Patents Assigned to Secure-it Inc.
-
Patent number: 12205092Abstract: At least one computer-readable medium on which are stored instructions that, when executed by one or more processing devices, enable the one or more processing devices to perform a method. The method includes the steps of receiving over a network a request from an employing entity to facilitate an automatic savings program including savings accounts for employees of the employing entity, receiving over the network a request from an employee to participate in the automatic savings program, automatically routing at predetermined time intervals an employee-selected amount of the employee's wages to a savings account of the employee, receiving at least one request over the network from the employee to transfer funds from the savings account of the employee to an employee-designated destination, and initiating the requested fund transfer.Type: GrantFiled: July 26, 2023Date of Patent: January 21, 2025Assignee: SECURE, INC.Inventors: Devin Miller, Bassam Saliba, Zachary Scott Shannon, Elaine Gilbert Levey, Gopal Annasundaram
-
Patent number: 12192229Abstract: A threat monitoring and vulnerability management system is disclosed. The system includes one or more sensors configured to scan a frequency spectrum of a project 25 (P25) network and to collect data on the P25 network.Type: GrantFiled: December 14, 2023Date of Patent: January 7, 2025Assignee: 802 Secure, Inc.Inventors: Garry Drummond, Konrad Grutzmacher, Clifford Fernandez, Michael Raggo
-
Patent number: 12160742Abstract: A System and Method is provided that enable identifying cyber security attacks using observation and monitoring of end point activity. By following and monitoring the wireless connection related activities of endpoint devices as they cycle through various steps leading to establishing a connection to the secure network, a knowledge base is established in the cloud by analysis of the actions, and communication to build the confidence that the users of the network are where they should be. In one embodiment, no access is provided until a user presents valid credentials. Based on these credentials the network then builds a specific path based on access controls, tunnels or other techniques to control the user's communication and access to specific targets within the network.Type: GrantFiled: March 7, 2023Date of Patent: December 3, 2024Assignee: 802 Secure, Inc.Inventors: Konrad Grutzmacher, Clifford Fernandez
-
Patent number: 12113810Abstract: An autonomic incident response system (AIRS) that can be used within any cyber system (computing systems, network devices, applications, cyber-physical systems, data, and files). If a cyber system is attacked, the cyberattack pattern type can be seamlessly identified by the AIRS along with the method used to launch the attack, the vulnerability that was exploited, the impact and consequence of the attack, and finally the recovery actions that can be taken automatically or semi-automatically to stop the attack or mitigate its impact on cyber system operations.Type: GrantFiled: August 4, 2021Date of Patent: October 8, 2024Assignee: 802 Secure, Inc.Inventor: Salim Hariri
-
Patent number: 12095790Abstract: Methods and systems for threat monitoring and analysis are disclosed. Data is collected, over a protected network, from a data stream provided by at least one data source connecting to the protected network. Machine learning (ML) models are trained for the data stream utilizing the collected data. The ML models include a first ML model to establish a baseline value, an allowed threshold value range, and a threshold value for the data from the data source, and a second ML model to identify outlier data. The outlier data is outside of the allowed threshold value range from the baseline value and exceeds the threshold value in the data stream. The ML models are used to determine whether one or more anomalies indicating a cyber threat exist within the collected data. Responsive to determining that the anomalies exist, it is determined whether to provide a response action.Type: GrantFiled: September 7, 2021Date of Patent: September 17, 2024Assignee: 802 Secure, Inc.Inventors: Ashok Madanahalli, Konrad Grutzmacher, Garry Drummond
-
Patent number: 12074873Abstract: In one embodiment, a method is provided. The method includes receiving a registration message from a network device. The registration request indicates that a first computing device has connected to the computing devices. The method also includes determining a category for the first computing device based on the registration message. The method further includes determining a set of rules for the computing device based on the category. The method further includes transmitting the set of rules to the network device. The set of rules indicates permissions for the first computing device. Each network of the set of networks is initially isolated from other networks of the set of networks when the network is created. Each network of the set of networks comprises a respective computing device of the set of computing devices.Type: GrantFiled: March 4, 2021Date of Patent: August 27, 2024Assignee: YIKES SECURE, INC.Inventors: Andrew Samuel Cohen, Daniel Curtis Weller, Thomas Wasyl Martz, Kevin Michael Yeich, Raemar Antwarn Horne, Tyler James Bryant
-
Patent number: 12015647Abstract: The embodiment herein provides a system for securing computer infrastructure and one or more devices that depend on one or more cloud platforms. The system includes a memory, and a processor that stores and executes a set of instructions. The processor is configured to (i) extract one or more information data from at least one of the cloud platforms or the devices that depends on the one or more cloud platforms, (ii) execute compliance tests to identify compliance and non-compliance in the one or more information data, (iii) generate a network topology map by querying the one or more information data, (iv) classify a connectivity between the one or more devices and their nature, (v) compute risk metrics, (vi) re-execute the compliance tests to detect changes, and (vii) implement security compliances without impacting a production or operational environment of the one or more cloud platforms.Type: GrantFiled: November 9, 2021Date of Patent: June 18, 2024Assignee: TALA SECURE INC.Inventors: Rajesh Kanungo, Raman Rampura Venkatachar, Benjamin R Loomis, Saurav Roy
