Patents by Inventor Brett Oliphant

Brett Oliphant has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 9369480
    Abstract: Methods for blind detection of computational vulnerabilities include the submission by a detecting system of potentially interpretable information to a target system; measurement of the timing characteristics of the output from the target system by the detecting system; and diagnosis of the vulnerabilities of the target system by the detecting system as based on the timing characteristics, optionally in conjunction with auxiliary data. Invented systems provide reference implementations of these methods.
    Type: Grant
    Filed: January 14, 2014
    Date of Patent: June 14, 2016
    Assignee: McAfee, Inc.
    Inventors: Brett Oliphant, Ben Tyler, Gabriel Pack, Brett Hardin
  • Patent number: 8910292
    Abstract: A method for detecting remote file inclusion vulnerabilities in a web application includes altering of extracted resource references from a web application, submission of altered references as HTTP requests to the web application, inspection of corresponding HTTP responses, and diagnosis of vulnerability. A computer system or systems can implement the disclosed embodiments.
    Type: Grant
    Filed: June 26, 2012
    Date of Patent: December 9, 2014
    Assignee: McAfee, Inc.
    Inventors: Brett Oliphant, Ben Tyler, Gabriel Richard Pack, Brett Hardin
  • Publication number: 20140317749
    Abstract: Methods for blind detection of computational vulnerabilities include the submission by a detecting system of potentially interpretable information to a target system; measurement of the timing characteristics of the output from the target system by the detecting system; and diagnosis of the vulnerabilities of the target system by the detecting system as based on the timing characteristics, optionally in conjunction with auxiliary data. Invented systems provide reference implementations of these methods.
    Type: Application
    Filed: January 14, 2014
    Publication date: October 23, 2014
    Inventors: Brett Oliphant, Ben Tyler, Gabriel Pack, Brett Hardin
  • Publication number: 20140130172
    Abstract: Methods for blind detection of computational vulnerabilities include the submission by a detecting system of potentially interpretable information to a target system; measurement of the timing characteristics of the output from the target system by the detecting system; and diagnosis of the vulnerabilities of the target system by the detecting system as based on the timing characteristics, optionally in conjunction with auxiliary data. Invented systems provide reference implementations of these methods.
    Type: Application
    Filed: January 14, 2014
    Publication date: May 8, 2014
    Inventors: Brett Oliphant, Ben Tyler, Gabriel Pack, Brett Hardin
  • Patent number: 8631497
    Abstract: Methods for blind detection of computational vulnerabilities include the submission by a detecting system of potentially interpretable information to a target system; measurement of the timing characteristics of the output from the target system by the detecting system; and diagnosis of the vulnerabilities of the target system by the detecting system as based on the timing characteristics, optionally in conjunction with auxiliary data. Invented systems provide reference implementations of these methods.
    Type: Grant
    Filed: February 1, 2008
    Date of Patent: January 14, 2014
    Assignee: McAfee, Inc.
    Inventors: Brett Oliphant, Ben Tyler, Gabriel Richard Pack, Brett Hardin
  • Patent number: 8286248
    Abstract: A method for discovering the structure, state transitions, and patterns of behavior of users of a web application includes a method for causing the web application to make HTTP requests for resources from an external supplier; capture of the requests for the external resources; extraction of meaningful data from the captured requests; and analysis to draw conclusions based on the extracted data. A system of invention provides a reference implementation of the method.
    Type: Grant
    Filed: February 1, 2008
    Date of Patent: October 9, 2012
    Assignee: McAfee, Inc.
    Inventors: Brett Oliphant, Ben Tyler, Gabriel Richard Pack, Brett Hardin
  • Patent number: 8239952
    Abstract: A method for detecting remote file inclusion vulnerabilities in a web application includes altering of extracted resource references from a web application, submission of altered references as HTTP requests to the web application, inspection of corresponding HTTP responses, and diagnosis of vulnerability. A system of invention implements the method.
    Type: Grant
    Filed: February 1, 2008
    Date of Patent: August 7, 2012
    Assignee: McAfee, Inc.
