Patents by Inventor Frank Jas

Frank Jas has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 10637887
    Abstract: A device may include one or more memories; and one or more processors, communicatively coupled to the one or more memories, to receive a query for data stored by a database; generate an abstract syntax tree based on the query; determine whether the abstract syntax tree matches a list, where the list identifies one or more abstract syntax trees corresponding to queries or types of queries; and selectively perform an action based on whether the abstract syntax tree matches the entry of the list.
    Type: Grant
    Filed: December 29, 2017
    Date of Patent: April 28, 2020
    Assignee: Cyphort Inc.
    Inventors: Frank Jas, Fengmin Gong
  • Publication number: 20190332771
    Abstract: A system configured to detect malware is described. The system configured to detect malware including a data collector configured to detect at least a first hypertext transfer object in a chain of a plurality of hypertext transfer objects. The data collector further configured to analyze at least the first hypertext transfer object for one or more events. And, the data collector configured to generate a list of events based on the analysis of at least the first hypertext transfer object.
    Type: Application
    Filed: July 10, 2019
    Publication date: October 31, 2019
    Inventors: Alexander BURT, Mikola BILOGORSKIY, McEnroe NAVARAJ, Frank JAS, Liang HAN, Yucheng TING, Manikandan KENYAN, Fengmin GONG, Ali GOLSHAN, Shishir SINGH
  • Publication number: 20190297097
    Abstract: A system configured to detect a threat activity on a network. The system including a digital device configured to detect a first order indicator of compromise on a network, detect a second order indicator of compromise on the network, generate a risk score based on correlating said first order indicator of compromise on the network with the second order indicator of compromise on said network, and generate at least one incident alert based on comparing the risk score to a threshold.
    Type: Application
    Filed: June 11, 2019
    Publication date: September 26, 2019
    Inventors: Fengmin Gong, Alexander Burt, Frank Jas
  • Patent number: 10354072
    Abstract: A system configured to detect malware is described. The system configured to detect malware including a data collector configured to detect at least a first hypertext transfer object in a chain of a plurality of hypertext transfer objects. The data collector further configured to analyze at least the first hypertext transfer object for one or more events. And, the data collector configured to generate a list of events based on the analysis of at least the first hypertext transfer object.
    Type: Grant
    Filed: April 20, 2018
    Date of Patent: July 16, 2019
    Assignee: Cyphort Inc.
    Inventors: Alexander Burt, Mikola Bilogorskiy, McEnroe Navaraj, Frank Jas, Liang Han, Yucheng Ting, Manikandan Kenyan, Fengmin Gong, Ali Golshan, Shishir Singh
  • Publication number: 20190207974
    Abstract: A device may include one or more memories; and one or more processors, communicatively coupled to the one or more memories, to receive a query for data stored by a database; generate an abstract syntax tree based on the query; determine whether the abstract syntax tree matches a list, where the list identifies one or more abstract syntax trees corresponding to queries or types of queries; and selectively perform an action based on whether the abstract syntax tree matches the entry of the list.
    Type: Application
    Filed: December 29, 2017
    Publication date: July 4, 2019
    Inventors: Frank JAS, Fengmin GONG
  • Patent number: 10326778
    Abstract: A system configured to detect a threat activity on a network. The system including a digital device configured to detect a first order indicator of compromise on a network, detect a second order indicator of compromise on the network, generate a risk score based on correlating said first order indicator of compromise on the network with the second order indicator of compromise on said network, and generate at least one incident alert based on comparing the risk score to a threshold.
    Type: Grant
    Filed: November 9, 2015
    Date of Patent: June 18, 2019
    Assignee: Cyphort Inc.
    Inventors: Fengmin Gong, Alexander Burt, Frank Jas
  • Patent number: 10225280
    Abstract: A system configured to detect malware is described. The system including an infection verification pack configured to perform behavior detonation; identify a malware object based on machine-learning; and select one or more persistent artifacts of the malware on the target system based on one or more algorithms applied to behavior traces of the malware object to select one or more persistent artifacts of the malware on the target system.
    Type: Grant
    Filed: February 23, 2015
    Date of Patent: March 5, 2019
    Assignee: Cyphort Inc.
