Patents by Inventor Brian P. Christian
Brian P. Christian has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Publication number: 20240121107Abstract: Techniques are disclosed for analyzing data related to computer applications and identifying suspect instances of such applications based on rolling baseline. The analysis is performed by a baseline engine that first establishes a rolling baseline with a centroid of a conceptual hypercube. The centroid represents the normal population of data packets for a given type of computer application. Data packets far enough away from the centroid indicate an anomaly or a suspect event for that computer application. An early detection of such suspect events and suspect application instances can prevent catastrophic downstream consequences for the concerned party/parties. Related embodiments also record suspect events and the identity of the suspect applications in a private and/or public distributed ledger, including a blockchain.Type: ApplicationFiled: June 27, 2023Publication date: April 11, 2024Inventor: Brian P. Christian
-
Publication number: 20230300153Abstract: Data surveillance techniques are presented for the detection of security and/or performance issues on a zero-trust computer network. There is a network device policy manager that works in conjunction with a network data policy manager and which is in charge of performing the above data surveillance. Of special interest are those security issues where privileged data may be stolen by steganographic, data manipulation or any form of exfiltration attempts. Such attempts may be made by rogue users or admins from the inside of a network, or from outside hackers who are able to intrude into the network but can impersonate themselves as legitimate users. The above data surveillance techniques are also applied for detecting intentional or unintentional exfiltration/leak of privileged data/assets between unauthorized users/groups of the organization.Type: ApplicationFiled: September 1, 2022Publication date: September 21, 2023Inventor: Brian P. Christian
-
Publication number: 20230007021Abstract: Techniques are disclosed for identifying indicators of compromise in a variety of medical/healthcare objects. The objects may be finished products or components of medical/healthcare objects/devices. The indicators of compromise in the objects are determined/detected by analyzing their data residing in a cloud. The analysis is performed by an instant baseline engine that first establishes a rolling baseline with a centroid of a conceptual hypercube. The centroid represents the normal population of data packets. Data packets far enough away from the centroid indicate an anomaly that may be an indicator of a compromise of/in the respective object. An early detection of such indicators of compromise in the objects can prevent catastrophic downstream consequences with the potential of saving lives and/or protecting them from harm.Type: ApplicationFiled: September 1, 2022Publication date: January 5, 2023Inventor: Brian P. Christian
-
Publication number: 20220377091Abstract: Techniques are disclosed for identifying indicators of compromise in a variety of objects. The objects may be finished products or components thereof. The indicators of compromise in the objects are determined/detected by analyzing their data which may reside in a cloud. The analysis is performed by an instant baseline engine that first establishes a rolling baseline with a centroid of a conceptual hypercube. The centroid represents the normal population of data packets. Data packets far enough away from the centroid indicate an anomaly that may be an indicator of a compromise of/in the respective object. An early detection of such indicators of compromise in the objects can prevent catastrophic downstream consequences for the concerned party/parties.Type: ApplicationFiled: August 4, 2022Publication date: November 24, 2022Inventor: Brian P. Christian
-
Patent number: 11470100Abstract: Data surveillance techniques are presented for the detection of security and/or performance issues on a zero-trust computer network. There is a network device policy manager that works in conjunction with a network data policy manager and which is in charge of performing the above data surveillance. Of special interest are those security issues where privileged data may be stolen by steganographic, data manipulation or any form of exfiltration attempts. Such attempts may be made by rogue users or admins from the inside of a network, or from outside hackers who are able to intrude into the network but can impersonate themselves as legitimate users. The above data surveillance techniques are also applied for detecting intentional or unintentional exfiltration/leak of privileged data/assets between unauthorized users/groups of the organization.Type: GrantFiled: March 21, 2022Date of Patent: October 11, 2022Assignee: Flying Cloud Technologies, Inc.Inventor: Brian P. Christian
-
Patent number: 11445340Abstract: Techniques are disclosed for identifying anomalous subjects and devices at a site. The devices may or may not be carried by or associated with subjects at the site. A number of various types of sensors may be utilized for this purpose. The sensors gather data about the subjects and devices. The data is processed by a data processing module which provides its output to a rolling baseline engine. The rolling baseline engine establishes a baseline for what is considered the “normal” behavior for subjects/devices at the site based on a desired dimension of analysis. Data associated with subjects/devices that is not normal is identified as an anomaly along with the associated subject/device. The findings are archived for performing analytics as required.Type: GrantFiled: January 21, 2021Date of Patent: September 13, 2022Assignee: Flying Cloud Technologies, Inc.Inventor: Brian P. Christian
-
