Patents by Inventor Tyson Macaulay

Tyson Macaulay has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 9118702
    Abstract: A method of refining cyber threat intelligence data, comprising: sending a first version of a threat list to a first cyber threat intelligence source and to a second cyber threat intelligence source; obtaining original first cyber threat intelligence data from the first source; obtaining original second cyber threat intelligence data from the second source; creating a second version of the threat list based on at least the original first cyber threat intelligence data and the original second cyber threat intelligence data; sending the second version of the threat list to the first source and to the second source; obtaining new first cyber threat intelligence data from the first source; obtaining new second cyber threat intelligence data from the second source; and creating a third version of the threat list based on at least the new first cyber threat intelligence data and the new second cyber threat intelligence data.
    Type: Grant
    Filed: July 27, 2011
    Date of Patent: August 25, 2015
    Assignee: BCE Inc.
    Inventor: Tyson MaCaulay
  • Publication number: 20150207809
    Abstract: A method of refining cyber threat intelligence data, comprising: sending a first version of a threat list to a first cyber threat intelligence source and to a second cyber threat intelligence source; obtaining original first cyber threat intelligence data from the first source; obtaining original second cyber threat intelligence data from the second source; creating a second version of the threat list based on at least the original first cyber threat intelligence data and the original second cyber threat intelligence data; sending the second version of the threat list to the first source and to the second source; obtaining new first cyber threat intelligence data from the first source; obtaining new second cyber threat intelligence data from the second source; and creating a third version of the threat list based on at least the new first cyber threat intelligence data and the new second cyber threat intelligence data.
    Type: Application
    Filed: July 27, 2011
    Publication date: July 23, 2015
    Inventor: Tyson MACAULAY
  • Publication number: 20030135762
    Abstract: An IEEE 802.11 security system for monitoring wireless networks with a view to detecting and locating unauthorized or threatening IEEE 802.11 devices entering a user's wireless network environment or a facility not intended to support wireless networks is disclosed. The security system comprises a network appliance subsystem and a portable computing subsystem with data means to interface between the two systems. Optionally, counter-measuring means for launching neutralizing and/or disabling counter-measures against a suspected device upon activation can be incorporated into the security system. A method of operation of the IEEE 802.11 security system is also disclosed.
    Type: Application
    Filed: December 20, 2002
    Publication date: July 17, 2003
    Applicant: PEEL WIRELESS, INC.
    Inventor: Tyson Macaulay