Patents by Inventor Kenny Tidwell

Kenny Tidwell has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 9100422
    Abstract: Different network segments can have overlapping address spaces. In one embodiment, the present invention includes a distributed agent of a security system receiving a security event from a network device monitored by the agent. In one embodiment, the agent normalizes the security event into an event schema including one or more zone fields. In one embodiment, the agent also determines one or more zones associated with the received security event, the one or more zones each describing a part of a network, and populates the one or more zone fields using the determined one or more zones.
    Type: Grant
    Filed: October 27, 2004
    Date of Patent: August 4, 2015
    Assignee: Hewlett-Packard Development Company, L.P.
    Inventors: Kenny Tidwell, Christian Beedgen
  • Patent number: 9027120
    Abstract: A network security system having a hierarchical configuration is provided. In one embodiment the present invention includes a plurality of subsystems, where each subsystem includes a plurality of distributed software agents configured to collect base security events from monitor devices, and a local manager module coupled to the plurality of distributed software agents to generate correlated events by correlating the base security events. Each subsystem can also include a filter coupled to the manager module to select which base security events are to be processed further. The selected base security events are passed to a global manager module coupled to the plurality of subsystems that generates global correlated events by correlating the base security events selected for further processing by each filter of each subsystem.
    Type: Grant
    Filed: October 10, 2003
    Date of Patent: May 5, 2015
    Assignee: Hewlett-Packard Development Company, L.P.
    Inventors: Kenny Tidwell, Christian Beedgen, Hugh S. Njemanze, Pravin S. Kothari
  • Patent number: 8528077
    Abstract: Events are received from a plurality of security devices (which may be similar or different devices, e.g., intrusion detection systems configured to monitor network traffic) and divided into a plurality of event flows. Comparing the event flows (e.g., using statistical correlation methods) then generates one or more meta-events. The received events may be divided into different event flows on the basis of the security device which generated the events. The meta-events may be generated by evaluating a perimeter defense device through comparison of the different event flows. In some cases, various ones of the security devices may be inside or outside a perimeter defined by the perimeter defense device.
    Type: Grant
    Filed: April 9, 2004
    Date of Patent: September 3, 2013
    Assignee: Hewlett-Packard Development Company, L.P.
    Inventors: Kenny Tidwell, Debabrata Dash
  • Patent number: 8065732
    Abstract: A system can be configured using configuration objects that have the ability to refer to one another. In one embodiment, the present invention includes such a system having a plurality of objects used to configure the system, each object having a uniform resource identifier (URI), and an object reference table to enable the plurality of objects to reference each other without using URIs.
    Type: Grant
    Filed: December 3, 2009
    Date of Patent: November 22, 2011
    Assignee: Hewlett-Packard Development Company, L.P.
    Inventors: Chad Ward, Ankur Lahoti, Kenny Tidwell
  • Patent number: 8015604
    Abstract: A network security system having a hierarchical configuration is provided. In one embodiment the present invention includes a plurality of subsystems, where each subsystem includes a plurality of distributed software agents configured to collect security events from monitor devices, and a local manager module coupled to the plurality of distributed software agents to generate correlated events by correlating the security events. Each of the subsystems can report the correlated events to a global manager module coupled to the plurality of subsystems, and the global manager module can correlate the correlated events from each manager module.
    Type: Grant
    Filed: October 10, 2003
    Date of Patent: September 6, 2011
    Assignee: ArcSight Inc
    Inventors: Kenny Tidwell, Christian Beedgen, Hugh S. Njemanze, Pravin S. Kothari
  • Patent number: 7647632
    Abstract: A system can be configured using configuration objects that have the ability to refer to one another. In one embodiment, the present invention includes such a system having a plurality of objects used to configure the system, each object having a uniform resource identifier (URI), and an object reference table to enable the plurality of objects to reference each other without using URIs.
    Type: Grant
    Filed: January 4, 2005
    Date of Patent: January 12, 2010
    Assignee: ArcSight, Inc.
    Inventors: Chad Ward, Ankur Lahoti, Kenny Tidwell
  • Patent number: 7509677
    Abstract: Patterns can be discovered in security events collected by a network security system. In one embodiment, the present invention includes collecting and storing security events from a variety of monitor devices. In one embodiment, a subset of the stored security events is provided to a manager as an event stream. In one embodiment, the present invention further includes the manager discovering one or more previously unknown event patterns in the event stream.
    Type: Grant
    Filed: May 4, 2004
    Date of Patent: March 24, 2009
    Assignee: ArcSight, Inc.
    Inventors: Kumar Saurabh, Kenny Tidwell
  • Publication number: 20090064333
    Abstract: Patterns can be discovered in events collected by a network system. In one embodiment, the present invention includes collecting and storing events from a variety of monitor devices. In one embodiment, a subset of the stored events is provided to a manager as an event stream. In one embodiment, the present invention further includes the manager discovering one or more previously unknown event patterns in the event stream.
    Type: Application
    Filed: October 1, 2008
    Publication date: March 5, 2009
    Applicant: ArcSight, Inc.
    Inventors: Kumar Saurabh, Kenny Tidwell
  • Publication number: 20080104046
    Abstract: A session table includes one or more records, where each record represents a session. Session record information is stored in various fields, such as key fields, value fields, and timestamp fields. Session information is described as keys and values in order to support query/lookup operations. A session table is associated with a filter, which describes a set of keys that can be used for records in that table. A session table is populated using data contained in security information/events. Rules are created to identify events related to session information, extract the session information, and use the session information to modify a session table. A session table is partitioned so that the number of records in each session table partition is decreased. A session table is processed periodically so that active sessions are moved to the current partition.
    Type: Application
    Filed: October 24, 2007
    Publication date: May 1, 2008
    Applicant: ARCSIGHT, INC.
    Inventors: Anurag Singla, Kumar Saurabh, Kenny Tidwell
  • Patent number: 7260844
    Abstract: A network security system is provided that receives information from various sensors and can analyse the received information. In one embodiment of the present invention, such a system receives a security event from a software agent. The received security event includes a target address and an event signature, as generated by the software agent. The event signature can be used to determine a set of vulnerabilities exploited by the received security event, and the target address can be used to identify a target asset within the network. By accessing a model of the target asset, a set of vulnerabilities exposed by the target asset can be retrieved. Then, a threat can be detected by comparing the set of vulnerabilities exploited by the security event to the set of vulnerabilities exposed by the target asset.
    Type: Grant
    Filed: September 3, 2003
    Date of Patent: August 21, 2007
    Assignee: ArcSight, Inc.
    Inventors: Kenny Tidwell, Kumar Saurabh, Debabrata Dash, Hugh S. Njemanze, Pravin S. Kothari
  • Publication number: 20050251860
    Abstract: Patterns can be discovered in security events collected by a network security system. In one embodiment, the present invention includes collecting and storing security events from a variety of monitor devices. In one embodiment, a subset of the stored security events is provided to a manager as an event stream. In one embodiment, the present invention further includes the manager discovering one or more previously unknown event patterns in the event stream.
    Type: Application
    Filed: May 4, 2004
    Publication date: November 10, 2005
    Inventors: Kumar Saurabh, Kenny Tidwell