Patents by Inventor James Deerman

James Deerman has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 9401932
    Abstract: A device and method for providing forensic data in network activity indicative of the presence of malware. A distributed set of network-based sensors operates within an enterprise network in cooperation with a centralized analytics and correlation engine that correlates detected events across the sensors to detect malicious activity on a monitored network which may include using a multi-tiered or Rete net rule set or engine. When malicious activity is detected upon the satisfaction of a predetermined set of conditions, the invention traces the activity to a host responsible for the activity for further action.
    Type: Grant
    Filed: January 3, 2014
    Date of Patent: July 26, 2016
    Assignee: CYBER ADAPT, INC.
    Inventors: James Deerman, Bill Joll, Craig Lanning, Keith Rhodes
  • Publication number: 20140245374
    Abstract: A device and method for providing forensic data in network activity indicative of the presence of malware. A distributed set of network-based sensors operates within an enterprise network in cooperation with a centralized analytics and correlation engine that correlates detected events across the sensors to detect malicious activity on a monitored network which may include using a multi-tiered or Rete net rule set or engine. When malicious activity is detected upon the satisfaction of a predetermined set of conditions, the invention traces the activity to a host responsible for the activity for further action.
    Type: Application
    Filed: January 3, 2014
    Publication date: August 28, 2014
    Inventors: James Deerman, Bill Joll, Craig Lanning, Keith Rhodes
  • Publication number: 20140157405
    Abstract: A scalable cyber-security system, method and architecture for the identification of malware and malicious behavior in a computer network. Host flow, host port usage, host information and network data at the application, transport and network layers are aggregated from within the network and correlated to identify a network behavior such as the presence of malicious code.
    Type: Application
    Filed: December 4, 2012
    Publication date: June 5, 2014
    Inventors: Bill Joll, Keith Rhodes, James Deerman
  • Publication number: 20060168266
    Abstract: An apparatus and method are described that provide signaling mediation between different protocols, or different implementations of the same protocol, at network boundaries for voice over Internet Protocol telephony. The signaling mediation device translates control messages from one protocol, or implementation of a protocol, into another protocol, or implementation of a protocol based on the type of networks to which the signaling mediation device is connected. The signaling mediation device also includes profiles for the networks to which it is connected based on the type of equipment in those networks. The profiles provide additional mapping and translation based on implementation specific characteristics of the network equipment connected to the signaling mediation device.
    Type: Application
    Filed: November 20, 2004
    Publication date: July 27, 2006
    Applicant: tekVizion, Inc.
    Inventors: Leland Phillips, Sachin Vengurlekar, James Deerman, Miguel Garcia
  • Publication number: 20060085548
    Abstract: An apparatus and method for traversing a network address translation/firewall device to maintain a registration between first and second devices separated by the firewall device are provided. In one example, the method includes intercepting a registration message from the first device to the second device. A determination is made based on a first timeout period defined by the second device as to whether it is time to renew the first device's registration. If it is time to renew the first device's registration, the registration message is forwarded to the second device. A response message that includes the first timeout period is intercepted, and the first timeout period is replaced with a second timeout period based on a binding lifetime of the firewall device before forwarding the response message to the first device.
    Type: Application
    Filed: October 18, 2004
    Publication date: April 20, 2006
    Applicant: Netrake Corporation
    Inventors: Robert Maher, Aswinkumar Rana, Milton Lie, James Deerman
  • Publication number: 20060013211
    Abstract: A method and system are described for resolving problems created by implementing multiple networks using private IP addresses and layer two tunneling protocols is described. A network processing system is operable to map flows from private IP addresses and ports on layer two tunneling protocol networks to public IP addresses and ports using the private IP addresses and ports and identifiers for the layer two tunneling protocol network. The network processing system uses its own public IP addresses and ports to anchor the traffic from the private network and performs the required mapping to pass traffic between the public and private networks.
    Type: Application
    Filed: July 14, 2004
    Publication date: January 19, 2006
    Inventors: James Deerman, Milton Lie, Aswinkumar Rana, Robert Maher
  • Publication number: 20050050171
    Abstract: A redundancy architecture is described for network processing systems which allows the network to recover from failure of a network processing system without interruption in service. The redundancy architecture allows network processing systems that use state information to associate network traffic into discrete flows, to provide system level redundancy to prevent service outages, or loss of network traffic resulting from a failure in any single network processing system. The redundancy architecture includes an out-of-band network link between the redundant network processing systems. The out-of-band network link allows the network processing systems to exchange state and other data as necessary.
    Type: Application
    Filed: August 29, 2003
    Publication date: March 3, 2005
    Inventors: James Deerman, Ramanamurthy Dantu, Aswinkumar Rana, Keung Yue