Patents by Inventor Brad Bernay Doctor
Brad Bernay Doctor has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 10721243Abstract: Implementations of the present disclosure involve a system and/or method for identifying and mitigating malicious network threats. Network data associated is retrieved from various sources across a network and analyzed to identify a malicious network threat. When a threat is found, the system performs a mitigating action to neutralize the malicious network threat.Type: GrantFiled: November 13, 2018Date of Patent: July 21, 2020Assignee: Level 3 Communications, LLCInventors: Brad Bernay Doctor, Skyler Jameson Bingham, Keshava Berg, John Sherwood Reynolds, II, Justin George Mohr
-
Patent number: 10708276Abstract: A system includes least one processor in communication with a memory storing instructions, the at least one processor to receive an authentication request comprising authentication information from a user requesting access to a computing device connected to a communications network, determine a type of authentication request sent by the user, transmit the authentication request to an appropriate authentication server responsive to the type of authentication request, receive an authentication response from the appropriate authentication server, determine a permission level for the user requesting access to the computing device and attach the permission level to the authentication response, and transmit the authentication response to the user requesting access to the computing device.Type: GrantFiled: November 21, 2015Date of Patent: July 7, 2020Assignee: Level 3 Communications, LLCInventors: Brad Bernay Doctor, Nathaniel David Jamiel, Taylor David Fraley, John Grayson Fable
-
Publication number: 20190104136Abstract: Implementations of the present disclosure involve a system and/or method for identifying and mitigating malicious network threats. Network data associated is retrieved from various sources across a network and analyzed to identify a malicious network threat.Type: ApplicationFiled: November 13, 2018Publication date: April 4, 2019Inventors: Brad Bernay Doctor, Skyler Jameson Bingham, Keshava Berg, John Sherwood Reynolds, Justin George Mohr
-
Patent number: 10129270Abstract: Implementations of the present disclosure involve a system and/or method for identifying and mitigating malicious network threats. Network data associated is retrieved from various sources across a network and analyzed to identify a malicious network threat. When a threat is found, the system performs a mitigating action to neutralize the malicious network threat.Type: GrantFiled: September 27, 2013Date of Patent: November 13, 2018Assignee: Level 3 Communications, LLCInventors: Brad Bernay Doctor, Skyler Jameson Bingham, Keshava Berg, John Sherwood Reynolds, II, Justin George Mohr
-
Patent number: 10097575Abstract: Implementations of the present disclosure involve a system and/or method of performing security asset management. The system and/or method may schedule vulnerability scanners to scan the various portions of one or more networks and obtain the results of the vulnerability scans. IP addresses may be assigned to each of vulnerability scanners to scan. The system obtains the results of the vulnerability scans and may adjust the results of the scans according to configuration of the one or more networks that an IP address is associated with. The system and/or method may also assign and reassign IP addresses amongst the scanners to optimize scanning speed.Type: GrantFiled: December 4, 2017Date of Patent: October 9, 2018Assignee: Level 3 Communications, LLCInventors: Brad Bernay Doctor, Taylor Fraley, Daniel Joseph Romero, Brett Wentworth, Keshava Berg
-
Publication number: 20180091545Abstract: Implementations of the present disclosure involve a system and/or method of performing security asset management. The system and/or method may schedule vulnerability scanners to scan the various portions of one or more networks and obtain the results of the vulnerability scans. IP addresses may be assigned to each of vulnerability scanners to scan. The system obtains the results of the vulnerability scans and may adjust the results of the scans according to configuration of the one or more networks that an IP address is associated with. The system and/or method may also assign and reassign IP addresses amongst the scanners to optimize scanning speed.Type: ApplicationFiled: December 4, 2017Publication date: March 29, 2018Inventors: Brad Bernay Doctor, Taylor Fraley, Daniel Joseph Romero, Brett Wentworth, Keshava Berg
-
Patent number: 9838414Abstract: Implementations of the present disclosure involve a system and/or method of performing security asset management. The system and/or method may schedule vulnerability scanners to scan the various portions of one or more networks and obtain the results of the vulnerability scans. IP addresses may be assigned to each of vulnerability scanners to scan. The system obtains the results of the vulnerability scans and may adjust the results of the scans according to configuration of the one or more networks that an IP address is associated with. The system and/or method may also assign and reassign IP addresses amongst the scanners to optimize scanning speed.Type: GrantFiled: November 21, 2016Date of Patent: December 5, 2017Assignee: Level 3 Communications, LLCInventors: Brad Bernay Doctor, Taylor Fraley, Daniel Joseph Romero, Brett Wentworth, Keshava Berg
-
Publication number: 20170070530Abstract: Implementations of the present disclosure involve a system and/or method of performing security asset management. The system and/or method may schedule vulnerability scanners to scan the various portions of one or more networks and obtain the results of the vulnerability scans. IP addresses may be assigned to each of vulnerability scanners to scan. The system obtains the results of the vulnerability scans and may adjust the results of the scans according to configuration of the one or more networks that an IP address is associated with. The system and/or method may also assign and reassign IP addresses amongst the scanners to optimize scanning speed.Type: ApplicationFiled: November 21, 2016Publication date: March 9, 2017Inventors: Brad Bernay Doctor, Taylor Fraley, Daniel Joseph Romero, Brett Wentworth, Keshava Berg
-
