Patents by Inventor Bill Joll

Bill Joll has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 9401932
    Abstract: A device and method for providing forensic data in network activity indicative of the presence of malware. A distributed set of network-based sensors operates within an enterprise network in cooperation with a centralized analytics and correlation engine that correlates detected events across the sensors to detect malicious activity on a monitored network which may include using a multi-tiered or Rete net rule set or engine. When malicious activity is detected upon the satisfaction of a predetermined set of conditions, the invention traces the activity to a host responsible for the activity for further action.
    Type: Grant
    Filed: January 3, 2014
    Date of Patent: July 26, 2016
    Assignee: CYBER ADAPT, INC.
    Inventors: James Deerman, Bill Joll, Craig Lanning, Keith Rhodes
  • Publication number: 20140245374
    Abstract: A device and method for providing forensic data in network activity indicative of the presence of malware. A distributed set of network-based sensors operates within an enterprise network in cooperation with a centralized analytics and correlation engine that correlates detected events across the sensors to detect malicious activity on a monitored network which may include using a multi-tiered or Rete net rule set or engine. When malicious activity is detected upon the satisfaction of a predetermined set of conditions, the invention traces the activity to a host responsible for the activity for further action.
    Type: Application
    Filed: January 3, 2014
    Publication date: August 28, 2014
    Inventors: James Deerman, Bill Joll, Craig Lanning, Keith Rhodes
  • Publication number: 20140157405
    Abstract: A scalable cyber-security system, method and architecture for the identification of malware and malicious behavior in a computer network. Host flow, host port usage, host information and network data at the application, transport and network layers are aggregated from within the network and correlated to identify a network behavior such as the presence of malicious code.
    Type: Application
    Filed: December 4, 2012
    Publication date: June 5, 2014
    Inventors: Bill Joll, Keith Rhodes, James Deerman