Patents by Inventor Alexander Burt

Alexander Burt has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 11902303
    Abstract: A system configured to detect a threat activity on a network. The system including a digital device configured to detect a first order indicator of compromise on a network, detect a second order indicator of compromise on the network, generate a risk score based on correlating said first order indicator of compromise on the network with the second order indicator of compromise on said network, and generate at least one incident alert based on comparing the risk score to a threshold.
    Type: Grant
    Filed: July 29, 2022
    Date of Patent: February 13, 2024
    Assignee: Juniper Networks, Inc.
    Inventors: Fengmin Gong, Alexander Burt, Frank Jas
  • Publication number: 20230030659
    Abstract: A system configured to detect a threat activity on a network. The system including a digital device configured to detect a first order indicator of compromise on a network, detect a second order indicator of compromise on the network, generate a risk score based on correlating said first order indicator of compromise on the network with the second order indicator of compromise on said network, and generate at least one incident alert based on comparing the risk score to a threshold.
    Type: Application
    Filed: July 29, 2022
    Publication date: February 2, 2023
    Inventors: Fengmin GONG, Alexander BURT, Frank JAS
  • Patent number: 11503053
    Abstract: Methods, systems, and apparatus, including computer programs encoded on computer storage media, for managing security of a vehicle are provided. One of the methods includes: monitoring a plurality of activities of one or more electronic devices associated with the vehicle; generating a plurality of event logs based on the monitored activities; sending the generated event logs to a server; and receiving, from the server, one or more alerts created based on the generated event logs.
    Type: Grant
    Filed: December 20, 2019
    Date of Patent: November 15, 2022
    Assignee: Beijing Voyager Technology Co., Ltd.
    Inventors: Jiang Zhang, Alexander Burt, Xiaoyong Yi
  • Patent number: 11405410
    Abstract: A system configured to detect a threat activity on a network. The system including a digital device configured to detect a first order indicator of compromise on a network, detect a second order indicator of compromise on the network, generate a risk score based on correlating said first order indicator of compromise on the network with the second order indicator of compromise on said network, and generate at least one incident alert based on comparing the risk score to a threshold.
    Type: Grant
    Filed: June 11, 2019
    Date of Patent: August 2, 2022
    Assignee: Cyphort Inc.
    Inventors: Fengmin Gong, Alexander Burt, Frank Jas
  • Patent number: 11368471
    Abstract: Methods, systems, and apparatus, including computer programs encoded on computer storage media, for a system associated with a vehicle are provided. One of the systems includes one or more electronic control units (ECUs) connected to a controller area network (CAN) bus, one or more infotainment devices, and a security gateway coupled to the one or more ECUs via the CAN bus and connected to the one or more infotainment devices. The security gateway may be configured to receive signals from the CAN bus and the one or more infotainment devices and detect a security event based at least in part on received signals.
    Type: Grant
    Filed: July 1, 2019
    Date of Patent: June 21, 2022
    Assignee: Beijing Voyager Technology Co., Ltd.
    Inventors: Xiaoyong Yi, Alexander Burt, Jiang Zhang, Fengmin Gong
  • Publication number: 20210194904
    Abstract: Methods, systems, and apparatus, including computer programs encoded on computer storage media, for managing security of a vehicle are provided. One of the methods includes: monitoring a plurality of activities of one or more electronic devices associated with the vehicle; generating a plurality of event logs based on the monitored activities; sending the generated event logs to a server; and receiving, from the server, one or more alerts created based on the generated event logs.
    Type: Application
    Filed: December 20, 2019
    Publication date: June 24, 2021
    Inventors: Jiang ZHANG, Alexander BURT, Xiaoyong YI
  • Publication number: 20210006571
    Abstract: Methods, systems, and apparatus, including computer programs encoded on computer storage media, for a system associated with a vehicle are provided. One of the systems includes one or more electronic control units (ECUs) connected to a controller area network (CAN) bus, one or more infotainment devices, and a security gateway coupled to the one or more ECUs via the CAN bus and connected to the one or more infotainment devices. The security gateway may be configured to receive signals from the CAN bus and the one or more infotainment devices and detect a security event based at least in part on received signals.
    Type: Application
    Filed: July 1, 2019
    Publication date: January 7, 2021
    Inventors: Xiaoyong YI, Alexander BURT, Jiang ZHANG, Fengmin GONG
  • Publication number: 20190332771
    Abstract: A system configured to detect malware is described. The system configured to detect malware including a data collector configured to detect at least a first hypertext transfer object in a chain of a plurality of hypertext transfer objects. The data collector further configured to analyze at least the first hypertext transfer object for one or more events. And, the data collector configured to generate a list of events based on the analysis of at least the first hypertext transfer object.
    Type: Application
    Filed: July 10, 2019
    Publication date: October 31, 2019
    Inventors: Alexander BURT, Mikola BILOGORSKIY, McEnroe NAVARAJ, Frank JAS, Liang HAN, Yucheng TING, Manikandan KENYAN, Fengmin GONG, Ali GOLSHAN, Shishir SINGH
  • Publication number: 20190297097
    Abstract: A system configured to detect a threat activity on a network. The system including a digital device configured to detect a first order indicator of compromise on a network, detect a second order indicator of compromise on the network, generate a risk score based on correlating said first order indicator of compromise on the network with the second order indicator of compromise on said network, and generate at least one incident alert based on comparing the risk score to a threshold.
