Patents by Inventor Peter Ashley

Peter Ashley has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20240132198
    Abstract: A retainer suitable for use on an aircraft is disclosed. The retainer comprises a first retainer part and a second retainer part. The first retainer part comprises a catch and a damper; in which the catch comprises one or more magnetic elements. The damper comprises a damping material, the damping material damps shock impulses; and the catch is supported on the damper.
    Type: Application
    Filed: August 29, 2023
    Publication date: April 25, 2024
    Applicant: B/E Aerospace (UK) Limited
    Inventors: Daniel H. Wall, Peter Ashley Griffiths, Rafal Hubert Chylinski
  • Patent number: 9830458
    Abstract: Techniques are presented herein for classifying a variety of enterprise computing resources based on asset characteristics. In particular, a computing asset, e.g., a server, may be classified based on any digital certificates provisioned on that server. That is, the properties of a digital certificate may be used to determine a measure of business value or importance of a server (or data hosted on that server). Once the computing asset has been classified, a monitoring system may use the assigned classifications to prioritize security incidents for review.
    Type: Grant
    Filed: April 25, 2014
    Date of Patent: November 28, 2017
    Assignee: Symantec Corporation
    Inventors: Kevin McBride, Quentin Liu, Hari Veladanda, George Tomic, Peter Ashley
  • Patent number: 9736178
    Abstract: The disclosed computer-implemented method for detecting suspicious Internet addresses may include (1) monitoring Internet communications of an entity (e.g., an organization or individual), (2) compiling an Internet-address history for the entity that includes one or more Internet addresses involved in the Internet communications of the entity, (3) detecting, after compiling the Internet-address history for the entity, an additional Internet address that may be used in future Internet communications involving the entity, (4) computing a similarity metric between the additional Internet address and at least one Internet-address in the Internet-address history, (5) determining that the similarity metric indicates that the additional Internet address is suspicious, and (6) performing a security action in response to determining that the similarity metric indicates that the additional Internet address is suspicious. Various other methods, systems, and computer-readable media are also disclosed.
    Type: Grant
    Filed: April 5, 2016
    Date of Patent: August 15, 2017
    Assignee: Symantec Corporation
    Inventor: Peter Ashley
  • Patent number: 9692772
    Abstract: A method to identify machines infected by malware is provided. The method includes determining whether a universal resource locator in a network request is present in a first cache and determining whether a fully qualified domain name from the uniform resource locator is present in a second cache. The method includes evaluating a parent hostname as to suspiciousness. The method includes indicating the computing device has a likelihood of infection, responsive to one of: the universal resource locator being present in the first cache with a first indication of suspiciousness, the fully qualified domain name being present in the second cache with a second indication of suspiciousness, or the evaluating the parent hostname having a third indication of suspiciousness, wherein at least one method operation is performed by the processor. A system and computer readable media are provided.
    Type: Grant
    Filed: February 8, 2016
    Date of Patent: June 27, 2017
    Assignee: Symantec Corporation
    Inventors: Michael Hart, Darrell Kienzle, Peter Ashley
  • Patent number: 9639693
    Abstract: Techniques for detecting security vulnerabilities are disclosed. In one particular embodiment, the techniques may be realized as a method for detecting security vulnerabilities including assigning a reputation to an application, distributing the reputation to a client, receiving monitored system behavior from the client related to the client executing the application, determining whether to change the reputation of the application based on the monitored system behavior, distributing the changed reputation to the client, receiving further monitored system behavior from the client, and determining whether to generate a rule for the application based on the monitored system behavior received from the client.
    Type: Grant
    Filed: June 28, 2013
    Date of Patent: May 2, 2017
    Assignee: Symantec Corporation
    Inventors: Shireen Rivera, Peter Ashley
  • Patent number: 9501649
    Abstract: A computer-implemented method for determining potential impacts of applications on the security of computing systems may include (1) identifying an application subject to a security vulnerability assessment, (2) requesting information that identifies a potential impact of the application on a vulnerability of at least one computing system to at least one exploit associated with the application, (3) receiving the information that identifies the potential impact of the application on the vulnerability of the computing system, wherein the information may be derived at least in part from data from at least one additional computing system on which the application has previously been installed and (4) directing a determination about an installation of the application on the computing system based at least in part on the information that identifies the potential impact of the application on the vulnerability of the computing system. Various other methods, systems, and computer-readable media are also disclosed.
    Type: Grant
    Filed: March 15, 2013
    Date of Patent: November 22, 2016
    Assignee: Symantec Corporation
    Inventors: Piyush Sharma, Peter Ashley
  • Patent number: 9444829
    Abstract: A computer-implemented method for protecting computing resources based on logical data models may include (1) receiving, from a security agent, log data that specifies details of a security event detected by the security agent, (2) creating an instance of a data structure for a logical data model that describes a path cycle of a security threat, (3) populating at least one field of the data structure for the logical data model with a completed value, (4) populating at least one other field of the data structure for the logical data model with a value of incomplete based on a completed value for the other field being unavailable, and (5) performing a security action based on an analysis of the instance of the data structure for the logical data model. Various other methods, systems, and computer-readable media are also disclosed.
