Patents by Inventor Stephen Douglas Milligan

Stephen Douglas Milligan has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20130014261
    Abstract: A system (200) detects transmission of potentially malicious packets. The system (200) receives, or otherwise observes, packets and generates hash values based on variable-sized blocks of the packets. The system (200) then compares the generated hash values to hash values associated with prior packets. The system (200) determines that one of the received packets is a potentially malicious packet when one or more of the generated hash values associated with the received packet match one or more of the hash values associated with the prior packets.
    Type: Application
    Filed: September 14, 2012
    Publication date: January 10, 2013
    Applicant: STRAGENT, LLC
    Inventors: Walter Clark Millliken, William Timothy Strayer, Stephen Douglas Milligan, Luis Sanchez, Craig Partridge
  • Patent number: 8272060
    Abstract: A system (200) detects transmission of potentially malicious packets. The system (200) receives, or otherwise observes, packets and generates hash values based on variable-sized blocks of the packets. The system (200) then compares the generated hash values to hash values associated with prior packets. The system (200) determines that one of the received packets is a potentially malicious packet when one or more of the generated hash values associated with the received packet match one or more of the hash values associated with the prior packets.
    Type: Grant
    Filed: April 18, 2010
    Date of Patent: September 18, 2012
    Assignee: Stragent, LLC
    Inventors: Walter Clark Milliken, William Timothy Strayer, Stephen Douglas Milligan, Luis Sanchez, Craig Partridge
  • Patent number: 8204945
    Abstract: A system (120) detects transmission of potentially unwanted e-mail messages. The system (120) may receive e-mail messages and generate hash values based on one or more portions of the e-mail messages. The system (120) may then determine whether the generated hash values match hash values associated with prior e-mail messages. The system (120) may determine that one of the e-mail messages is a potentially unwanted e-mail message when one or more of the generated hash values associated with the e-mail message match one or more of the hash values associated with the prior e-mail messages.
    Type: Grant
    Filed: October 9, 2008
    Date of Patent: June 19, 2012
    Assignee: Stragent, LLC
    Inventors: Walter Clark Milliken, William Timothy Strayer, Stephen Douglas Milligan
  • Patent number: 8166549
    Abstract: A system (200) detects transmission of potentially malicious packets. The system (200) receives, or otherwise observes, packets and generates hash values based on variable-sized blocks of the packets. The system (200) then compares the generated hash values to hash values associated with prior packets. The system (200) determines that one of the received packets is a potentially malicious packet when one or more of the generated hash values associated with the received packet match one or more of the hash values associated with the prior packets.
    Type: Grant
    Filed: April 18, 2010
    Date of Patent: April 24, 2012
    Assignee: Stragent, LLC
    Inventors: Walter Clark Milliken, William Timothy Strayer, Stephen Douglas Milligan, Luis Sanchez, Craig Partridge
  • Publication number: 20120082006
    Abstract: Disclosed are systems and methods that can be used to detect shooters. The systems and methods described herein use arrival times of a shockwave, produced by a shot, at a plurality of sensors to assign weights to each of the plurality of sensors, and determine a shot trajectory based on the assigned weights.
    Type: Application
    Filed: September 27, 2007
    Publication date: April 5, 2012
    Applicant: BBN Technologies Corp.
    Inventors: Marshall Seth Brinn, James Edwin Barger, Stephen Douglas Milligan
  • Publication number: 20100205671
    Abstract: A system (200) detects transmission of potentially malicious packets. The system (200) receives, or otherwise observes, packets and generates hash values based on variable-sized blocks of the packets. The system (200) then compares the generated hash values to hash values associated with prior packets. The system (200) determines that one of the received packets is a potentially malicious packet when one or more of the generated hash values associated with the received packet match one or more of the hash values associated with the prior packets.
    Type: Application
    Filed: April 18, 2010
    Publication date: August 12, 2010
    Applicant: Azure Networks, LLC
    Inventors: Walter Clark Milliken, William Timothy Strayer, Stephen Douglas Milligan, Luis Sanchez, Craig Partridge
  • Publication number: 20100205672
    Abstract: A system (126-129) detects transmission of potentially malicious packets. The system (126-129) receives packets and generates hash values corresponding to each of the packets. The system (126-129) may then compare the generated hash values to hash values corresponding to prior packets. The system (126-129) determines that one of the packets is a potentially malicious packet when the generated hash value corresponding to the one packet matches one of the hash values corresponding to one of the prior packets and the one prior packet was received within a predetermined amount of time of the one packet. The system (126-129) may also facilitate the tracing of the path taken by a potentially malicious packet. In this case, the system (126-129) may receive a message that identifies a potentially malicious packet, generate hash values from the potentially malicious packet, and determine whether one or more of the generated hash values match hash values corresponding to previously-received packets.
