Patents by Inventor Frederick Doyle

Frederick Doyle has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 10686825
    Abstract: A multiple presentation fidelity-level based quantitative cyber risk decision support system. The system comprises a processor, a memory, a data store comprising cyber threat event log entries, and a cyber threat analysis application stored in the memory that, when executed by the processor, analyzes the log entries, executes cyber threat materialization probability update rules on risk elements based on analyzing the log entries, builds a first presentation of an amplitude of cyber risk using a first presentation method, presents the first presentation on a workstation associated with a first level of user, builds a second presentation comprising an ordered list of actions to perform to mitigate cyber risk using a second presentation method, and presents the second presentation on a workstation associated with a second level of user.
    Type: Grant
    Filed: September 5, 2018
    Date of Patent: June 16, 2020
    Inventor: Frederick Doyle
  • Publication number: 20190124108
    Abstract: A multiple presentation fidelity-level based quantitative cyber risk decision support system. The system comprises a processor, a memory, a data store comprising cyber threat event log entries, and a cyber threat analysis application stored in the memory that, when executed by the processor, analyzes the log entries, executes cyber threat materialization probability update rules on risk elements based on analyzing the log entries, builds a first presentation of an amplitude of cyber risk using a first presentation method, presents the first presentation on a workstation associated with a first level of user, builds a second presentation comprising an ordered list of actions to perform to mitigate cyber risk using a second presentation method, and presents the second presentation on a workstation associated with a second level of user.
    Type: Application
    Filed: September 5, 2018
    Publication date: April 25, 2019
    Inventor: Frederick Doyle
  • Patent number: 10063583
    Abstract: A security system comprising a computer, a memory, a data store comprising a cyber threat intent dictionary and a technology dictionary; and an application stored in the memory. When executed by the computer, the application generates a report that comprises an identification of a cyber threat intent and the identification of a cyber threat technology, wherein the cyber threat intent is selected from a plurality of cyber threat intents listed in the cyber threat intent dictionary and wherein the cyber threat technology is selected from the technology dictionary. The application also populates values in a cyber threat progression vector, where the cyber threat progression vector comprises elements that each corresponds to an action in a chain of actions associated with a cybercrime, where the values correspond to one of present or not present. The vector is used to manage the cyber risk of an enterprise or organization.
    Type: Grant
    Filed: August 28, 2017
    Date of Patent: August 28, 2018
    Assignee: FireEye, Inc.
    Inventors: John P. Watters, Frederick Doyle, Henry Peltokangas, Matthew Keane
  • Publication number: 20180069891
    Abstract: A security system comprising a computer, a memory, a data store comprising a cyber threat intent dictionary and a technology dictionary; and an application stored in the memory. When executed by the computer, the application generates a report that comprises an identification of a cyber threat intent and the identification of a cyber threat technology, wherein the cyber threat intent is selected from a plurality of cyber threat intents listed in the cyber threat intent dictionary and wherein the cyber threat technology is selected from the technology dictionary. The application also populates values in a cyber threat progression vector, where the cyber threat progression vector comprises elements that each corresponds to an action in a chain of actions associated with a cybercrime, where the values correspond to one of present or not present. The vector is used to manage the cyber risk of an enterprise or organization.
    Type: Application
    Filed: August 28, 2017
    Publication date: March 8, 2018
    Inventors: John P. Watters, Frederick Doyle, Henry Peltokangas, Matthew Keane
  • Patent number: 9904955
    Abstract: A system for electronic crime reduction is provided, comprising a computer system, a database, a malware de-compiler, a malware parser, and an inference engine. The database contains information that associates electronic crime attack signature data with at least one of an individual, a group, and a location. The malware de-compiler, when executed on the computer system, translates a first malware executable to an assembly language version. The first malware is associated with an electronic crime that has been committed. The malware parser, when executed on the computer system, analyzes the assembly language version to identify distinctive coding preferences used to develop the first malware. The inference engine, when executed on the computer system, analyzes the distinctive coding preferences identified by the malware parser application in combination with searching the database to identify one of an individual, a group, and a location associated with the electronic crime.
    Type: Grant
    Filed: June 18, 2014
    Date of Patent: February 27, 2018
    Assignee: FireEye, Inc.
    Inventors: John P. Watters, Jonathan M. Couch, Sam F. Stover, Michael J. Weinberger, Frederick Doyle, Gregory MacManus
  • Patent number: 9749344
    Abstract: A security system comprising a computer, a memory, a data store comprising a plurality of consensus evaluations and a plurality of cyber threat analyst ratings, and an application stored in the memory. When executed by the computer, the application generates a cyber threat report that identifies of a cyber threat intent and a cyber threat technology, receives from a cyber threat analyst an input of a cyber threat frequency score, an input of a cyber threat likelihood score, and an input of a cyber threat capability score, and generates a cyber threat intensity based on the scores and based on a cyber threat analyst rating stored in the data store and associated with the cyber threat analyst inputting the scores, whereby the cyber threat report and the cyber threat intensity are used to select cyber risk mitigation actions to economically manage the cyber risk of an enterprise or organization.
    Type: Grant
    Filed: April 3, 2014
    Date of Patent: August 29, 2017
    Assignee: FireEye, Inc.
