Patents by Inventor Anthony A. Crumb

Anthony A. Crumb has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 9363231
    Abstract: A method of monitoring network communications originating in monitored jurisdictions includes a step of identifying a monitored jurisdiction within a computer network based on predetermined criteria. The computer network includes at least one monitored jurisdiction and at least one unmonitored jurisdiction. A database is queried to identify at least one communication identifier associated with the monitored jurisdiction. The method also includes a step of storing a list including the at least one communication identifier. Only network communication having communication identifiers included in the list are monitored.
    Type: Grant
    Filed: September 13, 2007
    Date of Patent: June 7, 2016
    Assignee: Caterpillar Inc.
    Inventors: Paul Force, Anthony Crumb, James Hutson, Steven Cox
  • Publication number: 20090077227
    Abstract: A method of monitoring network communications originating in monitored jurisdictions includes a step of identifying a monitored jurisdiction within a computer network based on predetermined criteria. The computer network includes at least one monitored jurisdiction and at least one unmonitored jurisdiction. A database is queried to identify at least one communication identifier associated with the monitored jurisdiction. The method also includes a step of storing a list including the at least one communication identifier. Only network communication having communication identifiers included in the list are monitored.
    Type: Application
    Filed: September 13, 2007
    Publication date: March 19, 2009
    Inventors: Paul Force, Anthony Crumb, James Hutson, Steven Cox
  • Publication number: 20090038014
    Abstract: A method of tracking remediation of security vulnerabilities includes a step of providing a global list of network devices within a computer network, wherein each network device of the global list is identified with dynamically assigned identifying information. The method also includes a step of scanning each network device of the global list for at least one security vulnerability. The method also includes a step of creating a vulnerability list of network devices having the at least one security vulnerability, wherein the vulnerability list is a subset of the global list and contains fewer network devices than the global list. Each network device of the vulnerability list is identified with identifying information. The method also includes steps of updating the dynamically assigned identifying information associated with the network devices of the vulnerability list and rescanning each network device of the updated vulnerability list to determine if the vulnerability has been remediated.
    Type: Application
    Filed: July 31, 2007
    Publication date: February 5, 2009
    Inventors: Paul Force, Lawrence Edwards, Julianne Davies Martin, Steven Cox, Anthony Crumb
  • Publication number: 20080263626
    Abstract: A method of logging a network communication event includes a step of identifying a network communication event within a communication leaving a computer network. The method also includes steps of identifying a network address associated with the communication, and associating a user identity with the network address. It should be appreciated that the network address may include a dynamic network address. In addition, information is logged associating the user identity with the network communication event.
    Type: Application
    Filed: April 4, 2008
    Publication date: October 23, 2008
    Inventors: Matthew Bainter, Amanda N. Pettit, James O. Hutson, Paul D. Force, Randy J. Rush, Anthony A. Crumb