    Type: Application
    Filed: April 18, 2010
    Publication date: August 12, 2010
    Applicant: Azure Networks, LLC
    Inventors: Walter Clark Milliken, William Timothy Strayer, Stephen Douglas Milligan, Luis Sanchez, Craig Partridge
  • Publication number: 20100205265
    Abstract: A system (120) detects transmission of potentially unwanted e-mail messages. The system (120) may receive e-mail messages and generate hash values based on one or more portions of the e-mail messages. The system (120) may then determine whether the generated hash values match hash values associated with prior e-mail messages. The system (120) may determine that one of the e-mail messages is a potentially unwanted e-mail message when one or more of the generated hash values associated with the e-mail message match one or more of the hash values associated with the prior e-mail messages.
    Type: Application
    Filed: April 19, 2010
    Publication date: August 12, 2010
    Applicant: Azure Networks, LLC
    Inventors: Walter Clark Milliken, William Timothy Strayer, Stephen Douglas Milligan
  • Publication number: 20100205670
    Abstract: A system and method for performing source path isolation in a network. The system comprises an intrusion detection system (IDS), a source path isolation server (SS1) and at least one router configured to operate as a source path isolation router (SR1) operating within an autonomous system. When IDS detects a malicious packet, a message is sent to SS1. SS1 in turn generates a query message (QM) containing at least a portion of the malicious packet. Then, QM is sent to participating routers located one hop away. SR1 uses the query message to determine if it has observed the malicious packet by comparing it with locally stored information about packets having passed through SR1. SR1 sends a reply to SS1, and SS1 uses the reply to identify the ingress point into the network of the malicious packet.
    Type: Application
    Filed: April 18, 2010
    Publication date: August 12, 2010
    Applicant: Azure Networks, LLC
    Inventors: Walter Clark Milliken, William Timothy Strayer, Stephen Douglas Milligan, Luis Sanchez, Craig Partridge
  • Publication number: 20090313339
    Abstract: A system and method for performing source path isolation in a network. The system comprises an intrusion detection system (IDS), a source path isolation server (SS1) and at least one router configured to operate as a source path isolation router (SR1) operating within an autonomous system. When IDS detects a malicious packet, a message is sent to SS1. SS1 in turn generates a query message (QM) containing at least a portion of the malicious packet. Then, QM is sent to participating routers located one hop away. SR1 uses the query message to determine if it has observed the malicious packet by comparing it with locally stored information about packets having passed through SR1. SR1 sends a reply to SS1, and SS1 uses the reply to identify the ingress point into the network of the malicious packet.
    Type: Application
    Filed: October 10, 2008
    Publication date: December 17, 2009
    Inventors: Walter Clark Milliken, William Timothy Strayer, Stephen Douglas Milligan, Luis Sanchez, Craig Patridge
  • Publication number: 20090182867
    Abstract: A system and method for identifying target packets in a network. The invention identifies packets by computing a hash value over at least a portion of a packet passing through a network device such as a router. The hash value is used as an address, or index, into a memory. The hash value identifies a unique memory address and a flag is set at the respective memory location. When a target packet is detected elsewhere in a network, the network device receives a query message containing a hash value of the target packet. The network device compares the target packet to the hash values in memory. A match between the hash value in memory and the hash value in the query message indicates the target packet was observed by the network device. After a match is detected, the network device makes a reply available to the network.
    Type: Application
    Filed: October 10, 2008
    Publication date: July 16, 2009
    Inventors: Walter Clark Milliken, William Timothy Strayer, Stephen Douglas Milligan, Luis Sanchez, Craig Partridge
  • Publication number: 20090158046
    Abstract: A system (200) detects transmission of potentially malicious packets. The system (200) receives, or otherwise observes, packets and generates hash values based on variable-sized blocks of the packets. The system (200) then compares the generated hash values to hash values associated with prior packets. The system (200) determines that one of the received packets is a potentially malicious packet when one or more of the generated hash values associated with the received packet match one or more of the hash values associated with the prior packets.
    Type: Application
    Filed: October 10, 2008
    Publication date: June 18, 2009
    Inventors: Walter Clark Milliken, William Timothy Strayer, Stephen Douglas Milligan, Luis Sanchez, Craig Partridge
  • Publication number: 20090158435
    Abstract: A system (126-129) detects transmission of potentially malicious packets. The system (126-129) receives packets and generates hash values corresponding to each of the packets. The system (126-129) may then compare the generated hash values to hash values corresponding to prior packets. The system (126-129) determines that one of the packets is a potentially malicious packet when the generated hash value corresponding to the one packet matches one of the hash values corresponding to one of the prior packets and the one prior packet was received within a predetermined amount of time of the one packet. The system (126-129) may also facilitate the tracing of the path taken by a potentially malicious packet. In this case, the system (126-129) may receive a message that identifies a potentially malicious packet, generate hash values from the potentially malicious packet, and determine whether one or more of the generated hash values match hash values corresponding to previously-received packets.