    Inventors: Neal Vu, Frank Jas, Fengmin Gong, Anthony James, Ali Golshan, Shishir Singh
  • Patent number: 10095866
    Abstract: A system configured to generate a risk score for a threat activity including a digital device. The digital device configured to extract one or more threat events on a network based on metadata for one or more targeted digital devices on the network. Further, the digital device is configured to detect one or more incidents based on a correlation between at least a first threat event of the one or more threat events and a second threat event of the one or more threat events. And, the digital device is configured to generate a risk score for each of said one or more incidents.
    Type: Grant
    Filed: November 9, 2015
    Date of Patent: October 9, 2018
    Assignee: Cyphort Inc.
    Inventors: Fengmin Gong, Frank Jas, Druce MacFarlane
  • Publication number: 20180247058
    Abstract: A system configured to detect malware is described. The system configured to detect malware including a data collector configured to detect at least a first hypertext transfer object in a chain of a plurality of hypertext transfer objects. The data collector further configured to analyze at least the first hypertext transfer object for one or more events. And, the data collector configured to generate a list of events based on the analysis of at least the first hypertext transfer object.
    Type: Application
    Filed: April 20, 2018
    Publication date: August 30, 2018
    Inventors: Alexander BURT, Mikola BILOGORSKIY, McEnroe NAVARAJ, Frank JAS, Liang HAN, Yucheng TING, Manikandan KENYAN, Fengmin GONG, Ali GOLSHAN, Shishir SINGH
  • Patent number: 9953163
    Abstract: A system configured to detect malware is described. The system configured to detect malware including a data collector configured to detect at least a first hypertext transfer object in a chain of a plurality of hypertext transfer objects. The data collector further configured to analyze at least the first hypertext transfer object for one or more events. And, the data collector configured to generate a list of events based on the analysis of at least the first hypertext transfer object.
    Type: Grant
    Filed: February 20, 2015
    Date of Patent: April 24, 2018
    Assignee: Cyphort Inc.
    Inventors: Alexander Burt, Mikola Bilogorskiy, McEnroe Navaraj, Frank Jas, Liang Han, Yucheng Ting, Manikandan Kenyan, Fengmin Gong, Ali Golshan, Shishir Singh
  • Patent number: 9686293
    Abstract: Systems and methods for monitoring malware events in a computer networking environment are described. The systems and methods including the steps of identifying suspect objects; transmitting the suspect objects to an inspection service, wherein the inspection service inspects the suspect objects using a plurality of inspection methods to create digital information about the nature of the potential threat posed by the suspect objects; transmitting said digital information to an analytical service operating, wherein the analytical service performs a plurality of analytical algorithms to categorize the suspect objects with one or more scores for each suspect object based on their security threat; transmitting said one or more scores to a correlation facility which aggregates a plurality of scores; and generating an infection verification pack comprising routines which, when run on an end-point machine within the computer networking environment, will mitigate a suspected security threat.
    Type: Grant
    Filed: February 23, 2015
    Date of Patent: June 20, 2017
    Assignee: Cyphort Inc.
    Inventors: Ali Golshan, Fengmin Gong, Frank Jas, Nick Bilogorskiy, Neal Vu, Chenghuai Lu, Alexander Burt, Manikandan Kenyan, Yucheng Ting
  • Publication number: 20160078229
    Abstract: A system configured to generate a risk score for a threat activity including a digital device. The digital device configured to extract one or more threat events on a network based on metadata for one or more targeted digital devices on the network. Further, the digital device is configured to detect one or more incidents based on a correlation between at least a first threat event of the one or more threat events and a second threat event of the one or more threat events. And, the digital device is configured to generate a risk score for each of said one or more incidents.
    Type: Application
    Filed: November 9, 2015
    Publication date: March 17, 2016
    Inventors: Fengmin Gong, Frank Jas, Druce MacFarlane
  • Publication number: 20160065601
    Abstract: A system configured to detect a threat activity on a network. The system including a digital device configured to detect a first order indicator of compromise on a network, detect a second order indicator of compromise on the network, generate a risk score based on correlating said first order indicator of compromise on the network with the second order indicator of compromise on said network, and generate at least one incident alert based on comparing the risk score to a threshold.
