Patents by Inventor Blake Stanton Sutherland
Blake Stanton Sutherland has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 9230097Abstract: A method and apparatus for detecting data modification in a layered operating system is disclosed. Outbound content indicators at different layers are compared to detect potential outbound data modifications. Likewise, inbound content indicators at different layers are compared to detect potential inbound data modifications. Content indicators include checksum, cryptographic hash, signature, and fingerprint indicators. Embodiments of the present invention enable detection of data modifications across an operating system's kernel and user mode spaces, prevention of modified outbound data from reaching a network, prevention of modified input data from reaching a user application, and detection of malware and faults within an operating system.Type: GrantFiled: April 1, 2015Date of Patent: January 5, 2016Assignee: TREND MICRO INCORPORATEDInventor: Blake Stanton Sutherland
-
Publication number: 20150205948Abstract: A method and apparatus for detecting data modification in a layered operating system is disclosed. Outbound content indicators at different layers are compared to detect potential outbound data modifications. Likewise, inbound content indicators at different layers are compared to detect potential inbound data modifications. Content indicators include checksum, cryptographic hash, signature, and fingerprint indicators. Embodiments of the present invention enable detection of data modifications across an operating system's kernel and user mode spaces, prevention of modified outbound data from reaching a network, prevention of modified input data from reaching a user application, and detection of malware and faults within an operating system.Type: ApplicationFiled: April 1, 2015Publication date: July 23, 2015Applicant: TREND MICRO INCORPORATEDInventors: Rares STEFAN, Blake Stanton SUTHERLAND
-
Patent number: 9009474Abstract: A method and apparatus for detecting data modification in a layered operating system is disclosed. Outbound content indicators at different layers are compared to detect potential outbound data modifications. Likewise, inbound content indicators at different layers are compared to detect potential inbound data modifications. Content indicators include checksum, cryptographic hash, signature, and fingerprint indicators. Embodiments of the present invention enable detection of data modifications across an operating system's kernel and user mode spaces, prevention of modified outbound data from reaching a network, prevention of modified input data from reaching a user application, and detection of malware and faults within an operating system.Type: GrantFiled: April 28, 2014Date of Patent: April 14, 2015Assignee: Trend Micro IncorporatedInventor: Blake Stanton Sutherland
-
Patent number: 8893276Abstract: An intrusion prevention/detection system filter (IPS filter) performance evaluation is provided. The performance evaluation is performed at both the security center and at the customer sites to derive a base confidence score and local confidence scores. Existence of new vulnerability is disclosed and its attributes are used in the generation of new IPS filter or updates. The generated IPS filter is first tested to determine its base confidence score from test confidence attributes prior to deploying it to a customer site. A deep security manager and deep security agent, at the customer site, collect local confidence attributes that are used for determining the local confidence score. The local confidence score and the base confidence score are aggregated to form a global confidence score. The local and global confidence scores are then compared to deployment thresholds to determine whether the IPS filter should be deployed in prevention or detection mode or sent back to the security center for improvement.Type: GrantFiled: October 27, 2012Date of Patent: November 18, 2014Assignee: Trend Micro IncorporatedInventors: Blake Stanton Sutherland, William G. McGee
-
Publication number: 20140237592Abstract: A method and apparatus for detecting data modification in a layered operating system is disclosed. Outbound content indicators at different layers are compared to detect potential outbound data modifications. Likewise, inbound content indicators at different layers are compared to detect potential inbound data modifications. Content indicators include checksum, cryptographic hash, signature, and fingerprint indicators. Embodiments of the present invention enable detection of data modifications across an operating system's kernel and user mode spaces, prevention of modified outbound data from reaching a network, prevention of modified input data from reaching a user application, and detection of malware and faults within an operating system.Type: ApplicationFiled: April 28, 2014Publication date: August 21, 2014Applicant: TREND MICRO INCORPORATEDInventors: Rares STEFAN, Blake Stanton SUTHERLAND
-
Patent number: 8762295Abstract: Value based licensing/billing methods and system for security software is provided, which use an effective vulnerability protection measure provided by a new or updated IPS filter deployed on host computer to determine the licensing/billing fee of the new or updated IPS filter over a billing period. The effective vulnerability protection measure is determined based on vulnerability and host attributes, and, in the embodiment of the invention, is based on a vulnerability time gap or time protected of the host computer.Type: GrantFiled: February 10, 2008Date of Patent: June 24, 2014Assignee: Trend Micro IncorporatedInventor: Blake Stanton Sutherland