-
Patent number: 11936680Abstract: A threat monitoring and vulnerability management system is disclosed. The system includes one or more sensors configured to scan a frequency spectrum of a project 25 (P25) network and to collect data on the P25network.Type: GrantFiled: February 21, 2023Date of Patent: March 19, 2024Assignee: 802 Secure, Inc.Inventors: Garry Drummond, Konrad Grutzmacher, Clifford Fernandez, Michael Raggo
-
Publication number: 20240062174Abstract: At least one computer-readable medium on which are stored instructions that, when executed by one or more processing devices, enable the one or more processing devices to perform a method. The method includes the steps of receiving over a network a request from an employing entity to facilitate an automatic savings program including savings accounts for employees of the employing entity, receiving over the network a request from an employee to participate in the automatic savings program, automatically routing at predetermined time intervals an employee-selected amount of the employee's wages to a savings account of the employee, receiving at least one request over the network from the employee to transfer funds from the savings account of the employee to an employee-designated destination, and initiating the requested fund transfer.Type: ApplicationFiled: July 26, 2023Publication date: February 22, 2024Applicant: SECURE, INC.Inventors: DEVIN MILLER, BASSAM SALIBA, ZACHARY SCOTT SHANNON, ELAINE GILBERT LEVEY, GOPAL ANNASUNDARAM
-
Patent number: 11818098Abstract: A protection system, method, and a security device can protect an operational technology (OT) system having connected hardware equipment, including at least an interface that can receive a control communication and an industrial control device (ICD) for controlling at least one industrial device. They feature tasks/steps that receive control communication from the communication interface, determine whether the received control communication contains an undesirable control command, and either pass or block the received control communication to the ICD depending on whether the received control communication contains an undesirable control command. The security device can be disposed between a source of communication in an OT network and the ICD for protection.Type: GrantFiled: September 15, 2021Date of Patent: November 14, 2023Assignee: MISSION SECURE, INC.Inventors: Daniel D. Park, John Mark Baggett, Edward C. Suhler, Rick A. Jones, Gary W. Huband, Paul D. Robertson, Austin C. Suhler, Casey Silver
-
Patent number: 11748720Abstract: At least one computer-readable medium on which are stored instructions that, when executed by one or more processing devices, enable the one or more processing devices to perform a method. The method includes the steps of receiving over a network a request from an employing entity to facilitate an automatic savings program including savings accounts for employees of the employing entity, receiving over the network a request from an employee to participate in the automatic savings program, automatically routing at predetermined time intervals an employee-selected amount of the employee's wages to a savings account of the employee, receiving at least one request over the network from the employee to transfer funds from the savings account of the employee to an employee-designated destination, and initiating the requested fund transfer.Type: GrantFiled: December 14, 2021Date of Patent: September 5, 2023Assignee: SECURE, INC.Inventors: Devin Miller, Bassam Saliba, Zachary Scott Shannon, Elaine Gilbert Levey, Gopal Annasundaram
-
Patent number: 11716623Abstract: A System and Method is provided that enable identifying cyber security attacks using observation and monitoring of end point activity. By following and monitoring the wireless connection related activities of endpoint devices as they cycle through various steps leading to establishing a connection to the secure network, a knowledge base is established in the cloud by analysis of the actions, and communication to build the confidence that the users of the network are where they should be. In one embodiment, no access is provided until a user presents valid credentials. Based on these credentials the network then builds a specific path based on access controls, tunnels or other techniques to control the user’s communication and access to specific targets within the network.Type: GrantFiled: October 6, 2022Date of Patent: August 1, 2023Assignee: 802 Secure, Inc.Inventors: Konrad Grutzmacher, Clifford Fernandez
-
Patent number: 11675650Abstract: A fault tolerant consensus generation and communication system and method is described. Each processing node in the system receives a plurality of measurements from a sensor, calculates a consolidated value for the received plurality of measurements, transmits the consolidated value to other processing nodes, receives consolidated values from the other processing nodes, calculates a consensus value based on the calculated consolidated value and the received one or more consolidated values, transmits the calculated consensus value to the other processing nodes, receives consensus values from the other processing nodes, generates a consensus message based on the calculated consensus value, the received one or more consensus values, and a predefined criterion, and, in a case where the consensus message is not present in a consensus queue, adds the consensus message to the consensus queue.Type: GrantFiled: October 28, 2021Date of Patent: June 13, 2023Assignee: MISSION SECURE, INC.Inventors: Jacob Tarren, Austin Charles Suhler, Cameron Patrick Calpin, Rick A. Jones