    Inventors: John P. Watters, Frederick Doyle, Henry Peltokangas, Matthew Keane
  • Patent number: 9749343
    Abstract: A security system comprising a computer, a memory, a data store comprising a cyber threat intent dictionary and a technology dictionary; and an application stored in the memory. When executed by the computer, the application generates a report that comprises an identification of a cyber threat intent and the identification of a cyber threat technology, wherein the cyber threat intent is selected from a plurality of cyber threat intents listed in the cyber threat intent dictionary and wherein the cyber threat technology is selected from the technology dictionary. The application also populates values in a cyber threat progression vector, where the cyber threat progression vector comprises elements that each corresponds to an action in a chain of actions associated with a cybercrime, where the values correspond to one of present or not present. The vector is used to manage the cyber risk of an enterprise or organization.
    Type: Grant
    Filed: April 3, 2014
    Date of Patent: August 29, 2017
    Assignee: FireEye, Inc.
    Inventors: John P. Watters, Frederick Doyle, Henry Peltokangas, Matthew Keane
  • Publication number: 20160241580
    Abstract: A security system comprising a computer, a memory, a data store comprising a cyber threat intent dictionary and a technology dictionary; and an application stored in the memory. When executed by the computer, the application generates a report that comprises an identification of a cyber threat intent and the identification of a cyber threat technology, wherein the cyber threat intent is selected from a plurality of cyber threat intents listed in the cyber threat intent dictionary and wherein the cyber threat technology is selected from the technology dictionary. The application also populates values in a cyber threat progression vector, where the cyber threat progression vector comprises elements that each corresponds to an action in a chain of actions associated with a cybercrime, where the values correspond to one of present or not present. The vector is used to manage the cyber risk of an enterprise or organization.
    Type: Application
    Filed: April 3, 2014
    Publication date: August 18, 2016
    Applicant: iSIGHT Partners, Inc.
    Inventors: John P. Watters, Frederick Doyle, Henry Peltokangas, Matthew Keane
  • Publication number: 20160241581
    Abstract: A security system comprising a computer, a memory, a data store comprising a plurality of consensus evaluations and a plurality of cyber threat analyst ratings, and an application stored in the memory. When executed by the computer, the application generates a cyber threat report that identifies of a cyber threat intent and a cyber threat technology, receives from a cyber threat analyst an input of a cyber threat frequency score, an input of a cyber threat likelihood score, and an input of a cyber threat capability score, and generates a cyber threat intensity based on the scores and based on a cyber threat analyst rating stored in the data store and associated with the cyber threat analyst inputting the scores, whereby the cyber threat report and the cyber threat intensity are used to select cyber risk mitigation actions to economically manage the cyber risk of an enterprise or organization.
    Type: Application
    Filed: April 3, 2014
    Publication date: August 18, 2016
    Applicant: iSIGHT Partners, Inc.
    Inventors: John P. Watters, Frederick Doyle, Henry Peltokangas, Matthew Keane
  • Publication number: 20140297494
    Abstract: A system for electronic crime reduction is provided, comprising a computer system, a database, a malware de-compiler, a malware parser, and an inference engine. The database contains information that associates electronic crime attack signature data with at least one of an individual, a group, and a location. The malware de-compiler, when executed on the computer system, translates a first malware executable to an assembly language version. The first malware is associated with an electronic crime that has been committed. The malware parser, when executed on the computer system, analyzes the assembly language version to identify distinctive coding preferences used to develop the first malware. The inference engine, when executed on the computer system, analyzes the distinctive coding preferences identified by the malware parser application in combination with searching the database to identify one of an individual, a group, and a location associated with the electronic crime.
    Type: Application
    Filed: June 18, 2014
    Publication date: October 2, 2014
    Inventors: John P. Watters, Jonathan M. Couch, Sam F. Stover, Michael J. Weinberger, Frederick Doyle, Gregory MacManus
  • Patent number: 8494974
    Abstract: A method of selecting security actions is provided. The method comprises estimating a maximum forecast loss, identifying general, sector specific, and targeted threats. The method further comprises forecasting a security loss based on the estimated maximum forecast loss and the threats, estimating a reduction in the security loss based on a first investment on a general threat countermeasure, on a second investment on a sector specific countermeasure, and on a third investment on a targeted threat countermeasure. The method further comprises allocating at least a portion of a security investment budget among the first, the second, and the third investments to maximize the estimated reduction in security loss. An aspect disclosed comprises a method that determines rates of return on security investment and selects security investments based on the rates of return. An aspect disclosed comprises a system for forecasting a security loss based on a security investment.
    Type: Grant
    Filed: January 18, 2010
    Date of Patent: July 23, 2013
    Assignee: iSIGHT Partners Inc.
    Inventors: John P. Watters, Frederick Doyle
  • Publication number: 20110178942
    Abstract: A method of selecting security actions is provided. The method comprises estimating a maximum forecast loss, identifying general, sector specific, and targeted threats. The method further comprises forecasting a security loss based on the estimated maximum forecast loss and the threats, estimating a reduction in the security loss based on a first investment on a general threat countermeasure, on a second investment on a sector specific countermeasure, and on a third investment on a targeted threat countermeasure. The method further comprises allocating at least a portion of a security investment budget among the first, the second, and the third investments to maximize the estimated reduction in security loss. An aspect disclosed comprises a method that determines rates of return on security investment and selects security investments based on the rates of return. An aspect disclosed comprises a system for forecasting a security loss based on a security investment.
    Type: Application
    Filed: January 18, 2010
    Publication date: July 21, 2011
    Applicant: iSIGHT PARTNERS, INC.
    Inventors: John P. Watters, Frederick Doyle