Patents by Inventor Matthew Edwin Carothers

Matthew Edwin Carothers has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20240144282
    Abstract: Devices, systems, and methods are provided for performing secured analytics using encrypted data. The method may include receiving first data and second data, the first data and the second data being homomorphically encrypted, the first data associated with a first type of data, and the second data associated with a second type of data. The method may include retrieving third data associated with the first type of data, and retrieving fourth data associated with the second type of data. The method may include determining a first proximity between the first data and the third data, and determining a second proximity between the second data and the fourth data. The method may include determining, based on the first proximity and the second proximity, a risk score, and determining, based on the risk score, a fraudulent action associated with the first data and the second data.
    Type: Application
    Filed: January 8, 2024
    Publication date: May 2, 2024
    Applicant: Cox Communications, Inc.
    Inventors: Jignesh Patel, Harry Tang, Matthew Edwin Carothers
  • Patent number: 11907952
    Abstract: Devices, systems, and methods are provided for performing secured analytics using encrypted data. The method may include receiving first data and second data, the first data and the second data being homomorphically encrypted, the first data associated with a first type of data, and the second data associated with a second type of data. The method may include retrieving third data associated with the first type of data, and retrieving fourth data associated with the second type of data. The method may include determining a first proximity between the first data and the third data, and determining a second proximity between the second data and the fourth data. The method may include determining, based on the first proximity and the second proximity, a risk score, and determining, based on the risk score, a fraudulent action associated with the first data and the second data.
    Type: Grant
    Filed: March 11, 2020
    Date of Patent: February 20, 2024
    Assignee: Cox Communications, Inc.
    Inventors: Jignesh Patel, Harry Tang, Matthew Edwin Carothers
  • Patent number: 11645414
    Abstract: Systems, methods, and computer readable media for providing a streamlined, comprehensive data privacy opt in and opt out solution. Data privacy laws, also known as data protection laws or consumer privacy laws, prohibit the disclosure or misuse of information held on private individuals. A first device may receive a request from a second device, the request associated with a user. The first device may determine, and based on the user, a privacy regulation. The device may determine a setting associated with the privacy regulation. The device may send, to the second device, the setting.
    Type: Grant
    Filed: August 2, 2019
    Date of Patent: May 9, 2023
    Assignee: COX COMMUNICATIONS, INC.
    Inventors: Len Barlik, William Bayless Bracker, Matthew Edwin Carothers, Donald W. Johnson, Michael J. Pacifico, Jemin Thakkar, Christian Ulf Welin
  • Publication number: 20200294056
    Abstract: Devices, systems, and methods are provided for performing secured analytics using encrypted data. The method may include receiving first data and second data, the first data and the second data being homomorphically encrypted, the first data associated with a first type of data, and the second data associated with a second type of data. The method may include retrieving third data associated with the first type of data, and retrieving fourth data associated with the second type of data. The method may include determining a first proximity between the first data and the third data, and determining a second proximity between the second data and the fourth data. The method may include determining, based on the first proximity and the second proximity, a risk score, and determining, based on the risk score, a fraudulent action associated with the first data and the second data.
    Type: Application
    Filed: March 11, 2020
    Publication date: September 17, 2020
    Applicant: Cox Communications, Inc.
    Inventors: Jignesh Patel, Harry Tang, Matthew Edwin Carothers
  • Publication number: 20200159955
    Abstract: Systems, methods, and computer readable media for providing a streamlined, comprehensive data privacy opt in and opt out solution. Data privacy laws, also known as data protection laws or consumer privacy laws, prohibit the disclosure or misuse of information held on private individuals. A first device may receive a request from a second device, the request associated with a user. The first device may determine, and based on the user, a privacy regulation. The device may determine a setting associated with the privacy regulation. The device may send, to the second device, the setting.
    Type: Application
    Filed: August 2, 2019
    Publication date: May 21, 2020
    Applicant: Cox Communications, Inc.
    Inventors: Len Barlik, William Bayless Bracker, Matthew Edwin Carothers, Donald W. Johnson, Michael J. Pacifico, Jemin Thakkar, Christian Ulf Welin
  • Publication number: 20190098051
    Abstract: Virtual honeypots methods and systems disclosed herein route all IP space of an ISP to a Darknet server as a default. When an IP address is used, it is assigned to a different server. So any IP address left on the Darknet server is an unassigned IP address. All traffic that accesses the Darknet server (the IP unassigned addresses assigned to the Darknet server as a default) is logged. Because those IP addresses are unused, it can be assumed that any traffic that hits them is the result of malicious activity. If malware is scanning the whole internet trying to spread itself, the malware will eventually access the Darknet server with the unassigned IPs.