    Type: Application
    Filed: June 11, 2019
    Publication date: September 26, 2019
    Inventors: Fengmin Gong, Alexander Burt, Frank Jas
  • Patent number: 10354072
    Abstract: A system configured to detect malware is described. The system configured to detect malware including a data collector configured to detect at least a first hypertext transfer object in a chain of a plurality of hypertext transfer objects. The data collector further configured to analyze at least the first hypertext transfer object for one or more events. And, the data collector configured to generate a list of events based on the analysis of at least the first hypertext transfer object.
    Type: Grant
    Filed: April 20, 2018
    Date of Patent: July 16, 2019
    Assignee: Cyphort Inc.
    Inventors: Alexander Burt, Mikola Bilogorskiy, McEnroe Navaraj, Frank Jas, Liang Han, Yucheng Ting, Manikandan Kenyan, Fengmin Gong, Ali Golshan, Shishir Singh
  • Patent number: 10326778
    Abstract: A system configured to detect a threat activity on a network. The system including a digital device configured to detect a first order indicator of compromise on a network, detect a second order indicator of compromise on the network, generate a risk score based on correlating said first order indicator of compromise on the network with the second order indicator of compromise on said network, and generate at least one incident alert based on comparing the risk score to a threshold.
    Type: Grant
    Filed: November 9, 2015
    Date of Patent: June 18, 2019
    Assignee: Cyphort Inc.
    Inventors: Fengmin Gong, Alexander Burt, Frank Jas
  • Publication number: 20180247058
    Abstract: A system configured to detect malware is described. The system configured to detect malware including a data collector configured to detect at least a first hypertext transfer object in a chain of a plurality of hypertext transfer objects. The data collector further configured to analyze at least the first hypertext transfer object for one or more events. And, the data collector configured to generate a list of events based on the analysis of at least the first hypertext transfer object.
    Type: Application
    Filed: April 20, 2018
    Publication date: August 30, 2018
    Inventors: Alexander BURT, Mikola BILOGORSKIY, McEnroe NAVARAJ, Frank JAS, Liang HAN, Yucheng TING, Manikandan KENYAN, Fengmin GONG, Ali GOLSHAN, Shishir SINGH
  • Patent number: 9953163
    Abstract: A system configured to detect malware is described. The system configured to detect malware including a data collector configured to detect at least a first hypertext transfer object in a chain of a plurality of hypertext transfer objects. The data collector further configured to analyze at least the first hypertext transfer object for one or more events. And, the data collector configured to generate a list of events based on the analysis of at least the first hypertext transfer object.
    Type: Grant
    Filed: February 20, 2015
    Date of Patent: April 24, 2018
    Assignee: Cyphort Inc.
    Inventors: Alexander Burt, Mikola Bilogorskiy, McEnroe Navaraj, Frank Jas, Liang Han, Yucheng Ting, Manikandan Kenyan, Fengmin Gong, Ali Golshan, Shishir Singh
  • Patent number: 9686293
    Abstract: Systems and methods for monitoring malware events in a computer networking environment are described. The systems and methods including the steps of identifying suspect objects; transmitting the suspect objects to an inspection service, wherein the inspection service inspects the suspect objects using a plurality of inspection methods to create digital information about the nature of the potential threat posed by the suspect objects; transmitting said digital information to an analytical service operating, wherein the analytical service performs a plurality of analytical algorithms to categorize the suspect objects with one or more scores for each suspect object based on their security threat; transmitting said one or more scores to a correlation facility which aggregates a plurality of scores; and generating an infection verification pack comprising routines which, when run on an end-point machine within the computer networking environment, will mitigate a suspected security threat.
    Type: Grant
    Filed: February 23, 2015
    Date of Patent: June 20, 2017
    Assignee: Cyphort Inc.
    Inventors: Ali Golshan, Fengmin Gong, Frank Jas, Nick Bilogorskiy, Neal Vu, Chenghuai Lu, Alexander Burt, Manikandan Kenyan, Yucheng Ting
  • Publication number: 20160065601
    Abstract: A system configured to detect a threat activity on a network. The system including a digital device configured to detect a first order indicator of compromise on a network, detect a second order indicator of compromise on the network, generate a risk score based on correlating said first order indicator of compromise on the network with the second order indicator of compromise on said network, and generate at least one incident alert based on comparing the risk score to a threshold.
    Type: Application
    Filed: November 9, 2015
    Publication date: March 3, 2016
    Inventors: Fengmin Gong, Alexander Burt, Frank Jas
  • Publication number: 20150242628
    Abstract: A system configured to detect malware is described. The system configured to detect malware including a data collector configured to detect at least a first hypertext transfer object in a chain of a plurality of hypertext transfer objects. The data collector further configured to analyze at least the first hypertext transfer object for one or more events. And, the data collector configured to generate a list of events based on the analysis of at least the first hypertext transfer object.
    Type: Application
    Filed: February 20, 2015
    Publication date: August 27, 2015
    Inventors: Alexander Burt, Nick Bilogorskiy, McEnroe Navaraj, Frank Jas, Liang Han, Yucheng Ting, Manikandan Kenyan, Fengmin Gong, Ali Golshan, Shishir Singh
  • Publication number: 20150244732
    Abstract: Systems and methods for monitoring malware events in a computer networking environment are described.
    Type: Application
    Filed: February 23, 2015
    Publication date: August 27, 2015
    Inventors: Ali Golshan, Fengmin Gong, Frank Jas, Nick Bilogorskiy, Neal Vu, Chenghuai Lu, Alexander Burt, Manikandan Kenyan, Yucheng Ting