    Inventors: Brett Oliphant, Ben Tyler, Gabriel Richard Pack, Brett Hardin
  • Publication number: 20070256132
    Abstract: A security information management system is described, wherein client-side devices preferably collect and monitor information describing the operating system, software, and patches installed on the device(s), as well as configuration thereof. A database of this information is maintained, along with data describing vulnerabilities of available software and associated remediation techniques available for it. The remediation techniques in the database include some that apply software patches, some that change the device's policy settings, and some that change one of the device's configuration files or registry.
    Type: Application
    Filed: July 1, 2004
    Publication date: November 1, 2007
    Applicant: SecurityProfiling, Inc.
    Inventor: Brett Oliphant
  • Publication number: 20070118756
    Abstract: A database maintains security status information on each device in a network, based on whether the device's operating system, software, and patches are installed and configured to meet a baseline level of security. A network gateway proxy blocks connection attempts from devices for which the database indicates a substandard security status, but allows connections from other devices to pass normally. The database is preferably updated on a substantially real-time basis by client-side software run by each device in the network.
    Type: Application
    Filed: July 1, 2004
    Publication date: May 24, 2007
    Applicant: SecurityProfiling, Inc.
    Inventor: Brett Oliphant
  • Publication number: 20070112941
    Abstract: A security information management system is described, wherein client-side devices preferably collect and monitor information describing the operating system, software, and patches installed on the device(s), as well as configuration thereof. A database of this information is maintained, along with data describing vulnerabilities of available software and associated remediation techniques available for it. The system exposes an API to support security-related decisions by other applications. For example, an intrusion detection system (IDS) accesses the database to determine whether an actual threat exists and should be (or has been) blocked.
    Type: Application
    Filed: July 1, 2004
    Publication date: May 17, 2007
    Applicant: SecurityProfiling, Inc.
    Inventor: Brett Oliphant
  • Publication number: 20070113272
    Abstract: A security information management system is described, wherein client-side devices preferably collect and monitor information describing the operating system, software, and patches installed on the device(s), as well as configuration thereof. A database of this information is maintained, along with data describing vulnerabilities of available software and associated remediation techniques available for it. The system exposes an API to support security-related decisions by other applications. For example, an intrusion detection system (IDS) accesses the database to determine whether an actual threat exists and should be (or has been) blocked.
    Type: Application
    Filed: July 1, 2004
    Publication date: May 17, 2007
    Applicant: SecurityProfiling, Inc.
    Inventor: Brett Oliphant
  • Publication number: 20070113265
    Abstract: A security information management system is described, wherein client-side devices preferably collect and monitor information describing the operating system, software, and patches installed on the device(s), as well as configuration thereof. A database of this information is maintained, along with data describing vulnerabilities of available software and associated remediation techniques available for it. The system exposes an API to support security-related decisions by other applications. For example, an intrusion detection system (IDS) accesses the database to determine whether an actual threat exists and should be (or has been) blocked.
    Type: Application
    Filed: July 1, 2004
    Publication date: May 17, 2007
    Applicant: SecurityProfiling, Inc.
    Inventor: Brett Oliphant
  • Publication number: 20070113100
    Abstract: A security information management system is described, wherein a database of potential vulnerabilities is maintained, along with data describing remediation techniques (patches, policy settings, and configuration options) available to protect against them. At least one vulnerability is associated in the database with multiple available remediation techniques. In one embodiment, the system presents a user with the list of remediation techniques available to protect against a known vulnerability, accepts the user's selection from the list, and executes the selected technique. In other embodiments, the system uses a predetermined prioritization schedule to automatically select among the available remediation techniques, then automatically executes the selected technique.
    Type: Application
    Filed: July 1, 2004
    Publication date: May 17, 2007
    Applicant: SecurityProfiling, Inc.
    Inventor: Brett Oliphant
  • Publication number: 20060259946
    Abstract: Abstract of the Disclosure A security information management system is described, wherein client-side devices preferably collect and monitor information describing the operating system, software, and patches installed on the device(s), as well as configuration thereof. A database of this information is maintained, along with data describing vulnerabilities of available software and associated remediation techniques available for it. The system exposes an API to support security-related decisions by other applications. For example, an intrusion detection system (IDS) accesses the database to determine whether an actual threat exists and should be (or has been) blocked.
