Patents by Inventor Jeffrey Bickford

Jeffrey Bickford has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20210185071
    Abstract: A method, computer-readable medium, and apparatus for classifying mobile traffic for securing a network or a mobile user endpoint device are disclosed. For example, a method may include a processor for classifying mobile network traffic using a probabilistic model for a plurality of mobile software applications based on a distribution of domain names, detecting an anomaly associated with a mobile software application of the plurality of mobile software applications, and performing a remedial action to address the anomaly.
    Type: Application
    Filed: March 1, 2021
    Publication date: June 17, 2021
    Inventors: Jeffrey Bickford, Wei Wang
  • Patent number: 11038906
    Abstract: Methods and systems for identifying threats within a network include collecting network traffic data and providing the network traffic data to a classifier configured to identify patterns within the network traffic data consistent with malicious computing devices. The computing devices identified by the classifier are then validated to confirm whether they are, in fact, malicious. In one implementation, such validation is accomplished by interrogating suspected malicious computing devices with messages according to a particular communication protocol and determining whether corresponding responses received form the malicious computing devices are similarly in accordance with the communication protocol. In certain implementations, after identification and validation of a malicious computing device, an emulated computing device is used to continue communication with the malicious computing device and to log characteristics of such communications to further train the classifier.
    Type: Grant
    Filed: February 2, 2018
    Date of Patent: June 15, 2021
    Assignee: Level 3 Communications, LLC
    Inventors: Skyler J. Bingham, Thomas B. Boatwright, Jeffrey Bickford
  • Patent number: 10938844
    Abstract: A method, computer-readable medium, and apparatus for classifying mobile traffic for securing a network or a mobile user endpoint device are disclosed. For example, a method may include a processor for classifying mobile network traffic using a probabilistic model for a plurality of mobile software applications based on a distribution of domain names, detecting an anomaly associated with a mobile software application of the plurality of mobile software applications, and performing a remedial action to address the anomaly.
    Type: Grant
    Filed: July 22, 2016
    Date of Patent: March 2, 2021
    Assignee: AT&T INTELLECTUAL PROPERTY I, L.P.
    Inventors: Jeffrey Bickford, Wei Wang
  • Publication number: 20180027416
    Abstract: A method, computer-readable medium, and apparatus for classifying mobile traffic for securing a network or a mobile user endpoint device are disclosed. For example, a method may include a processor for classifying mobile network traffic using a probabilistic model for a plurality of mobile software applications based on a distribution of domain names, detecting an anomaly associated with a mobile software application of the plurality of mobile software applications, and performing a remedial action to address the anomaly.
    Type: Application
    Filed: July 22, 2016
    Publication date: January 25, 2018
    Inventors: JEFFREY BICKFORD, Wei Wang
  • Patent number: 9773068
    Abstract: A method, non-transitory computer readable medium and apparatus for deriving trustful metadata for an application are disclosed. For example, the method crawls online for the application, analyzes the application to determine a function of the application, and generates trustful meta-data for the application based upon the function of the application.
    Type: Grant
    Filed: September 19, 2016
    Date of Patent: September 26, 2017
    Assignee: AT&T INTELLECTUAL PROPERTY I, L.P.
    Inventors: Andrea G. Forte, Baris Coskun, Qi Shen, Ilona Murynets, Jeffrey Bickford, Mikhail Istomin, Paul Giura, Roger Piqueras Jover, Ramesh Subbaraman, Suhas Mathur, Wei Wang
  • Publication number: 20170004217
    Abstract: A method, non-transitory computer readable medium and apparatus for deriving trustful metadata for an application are disclosed. For example, the method crawls online for the application, analyzes the application to determine a function of the application, and generates trustful meta-data for the application based upon the function of the application.
    Type: Application
    Filed: September 19, 2016
    Publication date: January 5, 2017
    Inventors: ANDREA G. FORTE, Baris Coskun, Qi Shen, Ilona Murynets, Jeffrey Bickford, Mikhail lstomin, Paul Giura, Roger Piqueras Jover, Ramesh Subbaraman, Suhas Mathur, Wei Wang
  • Patent number: 9449104
    Abstract: A method, non-transitory computer readable medium and apparatus for deriving trustful metadata for an application are disclosed. For example, the method crawls online for the application, analyzes the application to determine a function of the application, and generates trustful meta-data for the application based upon the function of the application.
    Type: Grant
    Filed: July 2, 2012
    Date of Patent: September 20, 2016
    Assignee: AT&T Intellectual Property I, L.P.
    Inventors: Andrea G. Forte, Baris Coskun, Qi Shen, Ilona Murynets, Jeffrey Bickford, Mikhail Istomin, Paul Giura, Roger Piqueras Jover, Ramesh Subbaraman, Suhas Mathur, Wei Wang
  • Patent number: 9392001
    Abstract: Concepts and technologies are disclosed herein for multilayered deception for intrusion detection. According to various embodiments of the concepts and technologies disclosed herein, a multilayer deception system includes honey servers, honey files and folders, honey databases, and/or honey computers. A multilayer deception system controller generates honey activity between the honey entities and exposes a honey profile with contact information associated with a honey user. Contact directed at the honey user and/or activity at any of the honey entities can trigger alarms and/or indicate an attack, and can be analyzed to prevent future attacks.
