Patents by Inventor Peter Ashley
Peter Ashley has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Publication number: 20240132198Abstract: A retainer suitable for use on an aircraft is disclosed. The retainer comprises a first retainer part and a second retainer part. The first retainer part comprises a catch and a damper; in which the catch comprises one or more magnetic elements. The damper comprises a damping material, the damping material damps shock impulses; and the catch is supported on the damper.Type: ApplicationFiled: August 29, 2023Publication date: April 25, 2024Applicant: B/E Aerospace (UK) LimitedInventors: Daniel H. Wall, Peter Ashley Griffiths, Rafal Hubert Chylinski
-
Patent number: 9830458Abstract: Techniques are presented herein for classifying a variety of enterprise computing resources based on asset characteristics. In particular, a computing asset, e.g., a server, may be classified based on any digital certificates provisioned on that server. That is, the properties of a digital certificate may be used to determine a measure of business value or importance of a server (or data hosted on that server). Once the computing asset has been classified, a monitoring system may use the assigned classifications to prioritize security incidents for review.Type: GrantFiled: April 25, 2014Date of Patent: November 28, 2017Assignee: Symantec CorporationInventors: Kevin McBride, Quentin Liu, Hari Veladanda, George Tomic, Peter Ashley
-
Patent number: 9736178Abstract: The disclosed computer-implemented method for detecting suspicious Internet addresses may include (1) monitoring Internet communications of an entity (e.g., an organization or individual), (2) compiling an Internet-address history for the entity that includes one or more Internet addresses involved in the Internet communications of the entity, (3) detecting, after compiling the Internet-address history for the entity, an additional Internet address that may be used in future Internet communications involving the entity, (4) computing a similarity metric between the additional Internet address and at least one Internet-address in the Internet-address history, (5) determining that the similarity metric indicates that the additional Internet address is suspicious, and (6) performing a security action in response to determining that the similarity metric indicates that the additional Internet address is suspicious. Various other methods, systems, and computer-readable media are also disclosed.Type: GrantFiled: April 5, 2016Date of Patent: August 15, 2017Assignee: Symantec CorporationInventor: Peter Ashley
-
Patent number: 9692772Abstract: A method to identify machines infected by malware is provided. The method includes determining whether a universal resource locator in a network request is present in a first cache and determining whether a fully qualified domain name from the uniform resource locator is present in a second cache. The method includes evaluating a parent hostname as to suspiciousness. The method includes indicating the computing device has a likelihood of infection, responsive to one of: the universal resource locator being present in the first cache with a first indication of suspiciousness, the fully qualified domain name being present in the second cache with a second indication of suspiciousness, or the evaluating the parent hostname having a third indication of suspiciousness, wherein at least one method operation is performed by the processor. A system and computer readable media are provided.Type: GrantFiled: February 8, 2016Date of Patent: June 27, 2017Assignee: Symantec CorporationInventors: Michael Hart, Darrell Kienzle, Peter Ashley
-
Patent number: 9639693Abstract: Techniques for detecting security vulnerabilities are disclosed. In one particular embodiment, the techniques may be realized as a method for detecting security vulnerabilities including assigning a reputation to an application, distributing the reputation to a client, receiving monitored system behavior from the client related to the client executing the application, determining whether to change the reputation of the application based on the monitored system behavior, distributing the changed reputation to the client, receiving further monitored system behavior from the client, and determining whether to generate a rule for the application based on the monitored system behavior received from the client.Type: GrantFiled: June 28, 2013Date of Patent: May 2, 2017Assignee: Symantec CorporationInventors: Shireen Rivera, Peter Ashley
-
Patent number: 9501649Abstract: A computer-implemented method for determining potential impacts of applications on the security of computing systems may include (1) identifying an application subject to a security vulnerability assessment, (2) requesting information that identifies a potential impact of the application on a vulnerability of at least one computing system to at least one exploit associated with the application, (3) receiving the information that identifies the potential impact of the application on the vulnerability of the computing system, wherein the information may be derived at least in part from data from at least one additional computing system on which the application has previously been installed and (4) directing a determination about an installation of the application on the computing system based at least in part on the information that identifies the potential impact of the application on the vulnerability of the computing system. Various other methods, systems, and computer-readable media are also disclosed.Type: GrantFiled: March 15, 2013Date of Patent: November 22, 2016Assignee: Symantec CorporationInventors: Piyush Sharma, Peter Ashley
-
Patent number: 9444829Abstract: A computer-implemented method for protecting computing resources based on logical data models may include (1) receiving, from a security agent, log data that specifies details of a security event detected by the security agent, (2) creating an instance of a data structure for a logical data model that describes a path cycle of a security threat, (3) populating at least one field of the data structure for the logical data model with a completed value, (4) populating at least one other field of the data structure for the logical data model with a value of incomplete based on a completed value for the other field being unavailable, and (5) performing a security action based on an analysis of the instance of the data structure for the logical data model. Various other methods, systems, and computer-readable media are also disclosed.Type: GrantFiled: July 30, 2014Date of Patent: September 13, 2016Assignee: Symantec CorporationInventor: Peter Ashley
