Patents by Inventor Brad Lovering

Brad Lovering has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 11588841
    Abstract: Techniques and mechanisms are disclosed for creating an environment for detecting malicious network traffic. A test computer network including a plurality of cloned nodes is created. The plurality of cloned nodes in the test computer network corresponds to at least some of a plurality of target nodes of a host computer network, and the test computer network has no network connectivity to the host computer network. Sensors in both the host computer network and the test computer network generate network flow records that are sent to a detection processing pipeline. The detection processing pipeline merges the records received from the sensors and uses the merged records to train at least one model used to identify instances of malicious network traffic.
    Type: Grant
    Filed: May 11, 2020
    Date of Patent: February 21, 2023
    Assignee: Splunk Inc.
    Inventors: Kurt Kokko, Damien Lindauer, Brad Lovering, Lynn Kasel
  • Patent number: 11327992
    Abstract: Systems and methods are disclosed for authenticating a user to use one or more components of a data intake and query system. The data intake and query system enables the generation or searching of events that include raw machine data associated with a timestamp. The data intake and query system receives a request for access via an application programming interface (API). Based on the request, the data intake and query system authenticates the user. The data intake and query system can receive a second request via the API for a component of the data intake and query system. Based on a determination that the user is authenticated, the data intake and query system can communicate the request to the component.
    Type: Grant
    Filed: July 16, 2019
    Date of Patent: May 10, 2022
    Assignee: Splunk Inc.
    Inventors: Alexandros Batsakis, Clifton Gordon, Brad Lovering, Christopher Madden Pride
  • Publication number: 20200344254
    Abstract: Techniques and mechanisms are disclosed for creating an environment for detecting malicious network traffic. A test computer network including a plurality of cloned nodes is created. The plurality of cloned nodes in the test computer network corresponds to at least some of a plurality of target nodes of a host computer network, and the test computer network has no network connectivity to the host computer network. Sensors in both the host computer network and the test computer network generate network flow records that are sent to a detection processing pipeline. The detection processing pipeline merges the records received from the sensors and uses the merged records to train at least one model used to identify instances of malicious network traffic.
    Type: Application
    Filed: May 11, 2020
    Publication date: October 29, 2020
    Applicant: Splunk Inc.
    Inventors: Kurt Kokko, Damien Lindauer, Brad Lovering, Lynn Kasel
  • Patent number: 10652261
    Abstract: Techniques and mechanisms are disclosed for creating an environment for detecting malicious network traffic. A test computer network including a plurality of cloned nodes is created. The plurality of cloned nodes in the test computer network corresponds to at least some of a plurality of target nodes of a host computer network, and the test computer network has no network connectivity to the host computer network. Sensors in both the host computer network and the test computer network generate network flow records that are sent to a detection processing pipeline. The detection processing pipeline merges the records received from the sensors and uses the merged records to train at least one model used to identify instances of malicious network traffic.
    Type: Grant
    Filed: January 31, 2018
    Date of Patent: May 12, 2020
    Assignee: Splunk Inc.
    Inventors: Kurt Kokko, Damien Lindauer, Brad Lovering, Lynn Kasel
  • Publication number: 20180219896
    Abstract: Techniques and mechanisms are disclosed for creating an environment for detecting malicious network traffic. A test computer network including a plurality of cloned nodes is created. The plurality of cloned nodes in the test computer network corresponds to at least some of a plurality of target nodes of a host computer network, and the test computer network has no network connectivity to the host computer network. Sensors in both the host computer network and the test computer network generate network flow records that are sent to a detection processing pipeline. The detection processing pipeline merges the records received from the sensors and uses the merged records to train at least one model used to identify instances of malicious network traffic.
    Type: Application
    Filed: January 31, 2018
    Publication date: August 2, 2018
    Inventors: Kurt Kokko, Damien Lindauer, Brad Lovering, Lynn Kasel