alexander R. Hood
-
Patent number: 10445765Abstract: Systems and methods are disclosed for enabling incremental reach for an advertising campaign, across multiple screens/channels. In some embodiments, a base TV/media plan is uploaded, and targeted exposed viewers are monitored. Unexposed target viewers are identified. Additional media channels that unexposed viewers use are found. Unexposed viewers are matched with pricing and media avails from one or more media directories. Media avails are then analyzed along with incremental on-target impressions. Targeted avails for unexposed viewers are then determined, based on lowest incremental cost and largest incremental reach are added to a current cross-screen plan. An analysis to find new unexposed viewers is then re-run to determine the next-most cost effective avails. The above steps are repeated or looped until a selected advertisement budget has been allocated. User interface embodiments for these methods are also disclosed.Type: GrantFiled: September 30, 2016Date of Patent: October 15, 2019Assignee: ADOBE INC.Inventors: Antoine Barbier, Greg Collison, Albert Lim, Nikhil Belsare, Alexander R. Hood
-
Publication number: 20190303964Abstract: Systems and methods are disclosed for enabling incremental reach for an advertising campaign, across multiple screens/channels. In some embodiments, a base TV/media plan is uploaded, and targeted exposed viewers are monitored. Unexposed target viewers are identified. Additional media channels that unexposed viewers use are found. Unexposed viewers are matched with pricing and media avails from one or more media directories. Media avails are then analyzed along with incremental on-target impressions. Targeted avails for unexposed viewers are then determined, based on lowest incremental cost and largest incremental reach are added to a current cross-screen plan. An analysis to find new unexposed viewers is then re-run to determine the next-most cost effective avails. The above steps are repeated or looped until a selected advertisement budget has been allocated. User interface embodiments for these methods are also disclosed.Type: ApplicationFiled: June 12, 2019Publication date: October 3, 2019Inventors: Antoine Barbier, Greg Collison, Albert Lim, Nikhil Belsare, Alexander R. Hood
-
Patent number: 10419453Abstract: This invention relates to a system and method for simultaneously displaying real-time information security threat posture of a plurality of computers and its intermediary networks that are under surveillance. In particular, the invention involves displaying a three-dimensional abstract object that has been scaled according to the size and orientation of a display screen so that the entirety of the three-dimensional abstract object may be simultaneously viewed by viewers of the display technology in its entirety. The displayed three-dimensional abstract object is made up of an amalgamation of semi-translucent three-dimensional shapes that are arranged together to achieve the unified shape and form of the three-dimensional abstract object.Type: GrantFiled: December 14, 2015Date of Patent: September 17, 2019Assignee: CERTIS CISCO SECURITY PTE LTDInventor: Keng Leng Albert Lim
-
Publication number: 20190095618Abstract: This document describes a system and method for quantitatively unifying and assimilating all unstructured, unlabelled and/or fragmented real-time and non-real-time cyber threat data generated by a plurality of sources. These sources may include cyber-security surveillance systems that are equipped with machine learning capabilities.Type: ApplicationFiled: October 24, 2016Publication date: March 28, 2019Applicant: Certis Cisco Security Pte LtdInventor: Keng Leng Albert LIM
-
Publication number: 20190098025Abstract: This invention relates to a system and method for prioritizing an incident triage process in an autonomic manner. In particular, the system employs performance modifier indicators and temporal decay parameters to autonomously compile, adjust and demonstrate a list of prioritized incidents in a dynamic manner.Type: ApplicationFiled: June 29, 2017Publication date: March 28, 2019Applicant: Certis Cisco Security Pte LtdInventor: Keng Leng Albert LIM
-
Patent number: 10237297Abstract: A system and method for evaluating cyber-security threat incidents of a computer network is described in this document. In particular, it is described that cyber-security threat incidents of a computer network may be visualized by displaying these threat incidents as a plurality of graphical objects on a display of a device. A subset of these graphical objects or threat incidents may then be selected by applying a single continuous touch input to a touch interface of the device. A risk score will then be generated and displayed based on the threat incidents that are contained within the subset of graphical objects. Mitigation actions addressing the cyber-security threats that triggered these threat incidents are then implemented by the device.Type: GrantFiled: April 11, 2016Date of Patent: March 19, 2019Assignee: Certis Cisco Security Pte LtdInventor: Keng Leng Albert Lim
-
