Patents by Inventor Patrick Stach

Patrick Stach has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 10606965
    Abstract: A system, method and media are shown for emulating potentially malicious code involving emulating a first ring of an operating system, emulating a second ring of the operating system, where the second ring has greater access to system resources than the first ring and where the first and second rings are separately emulated, executing a code payload in the emulated first ring, checking the behavior of the executing code payload for suspect behavior, and identifying the code payload as malicious code if suspect behavior is detected. Some examples emulate the second ring by operating system or microarchitecture functionality such that the second ring emulation returns results to the executing code payload, but does not actually perform the functionality in a host platform. Some examples execute the code payload in the emulated first shell at one or more offsets.
    Type: Grant
    Filed: July 20, 2015
    Date of Patent: March 31, 2020
    Assignee: LEVIATHAN SECURITY GROUP, INC.
    Inventors: Falcon Momot, Mikhail Davidov, Patrick Stach, Darren Kemp
  • Patent number: 10242190
    Abstract: Examples of systems, methods and media are shown for iteratively emulating potentially malicious code involving, for each offset of a microarchitecture for the code, emulating a first ring of an operating system, executing a segment of code in the emulated first ring, checking the behavior of the executing code for suspect behavior, and identifying the executing code as malicious code if suspect behavior is detected. Some examples include emulating a second ring of the operating system having a higher level of privilege than the first ring, such that the second ring emulation returns results to the executing code segment, but does not actually perform the functionality in a host platform.
    Type: Grant
    Filed: July 23, 2015
    Date of Patent: March 26, 2019
    Assignee: LEVIATHAN SECURITY GROUP, INC.
    Inventors: Mikhail Davidov, Patrick Stach
  • Publication number: 20160196425
    Abstract: Examples of systems, methods and media are shown for iteratively emulating potentially malicious code involving, for each offset of a microarchitecture for the code, emulating a first ring of an operating system, executing a segment of code in the emulated first ring, checking the behavior of the executing code for suspect behavior, and identifying the executing code as malicious code if suspect behavior is detected. Some examples include emulating a second ring of the operating system having a higher level of privilege than the first ring, such that the second ring emulation returns results to the executing code segment, but does not actually perform the functionality in a host platform.
    Type: Application
    Filed: July 23, 2015
    Publication date: July 7, 2016
    Applicant: LEVIATHAN, INC.
    Inventors: Mikhail Davidov, Patrick Stach
  • Publication number: 20160196368
    Abstract: A system, method and media are shown for emulating potentially malicious code involving emulating a first ring of an operating system, emulating a second ring of the operating system, where the second ring has greater access to system resources than the first ring and where the first and second rings are separately emulated, executing a code payload in the emulated first ring, checking the behavior of the executing code payload for suspect behavior, and identifying the code payload as malicious code if suspect behavior is detected. Some examples emulate the second ring by operating system or microarchitecture functionality such that the second ring emulation returns results to the executing code payload, but does not actually perform the functionality in a host platform. Some examples execute the code payload in the emulated first shell at one or more offsets.
    Type: Application
    Filed: July 20, 2015
    Publication date: July 7, 2016
    Applicant: Leviathan, Inc.
    Inventors: Falcon Momot, Mikhail Davidov, Patrick Stach, Darren Kemp
  • Patent number: 8650391
    Abstract: The invention is directed to a system for use with a first device in communication with a second device. The system includes a storage medium that is connectable with the first device, a hardened, stand alone, web browser stored on the storage medium, and client authentication data. The web browser uses the client authentication data to facilitate secure communication between the first device and the second device, and the first device communicates with a third device that provides configuration data that includes one or more approved addresses.
    Type: Grant
    Filed: November 11, 2009
    Date of Patent: February 11, 2014
    Assignee: Trustate International Inc.
    Inventors: Ramsey Jallad, Patrick Stach, John Terrill, Gary Bartholomew, Lyndon Paul Wright, Paul Anton Sop
  • Publication number: 20110119484
    Abstract: The invention is directed to a system for use with a first device in communication with a second device. The system includes a storage medium that is connectable with the first device, a hardened, stand alone, web browser stored on the storage medium, and client authentication data. The web browser uses the client authentication data to facilitate secure communication between the first device and the second device, and the first device communicates with a third device that provides configuration data that includes one or more approved addresses.
    Type: Application
    Filed: November 11, 2009
    Publication date: May 19, 2011
    Inventors: Ramsey Jallad, Patrick Stach, John Terrill, Gary Bartholomew, Lyndon Paul Wright, Paul Anton Sop
  • Patent number: 7624440
    Abstract: The invention is directed to a secure data communication system and method for use in connection with a potentially untrusted host computer. The system includes a storage medium that is connectable with the potentially untrusted host computer. The system also includes a hardened, stand alone, browser stored on the storage medium. The system can also include client authentication data and/or add-on program data. The browser can use the client authentication data to facilitate secure communications. The system can include has a loader that performs an integrity check of the browser and/or data files and launches the browser only if the browser and associated data files pass the integrity check. The client authentication data can be stored on the storage medium. The storage medium can be read-only, read-write or a combination thereof.
    Type: Grant
    Filed: July 31, 2007
    Date of Patent: November 24, 2009
    Assignee: EMT LLC
    Inventors: Ramsey Jallad, Patrick Stach, John Terrill
  • Publication number: 20080034210
    Abstract: The invention is directed to a secure data communication system and method for use in connection with a potentially untrusted host computer. The system includes a storage medium that is connectable with the potentially untrusted host computer. The system also includes a hardened, stand alone, browser stored on the storage medium. The system can also include client authentication data and/or add-on program data. The browser can use the client authentication data to facilitate secure communications. The system can include has a loader that performs an integrity check of the browser and/or data files and launches the browser only if the browser and associated data files pass the integrity check. The client authentication data can be stored on the storage medium. The storage medium can be read-only, read-write or a combination thereof.
    Type: Application
    Filed: July 31, 2007
    Publication date: February 7, 2008
    Inventors: Ramsey Jallad, Patrick Stach, John Terrill