-
Patent number: 8713312Abstract: A method and apparatus for detecting data modification in a layered operating system is disclosed. Outbound content indicators at different layers are compared to detect potential outbound data modifications. Likewise, inbound content indicators at different layers are compared to detect potential inbound data modifications. Content indicators include checksum, cryptographic hash, signature, and fingerprint indicators. Embodiments of the present invention enable detection of data modifications across an operating system's kernel and user mode spaces, prevention of modified outbound data from reaching a network, prevention of modified input data from reaching a user application, and detection of malware and faults within an operating system.Type: GrantFiled: December 6, 2009Date of Patent: April 29, 2014Assignee: Trend Micrio IncorporatedInventors: Rares Stefan, Blake Stanton Sutherland
-
Patent number: 8321937Abstract: An intrusion prevention/detection system filter (IPS filter) performance evaluation is provided. The performance evaluation is performed at both the security center and at the customer sites to derive a base confidence score and local confidence scores. Existence of new vulnerability is disclosed and its attributes are used in the generation of new IPS filter or updates. The generated IPS filter is first tested to determine its base confidence score from test confidence attributes prior to deploying it to a customer site. A deep security manager and deep security agent, at the customer site, collect local confidence attributes that are used for determining the local confidence score. The local confidence score and the base confidence score are aggregated to form a global confidence score. The local and global confidence scores are then compared to deployment thresholds to determine whether the IPS filter should be deployed in prevention or detection mode or sent back to the security center for improvement.Type: GrantFiled: October 22, 2008Date of Patent: November 27, 2012Assignee: Trend Micro IncorporatedInventors: Blake Stanton Sutherland, William G. McGee
-
Publication number: 20110022840Abstract: A method and apparatus for detecting data modification in a layered operating system is disclosed. Outbound content indicators at different layers are compared to detect potential outbound data modifications. Likewise, inbound content indicators at different layers are compared to detect potential inbound data modifications. Content indicators include checksum, cryptographic hash, signature, and fingerprint indicators. Embodiments of the present invention enable detection of data modifications across an operating system's kernel and user mode spaces, prevention of modified outbound data from reaching a network, prevention of modified input data from reaching a user application, and detection of malware and faults within an operating system.Type: ApplicationFiled: December 6, 2009Publication date: January 27, 2011Inventors: Rares STEFAN, Blake Stanton SUTHERLAND
-
Publication number: 20090172818Abstract: An intrusion prevention/detection system filter (IPS filter) performance evaluation is provided. The performance evaluation is performed at both the security center and at the customer sites to derive a base confidence score and local confidence scores. Existence of new vulnerability is disclosed and its attributes are used in the generation of new IPS filter or updates. The generated IPS filter is first tested to determine its base confidence score from test confidence attributes prior to deploying it to a customer site. A deep security manager and deep security agent, at the customer site, collect local confidence attributes that are used for determining the local confidence score. The local confidence score and the base confidence score are aggregated to form a global confidence score. The local and global confidence scores are then compared to deployment thresholds to determine whether the IPS filter should be deployed in prevention or detection mode or sent back to the security center for improvement.Type: ApplicationFiled: October 22, 2008Publication date: July 2, 2009Inventors: Blake Stanton SUTHERLAND, William G. McGee
-
Patent number: 7426635Abstract: A method and system for managing public key certificates is provided. A user purchases a block of unallocated time. When the user requests a certificate, the user specifies a life span for the certificate. A certificate is generated, and the life span of the certificate is deducted from the block of unallocated time. If the user revokes a certificate, the remaining lifetime of the revoked certificate is added back to the block of unallocated time. This allows certificates to be revoked without loss of purchased time, and gives the user more flexibility at requesting and revoking certificates.Type: GrantFiled: June 28, 2001Date of Patent: September 16, 2008Assignee: Entrust Technologies LimitedInventors: Robert Everett Parkhill, Blake Stanton Sutherland
-
Publication number: 20080195560Abstract: Value based licensing/billing methods and system for security software is provided, which use an effective vulnerability protection measure provided by a new or updated IPS filter deployed on host computer to determine the licensing/billing fee of the new or updated IPS filter over a billing period. The effective vulnerability protection measure is determined based on vulnerability and host attributes, and, in the embodiment of the invention, is based on a vulnerability time gap or time protected of the host computer.Type: ApplicationFiled: February 10, 2008Publication date: August 14, 2008Inventor: Blake Stanton Sutherland