Publication number: 20190058597Abstract: This document discloses a method and system for just-in-time compression and optimization of raw unstructured in-line and in-transit data by identifying low entropy data blocks or duplicated information security information in raw computer security alerts within a series of time windows. In particular, the method and system automatically manages; processes; and optimizes in-line and in-transit data blocks or raw information security alerts received from a plurality of information surveillance sources and/or peripheral monitoring devices simultaneously. The data blocks or raw information security alerts that are found to be unique in the various time windows are transposed into meta-definition tables to be further processed while redundant data blocks or raw alerts contained within each particular time window are identified, marked and processed accordingly.Type: ApplicationFiled: February 15, 2016Publication date: February 21, 2019Applicant: Certis Cisco Security Pte LtdInventor: Keng Leng Albert Lim
-
Publication number: 20180324202Abstract: A system and method for evaluating cyber-security threat incidents of a computer network is described in this document. In particular, it is described that cyber-security threat incidents of a computer network may be visualized by displaying these threat incidents as a plurality of graphical objects on a display of a device. A subset of these graphical objects or threat incidents may then be selected by applying a single continuous touch input to a touch interface of the device. A risk score will then be generated and displayed based on the threat incidents that are contained within the subset of graphical objects. Mitigation actions addressing the cyber-security threats that triggered these threat incidents are then implemented by the device.Type: ApplicationFiled: April 11, 2016Publication date: November 8, 2018Applicant: Certis CISCO Security Pte LtdInventor: Keng Leng Albert Lim
-
Patent number: 10105249Abstract: The present invention provides systems and methods for deploying implantable devices within the body. The delivery and deployment systems include at least one catheter or an assembly of catheters for selectively positioning the lumens of the implant to within target vessels. Various deployment and attachment mechanisms are provided for selectively deploying the implants.Type: GrantFiled: September 29, 2008Date of Patent: October 23, 2018Assignee: Taheri LaDuca LLCInventors: Brice Maxime Arnault De La Menardiere, Frederich Albert Lim Alavar, Robert C. LaDuca, Paul A. LaDuca
-
Publication number: 20180276376Abstract: This document discloses a heuristic data analytics method and system for analysing potential information security threats in information security events. In particular, the heuristic data analytics method and system analyses Binary Large Objects (BLOBs) of structured and unstructured information security events at high speed and in real-time to anticipate potential security breaches that will occur in the near future using algorithms and large scale computing systems.Type: ApplicationFiled: March 24, 2016Publication date: September 27, 2018Applicant: Certis Cisco Security Pte LtdInventor: Keng Leng Albert Lim
-
Publication number: 20180041523Abstract: This invention relates to a system and method for simultaneously displaying real-time information security threat posture of a plurality of computers and its intermediary networks that are under surveillance. In particular, the invention involves displaying a three-dimensional abstract object that has been scaled according to the size and orientation of a display screen so that the entirety of the three-dimensional abstract object may be simultaneously viewed by viewers of the display technology in its entirety. The displayed three-dimensional abstract object is made up of an amalgamation of semi-translucent three-dimensional shapes that are arranged together to achieve the unified shape and form of the three-dimensional abstract object.Type: ApplicationFiled: December 14, 2015Publication date: February 8, 2018Applicant: Certis CISCO Security Pte LtdInventor: Keng Leng Albert Lim
-
Publication number: 20170228658Abstract: This document discloses a system and method for consolidating threat intelligence data for a computer and its related networks. Massive volumes of raw threat intelligence data are collected from a plurality of sources and are partitioned into a common format for cluster analysis whereby the clustering of the data is done using unsupervised machine learning algorithms. The resulting organized threat intelligence data subsequently undergoes a weighted asset based threat severity level correlation process. All the intermediary network vulnerabilities of a particular computer network are utilized as the critical consolidation parameters of this process. The final processed intelligence data gathered through this high speed automated process is then formatted into predefined formats prior to transmission to third parties.Type: ApplicationFiled: July 24, 2015Publication date: August 10, 2017Applicant: Certis CISCO Security Pte LtdInventor: Keng Leng Albert Lim