Publication number: 20170012992Abstract: A system includes least one processor in communication with a memory storing instructions, the at least one processor to receive an authentication request comprising authentication information from a user requesting access to a computing device connected to a communications network, determine a type of authentication request sent by the user, transmit the authentication request to an appropriate authentication server responsive to the type of authentication request, receive an authentication response from the appropriate authentication server, determine a permission level for the user requesting access to the computing device and attach the permission level to the authentication response, and transmit the authentication response to the user requesting access to the computing device.Type: ApplicationFiled: November 21, 2015Publication date: January 12, 2017Inventors: Brad Bernay Doctor, Nathaniel David Jamiel, Taylor David Fraley, John Grayson Fable
-
Patent number: 9503481Abstract: Implementations of the present disclosure involve a system and/or method of performing security asset management. The system and/or method may schedule vulnerability scanners to scan the various portions of one or more networks and obtain the results of the vulnerability scans. IP addresses may be assigned to each of vulnerability scanners to scan. The system obtains the results of the vulnerability scans and may adjust the results of the scans according to configuration of the one or more networks that an IP address is associated with. The system and/or method may also assign and reassign IP addresses amongst the scanners to optimize scanning speed.Type: GrantFiled: November 16, 2015Date of Patent: November 22, 2016Assignee: LEVEL 3 COMMUNICATIONS, LLCInventors: Brad Bernay Doctor, Taylor Fraley, Daniel Joseph Romero, Brett Wentworth, Keshava Berg
-
Publication number: 20160072846Abstract: Implementations of the present disclosure involve a system and/or method of performing security asset management. The system and/or method may schedule vulnerability scanners to scan the various portions of one or more networks and obtain the results of the vulnerability scans. IP addresses may be assigned to each of vulnerability scanners to scan. The system obtains the results of the vulnerability scans and may adjust the results of the scans according to configuration of the one or more networks that an IP address is associated with. The system and/or method may also assign and reassign IP addresses amongst the scanners to optimize scanning speed.Type: ApplicationFiled: November 16, 2015Publication date: March 10, 2016Inventors: Brad Bernay Doctor, Taylor Fraley, Daniel Joseph Romero, Brett Wentworth, Keshava Berg
-
Patent number: 9202031Abstract: A system includes least one processor in communication with a memory storing instructions, the at least one processor to receive an authentication request comprising authentication information from a user requesting access to a computing device connected to a communications network, determine a type of authentication request sent by the user, transmit the authentication request to an appropriate authentication server responsive to the type of authentication request, receive an authentication response from the appropriate authentication server, determine a permission level for the user requesting access to the computing device and attach the permission level to the authentication response, and transmit the authentication response to the user requesting access to the computing device.Type: GrantFiled: February 10, 2014Date of Patent: December 1, 2015Assignee: Level 3 Communications, LLCInventors: Brad Bernay Doctor, Nathaniel David Jamiel, Taylor David Fraley, IV, John Grayson Fable
-
Patent number: 9191409Abstract: Implementations of the present disclosure involve a system and/or method of performing security asset management. The system and/or method may schedule vulnerability scanners to scan the various portions of one or more networks and obtain the results of the vulnerability scans. IP addresses may be assigned to each of vulnerability scanners to scan. The system obtains the results of the vulnerability scans and may adjust the results of the scans according to configuration of the one or more networks that an IP address is associated with. The system and/or method may also assign and reassign IP addresses amongst the scanners to optimize scanning speed.Type: GrantFiled: November 25, 2013Date of Patent: November 17, 2015Assignee: LEVEL 3 COMMUNICATIONS, LLCInventors: Brad Bernay Doctor, Taylor Fraley, Daniel Joseph Romero, Brett Wentworth, Keshava Berg
-
Publication number: 20150227732Abstract: A system includes least one processor in communication with a memory storing instructions, the at least one processor to receive an authentication request comprising authentication information from a user requesting access to a computing device connected to a communications network, determine a type of authentication request sent by the user, transmit the authentication request to an appropriate authentication server responsive to the type of authentication request, receive an authentication response from the appropriate authentication server, determine a permission level for the user requesting access to the computing device and attach the permission level to the authentication response, and transmit the authentication response to the user requesting access to the computing device.Type: ApplicationFiled: February 10, 2014Publication date: August 13, 2015Applicant: Level 3 Communications, LLCInventors: Brad Bernay Doctor, Nathaniel David Jamiel, Taylor David Fraley, IV, John Grayson Fable
-
Publication number: 20150150072Abstract: Implementations of the present disclosure involve a system and/or method of performing security asset management. The system and/or method may schedule vulnerability scanners to scan the various portions of one or more networks and obtain the results of the vulnerability scans. IP addresses may be assigned to each of vulnerability scanners to scan. The system obtains the results of the vulnerability scans and may adjust the results of the scans according to configuration of the one or more networks that an IP address is associated with. The system and/or method may also assign and reassign IP addresses amongst the scanners to optimize scanning speed.Type: ApplicationFiled: November 25, 2013Publication date: May 28, 2015Applicant: Level 3 Communications, LLCInventors: Brad Bernay Doctor, Taylor Fraley, Daniel Joseph Romero, Brett Wentworth, Keshava Berg
-
Publication number: 20140096251Abstract: Implementations of the present disclosure involve a system and/or method for identifying and mitigating malicious network threats. Network data associated is retrieved from various sources across a network and analyzed to identify a malicious network threat.Type: ApplicationFiled: September 27, 2013Publication date: April 3, 2014Applicant: Level 3 Communications, LLCInventors: Brad Bernay Doctor, Skyler Jameson Bingham, Keshava Berg, John Sherwood Reynolds, II, Justin George Mohr