-
Patent number: 11595429Abstract: A threat monitoring and vulnerability management system is disclosed. The system includes one or more sensors configured to scan a frequency spectrum of a project 25 (P25) network and to collect data on the P25 network.Type: GrantFiled: March 2, 2021Date of Patent: February 28, 2023Assignee: 802 Secure, Inc.Inventors: Garry Drummond, Konrad Grutzmacher, Clifford Fernandez, Michael Raggo
-
Patent number: 11540130Abstract: A System and Method is provided that enable identifying cyber security attacks using observation and monitoring of end point activity. By following and monitoring the wireless connection related activities of endpoint devices as they cycle through various steps leading to establishing a connection to the secure network, a knowledge base is established in the cloud by analysis of the actions, and communication to build the confidence that the users of the network are where they should be. In one embodiment, no access is provided until a user presents valid credentials. Based on these credentials the network then builds a specific path based on access controls, tunnels or other techniques to control the user's communication and access to specific targets within the network.Type: GrantFiled: March 26, 2019Date of Patent: December 27, 2022Assignee: 802 Secure, Inc.Inventors: Konrad Grutzmacher, Clifford Fernandez
-
Patent number: 11337067Abstract: Security is provided for enterprise local area networks (LANs) by pre-vetting and identifying the security characteristic and actions of any new wireless networks that tries to connect to a secure LAN network. The disclosure herein provides for identification and classification of IEEE 802.11 wireless networks by using monitoring sensor system within and managed by a centralized cloud. The monitoring sensors interrogate the network mimicking the behavior of known platforms, such as an end-user's workstation or mobile device followed by random actions simulating a human person. The response characteristics of the wireless network including the behavior patterns relating to the LAN system and human behavior are collected.Type: GrantFiled: July 14, 2020Date of Patent: May 17, 2022Assignee: 802 Secure, Inc.Inventors: Konrad Grutzmacher, Clifford Fernandez, Michael Raggo, Garry Drummond
-
Patent number: 11252176Abstract: A computer-implemented method may comprise collecting and storing a plurality of electronic messages and a corresponding plurality of phishing kits, each of which being associated with one or several malicious Uniform Resource Locator (URL) and extracting a set of features from each of the plurality of electronic messages. For each of the extracted set of features, the method may comprise determining a set of optimal scanning parameters using one or more decision trees, trained with a supervised learning algorithm based on programmatically or manually examining or reverse-engineering the source code of the phishing kits, or trained with a supervised learning algorithm based on a function that iteratively requests data from the websites pointed to by the malicious URLs and examines data and codes returned by such requests.Type: GrantFiled: April 29, 2020Date of Patent: February 15, 2022Assignee: VADE SECURE INC.Inventors: Sebastien Goutal, Maxime Marc Meyer
-
Patent number: 11184393Abstract: A method of collecting training data related to a branded phishing URL may comprise retrieving a phishing URL impersonating a brand; fetching a final webpage referenced thereby; determining the main language of the textual content thereof; rendering graphical representation(s) of the final webpage; extracting, from the source of URLs, information including the retrieved phishing URL, a brand, a type and a date associated therewith and storing the extracted information together with the final webpage and the rendered graphical representation(s). A message that contains a URL matching the phishing URL may then be retrieved. The main language of the textual content of the message may be determined and graphical representations thereof rendered. A record may be updated with the message, the main language and the rendered graphical representations, which may be made accessible as training data to train users to recognize phishing websites and messages.Type: GrantFiled: October 1, 2020Date of Patent: November 23, 2021Assignee: VADE SECURE INC.Inventors: Adrien Gendre, Olivier Lemarié, Sébastien Goutal
-
Patent number: 11153277Abstract: A protection system, method, and a security device can protect an Internet of things (IOT) system having connected hardware equipment, including at least an interface that can receive a control communication for controlling at least one connected device. They feature tasks/steps that intercept control communication between a controller and a connected device, determine whether the received control communication contains an undesirable control command, and either pass or block the received control communication to the connected device depending on whether the received control communication contains an undesirable control command. The security device can be disposed between a source of communication in an IOT network and the connected device for protection.Type: GrantFiled: December 4, 2019Date of Patent: October 19, 2021Assignee: MISSION SECURE, INC.Inventors: Daniel D. Park, John Mark Baggett, Edward C Suhler, Rick A. Jones, Gary W. Huband, Paul D. Robertson, Austin C. Suhler, Casey Silver
-
Patent number: 11019079Abstract: A computer-implemented method of detecting an email spoofing and spear phishing attack may comprise generating a contact model of a sender of emails; determining, by a hardware processor, a statistical dispersion of the generated contact model that is indicative of a spread of a distribution of data in the generated model and receiving, over a computer network, an email from the sender.Type: GrantFiled: March 14, 2019Date of Patent: May 25, 2021Assignee: VADE SECURE INC.Inventor: Sebastien Goutal