    Type: Grant
    Filed: May 21, 2014
    Date of Patent: July 12, 2016
    Assignee: AT&T Intellectual Property I, L.P.
    Inventors: Wei Wang, Qi Shen, Andrea Forte, Jeffrey Bickford
  • Publication number: 20140259172
    Abstract: Concepts and technologies are disclosed herein for multilayered deception for intrusion detection. According to various embodiments of the concepts and technologies disclosed herein, a multilayer deception system includes honey servers, honey files and folders, honey databases, and/or honey computers. A multilayer deception system controller generates honey activity between the honey entities and exposes a honey profile with contact information associated with a honey user. Contact directed at the honey user and/or activity at any of the honey entities can trigger alarms and/or indicate an attack, and can be analyzed to prevent future attacks.
    Type: Application
    Filed: May 21, 2014
    Publication date: September 11, 2014
    Applicant: AT&T Intellectual Property I, L.P.
    Inventors: Wei Wang, Qi Shen, Andrea Forte, Jeffrey Bickford
  • Publication number: 20140006418
    Abstract: A method, non-transitory computer readable medium and apparatus for ranking an application are disclosed. For example, the method collects meta-data from the application, determines a reputation of a developer of the application using the meta-data, and computes an initial ranking of the application based upon the reputation of the developer.
    Type: Application
    Filed: July 2, 2012
    Publication date: January 2, 2014
    Inventors: ANDREA G. FORTE, BARIS COSKUN, QI SHEN, ILONA MURYNETS, JEFFREY BICKFORD, MIKHAIL ISTOMIN, PAUL GIURA, ROGER PIQUERAS JOVER, RAMESH SUBBARAMAN, SUHAS MATHUR, WEI WANG
  • Publication number: 20140006440
    Abstract: A method, non-transitory computer readable medium and apparatus for searching for an application are disclosed. For example, the method receives information regarding a context of a user, receives a search request for the application, finds the application that has context information that matches the context of the user, and provides a search result in response to the search request that includes the application that has the context information that matches the context of the user.
    Type: Application
    Filed: July 2, 2012
    Publication date: January 2, 2014
    Inventors: Andrea G. Forte, Baris Coskun, Qi Shen, Ilona Murynets, Jeffrey Bickford, Mikhail Istomin, Paul Giura, Roger Piqueras Jover, Ramesh Subbaraman, Suhas Mathur, Wei Wang
  • Publication number: 20140006375
    Abstract: A method, non-transitory computer readable medium and apparatus for fingerprinting applications are disclosed. For example, the method analyzes an application binary of the application, extracts an invariant feature from the application binary, generates a signature from the invariant feature, and compares the signature of the application to a second signature of a second application to determine if the application and the second application are similar.
    Type: Application
    Filed: July 2, 2012
    Publication date: January 2, 2014
    Inventors: Andrea G. Forte, Baris Coskun, Qi Shen, Ilona Murynets, Jeffrey Bickford, Mikhail Istomin, Paul Giura, Roger Piqueras Jover, Ramesh Subbaraman, Suhas Mathur, Wei Wang
  • Publication number: 20140006374
    Abstract: A method, non-transitory computer readable medium and apparatus for deriving trustful metadata for an application are disclosed. For example, the method crawls online for the application, analyzes the application to determine a function of the application, and generates trustful meta-data for the application based upon the function of the application.
    Type: Application
    Filed: July 2, 2012
    Publication date: January 2, 2014
    Inventors: ANDREA G. FORTE, Baris Coskun, Qi Shen, Ilona Murynets, Jeffrey Bickford, Mikhail Istomin, Paul Giura, Roger Piqueras Jover, Ramesh Subbaraman, Suhas Mathur, Wei Wang
  • Patent number: 8566935
    Abstract: The subject disclosure presents a novel technique for balancing the tradeoff between security monitoring and energy consumption on mobile devices. Security/energy tradeoffs for host-based detectors focusing on rootkits are analyzed along two axes: a scanning frequency, and a surface of attack. Experimental results are applied to a hypervisor-based framework, and a sweet spot is identified to minimize both energy consumption and a window of vulnerability for critical operating system objects such as code pages and kernel data.
    Type: Grant
    Filed: May 12, 2011
    Date of Patent: October 22, 2013
    Assignee: AT&T Intellectual Property I, L.P.
    Inventors: Horacio Andres Lagar-Cavilla, Jeffrey Bickford, Vinod Ganapathy, Liviu Iftode, Alexander Varshavsky
  • Publication number: 20120291126
    Abstract: The subject disclosure presents a novel technique for balancing the tradeoff between security monitoring and energy consumption on mobile devices. Security/energy tradeoffs for host-based detectors focusing on rootkits are analyzed along two axes: a scanning frequency, and a surface of attack. Experimental results are applied to a hypervisor-based framework, and a sweet spot is identified to minimize both energy consumption and a window of vulnerability for critical operating system objects such as code pages and kernel data.
    Type: Application
    Filed: May 12, 2011
    Publication date: November 15, 2012
    Applicants: RUTGERS, THE STATE UNIVERSITY OF NEW JERSEY, AT&T INTELLECTUAL PROPERTY I, L.P.
    Inventors: Horacio Andres Lagar-Cavilla, Jeffrey Bickford, Vinod Ganapathy, Liviu Iftode, Alexander Varshavsky