Patents by Inventor Nicholas G. Feamster

Nicholas G. Feamster has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 8893300
    Abstract: Disclosed are embodiments of a security system for reducing data leaks by checking information flows between resources of a network. When an information flow is attempted between a sending resource, which can be anywhere in the network, and a receiving resource residing at a specific host within the network, a host labeler can determine whether information is allowed to flow from the sending resource to the receiving resource. The sending resource and the receiving resource can each have an applicable label, and each label can comprise zero, one, or more taints. For each taint having an active secrecy characteristic in a label of the sending resource, the host labeler can require that there be a matching taint with active secrecy characteristic in the receiving resource. If this condition is not met, the security system can block the information flow between the sending and receiving resources.
    Type: Grant
    Filed: September 20, 2011
    Date of Patent: November 18, 2014
    Assignee: Georgia Tech Research Corporation
    Inventors: Anirudh V. Ramachandran, Yogesh H. Mundada, Muhammad Mukarram Bin Tariq, Nicholas G. Feamster
  • Patent number: 8713676
    Abstract: Systems and methods are disclosed for identifying domains as malicious based on Internet-wide DNS lookup patterns. Disclosed embodiments look for variance in the servers that look up a domain and also look at the popularity growth (quantity of queries from unique addresses) of a domain after registration to identify malicious domains. Other disclosed embodiments measure the similarity of servers that query a domain and cluster domains based on the similarity of those servers. Disclosed embodiments may use such temporal and spatial lookup patterns as input to a blacklist process to more effectively and quickly blacklist domains based on their Internet-wide lookup patterns.
    Type: Grant
    Filed: May 13, 2011
    Date of Patent: April 29, 2014
    Assignees: Verisign, Inc., Georgia Tech Research Corporation
    Inventors: Ramakant Pandrangi, Nicholas G. Feamster, Shuang Hao
  • Publication number: 20120137375
    Abstract: Disclosed are embodiments of a security system for reducing data leaks by checking information flows between resources of a network. When an information flow is attempted between a sending resource, which can be anywhere in the network, and a receiving resource residing at a specific host within the network, a host labeler can determine whether information is allowed to flow from the sending resource to the receiving resource. The sending resource and the receiving resource can each have an applicable label, and each label can comprise zero, one, or more taints. For each taint having an active secrecy characteristic in a label of the sending resource, the host labeler can require that there be a matching taint with active secrecy characteristic in the receiving resource. If this condition is not met, the security system can block the information flow between the sending and receiving resources.
    Type: Application
    Filed: September 20, 2011
    Publication date: May 31, 2012
    Applicant: Georgia Tech Research Corporation
    Inventors: Anirudh V. RAMACHANDRAN, Yogesh H. MUNDADA, Muhammad Mukarran BIN TARIQ, Nicholas G. FEAMSTER
  • Publication number: 20110283357
    Abstract: Systems and methods are disclosed for identifying domains as malicious based on Internet-wide DNS lookup patterns. Disclosed embodiments look for variance in the servers that look up a domain and also look at the popularity growth (quantity of queries from unique addresses) of a domain after registration to identify malicious domains. Other disclosed embodiments measure the similarity of servers that query a domain and cluster domains based on the similarity of those servers. Disclosed embodiments may use such temporal and spatial lookup patterns as input to a blacklist process to more effectively and quickly blacklist domains based on their Internet-wide lookup patterns.
    Type: Application
    Filed: May 13, 2011
    Publication date: November 17, 2011
    Inventors: Ramakant PANDRANGI, Nicholas G. Feamster, Shuang Hao
  • Patent number: 4850245
    Abstract: An extender arm for a bicycle crank arm consists of a generally cylindrical structure suitable for being slidably mounted on the crank arm of the bicycle. The distal end of the extender includes an opening for the mounting of a bicycle pedal. The extender arm contains at least one opening in its side for receipt of a bolt or fastener which will extend through the extender arm and into the opening at the end of the crank arm for receipt of a pedal. In one embodiment, the extender also includes a set screw at the proximal end opposite the distal end on which the pedal is mounted for stabilizing the extender arm on the crank arm.
    Type: Grant
    Filed: June 19, 1987
    Date of Patent: July 25, 1989
    Inventors: Nicholas G. Feamster, Robert S. Feamster