Patents by Inventor Brad Bernay Doctor

Brad Bernay Doctor has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 10721243
    Abstract: Implementations of the present disclosure involve a system and/or method for identifying and mitigating malicious network threats. Network data associated is retrieved from various sources across a network and analyzed to identify a malicious network threat. When a threat is found, the system performs a mitigating action to neutralize the malicious network threat.
    Type: Grant
    Filed: November 13, 2018
    Date of Patent: July 21, 2020
    Assignee: Level 3 Communications, LLC
    Inventors: Brad Bernay Doctor, Skyler Jameson Bingham, Keshava Berg, John Sherwood Reynolds, II, Justin George Mohr
  • Patent number: 10708276
    Abstract: A system includes least one processor in communication with a memory storing instructions, the at least one processor to receive an authentication request comprising authentication information from a user requesting access to a computing device connected to a communications network, determine a type of authentication request sent by the user, transmit the authentication request to an appropriate authentication server responsive to the type of authentication request, receive an authentication response from the appropriate authentication server, determine a permission level for the user requesting access to the computing device and attach the permission level to the authentication response, and transmit the authentication response to the user requesting access to the computing device.
    Type: Grant
    Filed: November 21, 2015
    Date of Patent: July 7, 2020
    Assignee: Level 3 Communications, LLC
    Inventors: Brad Bernay Doctor, Nathaniel David Jamiel, Taylor David Fraley, John Grayson Fable
  • Publication number: 20190104136
    Abstract: Implementations of the present disclosure involve a system and/or method for identifying and mitigating malicious network threats. Network data associated is retrieved from various sources across a network and analyzed to identify a malicious network threat.
    Type: Application
    Filed: November 13, 2018
    Publication date: April 4, 2019
    Inventors: Brad Bernay Doctor, Skyler Jameson Bingham, Keshava Berg, John Sherwood Reynolds, Justin George Mohr
  • Patent number: 10129270
    Abstract: Implementations of the present disclosure involve a system and/or method for identifying and mitigating malicious network threats. Network data associated is retrieved from various sources across a network and analyzed to identify a malicious network threat. When a threat is found, the system performs a mitigating action to neutralize the malicious network threat.
    Type: Grant
    Filed: September 27, 2013
    Date of Patent: November 13, 2018
    Assignee: Level 3 Communications, LLC
    Inventors: Brad Bernay Doctor, Skyler Jameson Bingham, Keshava Berg, John Sherwood Reynolds, II, Justin George Mohr
  • Patent number: 10097575
    Abstract: Implementations of the present disclosure involve a system and/or method of performing security asset management. The system and/or method may schedule vulnerability scanners to scan the various portions of one or more networks and obtain the results of the vulnerability scans. IP addresses may be assigned to each of vulnerability scanners to scan. The system obtains the results of the vulnerability scans and may adjust the results of the scans according to configuration of the one or more networks that an IP address is associated with. The system and/or method may also assign and reassign IP addresses amongst the scanners to optimize scanning speed.
    Type: Grant
    Filed: December 4, 2017
    Date of Patent: October 9, 2018
    Assignee: Level 3 Communications, LLC
    Inventors: Brad Bernay Doctor, Taylor Fraley, Daniel Joseph Romero, Brett Wentworth, Keshava Berg
  • Publication number: 20180091545
    Abstract: Implementations of the present disclosure involve a system and/or method of performing security asset management. The system and/or method may schedule vulnerability scanners to scan the various portions of one or more networks and obtain the results of the vulnerability scans. IP addresses may be assigned to each of vulnerability scanners to scan. The system obtains the results of the vulnerability scans and may adjust the results of the scans according to configuration of the one or more networks that an IP address is associated with. The system and/or method may also assign and reassign IP addresses amongst the scanners to optimize scanning speed.
    Type: Application
    Filed: December 4, 2017
    Publication date: March 29, 2018
    Inventors: Brad Bernay Doctor, Taylor Fraley, Daniel Joseph Romero, Brett Wentworth, Keshava Berg
  • Patent number: 9838414
    Abstract: Implementations of the present disclosure involve a system and/or method of performing security asset management. The system and/or method may schedule vulnerability scanners to scan the various portions of one or more networks and obtain the results of the vulnerability scans. IP addresses may be assigned to each of vulnerability scanners to scan. The system obtains the results of the vulnerability scans and may adjust the results of the scans according to configuration of the one or more networks that an IP address is associated with. The system and/or method may also assign and reassign IP addresses amongst the scanners to optimize scanning speed.
    Type: Grant
    Filed: November 21, 2016
    Date of Patent: December 5, 2017
    Assignee: Level 3 Communications, LLC
    Inventors: Brad Bernay Doctor, Taylor Fraley, Daniel Joseph Romero, Brett Wentworth, Keshava Berg
  • Publication number: 20170070530
    Abstract: Implementations of the present disclosure involve a system and/or method of performing security asset management. The system and/or method may schedule vulnerability scanners to scan the various portions of one or more networks and obtain the results of the vulnerability scans. IP addresses may be assigned to each of vulnerability scanners to scan. The system obtains the results of the vulnerability scans and may adjust the results of the scans according to configuration of the one or more networks that an IP address is associated with. The system and/or method may also assign and reassign IP addresses amongst the scanners to optimize scanning speed.
    Type: Application
    Filed: November 21, 2016
    Publication date: March 9, 2017
    Inventors: Brad Bernay Doctor, Taylor Fraley, Daniel Joseph Romero, Brett Wentworth, Keshava Berg
  • Publication number: 20170012992
    Abstract: A system includes least one processor in communication with a memory storing instructions, the at least one processor to receive an authentication request comprising authentication information from a user requesting access to a computing device connected to a communications network, determine a type of authentication request sent by the user, transmit the authentication request to an appropriate authentication server responsive to the type of authentication request, receive an authentication response from the appropriate authentication server, determine a permission level for the user requesting access to the computing device and attach the permission level to the authentication response, and transmit the authentication response to the user requesting access to the computing device.
