Patents by Inventor Andrew J. Thomas

Andrew J. Thomas has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20230114821
    Abstract: A threat management facility receives data from a variety of sources such as compute instances within an enterprise network, cloud service providers supporting the enterprise network, and third-party data providers such as geolocation services. In order to facilitate prompt notification of potential risks, the threat management facility may incrementally update data for use in threat assessments as the data becomes available from these different sources, and create suitable alerts or notifications whenever the currently accumulated data provides an indication of threat meeting a predetermined threshold.
    Type: Application
    Filed: May 26, 2022
    Publication date: April 13, 2023
    Inventors: Andrew J. Thomas, Mangal Rakesh Vankadaru, Prakash Kumar Talreja, Timothy Rayment, Biju Balakrishnan Nair
  • Publication number: 20230111864
    Abstract: An asynchronous stream of security events is added to a data lake for enterprise security by identifying groups of related events related to a security threat, and creating rules to fold these related events into a single security event along with metadata. The folding rules may then be applied to security events in the event stream to compress data in the data lake and improve detection efficiency.
    Type: Application
    Filed: May 26, 2022
    Publication date: April 13, 2023
    Inventors: Andrew J. Thomas, Mangal Rakesh Vankadaru, Prakash Kumar Talreja, Timothy Rayment
  • Publication number: 20230113375
    Abstract: A threat management system stores an attack matrix characterizing tactics and techniques, and provides threat detection based on patterns of traversal of the attack matrix. Where the threat management system provides a data lake of security events and a query interface for using the data lake to investigate security issues, useful inferences may also be drawn by comparing query activity in the query interface with the patterns of traversal of the attack matrix, such as by using a malicious pattern of traversal to identify a concurrent chain of queries indicative of a threat, or by presenting separate threat scores to an analyst based on query activity and patterns of traversal.
    Type: Application
    Filed: May 26, 2022
    Publication date: April 13, 2023
    Inventors: Andrew J. Thomas, Mangal Rakesh Vankadaru, Prakash Kumar Talreja, Timothy Rayment
  • Publication number: 20230111304
    Abstract: A platform for threat investigation in an enterprise network receives threat data from managed endpoints, and is augmented with data from cloud computing platforms and other third-party resources. The resulting merged data set can be incrementally updated and used to automatically launch investigations at appropriate times.
    Type: Application
    Filed: May 26, 2022
    Publication date: April 13, 2023
    Inventors: Andrew J. Thomas, Mangal Rakesh Vankadaru, Prakash Kumar Talreja, Timothy Rayment, Biju Balakrishnan Nair
  • Publication number: 20230114719
    Abstract: A platform for managing threat data integrates threat data from a variety of sources including internal threat data from instrumented compute instances associated with an enterprise network and threat data from one or more independent, external resources. Threat assessments are incrementally revised as this threat data is asynchronously received from various sources, and a threat intervention container is automatically created and presented to an investigator when a composite threat score for one or more of the compute instances meets a predetermined threshold.
    Type: Application
    Filed: May 26, 2022
    Publication date: April 13, 2023
    Inventors: Andrew J. Thomas, Mangal Rakesh Vankadaru, Prakash Kumar Talreja, Timothy Rayment, Biju Balakrishnan Nair
  • Patent number: 11616758
    Abstract: A network address translation device or similarly situated network device can cooperate with endpoints on a subnet of an enterprise network to secure endpoints within the subnet. For example, the network address translation device may be configured, either alone or in cooperation with other network devices, to block traffic from a compromised endpoint to destinations outside the subnet, and to direct other endpoints within the subnet to stop network communications with the compromised endpoint.
    Type: Grant
    Filed: April 4, 2018
    Date of Patent: March 28, 2023
    Assignee: Sophos Limited
    Inventors: Moritz Daniel Grimm, Daniel Stutz, Andrew J. Thomas, Kenneth D. Ray
  • Patent number: 11616811
    Abstract: Phishing attacks attempt to solicit valuable information such as personal information, account credentials, and the like from human users by disguising a malicious request for information as a legitimate inquiry, typically in the form of an electronic mail or similar communication. By tracking a combination of outbound web traffic from an endpoint and inbound electronic mail traffic to the endpoint, improved detection of phishing attacks or similar efforts to wrongly obtain sensitive information can be achieved.