    Type: Application
    Filed: September 27, 2017
    Publication date: March 28, 2019
    Applicant: COX COMMUNICATIONS, INC.
    Inventor: Matthew Edwin Carothers
  • Publication number: 20180351977
    Abstract: Example embodiments of the systems and methods of malicious domain identification disclosed herein considers a first group of users. The first group of users has traffic including some traffic with malicious domains. A second group of users is then selected with traffic that is known to be uninfected, and the common domains are determined. The second group of users, who are known to be uninfected users, are accessing some of the same domains as the first group, among others, but are not accessing the malicious domains. Traffic from the second group of users will have the same commonalities between each other as the malicious domain does with the second group. The common domains between the first and second groups are determined and eliminated. When the common domains are removed from the traffic of the first group of users, malicious domain list remains.
    Type: Application
    Filed: June 2, 2017
    Publication date: December 6, 2018
    Applicant: COX COMMUNICATIONS, INC.
    Inventor: Matthew Edwin Carothers
  • Patent number: 8811407
    Abstract: A system for weighted communication of data packets via a data communication network. Data packets from sending devices are selectively transmitted in the upstream direction to recipient devices through the application of weights, or weight factors, which determine the number of data packets from each sending device transmitted upstream relative to the number of data packets from other sending devices during a round robin cycle of such devices. Data packets for delivery to receiving devices are selectively transmitted in the downstream direction to the receiving devices using the application of weights, or weight factors, which determine the number of data packets for each receiving device transmitted downstream relative to the number of data packets for other receiving devices during a round robin cycle of such devices. Weights may be associated with the service tier subscribed to with a communication service provider by an owner/user of a sending and receiving device.
    Type: Grant
    Filed: November 30, 2009
    Date of Patent: August 19, 2014
    Assignee: Cox Communications, Inc.
    Inventors: Matthew Edwin Carothers, Daniel Seth Hogan, Elissa Kahalelauniu Babayigit
  • Patent number: 8763117
    Abstract: To circumvent being blacklisted by an ISP, some viruses use a domain name generator algorithm or a domain generator algorithm (DGA). In an example, the DGA may use the current date and time to generate a random domain name based on the date. So for a given date, the botnet registers a particular domain in order to control the Trojan horse virus. The domain name that the botnet uses typically changes every day, which helps circumvent blacklisting. To counteract that, the disclosed systems and methods of DNS greylisting place a domain name in a grey list for a time period, for example a day, that the domain is resolved by the ISP. The first time the ISP experiences a customer trying to contact a particular domain, the ISP prevents the domain from resolving. After the time period (for example, 24 hours) expires, the domain is allowed to resolve normally.
    Type: Grant
    Filed: March 2, 2012
    Date of Patent: June 24, 2014
    Assignee: Cox Communications, Inc.
    Inventor: Matthew Edwin Carothers
  • Patent number: 8656052
    Abstract: A private customer IP address is mapped to a public NAT address using a repeatable, reversible algorithm. A given private IP address must always map to the same public IP address and a fixed range of source ports. In the mapped address translation (MAT) implementation, private IP addresses are mapped to public IP/port ranges by borrowing bits from the 16 bit port number.
    Type: Grant
    Filed: May 16, 2011
    Date of Patent: February 18, 2014
    Assignee: Cox Communications, Inc.
    Inventor: Matthew Edwin Carothers
  • Publication number: 20130232574
    Abstract: To circumvent being blacklisted by an ISP, some viruses use a domain name generator algorithm or a domain generator algorithm (DGA). In an example, the DGA may use the current date and time to generate a random domain name based on the date. So for a given date, the botnet registers a particular domain in order to control the Trojan horse virus. The domain name that the botnet uses typically changes every day, which helps circumvent blacklisting. To counteract that, the disclosed systems and methods of DNS greylisting place a domain name in a grey list for a time period, for example a day, that the domain is resolved by the ISP. The first time the ISP experiences a customer trying to contact a particular domain, the ISP prevents the domain from resolving. After the time period (for example, 24 hours) expires, the domain is allowed to resolve normally.
    Type: Application
    Filed: March 2, 2012
    Publication date: September 5, 2013
    Applicant: COX COMMUNICATIONS, INC.
    Inventor: Matthew Edwin Carothers
  • Publication number: 20120297089
    Abstract: A private customer IP address is mapped to a public NAT address using a repeatable, reversible algorithm. A given private IP address must always map to the same public IP address and a fixed range of source ports. In the mapped address translation (MAT) implementation, private IP addresses are mapped to public IP/port ranges by borrowing bits from the 16 bit port number.
    Type: Application
    Filed: May 16, 2011
    Publication date: November 22, 2012
    Applicant: COX COMMUNICATIONS, INC.
    Inventor: Matthew Edwin Carothers