    Type: Application
    Filed: November 21, 2015
    Publication date: January 12, 2017
    Inventors: Brad Bernay Doctor, Nathaniel David Jamiel, Taylor David Fraley, John Grayson Fable
  • Patent number: 9503481
    Abstract: Implementations of the present disclosure involve a system and/or method of performing security asset management. The system and/or method may schedule vulnerability scanners to scan the various portions of one or more networks and obtain the results of the vulnerability scans. IP addresses may be assigned to each of vulnerability scanners to scan. The system obtains the results of the vulnerability scans and may adjust the results of the scans according to configuration of the one or more networks that an IP address is associated with. The system and/or method may also assign and reassign IP addresses amongst the scanners to optimize scanning speed.
    Type: Grant
    Filed: November 16, 2015
    Date of Patent: November 22, 2016
    Assignee: LEVEL 3 COMMUNICATIONS, LLC
    Inventors: Brad Bernay Doctor, Taylor Fraley, Daniel Joseph Romero, Brett Wentworth, Keshava Berg
  • Publication number: 20160072846
    Abstract: Implementations of the present disclosure involve a system and/or method of performing security asset management. The system and/or method may schedule vulnerability scanners to scan the various portions of one or more networks and obtain the results of the vulnerability scans. IP addresses may be assigned to each of vulnerability scanners to scan. The system obtains the results of the vulnerability scans and may adjust the results of the scans according to configuration of the one or more networks that an IP address is associated with. The system and/or method may also assign and reassign IP addresses amongst the scanners to optimize scanning speed.
    Type: Application
    Filed: November 16, 2015
    Publication date: March 10, 2016
    Inventors: Brad Bernay Doctor, Taylor Fraley, Daniel Joseph Romero, Brett Wentworth, Keshava Berg
  • Patent number: 9202031
    Abstract: A system includes least one processor in communication with a memory storing instructions, the at least one processor to receive an authentication request comprising authentication information from a user requesting access to a computing device connected to a communications network, determine a type of authentication request sent by the user, transmit the authentication request to an appropriate authentication server responsive to the type of authentication request, receive an authentication response from the appropriate authentication server, determine a permission level for the user requesting access to the computing device and attach the permission level to the authentication response, and transmit the authentication response to the user requesting access to the computing device.
    Type: Grant
    Filed: February 10, 2014
    Date of Patent: December 1, 2015
    Assignee: Level 3 Communications, LLC
    Inventors: Brad Bernay Doctor, Nathaniel David Jamiel, Taylor David Fraley, IV, John Grayson Fable
  • Patent number: 9191409
    Abstract: Implementations of the present disclosure involve a system and/or method of performing security asset management. The system and/or method may schedule vulnerability scanners to scan the various portions of one or more networks and obtain the results of the vulnerability scans. IP addresses may be assigned to each of vulnerability scanners to scan. The system obtains the results of the vulnerability scans and may adjust the results of the scans according to configuration of the one or more networks that an IP address is associated with. The system and/or method may also assign and reassign IP addresses amongst the scanners to optimize scanning speed.
    Type: Grant
    Filed: November 25, 2013
    Date of Patent: November 17, 2015
    Assignee: LEVEL 3 COMMUNICATIONS, LLC
    Inventors: Brad Bernay Doctor, Taylor Fraley, Daniel Joseph Romero, Brett Wentworth, Keshava Berg
  • Publication number: 20150227732
    Abstract: A system includes least one processor in communication with a memory storing instructions, the at least one processor to receive an authentication request comprising authentication information from a user requesting access to a computing device connected to a communications network, determine a type of authentication request sent by the user, transmit the authentication request to an appropriate authentication server responsive to the type of authentication request, receive an authentication response from the appropriate authentication server, determine a permission level for the user requesting access to the computing device and attach the permission level to the authentication response, and transmit the authentication response to the user requesting access to the computing device.
    Type: Application
    Filed: February 10, 2014
    Publication date: August 13, 2015
    Applicant: Level 3 Communications, LLC
    Inventors: Brad Bernay Doctor, Nathaniel David Jamiel, Taylor David Fraley, IV, John Grayson Fable
  • Publication number: 20150150072
    Abstract: Implementations of the present disclosure involve a system and/or method of performing security asset management. The system and/or method may schedule vulnerability scanners to scan the various portions of one or more networks and obtain the results of the vulnerability scans. IP addresses may be assigned to each of vulnerability scanners to scan. The system obtains the results of the vulnerability scans and may adjust the results of the scans according to configuration of the one or more networks that an IP address is associated with. The system and/or method may also assign and reassign IP addresses amongst the scanners to optimize scanning speed.
    Type: Application
    Filed: November 25, 2013
    Publication date: May 28, 2015
    Applicant: Level 3 Communications, LLC
    Inventors: Brad Bernay Doctor, Taylor Fraley, Daniel Joseph Romero, Brett Wentworth, Keshava Berg
  • Publication number: 20140096251
    Abstract: Implementations of the present disclosure involve a system and/or method for identifying and mitigating malicious network threats. Network data associated is retrieved from various sources across a network and analyzed to identify a malicious network threat.
    Type: Application
    Filed: September 27, 2013
    Publication date: April 3, 2014
    Applicant: Level 3 Communications, LLC
    Inventors: Brad Bernay Doctor, Skyler Jameson Bingham, Keshava Berg, John Sherwood Reynolds, II, Justin George Mohr