Patents by Inventor Andrew J. Surwilo

Andrew J. Surwilo has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20220394061
    Abstract: A method for data breach protection includes identifying data partners of an enterprise and determining data usage policies of the data partners. The data usage policies of the data partners may be monitored and a change in at least one data usage policy of at least one data partner may be detected. A similarity between an original version of the at least one data usage policy and the changed version of the at least one data usage policy may be determined. Results of the determined similarity may be displayed.
    Type: Application
    Filed: February 14, 2022
    Publication date: December 8, 2022
    Applicant: BROADSTONE TECHNOLOGIES, LLC
    Inventors: Taimur Aslam, Andrew J. Surwilo
  • Publication number: 20220263734
    Abstract: A method for telemetry analysis of a digital twin includes analyzing network traffic sent or received by a host network. Entities exchanging data with the host network are identified. A plurality of applications within the host network used for sending or receiving the exchanged data may be identified. A digital twin of the host network is developed based upon the identified entities exchanging data with the host network and the applications within the host network used for sending or receiving the exchanged data. Stimuli may be applied to the digital twin, and the likelihood of a change in state within the host network is assessed based upon the applied stimuli.
    Type: Application
    Filed: February 14, 2022
    Publication date: August 18, 2022
    Applicant: BROADSTONE TECHNOLOGIES, LLC
    Inventors: Taimur Aslam, Andrew J. Surwilo
  • Publication number: 20220261881
    Abstract: According to some embodiments, a method is performed by an augmented reality (AR) device. The AR device comprises a display configured to overlay virtual objects onto a field of view of a user in real-time. The method comprises receiving an indication from an e-commerce engine that an AR model is available to the user, wherein the AR model represents an e-commerce product and comprises attributes describing the e-commerce product, and retrieving the AR model from the e-commerce engine. The AR model represents a product offered by the e-commerce engine (e.g., gift card, coupon code, offer code). The method further comprises determining a surface in the field of view of the second user for projection of the AR model and displaying on the determined surface an AR projection based on the AR model to the user via the display. The AR projection represents the product represented by the AR model.
    Type: Application
    Filed: February 14, 2022
    Publication date: August 18, 2022
    Inventors: Taimur Aslam, Andrew J. Surwilo
  • Publication number: 20220262078
    Abstract: According to some embodiments, a method is performed by an augmented reality (AR) device. The AR device comprises a display configured to overlay virtual objects onto a field of view of a user in real-time. The method comprises: establishing an audio-video connection between a first user and a second user; receiving an indication from an AR engine that an AR model from the first user is available to the second user; retrieving the AR model from the AR engine, wherein the AR model represents a real world object in the field of view of the second user; determining a surface in the field of view of the second user for projection of the AR model; and displaying on the determined surface an AR projection based on the AR model to the second user via the display.
    Type: Application
    Filed: February 11, 2022
    Publication date: August 18, 2022
    Inventors: Taimur Aslam, Andrew J. Surwilo
  • Publication number: 20220261714
    Abstract: A method predicting risk includes identifying data partners associated with the enterprise and generating a computer readable model of the enterprise including representations of digital and physical assets, and data partners. Risk analysis algorithms may be applied to the computer readable model. A risk model associated with risk analysis may be generated, using the computer readable model, and results of the risk model may be displayed at a user interface.
    Type: Application
    Filed: February 14, 2022
    Publication date: August 18, 2022
    Applicant: BROADSTONE TECHNOLOGIES, LLC
    Inventors: Taimur Aslam, Andrew J. Surwilo
  • Publication number: 20220263843
    Abstract: A method for data breach protection includes analyzing network traffic of an enterprise. Uniform Resource Locators (URLs) included in the network traffic may be identified. The URLs may be classified into a bipartite graph. Classification sets of the bipartite graph may be established and displayed. In response to displaying the classification sets, an instruction related to management of the network traffic may be received and/or executed.
    Type: Application
    Filed: February 14, 2022
    Publication date: August 18, 2022
    Applicant: BROADSTONE TECHNOLOGIES, LLC
    Inventors: Taimur Aslam, Andrew J. Surwilo