    Type: Grant
    Filed: July 30, 2014
    Date of Patent: September 13, 2016
    Assignee: Symantec Corporation
    Inventor: Peter Ashley
  • Patent number: 9419986
    Abstract: A method to identify machines infected by malware is provided. The method includes determining whether a universal resource locator in a network request is present in a first cache and determining whether a fully qualified domain name from the uniform resource locator is present in a second cache. The method includes evaluating a parent hostname as to suspiciousness. The method includes indicating the computing device has a likelihood of infection, responsive to one of: the universal resource locator being present in the first cache with a first indication of suspiciousness, the fully qualified domain name being present in the second cache with a second indication of suspiciousness, or the evaluating the parent hostname having a third indication of suspiciousness, wherein at least one method operation is performed by the processor. A system and computer readable media are provided.
    Type: Grant
    Filed: March 26, 2014
    Date of Patent: August 16, 2016
    Assignee: Symantec Corporation
    Inventors: Michael Hart, Darrell Kienzle, Peter Ashley
  • Patent number: 9418222
    Abstract: Techniques for detecting advanced security threats are disclosed. In one particular embodiment, the techniques may be realized as a method for detecting a security threat including generating a resource at a client, implementing the resource on the client, monitoring system behavior of the client having the resource implemented thereon, determining whether a security event involving the implemented resource has occurred based on the monitored system behavior, and generating a report when it has been determined that the security event has occurred.
    Type: Grant
    Filed: September 27, 2013
    Date of Patent: August 16, 2016
    Assignee: Symantec Corporation
    Inventors: Shireen Rivera, Peter Ashley
  • Patent number: 9384336
    Abstract: A computer-implemented method to assign a security policy is described. A plurality of components of a device are detected. An individual reputation for each of the plurality of components is determined. An overall reputation is determined based on the individual reputations. A security policy is assigned based at least in part on the overall reputation. In some cases, access to at least one component on the device is restricted according to the security policy.
    Type: Grant
    Filed: October 8, 2012
    Date of Patent: July 5, 2016
    Assignee: Symantec Corporation
    Inventor: Peter Ashley
  • Publication number: 20160156640
    Abstract: A method to identify machines infected by malware is provided. The method includes determining whether a universal resource locator in a network request is present in a first cache and determining whether a fully qualified domain name from the uniform resource locator is present in a second cache. The method includes evaluating a parent hostname as to suspiciousness. The method includes indicating the computing device has a likelihood of infection, responsive to one of: the universal resource locator being present in the first cache with a first indication of suspiciousness, the fully qualified domain name being present in the second cache with a second indication of suspiciousness, or the evaluating the parent hostname having a third indication of suspiciousness, wherein at least one method operation is performed by the processor. A system and computer readable media are provided.
    Type: Application
    Filed: February 8, 2016
    Publication date: June 2, 2016
    Inventors: Michael Hart, Darrell Kienzle, Peter Ashley
  • Patent number: 9332022
    Abstract: The disclosed computer-implemented method for detecting suspicious Internet addresses may include (1) monitoring Internet communications of an entity (e.g., an organization or individual), (2) compiling an Internet-address history for the entity that includes one or more Internet addresses involved in the Internet communications of the entity, (3) detecting, after compiling the Internet-address history for the entity, an additional Internet address that may be used in future Internet communications involving the entity, (4) computing a similarity metric between the additional Internet address and at least one Internet-address in the Internet-address history, (5) determining that the similarity metric indicates that the additional Internet address is suspicious, and (6) performing a security action in response to determining that the similarity metric indicates that the additional Internet address is suspicious. Various other methods, systems, and computer-readable media are also disclosed.
    Type: Grant
    Filed: July 7, 2014
    Date of Patent: May 3, 2016
    Assignee: Symantec Corporation
    Inventor: Peter Ashley
  • Patent number: 9258269
    Abstract: A computer-implemented method for managing delivery of email to local recipients. The computer-implemented method may include establishing a local reputation for an email sender address. The method may include storing a domain-name-system record associated with the local reputation on a domain-name system. The domain-name system may be mail-transfer agent agnostic. The method may also include identifying one or more emails sent from the email sender address to one or more local recipients. The method may include forming a spam verdict for each of the one or more emails by analyzing contents of each of the one or more emails. The method may additionally include updating the local reputation for the email sender address based on the one or more spam verdicts.
    Type: Grant
    Filed: March 25, 2009
    Date of Patent: February 9, 2016
    Assignee: Symantec Corporation
    Inventor: Peter Ashley
  • Publication number: 20150310215
    Abstract: Techniques are presented herein for classifying a variety of enterprise computing resources based on asset characteristics. In particular, a computing asset, e.g., a server, may be classified based on any digital certificates provisioned on that server. That is, the properties of a digital certificate may be used to determine a measure of business value or importance of a server (or data hosted on that server). Once classified, a monitoring system may use the assigned classifications to prioritize security incidents for review.