    Type: Grant
    Filed: December 18, 2018
    Date of Patent: March 28, 2023
    Assignee: Sophos Limited
    Inventors: Andrew J. Thomas, Karl Ackerman, James Douglas Bean, Kenneth D. Ray, Daniel Stutz
  • Patent number: 11599660
    Abstract: Entity models are used to evaluate potential risk of entities, either individually or in groups, in order to evaluate suspiciousness within an enterprise network. These individual or aggregated risk assessments can be used to adjust the security policy for compute instances within the enterprise network. A security policy may specify security settings such as network speed, filtering levels, network isolation, levels of privilege, and the like.
    Type: Grant
    Filed: July 13, 2021
    Date of Patent: March 7, 2023
    Assignee: Sophos Limited
    Inventors: Joseph H. Levy, Andrew J. Thomas, Daniel Salvatore Schiappa, Kenneth D. Ray
  • Patent number: 11562089
    Abstract: An interface for a threat management facility of an enterprise network supports the use of third-party security products within the enterprise network by providing access to relevant internal instrumentation and/or a programmatic interface for direct or indirect access to local security agents on compute instances within the enterprise network.
    Type: Grant
    Filed: April 12, 2019
    Date of Patent: January 24, 2023
    Assignee: Sophos Limited
    Inventors: Joseph H. Levy, Andrew J. Thomas, Daniel Salvatore Schiappa, Kenneth D. Ray
  • Patent number: 11562088
    Abstract: A security platform uses a sensor-event-analysis-response methodology to iteratively adapt to a changing security environment by continuously creating and updating entity models based on observed activities and detecting patterns of events that deviate from these entity models.
    Type: Grant
    Filed: April 12, 2019
    Date of Patent: January 24, 2023
    Assignee: Sophos Limited
    Inventors: Joseph H. Levy, Andrew J. Thomas, Daniel Salvatore Schiappa, Kenneth D. Ray
  • Patent number: 11556664
    Abstract: A threat management facility stores a number of entity models that characterize reportable events from one or more entities. A stream of events from compute instances within an enterprise network can then be analyzed using these entity models to detect behavior that is inconsistent or anomalous for one or more of the entities that are currently active within the enterprise network.
    Type: Grant
    Filed: April 12, 2019
    Date of Patent: January 17, 2023
    Assignee: Sophos Limited
    Inventors: Joseph H. Levy, Andrew J. Thomas, Daniel Salvatore Schiappa, Kenneth D. Ray
  • Patent number: 11552962
    Abstract: An ensemble of detection techniques are used to identify code that presents intermediate levels of threat. For example, an ensemble of machine learning techniques may be used to evaluate suspiciousness based on binaries, file paths, behaviors, reputations, and so forth, and code may be sorted into safe, unsafe, intermediate, or any similar categories. By filtering and prioritizing intermediate threats with these tools, human threat intervention can advantageously be directed toward code samples and associated contexts most appropriate for non-automated responses.
    Type: Grant
    Filed: September 12, 2018
    Date of Patent: January 10, 2023
    Assignee: Sophos Limited
    Inventors: Joshua Daniel Saxe, Andrew J. Thomas, Russell Humphries, Simon Neil Reed, Kenneth D. Ray, Joseph H. Levy
  • Patent number: 11550909
    Abstract: A multi-endpoint event graph is used to detect malware based on malicious software moving through a network.
    Type: Grant
    Filed: September 30, 2020
    Date of Patent: January 10, 2023
    Assignee: Sophos Limited
    Inventors: Beata Ladnai, Mark David Harris, Andrew J. Thomas, Andrew G. P. Smith, Russell Humphries
  • Patent number: 11545996
    Abstract: Systems, devices, and methods related to low-noise, high-accuracy single-ended continuous-time sigma-delta (CTSD) analog-to-digital converter (ADC) are provided. An example single-ended CTSD ADC includes a pair of input nodes to receive a single-ended input signal and input circuitry. The input circuitry includes a pair of switches, each coupled to one of the pair of input nodes; and an amplifier to provide a common mode signal at a pair of first nodes, each before one of the pair of switches. The single-ended CTSD ADC further includes digital-to-analog converter (DAC) circuitry; and integrator circuitry coupled to the input circuitry and the DAC circuitry via a pair of second nodes.