-
Patent number: 9419986Abstract: A method to identify machines infected by malware is provided. The method includes determining whether a universal resource locator in a network request is present in a first cache and determining whether a fully qualified domain name from the uniform resource locator is present in a second cache. The method includes evaluating a parent hostname as to suspiciousness. The method includes indicating the computing device has a likelihood of infection, responsive to one of: the universal resource locator being present in the first cache with a first indication of suspiciousness, the fully qualified domain name being present in the second cache with a second indication of suspiciousness, or the evaluating the parent hostname having a third indication of suspiciousness, wherein at least one method operation is performed by the processor. A system and computer readable media are provided.Type: GrantFiled: March 26, 2014Date of Patent: August 16, 2016Assignee: Symantec CorporationInventors: Michael Hart, Darrell Kienzle, Peter Ashley
-
Patent number: 9418222Abstract: Techniques for detecting advanced security threats are disclosed. In one particular embodiment, the techniques may be realized as a method for detecting a security threat including generating a resource at a client, implementing the resource on the client, monitoring system behavior of the client having the resource implemented thereon, determining whether a security event involving the implemented resource has occurred based on the monitored system behavior, and generating a report when it has been determined that the security event has occurred.Type: GrantFiled: September 27, 2013Date of Patent: August 16, 2016Assignee: Symantec CorporationInventors: Shireen Rivera, Peter Ashley
-
Patent number: 9384336Abstract: A computer-implemented method to assign a security policy is described. A plurality of components of a device are detected. An individual reputation for each of the plurality of components is determined. An overall reputation is determined based on the individual reputations. A security policy is assigned based at least in part on the overall reputation. In some cases, access to at least one component on the device is restricted according to the security policy.Type: GrantFiled: October 8, 2012Date of Patent: July 5, 2016Assignee: Symantec CorporationInventor: Peter Ashley
-
Publication number: 20160156640Abstract: A method to identify machines infected by malware is provided. The method includes determining whether a universal resource locator in a network request is present in a first cache and determining whether a fully qualified domain name from the uniform resource locator is present in a second cache. The method includes evaluating a parent hostname as to suspiciousness. The method includes indicating the computing device has a likelihood of infection, responsive to one of: the universal resource locator being present in the first cache with a first indication of suspiciousness, the fully qualified domain name being present in the second cache with a second indication of suspiciousness, or the evaluating the parent hostname having a third indication of suspiciousness, wherein at least one method operation is performed by the processor. A system and computer readable media are provided.Type: ApplicationFiled: February 8, 2016Publication date: June 2, 2016Inventors: Michael Hart, Darrell Kienzle, Peter Ashley
-
Patent number: 9332022Abstract: The disclosed computer-implemented method for detecting suspicious Internet addresses may include (1) monitoring Internet communications of an entity (e.g., an organization or individual), (2) compiling an Internet-address history for the entity that includes one or more Internet addresses involved in the Internet communications of the entity, (3) detecting, after compiling the Internet-address history for the entity, an additional Internet address that may be used in future Internet communications involving the entity, (4) computing a similarity metric between the additional Internet address and at least one Internet-address in the Internet-address history, (5) determining that the similarity metric indicates that the additional Internet address is suspicious, and (6) performing a security action in response to determining that the similarity metric indicates that the additional Internet address is suspicious. Various other methods, systems, and computer-readable media are also disclosed.Type: GrantFiled: July 7, 2014Date of Patent: May 3, 2016Assignee: Symantec CorporationInventor: Peter Ashley
-
Patent number: 9258269Abstract: A computer-implemented method for managing delivery of email to local recipients. The computer-implemented method may include establishing a local reputation for an email sender address. The method may include storing a domain-name-system record associated with the local reputation on a domain-name system. The domain-name system may be mail-transfer agent agnostic. The method may also include identifying one or more emails sent from the email sender address to one or more local recipients. The method may include forming a spam verdict for each of the one or more emails by analyzing contents of each of the one or more emails. The method may additionally include updating the local reputation for the email sender address based on the one or more spam verdicts.Type: GrantFiled: March 25, 2009Date of Patent: February 9, 2016Assignee: Symantec CorporationInventor: Peter Ashley
-