    Type: Application
    Filed: April 25, 2014
    Publication date: October 29, 2015
    Applicant: SYMANTEC CORPORATION
    Inventors: Kevin McBRIDE, Quentin LIU, Hari VELADANDA, George TOMIC, Peter ASHLEY
  • Publication number: 20150281257
    Abstract: A method to identify machines infected by malware is provided. The method includes determining whether a universal resource locator in a network request is present in a first cache and determining whether a fully qualified domain name from the uniform resource locator is present in a second cache. The method includes evaluating a parent hostname as to suspiciousness. The method includes indicating the computing device has a likelihood of infection, responsive to one of: the universal resource locator being present in the first cache with a first indication of suspiciousness, the fully qualified domain name being present in the second cache with a second indication of suspiciousness, or the evaluating the parent hostname having a third indication of suspiciousness, wherein at least one method operation is performed by the processor. A system and computer readable media are provided.
    Type: Application
    Filed: March 26, 2014
    Publication date: October 1, 2015
    Applicant: Symantec Corporation
    Inventors: Michael HART, Darrell KIENZLE, Peter ASHLEY
  • Patent number: 9065849
    Abstract: A computer-implemented method for determining trustworthiness of software programs may include (1) determining, for at least one software program, a prevalence score that indicates a prevalence of the software program within a local network, (2) obtaining, for the software program, a reputation score that indicates a reputation of the software program, (3) determining a trustworthiness of the software program based on both the reputation score of the software program and the prevalence score of the software program, and (4) performing a security action based on the trustworthiness of the software program. Various other methods, systems, and computer-readable media are also disclosed.
    Type: Grant
    Filed: September 18, 2013
    Date of Patent: June 23, 2015
    Assignee: Symantec Corporation
    Inventors: Shireen H. Rivera, Peter Ashley
  • Publication number: 20150007315
    Abstract: Techniques for detecting security vulnerabilities are disclosed. In one particular embodiment, the techniques may be realized as a method for detecting security vulnerabilities including assigning a reputation to an application, distributing the reputation to a client, receiving monitored system behavior from the client related to the client executing the application, determining whether to change the reputation of the application based on the monitored system behavior, distributing the changed reputation to the client, receiving further monitored system behavior from the client, and determining whether to generate a rule for the application based on the monitored system behavior received from the client.
    Type: Application
    Filed: June 28, 2013
    Publication date: January 1, 2015
    Applicant: Symantec Corporation
    Inventors: Shireen RIVERA, Peter ASHLEY
  • Patent number: 8868578
    Abstract: Source entities with initially predefined properties for service modeling are presented in a library for user selection as service modeling entities. An automated computer process expediter copies user selected ones of the source entities from the library into a computer readable storage medium providing a services layer. The copying generates instances in the services layer of the selected service modeling source entities, such that the services layer instances at least initially include the initially predefined properties of their respective source entities. The automated computer process expediter maintains the properties of the selected ones of the source entities, including maintaining the selected source entities' properties independently of changes made in a first change mode to the properties of the service modeling entity instances, which are in the services layer, so that the user may change the properties of the layer service modeling instances.
    Type: Grant
    Filed: September 30, 2010
    Date of Patent: October 21, 2014
    Assignee: International Business Machines Corporation
    Inventors: Peter Ashley, Michael John Brady, Frank Patrick Krause, Vishwa Ranjan, Gandhi Sivakumar
  • Publication number: 20140283082
    Abstract: A computer-implemented method for determining potential impacts of applications on the security of computing systems may include (1) identifying an application subject to a security vulnerability assessment, (2) requesting information that identifies a potential impact of the application on a vulnerability of at least one computing system to at least one exploit associated with the application, (3) receiving the information that identifies the potential impact of the application on the vulnerability of the computing system, wherein the information may be derived at least in part from data from at least one additional computing system on which the application has previously been installed and (4) directing a determination about an installation of the application on the computing system based at least in part on the information that identifies the potential impact of the application on the vulnerability of the computing system. Various other methods, systems, and computer-readable media are also disclosed.
    Type: Application
    Filed: March 15, 2013
    Publication date: September 18, 2014
    Applicant: Symantec Corporation
    Inventors: Piyush Sharma, Peter Ashley
  • Patent number: 8650245
    Abstract: A method implemented by a computing component for providing adaptive views of reputation data associated with a domain name system query is described. A domain name system query is received. A filter portion within the query is identified. A virtual zone file is queried according to the filter portion of the query. A response to the query is generated. The response comprises an analysis of the reputation data according to the filter portion.
    Type: Grant
    Filed: April 22, 2009
    Date of Patent: February 11, 2014
    Assignee: Symantec Corporation
    Inventor: Peter Ashley