    Type: Application
    Filed: October 10, 2008
    Publication date: June 18, 2009
    Inventors: Walter Clark Milliken, William Timothy Strayer, Stephen Douglas Milligan, Luis Sanchez, Craig Partridge
  • Publication number: 20090132669
    Abstract: A system (120) detects transmission of potentially unwanted e-mail messages. The system (120) may receive e-mail messages and generate hash values based on one or more portions of the e-mail messages. The system (120) may then determine whether the generated hash values match hash values associated with prior e-mail messages. The system (120) may determine that one of the e-mail messages is a potentially unwanted e-mail message when one or more of the generated hash values associated with the e-mail message match one or more of the hash values associated with the prior e-mail messages.
    Type: Application
    Filed: October 9, 2008
    Publication date: May 21, 2009
    Inventors: Walter Clark Milliken, William Timothy Strayer, Stephen Douglas Milligan
  • Publication number: 20090031136
    Abstract: A system (120) detects transmission of potentially unwanted e-mail messages. The system (120) may receive e-mail messages and generate hash values based on one or more portions of the e-mail messages. The system (120) may then determine whether the generated hash values match hash values associated with prior e-mail messages. The system (120) may determine that one of the e-mail messages is a potentially unwanted e-mail message when one or more of the generated hash values associated with the e-mail message match one or more of the hash values associated with the prior e-mail messages.
    Type: Application
    Filed: October 1, 2008
    Publication date: January 29, 2009
    Inventors: Walter Clark Milliken, William Timothy Strayer, Stephen Douglas Milligan
  • Publication number: 20090031129
    Abstract: A system (120) detects transmission of potentially unwanted e-mail messages. The system (120) may receive e-mail messages and generate hash values based on one or more portions of the e-mail messages. The system (120) may then determine whether the generated hash values match hash values associated with prior e-mail messages. The system (120) may determine that one of the e-mail messages is a potentially unwanted e-mail message when one or more of the generated hash values associated with the e-mail message match one or more of the hash values associated with the prior e-mail messages.
    Type: Application
    Filed: October 1, 2008
    Publication date: January 29, 2009
    Inventors: Walter Clark Milliken, William Timothy Strayer, Stephen Douglas Milligan
  • Patent number: 7190633
    Abstract: Shockwave-only solutions that estimate shooter position and shot trajectory are extremely sensitive to the quality and precision of the shock time-of-arrival (TOA) measurements as well as the accuracy to which relative sensor positions in space are known. Over the life of a long-deployed system, the sensor positions can shift and the performance of some sensors may degrade for various reasons. Such changes can degrade the performance of deployed shooter estimation systems. Disclosed are systems and methods that can be used to calibrate sensor positions based on shock and muzzle measurements processed from a series of shots fired from a known location and in a known direction, as well as an approach for dynamically adapting shock-only shooter estimation algorithms to compensate for sensor degradation and/or loss.
    Type: Grant
    Filed: August 24, 2004
    Date of Patent: March 13, 2007
    Assignee: BBN Technologies Corp.
    Inventors: Marshall Seth Brinn, James Edwin Barger, Stephen Douglas Milligan
  • Patent number: 7126877
    Abstract: Systems and methods for locating the shooter of supersonic projectiles based on shockwave-only measurements are described. Muzzle blast signals are neither sought nor required. The system uses at least five, preferably seven, acoustic sensors that are spaced apart at least 1 meter. The sensor signals are acquired with a time resolution in the order of microseconds and processed to find and disambiguate the shockwave arrival angle unit vector. Two different Time-Difference-Of-Arrival (TDOA) measurement techniques are described, with one technique using counters in each signal channel and the other technique using cross-correlation between signal channels. A genetic algorithm can be used to efficiently disambiguate the results.
    Type: Grant
    Filed: August 24, 2004
    Date of Patent: October 24, 2006
    Assignee: BBN Technologies Corp.
    Inventors: James Edwin Barger, Stephen Douglas Milligan, Marshall Seth Brinn, Richard J. Mullen
  • Publication number: 20040073617
    Abstract: A system (120) detects transmission of potentially unwanted e-mail messages. The system (120) may receive e-mail messages and generate hash values based on one or more portions of the e-mail messages. The system (120) may then determine whether the generated hash values match hash values associated with prior e-mail messages. The system (120) may determine that one of the e-mail messages is a potentially unwanted e-mail message when one or more of the generated hash values associated with the e-mail message match one or more of the hash values associated with the prior e-mail messages.
    Type: Application
    Filed: September 4, 2003
    Publication date: April 15, 2004
    Inventors: Walter Clark Milliken, William Timothy Strayer, Stephen Douglas Milligan