Publication number: 20150310215Abstract: Techniques are presented herein for classifying a variety of enterprise computing resources based on asset characteristics. In particular, a computing asset, e.g., a server, may be classified based on any digital certificates provisioned on that server. That is, the properties of a digital certificate may be used to determine a measure of business value or importance of a server (or data hosted on that server). Once classified, a monitoring system may use the assigned classifications to prioritize security incidents for review.Type: ApplicationFiled: April 25, 2014Publication date: October 29, 2015Applicant: SYMANTEC CORPORATIONInventors: Kevin McBRIDE, Quentin LIU, Hari VELADANDA, George TOMIC, Peter ASHLEY
-
Publication number: 20150281257Abstract: A method to identify machines infected by malware is provided. The method includes determining whether a universal resource locator in a network request is present in a first cache and determining whether a fully qualified domain name from the uniform resource locator is present in a second cache. The method includes evaluating a parent hostname as to suspiciousness. The method includes indicating the computing device has a likelihood of infection, responsive to one of: the universal resource locator being present in the first cache with a first indication of suspiciousness, the fully qualified domain name being present in the second cache with a second indication of suspiciousness, or the evaluating the parent hostname having a third indication of suspiciousness, wherein at least one method operation is performed by the processor. A system and computer readable media are provided.Type: ApplicationFiled: March 26, 2014Publication date: October 1, 2015Applicant: Symantec CorporationInventors: Michael HART, Darrell KIENZLE, Peter ASHLEY
-
Patent number: 9065849Abstract: A computer-implemented method for determining trustworthiness of software programs may include (1) determining, for at least one software program, a prevalence score that indicates a prevalence of the software program within a local network, (2) obtaining, for the software program, a reputation score that indicates a reputation of the software program, (3) determining a trustworthiness of the software program based on both the reputation score of the software program and the prevalence score of the software program, and (4) performing a security action based on the trustworthiness of the software program. Various other methods, systems, and computer-readable media are also disclosed.Type: GrantFiled: September 18, 2013Date of Patent: June 23, 2015Assignee: Symantec CorporationInventors: Shireen H. Rivera, Peter Ashley
-
Publication number: 20150007315Abstract: Techniques for detecting security vulnerabilities are disclosed. In one particular embodiment, the techniques may be realized as a method for detecting security vulnerabilities including assigning a reputation to an application, distributing the reputation to a client, receiving monitored system behavior from the client related to the client executing the application, determining whether to change the reputation of the application based on the monitored system behavior, distributing the changed reputation to the client, receiving further monitored system behavior from the client, and determining whether to generate a rule for the application based on the monitored system behavior received from the client.Type: ApplicationFiled: June 28, 2013Publication date: January 1, 2015Applicant: Symantec CorporationInventors: Shireen RIVERA, Peter ASHLEY
-
Patent number: 8868578Abstract: Source entities with initially predefined properties for service modeling are presented in a library for user selection as service modeling entities. An automated computer process expediter copies user selected ones of the source entities from the library into a computer readable storage medium providing a services layer. The copying generates instances in the services layer of the selected service modeling source entities, such that the services layer instances at least initially include the initially predefined properties of their respective source entities. The automated computer process expediter maintains the properties of the selected ones of the source entities, including maintaining the selected source entities' properties independently of changes made in a first change mode to the properties of the service modeling entity instances, which are in the services layer, so that the user may change the properties of the layer service modeling instances.Type: GrantFiled: September 30, 2010Date of Patent: October 21, 2014Assignee: International Business Machines CorporationInventors: Peter Ashley, Michael John Brady, Frank Patrick Krause, Vishwa Ranjan, Gandhi Sivakumar
-
Publication number: 20140283082Abstract: A computer-implemented method for determining potential impacts of applications on the security of computing systems may include (1) identifying an application subject to a security vulnerability assessment, (2) requesting information that identifies a potential impact of the application on a vulnerability of at least one computing system to at least one exploit associated with the application, (3) receiving the information that identifies the potential impact of the application on the vulnerability of the computing system, wherein the information may be derived at least in part from data from at least one additional computing system on which the application has previously been installed and (4) directing a determination about an installation of the application on the computing system based at least in part on the information that identifies the potential impact of the application on the vulnerability of the computing system. Various other methods, systems, and computer-readable media are also disclosed.Type: ApplicationFiled: March 15, 2013Publication date: September 18, 2014Applicant: Symantec CorporationInventors: Piyush Sharma, Peter Ashley
-
Patent number: 8650245Abstract: A method implemented by a computing component for providing adaptive views of reputation data associated with a domain name system query is described. A domain name system query is received. A filter portion within the query is identified. A virtual zone file is queried according to the filter portion of the query. A response to the query is generated. The response comprises an analysis of the reputation data according to the filter portion.Type: GrantFiled: April 22, 2009Date of Patent: February 11, 2014Assignee: Symantec CorporationInventor: Peter Ashley