Patents by Inventor Jeffrey Guilfoyle

Jeffrey Guilfoyle has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 7954159
    Abstract: A system securing a computer network having various devices connected thereto. The system includes a security subsystem connected to the devices in the network, a master security system, and a first communication medium connected between the security subsystem and the master security system. The network devices generate event messages when under attack. The security subsystem generates multiple views, each view including a subset of the event messages generated by the devices. The security subsystem includes an event analyzer, which analyzes the event messages across multiple views to determine if any of the associated events exceeds a predetermined threshold. The master security system receives the associated events, which exceed the predetermined threshold, from the security subsystem through the first communication medium.
    Type: Grant
    Filed: May 5, 2008
    Date of Patent: May 31, 2011
    Assignee: Solutionary Inc.
    Inventors: Mike Hrabik, Jeffrey Guilfoyle, Edward Mac Beaver
  • Publication number: 20080244745
    Abstract: A system securing a computer network having various devices connected thereto. The system includes a security subsystem connected to the devices in the network, a master security system, and a first communication medium connected between the security subsystem and the master security system. The network devices generate event messages when under attack. The security subsystem generates multiple views, each view including a subset of the event messages generated by the devices. The security subsystem includes an event analyzer, which analyzes the event messages across multiple views to determine if any of the associated events exceeds a predetermined threshold. The master security system receives the associated events, which exceed the predetermined threshold, from the security subsystem through the first communication medium.
    Type: Application
    Filed: May 5, 2008
    Publication date: October 2, 2008
    Applicant: SOLUTIONARY, INC.
    Inventors: Michael HRABIK, Jeffrey GUILFOYLE, Edward MAC BEAVER
  • Patent number: 7370359
    Abstract: A method and apparatus for verifying the integrity of devices on a target network. The apparatus has security subsystems and a master security system hierarchically connected to the security subsystems via a secure link. The target network includes various intrusion detection devices, which may be part of the security subsystem. Each intrusion detection device generates a plurality of event messages when an attack on the network is detected. The security subsystem collects these event messages, correlates, and analyzes them, and performs network scanning processes. If certain events warrant additional scrutiny, they are uploaded to the master security system for review.
    Type: Grant
    Filed: March 2, 2005
    Date of Patent: May 6, 2008
    Assignee: Solutionary, Inc.
    Inventors: Michael Hrabik, Jeffrey Guilfoyle, Edward Mac Beaver
  • Publication number: 20070113283
    Abstract: A security system for a computer network that has a plurality of devices connected thereto comprises a security subsystem, a master system and a secure link. The security subsystem is connected to at least some of the devices in the network. The security subsystem is configured to monitor activities of the at least some devices on the network and detect attacks on the at least some devices. The master system monitors the integrity of the security subsystem and registers information pertaining to attacks detected by the security subsystem. The secure link is connected between the security subsystem and the master system. The master system monitors the integrity of the security subsystem and receives the information pertaining to the attacks through the secure link.
    Type: Application
    Filed: December 29, 2006
    Publication date: May 17, 2007
    Inventors: Michael Hrabik, Jeffrey Guilfoyle, Edward "Mac" Beaver
  • Patent number: 6988208
    Abstract: A method and apparatus for verifying the integrity of devices on a target network. The apparatus has security subsystems and a master security system hierarchically connected to the security subsystems via a secure link. The target network includes various intrusion detection devices, which may be part of the security subsystem. Each intrusion detection device generates a plurality of event messages when an attack on the network is detected. The security subsystem collects these event messages, correlates, and analyzes them, and performs network scanning processes. If certain events warrant additional scrutiny, they are uploaded to the master security system for review.
    Type: Grant
    Filed: July 16, 2002
    Date of Patent: January 17, 2006
    Assignee: Solutionary, Inc.
    Inventors: Michael Hrabik, Jeffrey Guilfoyle, Edward Mac Beaver
  • Publication number: 20050204404
    Abstract: A method and apparatus for verifying the integrity of devices on a target network. The apparatus has security subsystems and a master security system hierarchically connected to the security subsystems via a secure link. The target network includes various intrusion detection devices, which may be part of the security subsystem. Each intrusion detection device generates a plurality of event messages when an attack on the network is detected. The security subsystem collects these event messages, correlates, and analyzes them, and performs network scanning processes. If certain events warrant additional scrutiny, they are uploaded to the master security system for review.
    Type: Application
    Filed: March 2, 2005
    Publication date: September 15, 2005
    Applicant: Solutionary, Inc.
    Inventors: Michael Hrabik, Jeffrey Guilfoyle, Edward Mac Beaver
  • Publication number: 20020178383
    Abstract: A method and apparatus for verifying the integrity of devices on a target network. The apparatus has security subsystems and a master security system hierarchically connected to the security subsystems via a secure link. The target network includes various intrusion detection devices, which may be part of the security subsystem. Each intrusion detection device generates a plurality of event messages when an attack on the network is detected. The security subsystem collects these event messages, correlates, and analyzes them, and performs network scanning processes. If certain events warrant additional scrutiny, they are uploaded to the master security system for review.
    Type: Application
    Filed: July 16, 2002
    Publication date: November 28, 2002
    Inventors: Michael Hrabik, Jeffrey Guilfoyle, Edward Mac Beaver