Patents by Inventor Andrew Moravec

Andrew Moravec has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20230274017
    Abstract: Disclosed in some examples are methods, systems, and machine readable mediums for applications that detect indicators of data exfiltration through applications such as browser-based interfaces. The disclosed system monitors file system element events related to one or more target applications (such as browsers) through operating system interfaces. Once an event of interest is detected, the system interfaces with the browser to determine a context for the event of interest that may include a URL of a website that the user was visiting corresponding to the file system element event. If the URL is directed towards a prohibited site, a notification may be generated that may be used as a signal to alert an administrator. As used herein, a file system element may include a file, directory, folder, archive, blob, raw storage, metadata, or the like. File system element events may include copying, deleting, modifying, or moving a file system element.
    Type: Application
    Filed: May 8, 2023
    Publication date: August 31, 2023
    Inventors: Robert Juncker, Neil Kulevsky, Andrew Moravec, James Sablatura, Shane Zako
  • Patent number: 11720702
    Abstract: Disclosed in some examples are methods, systems, and machine readable mediums for applications that detect indicators of data exfiltration through applications such as browser-based interfaces. The disclosed system monitors file system element events related to one or more target applications (such as browsers) through operating system interfaces. Once an event of interest is detected, the system interfaces with the browser to determine a context for the event of interest that may include a URL of a website that the user was visiting corresponding to the file system element event. If the URL is directed towards a prohibited site, a notification may be generated that may be used as a signal to alert an administrator. As used herein, a file system element may include a file, directory, folder, archive, blob, raw storage, metadata, or the like File system element events may include copying, deleting, modifying, or moving a file system element.
    Type: Grant
    Filed: April 28, 2021
    Date of Patent: August 8, 2023
    Assignee: Code42 Software, Inc.
    Inventors: Rob Juncker, Neil Kulevsky, Andrew Moravec, James Sablatura, Shane Zako
  • Publication number: 20220350905
    Abstract: Disclosed in some examples are methods, systems, and machine readable mediums for applications that detect indicators of data exfiltration through applications such as browser-based interfaces. The disclosed system monitors file system element events related to one or more target applications (such as browsers) through operating system interfaces. Once an event of interest is detected, the system interfaces with the browser to determine a context for the event of interest that may include a URL of a website that the user was visiting corresponding to the file system element event. If the URL is directed towards a prohibited site, a notification may be generated that may be used as a signal to alert an administrator. As used herein, a file system element may include a file, directory, folder, archive, blob, raw storage, metadata, or the like File system element events may include copying, deleting, modifying, or moving a file system element.
    Type: Application
    Filed: April 28, 2021
    Publication date: November 3, 2022
    Inventors: Rob Juncker, Neil Kulevsky, Andrew Moravec, James Sablatura, Shane Zako
  • Patent number: 11436279
    Abstract: System and techniques for dynamically building a file graph are described herein. Meta data is received for a first and a second file. An intersection of the first metadata set and the second metadata set is computed. An edge in a file graph is created based on the intersection. Then, after receiving a query about the first file, the second file is provided as a result to the query based on the edge in the file graph.
    Type: Grant
    Filed: November 9, 2018
    Date of Patent: September 6, 2022
    Assignee: Code42 Software, Inc.
    Inventor: Andrew Moravec
  • Publication number: 20210385208
    Abstract: A method by a management server is described. The method includes receiving a credentials request from a requesting management node. The credentials request includes a public key of the requesting management node. The method also includes determining whether the management server has credentials encrypted for the requesting management node in a local cache. The credentials are encrypted using the public key of the requesting management node and cannot be decrypted by the management server. The method further includes sending the encrypted credentials to the requesting management node when the management server has the encrypted credentials. The requesting management node can decrypt the encrypted credentials using a private key.
    Type: Application
    Filed: August 23, 2021
    Publication date: December 9, 2021
    Applicant: Ivanti, Inc.
    Inventors: Mark Tempel, Andrew Moravec
  • Patent number: 11100232
    Abstract: An apparatus includes a processor and a memory operatively coupled to the processor. The processor is configured to automatically send queries to client devices, and to receive responses from the client devices in response to the queries. The processor is configured to identify, based on the responses and on role information stored in an Active Directory database, roles of current users of the client devices and identify based on the roles security risks associated with the client devices. The roles can differ among users. The processor is configured to select a remedial action for at least one of the client devices based on the security risk associated with that client device, and is configured to implement the remedial action on that client device. The processor is configured to not select a remedial action for another of the client devices based on the security risk associated with that client device.
    Type: Grant
    Filed: February 22, 2018
    Date of Patent: August 24, 2021
    Assignee: Ivanti, Inc.
