Patents by Inventor Bradley T. Ford

Bradley T. Ford has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 9003532
    Abstract: In certain embodiments, a computer-implemented method comprises receiving, via a computer network and from a first computer system, a first malware analysis request. The first malware analysis request comprises a file to be analyzed for malware by a malware analysis system. The method includes initiating a malware analysis by the malware analysis system of the first file for malware. The method includes communicating to the first computer system a response for the first file determined by the malware analysis system to the first computer system. The response comprises an indication of whether the first file comprises malware.
    Type: Grant
    Filed: September 15, 2011
    Date of Patent: April 7, 2015
    Assignee: Raytheon Company
    Inventors: Monty D. McDougal, Bradley T. Ford, William E. Sterns
  • Patent number: 8627404
    Abstract: In certain embodiments, a computer system includes a memory unit and a processing unit. The processing unit executes a monitoring module stored on the computer system. The monitoring module monitors the computer system for addition of a file to the computer system and detects an addition of a file to the computer system. The monitoring module accesses policies to determine whether to communicate information associated with the detected addition of the file over a communication network to a remote malware analysis system to initiate a possible malware analysis of the file by the remote malware analysis system. The monitoring module initiates, in response to determining to communicate information associated with the detected addition of the file, communication over the communication network of information associated with the detected addition of the file to the remote malware analysis system, the remote malware analysis system operable to analyze the file for malware.
    Type: Grant
    Filed: August 24, 2011
    Date of Patent: January 7, 2014
    Assignee: Raytheon Company
    Inventors: Monty D. McDougal, Bradley T. Ford, William P. Smelser, Jason R. Clinton, Morgan J. Greenwood
  • Patent number: 8468602
    Abstract: According to one embodiment, a computer-implemented method includes: accessing a set of configuration parameters, accessing a set of identifiers of files known not to be malware, and accessing a set of identifiers of files known to be malware. Further, the method includes: comparing a first file to the set of configuration parameters, determining that a first hash of the first file is not in the set of identifiers of files known not to be malware and that the first hash is not in the set of identifiers of files known to be malware, and sending the at least one file and information related to the at least one file to be analyzed for malware. The method includes deleting the set of configuration parameters, the set of identifiers of files known not to be malware, and the set of identifiers of files known to be malware after sending the first file.
    Type: Grant
    Filed: March 8, 2010
    Date of Patent: June 18, 2013
    Assignee: Raytheon Company
    Inventors: Monty D. McDougal, Brian N. Smith, Keven K. Kalkbrenner, Bradley T. Ford, Randy S. Jennings, William E. Sterns
  • Publication number: 20130074185
    Abstract: In certain embodiments, a computer-implemented method comprises receiving, via a computer network and from a first computer system, a first malware analysis request. The first malware analysis request comprises a file to be analyzed for malware by a malware analysis system. The method includes initiating a malware analysis by the malware analysis system of the first file for malware. The method includes communicating to the first computer system a response for the first file determined by the malware analysis system to the first computer system. The response comprises an indication of whether the first file comprises malware.
    Type: Application
    Filed: September 15, 2011
    Publication date: March 21, 2013
    Applicant: Raytheon Company
    Inventors: Monty D. McDougal, Bradley T. Ford, William E. Sterns
  • Publication number: 20130055338
    Abstract: In certain embodiments, a computer system includes a memory unit and a processing unit. The processing unit executes a monitoring module stored on the computer system. The monitoring module monitors the computer system for addition of a file to the computer system and detects an addition of a file to the computer system. The monitoring module accesses policies to determine whether to communicate information associated with the detected addition of the file over a communication network to a remote malware analysis system to initiate a possible malware analysis of the file by the remote malware analysis system. The monitoring module initiates, in response to determining to communicate information associated with the detected addition of the file, communication over the communication network of information associated with the detected addition of the file to the remote malware analysis system, the remote malware analysis system operable to analyze the file for malware.
    Type: Application
    Filed: August 24, 2011
    Publication date: February 28, 2013
    Applicant: Raytheon Company
    Inventors: Monty D. McDougal, Bradley T. Ford, William P. Smelser, Jason R. Clinton, Morgan J. Greenwood
  • Publication number: 20110219451
    Abstract: According to one embodiment, a computer-implemented method includes: accessing a set of configuration parameters, accessing a set of identifiers of files known not to be malware, and accessing a set of identifiers of files known to be malware. Further, the method includes: comparing a first file to the set of configuration parameters, determining that a first hash of the first file is not in the set of identifiers of files known not to be malware and that the first hash is not in the set of identifiers of files known to be malware, and sending the at least one file and information related to the at least one file to be analyzed for malware. The method includes deleting the set of configuration parameters, the set of identifiers of files known not to be malware, and the set of identifiers of files known to be malware after sending the first file.
    Type: Application
    Filed: March 8, 2010
    Publication date: September 8, 2011
    Applicant: Raytheon Company
    Inventors: Monty D. McDougal, Brian N. Smith, Keven K. Kalkbrenner, Bradley T. Ford, Randy S. Jennings, William E. Sterns