    Type: Application
    Filed: July 1, 2004
    Publication date: November 16, 2006
    Applicant: SecurityProfiling, Inc.
    Inventor: Brett Oliphant
  • Publication number: 20060259593
    Abstract: Abstract of the Disclosure A security information management system is described, wherein client-side devices preferably collect and monitor information describing the operating system, software, and patches installed on the device(s), as well as configuration thereof. A database of this information is maintained, along with data describing vulnerabilities of available software and associated remediation techniques available for it. The system exposes an API to support security-related decisions by other applications. For example, an intrusion detection system (IDS) accesses the database to determine whether an actual threat exists and should be (or has been) blocked.
    Type: Application
    Filed: July 1, 2004
    Publication date: November 16, 2006
    Applicant: SecurityProfiling, Inc.
    Inventor: Brett Oliphant
  • Publication number: 20060259972
    Abstract: Abstract of the Disclosure A security information management system is described, wherein client-side devices preferably collect and monitor information describing the operating system, software, and patches installed on the device(s), as well as configuration thereof. A database of this information is maintained, along with data describing vulnerabilities of available software and associated remediation techniques available for it. The remediation techniques in the database include some that apply software patches, some that change the device’s policy settings, and some that change one of the device’s configuration files or registry.
    Type: Application
    Filed: July 1, 2004
    Publication date: November 16, 2006
    Applicant: SecurityProfiling, Inc.
    Inventor: Brett Oliphant
  • Publication number: 20060259779
    Abstract: Abstract of the Disclosure A security information management system is described, wherein a database of potential vulnerabilities is maintained, along with data describing remediation techniques (patches, policy settings, and configuration options) available to protect against them. At least one vulnerability is associated in the database with multiple available remediation techniques. In one embodiment, the system presents a user with the list of remediation techniques available to protect against a known vulnerability, accepts the user’s selection from the list, and executes the selected technique. In other embodiments, the system uses a predetermined prioritization schedule to automatically select among the available remediation techniques, then automatically executes the selected technique.
    Type: Application
    Filed: July 1, 2004
    Publication date: November 16, 2006
    Applicant: SecurityProfiling, Inc.
    Inventor: Brett Oliphant
  • Publication number: 20060259775
    Abstract: Abstract of the Disclosure A database maintains security status information on each device in a network, based on whether the device’s operating system, software, and patches are installed and configured to meet a baseline level of security. A network gateway proxy blocks connection attempts from devices for which the database indicates a substandard security status, but allows connections from other devices to pass normally. The database is preferably updated on a substantially real-time basis by client-side software run by each device in the network.
    Type: Application
    Filed: July 1, 2004
    Publication date: November 16, 2006
    Applicant: SecurityProfiling, Inc.
    Inventor: Brett Oliphant
  • Publication number: 20060230441
    Abstract: Abstract of the Disclosure A security information management system is described, wherein client-side devices preferably collect and monitor information describing the operating system, software, and patches installed on the device(s), as well as configuration thereof. A database of this information is maintained, along with data describing vulnerabilities of available software and associated remediation techniques available for it. The system exposes an API to support security-related decisions by other applications. For example, an intrusion detection system (IDS) accesses the database to determine whether an actual threat exists and should be (or has been) blocked.
    Type: Application
    Filed: July 1, 2004
    Publication date: October 12, 2006
    Applicant: SecurityProfiling, Inc.
    Inventor: Brett Oliphant
  • Publication number: 20050044389
    Abstract: A security information management system is described, wherein a database of potential vulnerabilities is maintained, along with data describing remediation techniques (patches, policy settings, and configuration options) available to protect against them. At least one vulnerability is associated in the database with multiple available remediation techniques. In one embodiment, the system presents a user with the list of remediation techniques available to protect against a known vulnerability, accepts the user's selection from the list, and executes the selected technique. In other embodiments, the system uses a predetermined prioritization schedule to automatically select among the available remediation techniques, then automatically executes the selected technique.
    Type: Application
    Filed: July 1, 2004
    Publication date: February 24, 2005
    Inventor: Brett Oliphant