    Type: Application
    Filed: November 9, 2015
    Publication date: March 3, 2016
    Inventors: Fengmin Gong, Alexander Burt, Frank Jas
  • Publication number: 20150244732
    Abstract: Systems and methods for monitoring malware events in a computer networking environment are described.
    Type: Application
    Filed: February 23, 2015
    Publication date: August 27, 2015
    Inventors: Ali Golshan, Fengmin Gong, Frank Jas, Nick Bilogorskiy, Neal Vu, Chenghuai Lu, Alexander Burt, Manikandan Kenyan, Yucheng Ting
  • Publication number: 20150242628
    Abstract: A system configured to detect malware is described. The system configured to detect malware including a data collector configured to detect at least a first hypertext transfer object in a chain of a plurality of hypertext transfer objects. The data collector further configured to analyze at least the first hypertext transfer object for one or more events. And, the data collector configured to generate a list of events based on the analysis of at least the first hypertext transfer object.
    Type: Application
    Filed: February 20, 2015
    Publication date: August 27, 2015
    Inventors: Alexander Burt, Nick Bilogorskiy, McEnroe Navaraj, Frank Jas, Liang Han, Yucheng Ting, Manikandan Kenyan, Fengmin Gong, Ali Golshan, Shishir Singh
  • Publication number: 20150244730
    Abstract: A system configured to detect malware is described. The system including an infection verification pack configured to perform behavior detonation; identify a malware object based on machine-learning; and select one or more persistent artifacts of the malware on the target system based on one or more algorithms applied to behavior traces of the malware object to select one or more persistent artifacts of the malware on the target system.
    Type: Application
    Filed: February 23, 2015
    Publication date: August 27, 2015
    Inventors: Neal Vu, Frank Jas, Fengmin Gong, Anthony James, Ali Golshan, Shishir Singh
  • Patent number: 7912869
    Abstract: A computer-based database processing system contains a database, as well as a number of other components, including one or more user applications and an application interface which communicates data to and from each user application. An entity manager communicates data to and from the application interface, while a constraint manager communicates data to and from the application interface. An attribute description manager communicates data to and from the application interface, and a component manager communicates data to and from the entity manager, the constraint manager, the attribute description manager, and the database. A free space manager transmits data to and from the component packet manager and the database.
    Type: Grant
    Filed: June 7, 2007
    Date of Patent: March 22, 2011
    Inventor: Frank Jas
  • Patent number: 7243108
    Abstract: A component packet manager for a computer-based database processing system containing a database consists of a number of other components, including one or more user applications and an application interface which communicates data to and from each user application. An entity manager communicates data to and from the application interface, while a constraint manager communicates data to and from the application interface.
    Type: Grant
    Filed: January 22, 2004
    Date of Patent: July 10, 2007
    Inventor: Frank Jas
  • Patent number: 6694325
    Abstract: A computer-based software method for creating and modifying a data base which contains a multiplicity of records consisting of attribute records, entity records, and constraint records. Each entity record contains a unique identifier and a list of pairs of attribute identifiers and associated values. Each constraint record contains a statement which evaluates to true or false when applied to an entity record in the database. The result is a database in which attribute, constraint, and entity records may be modified without having to reload parts of or the entire database. In addition, the invention contains an integrated method of data compacting and indexing, implemented by component packets, containing component data records, component description records arranged in an array, and a header record. Component data records may contain index structures, which in turn may contain other component packets. Data packets are transferred between an applications program and the database.
    Type: Grant
    Filed: October 14, 2001
    Date of Patent: February 17, 2004
    Inventor: Frank Jas
  • Publication number: 20020059260
    Abstract: A computer-based software method for creating and modifying a data base which contains a multiplicity of records consisting of attribute records, entity records, and constraint records. Each entity record contains a unique identifier and a list of pairs of attribute identifiers and associated values. Each constraint record contains a statement which evaluates to true or false when applied to an entity record in the database. The result is a database in which attribute, constraint, and entity records may be modified without having to reload parts of or the entire database. In addition, the invention contains an integrated method of data compacting and indexing, implemented by component packets, containing component data records, component description records arranged in an array, and a header record. Component data records may contain index structures, which in turn may contain other component packets. Data packets are transferred between an applications program and the database.
    Type: Application
    Filed: October 14, 2001
    Publication date: May 16, 2002
    Inventor: Frank Jas