    Type: Grant
    Filed: August 24, 2021
    Date of Patent: January 3, 2023
    Assignee: Analog Devices International Unlimited Company
    Inventors: Roberto Sergio Matteo Maurino, Venkata Aruna Srikanth Nittala, Bhargav R. Vyas, Christopher Peter Hurrell, Andrew J. Thomas
  • Patent number: 11545991
    Abstract: Disclosed herein are some examples of analog-to-digital converters (ADCs) that can perform auto-zeroing with amplifying a signal for improvement of a signal-to-noise ratio. The ADCs may produce a first digital code to represent an analog input signal and a second digital code based on a residue from the first digital code, and may combine the first digital code and the second digital code to produce a digital output code to represent the analog input signal. The ADC may utilize a first observation and a second observation of an analog residue value representing the residue to produce the second digital code.
    Type: Grant
    Filed: November 11, 2021
    Date of Patent: January 3, 2023
    Assignee: Analog Devices, Inc.
    Inventors: Jesper Steensgaard-Madsen, Andrew J. Thomas
  • Publication number: 20220394480
    Abstract: Methods, systems and computer readable media for rogue access point detection are described.
    Type: Application
    Filed: August 15, 2022
    Publication date: December 8, 2022
    Applicant: SOPHOS LIMITED
    Inventors: Anil Kaushik, Andrew J. Thomas, Shail Talati, Dirk Bolte
  • Publication number: 20220368698
    Abstract: A variety of techniques are disclosed for detection of advanced persistent threats and similar malware. In one aspect, the detection of certain network traffic at a gateway is used to trigger a query of an originating endpoint, which can use internal logs to identify a local process that is sourcing the network traffic. In another aspect, an endpoint is configured to periodically generate and transmit a secure heartbeat, so that an interruption of the heartbeat can be used to signal the possible presence of malware. In another aspect, other information such as local and global reputation information is used to provide context for more accurate malware detection.
    Type: Application
    Filed: April 15, 2022
    Publication date: November 17, 2022
    Inventor: Andrew J. Thomas
  • Patent number: 11463882
    Abstract: Methods, systems and computer readable media for rogue access point detection are described.
    Type: Grant
    Filed: April 14, 2020
    Date of Patent: October 4, 2022
    Assignee: Sophos Limited
    Inventors: Anil Kaushik, Andrew J. Thomas, Shail Talati, Dirk Bolte
  • Publication number: 20220286481
    Abstract: A threat management facility detects a device on an enterprise network and determines whether the device is one of a set of managed devices for the enterprise network. When the device is not one of the set of managed devices, the threat management facility may selectively direct the device to a portal that provides support to the user of the device while the device awaits admission to the enterprise network. As the user interacts with the portal, the portal may manage admission of unrecognized devices onto the enterprise network while making efficient use of network administrator resources.
    Type: Application
    Filed: April 15, 2022
    Publication date: September 8, 2022
    Inventors: John Edward Tyrone Shaw, Ross McKerchar, Moritz Daniel Grimm, Jan Karl Heinrich Weber, Shail R. Talati, Kenneth D. Ray, Andrew J. Thomas
  • Publication number: 20220217166
    Abstract: An endpoint coupled in a communicating relationship with an enterprise network may include a data recorder configured to store an event stream of data indicating events on the endpoint including types of changes to computing objects, a filter configured to locally process the event stream into a filtered event stream including a subset of types of changes to the computing objects, and a local security agent. The local security agent may be configured to transmit the filtered event stream to a threat management facility, respond to a filter adjustment from the threat management facility by adjusting the filter to modify the subset of types of changes included in the filtered event stream, and respond to a query from the threat management facility by retrieving data stored in the data recorder over a time window before the query and excluded from the filtered event stream.
    Type: Application
    Filed: March 28, 2022
    Publication date: July 7, 2022
    Inventors: Beata Ladnai, Mark David Harris, Andrew G. P. Smith, Kenneth D. Ray, Andrew J. Thomas, Russell Humphries