    Inventors: Robert M. Juncker, David B. Morley, Andrew Moravec
  • Patent number: 11102193
    Abstract: A method by a management server is described. The method includes receiving a credentials request from a requesting management node. The credentials request includes a public key of the requesting management node. The method also includes determining whether the management server has credentials encrypted for the requesting management node in a local cache. The credentials are encrypted using the public key of the requesting management node and cannot be decrypted by the management server. The method further includes sending the encrypted credentials to the requesting management node when the management server has the encrypted credentials. The requesting management node can decrypt the encrypted credentials using a private key.
    Type: Grant
    Filed: February 27, 2019
    Date of Patent: August 24, 2021
    Assignee: Ivanti, Inc.
    Inventors: Mark Tempel, Andrew Moravec
  • Publication number: 20200151280
    Abstract: System and techniques for dynamically building a file graph are described herein. Meta data is received for a first and a second file. An intersection of the first metadata set and the second metadata set is computed. An edge in a file graph is created based on the intersection. Then, after receiving a query about the first file, the second file is provided as a result to the query based on the edge in the file graph.
    Type: Application
    Filed: November 9, 2018
    Publication date: May 14, 2020
    Inventor: Andrew Moravec
  • Publication number: 20200036702
    Abstract: A method by a management server is described. The method includes receiving a credentials request from a requesting management node. The credentials request includes a public key of the requesting management node. The method also includes determining whether the management server has credentials encrypted for the requesting management node in a local cache. The credentials are encrypted using the public key of the requesting management node and cannot be decrypted by the management server. The method further includes sending the encrypted credentials to the requesting management node when the management server has the encrypted credentials. The requesting management node can decrypt the encrypted credentials using a private key.
    Type: Application
    Filed: February 27, 2019
    Publication date: January 30, 2020
    Applicant: Ivanti, Inc.
    Inventors: Mark TEMPEL, Andrew MORAVEC
  • Patent number: 10142325
    Abstract: A method by a management server is described. The method includes receiving a credentials request from a requesting management node. The credentials request includes a public key of the requesting management node. The method also includes determining whether the management server has credentials encrypted for the requesting management node in a local cache. The credentials are encrypted using the public key of the requesting management node and cannot be decrypted by the management server. The method further includes sending the encrypted credentials to the requesting management node when the management server has the encrypted credentials. The requesting management node can decrypt the encrypted credentials using a private key.
    Type: Grant
    Filed: August 29, 2016
    Date of Patent: November 27, 2018
    Assignee: Ivanti, Inc.
    Inventors: Mark Tempel, Andrew Moravec
  • Publication number: 20180063123
    Abstract: A method by a management server is described. The method includes receiving a credentials request from a requesting management node. The credentials request includes a public key of the requesting management node. The method also includes determining whether the management server has credentials encrypted for the requesting management node in a local cache. The credentials are encrypted using the public key of the requesting management node and cannot be decrypted by the management server. The method further includes sending the encrypted credentials to the requesting management node when the management server has the encrypted credentials. The requesting management node can decrypt the encrypted credentials using a private key.
    Type: Application
    Filed: August 29, 2016
    Publication date: March 1, 2018
    Inventors: Mark Tempel, Andrew Moravec
  • Patent number: 9858164
    Abstract: A method for providing a context sensitive information technology (IT) management prescription is described. In response to a user request, a scan is performed on a target computing environment and data is collected from the scan. The data is forwarded to a cloud based entity. At the cloud based entity the data is parsed in accordance with a dynamic set of rules to determine an IT management prescription specific to the context of the target computing environment. The IT management prescription is provided for access by the user.
    Type: Grant
    Filed: August 23, 2012
    Date of Patent: January 2, 2018
    Assignee: Crimson Corporation
    Inventors: Jace McLean, Andrew Moravec
  • Patent number: 9292422
    Abstract: In a method of testing a software item, a graphical user interface is presented for scheduling a test of the software item. Specified information regarding conduct of a test is received via the graphical user interface. The specified information includes a test time for initiating the test. The test is initiated at the test time.
    Type: Grant
    Filed: October 12, 2012
    Date of Patent: March 22, 2016
    Assignee: VMware, Inc.
    Inventors: Callistus C Schissel, Andrew Moravec, Sean McDonald, Scott Rens, David Gibbens
  • Publication number: 20140109056
    Abstract: In a method of testing a software item, a graphical user interface is presented for scheduling a test of the software item. Specified information regarding conduct of a test is received via the graphical user interface. The specified information includes a test time for initiating the test. The test is initiated at the test time.
    Type: Application
    Filed: October 12, 2012
    Publication date: April 17, 2014
    Applicant: VMware,Inc.
    Inventors: Callistus C. Schissel, Andrew Moravec, Sean McDonald, Scott Rens, David Gibbens