Patents Assigned to 802 Secure, Inc.
-
Patent number: 12160742Abstract: A System and Method is provided that enable identifying cyber security attacks using observation and monitoring of end point activity. By following and monitoring the wireless connection related activities of endpoint devices as they cycle through various steps leading to establishing a connection to the secure network, a knowledge base is established in the cloud by analysis of the actions, and communication to build the confidence that the users of the network are where they should be. In one embodiment, no access is provided until a user presents valid credentials. Based on these credentials the network then builds a specific path based on access controls, tunnels or other techniques to control the user's communication and access to specific targets within the network.Type: GrantFiled: March 7, 2023Date of Patent: December 3, 2024Assignee: 802 Secure, Inc.Inventors: Konrad Grutzmacher, Clifford Fernandez
-
Patent number: 12113810Abstract: An autonomic incident response system (AIRS) that can be used within any cyber system (computing systems, network devices, applications, cyber-physical systems, data, and files). If a cyber system is attacked, the cyberattack pattern type can be seamlessly identified by the AIRS along with the method used to launch the attack, the vulnerability that was exploited, the impact and consequence of the attack, and finally the recovery actions that can be taken automatically or semi-automatically to stop the attack or mitigate its impact on cyber system operations.Type: GrantFiled: August 4, 2021Date of Patent: October 8, 2024Assignee: 802 Secure, Inc.Inventor: Salim Hariri
-
Patent number: 12095790Abstract: Methods and systems for threat monitoring and analysis are disclosed. Data is collected, over a protected network, from a data stream provided by at least one data source connecting to the protected network. Machine learning (ML) models are trained for the data stream utilizing the collected data. The ML models include a first ML model to establish a baseline value, an allowed threshold value range, and a threshold value for the data from the data source, and a second ML model to identify outlier data. The outlier data is outside of the allowed threshold value range from the baseline value and exceeds the threshold value in the data stream. The ML models are used to determine whether one or more anomalies indicating a cyber threat exist within the collected data. Responsive to determining that the anomalies exist, it is determined whether to provide a response action.Type: GrantFiled: September 7, 2021Date of Patent: September 17, 2024Assignee: 802 Secure, Inc.Inventors: Ashok Madanahalli, Konrad Grutzmacher, Garry Drummond
-
Patent number: 11936680Abstract: A threat monitoring and vulnerability management system is disclosed. The system includes one or more sensors configured to scan a frequency spectrum of a project 25 (P25) network and to collect data on the P25network.Type: GrantFiled: February 21, 2023Date of Patent: March 19, 2024Assignee: 802 Secure, Inc.Inventors: Garry Drummond, Konrad Grutzmacher, Clifford Fernandez, Michael Raggo
-
Patent number: 11716623Abstract: A System and Method is provided that enable identifying cyber security attacks using observation and monitoring of end point activity. By following and monitoring the wireless connection related activities of endpoint devices as they cycle through various steps leading to establishing a connection to the secure network, a knowledge base is established in the cloud by analysis of the actions, and communication to build the confidence that the users of the network are where they should be. In one embodiment, no access is provided until a user presents valid credentials. Based on these credentials the network then builds a specific path based on access controls, tunnels or other techniques to control the user’s communication and access to specific targets within the network.Type: GrantFiled: October 6, 2022Date of Patent: August 1, 2023Assignee: 802 Secure, Inc.Inventors: Konrad Grutzmacher, Clifford Fernandez
-
Patent number: 11595429Abstract: A threat monitoring and vulnerability management system is disclosed. The system includes one or more sensors configured to scan a frequency spectrum of a project 25 (P25) network and to collect data on the P25 network.Type: GrantFiled: March 2, 2021Date of Patent: February 28, 2023Assignee: 802 Secure, Inc.Inventors: Garry Drummond, Konrad Grutzmacher, Clifford Fernandez, Michael Raggo
-
Patent number: 11540130Abstract: A System and Method is provided that enable identifying cyber security attacks using observation and monitoring of end point activity. By following and monitoring the wireless connection related activities of endpoint devices as they cycle through various steps leading to establishing a connection to the secure network, a knowledge base is established in the cloud by analysis of the actions, and communication to build the confidence that the users of the network are where they should be. In one embodiment, no access is provided until a user presents valid credentials. Based on these credentials the network then builds a specific path based on access controls, tunnels or other techniques to control the user's communication and access to specific targets within the network.Type: GrantFiled: March 26, 2019Date of Patent: December 27, 2022Assignee: 802 Secure, Inc.Inventors: Konrad Grutzmacher, Clifford Fernandez
-
Patent number: 11337067Abstract: Security is provided for enterprise local area networks (LANs) by pre-vetting and identifying the security characteristic and actions of any new wireless networks that tries to connect to a secure LAN network. The disclosure herein provides for identification and classification of IEEE 802.11 wireless networks by using monitoring sensor system within and managed by a centralized cloud. The monitoring sensors interrogate the network mimicking the behavior of known platforms, such as an end-user's workstation or mobile device followed by random actions simulating a human person. The response characteristics of the wireless network including the behavior patterns relating to the LAN system and human behavior are collected.Type: GrantFiled: July 14, 2020Date of Patent: May 17, 2022Assignee: 802 Secure, Inc.Inventors: Konrad Grutzmacher, Clifford Fernandez, Michael Raggo, Garry Drummond
-
Patent number: 10999309Abstract: A threat monitoring and vulnerability management system is disclosed. The system includes one or more sensors configured to scan a frequency spectrum of a project 25 (P25) network and to collect data on the P25 network.Type: GrantFiled: May 7, 2018Date of Patent: May 4, 2021Assignee: 802 Secure, Inc.Inventors: Garry Drummond, Konrad Grutzmacher, Clifford Fernandez, Michael Raggo
-
Patent number: 10764755Abstract: Security is provided for enterprise local area networks (LANs) by pre-vetting and identifying the security characteristic and actions of any new wireless networks that tries to connect to a secure LAN network. The disclosure herein provides for identification and classification of IEEE 802.11 wireless networks by using monitoring sensor system within and managed by a centralized cloud. The monitoring sensors interrogate the network mimicking the behavior of known platforms, such as an end-user's workstation or mobile device followed by random actions simulating a human person. The response characteristics of the wireless network including the behavior patterns relating to the LAN system and human behavior are collected.Type: GrantFiled: January 22, 2018Date of Patent: September 1, 2020Assignee: 802 Secure, Inc.Inventors: Konrad Grutzmacher, Clifford Fernandez, Michael Raggo, Garry Drummond
-
Patent number: 10257226Abstract: A system and method are provided that enable identifying and trapping cyber security attacks via wireless connectivity on enterprise and corporate networks. A deceptive network emulation of a specific customer network is used to invite and draw in possible attackers. The attacker is also enticed to initiate attack on the emulated deceptive network. Packet header inspection and deep packet evaluation of the attack are used for generating possible signatures of the attacker and the attack. The information from deep packet inspection combined with the understanding of attack modality derived from enablement of attack on the deceptive network are used to generate detailed defensive methodologies, response capabilities and attack signatures, so that various types of cyber attacks including zero-day attacks from the attacker can be identified, prevented or addressed and responded to.Type: GrantFiled: June 7, 2016Date of Patent: April 9, 2019Assignee: 802 Secure, Inc.Inventors: Garry Drummond, Paul Vilevac