Publication number: 20220232356Abstract: Techniques are disclosed for identifying anomalous subjects and devices at a site. The devices may or may not be carried by or associated with subjects at the site. A number of various types of sensors may be utilized for this purpose. The sensors gather data about the subjects and devices. The data is processed by a data processing module which provides its output to a rolling baseline engine. The rolling baseline engine establishes a baseline for what is considered the “normal” behavior for subjects/devices at the site based on a desired dimension of analysis. Data associated with subjects/devices that is not normal is identified as an anomaly along with the associated subject/device. The findings are archived for performing analytics as required.Type: ApplicationFiled: January 21, 2021Publication date: July 21, 2022Inventor: Brian P. Christian
-
Patent number: 10887330Abstract: Data surveillance techniques are presented for the detection of security issues, especially of the kind where privileged data may be stolen by steganographic, data manipulation or any form of exfiltration attempts. Such attempts may be made by rogue users or admins from the inside of a network, or from outside hackers who are able to intrude into the network and impersonate themselves as legitimate users. The system and methods use a triangulation process whereby analytical results pertaining to data protocol, user-behavior and packet content are combined to establish a baseline for the data. Subsequent incoming data is then scored and compared against the baseline to detect any security anomalies. The above data surveillance techniques are also applied for detecting intentional or unintentional exfiltration/leak of privileged data/assets between unauthorized users/groups of the organization. Such detection may be performed based on analyzing threat stream data from threat intelligence providers.Type: GrantFiled: February 28, 2020Date of Patent: January 5, 2021Assignee: Flying Cloud Technologies, Inc.Inventor: Brian P. Christian
-
Patent number: 10848514Abstract: Data surveillance techniques are presented for the detection of security issues, especially of the kind where privileged data may be stolen by steganographic, data manipulation or any form of exfiltration attempts. Such attempts may be made by rogue users or admins from the inside of a network, or from outside hackers who are able to intrude into the network and impersonate themselves as legitimate users. The system and methods use a triangulation process whereby analytical results pertaining to data protocol, user-behavior and packet content are combined to establish a baseline for the data. Subsequent incoming data is then scored and compared against the baseline to detect any security anomalies. The above data surveillance techniques are also applied for detecting intentional or unintentional exfiltration/leak of privileged data/assets between unauthorized users/groups of the organization.Type: GrantFiled: December 2, 2019Date of Patent: November 24, 2020Assignee: Flying Cloud Technologies, Inc.Inventor: Brian P. Christian
-
Publication number: 20200204574Abstract: Data surveillance techniques are presented for the detection of security issues, especially of the kind where privileged data may be stolen by steganographic, data manipulation or any form of exfiltration attempts. Such attempts may be made by rogue users or admins from the inside of a network, or from outside hackers who are able to intrude into the network and impersonate themselves as legitimate users. The system and methods use a triangulation process whereby analytical results pertaining to data protocol, user-behavior and packet content are combined to establish a baseline for the data. Subsequent incoming data is then scored and compared against the baseline to detect any security anomalies. The above data surveillance techniques are also applied for detecting intentional or unintentional exfiltration/leak of privileged data/assets between unauthorized users/groups of the organization. Such detection may be performed based on analyzing threat stream data from threat intelligence providers.Type: ApplicationFiled: February 28, 2020Publication date: June 25, 2020Inventor: Brian P. Christian
-
Publication number: 20200106797Abstract: Data surveillance techniques are presented for the detection of security issues, especially of the kind where privileged data may be stolen by steganographic, data manipulation or any form of exfiltration attempts. Such attempts may be made by rogue users or admins from the inside of a network, or from outside hackers who are able to intrude into the network and impersonate themselves as legitimate users. The system and methods use a triangulation process whereby analytical results pertaining to data protocol, user-behavior and packet content are combined to establish a baseline for the data. Subsequent incoming data is then scored and compared against the baseline to detect any security anomalies. The above data surveillance techniques are also applied for detecting intentional or unintentional exfiltration/leak of privileged data/assets between unauthorized users/groups of the organization.Type: ApplicationFiled: December 2, 2019Publication date: April 2, 2020Inventor: Brian P. Christian
-
Patent number: 10542026Abstract: Data surveillance techniques are presented for the detection of security issues, especially of the kind where privileged data may be stolen by steganographic, data manipulation or any form of exfiltration attempts. Such attempts may be made by rogue users or admins from the inside of a network, or from outside hackers who are able to intrude into the network and impersonate themselves as legitimate users. The system and methods use a triangulation process whereby analytical results pertaining to data protocol, user-behavior and packet content are combined to establish a baseline for the data. Subsequent incoming data is then scored and compared against the baseline to detect any security anomalies. A centroid representing the normal population of the data packets is identified. The design allows establishing the context of various events of interest in the organization, thus enabling dynamic management of security policies.Type: GrantFiled: September 4, 2018Date of Patent: January 21, 2020Assignee: Flying Cloud Technologies, Inc.Inventor: Brian P. Christian
-
Patent number: 10523698Abstract: Data surveillance techniques are presented for the detection of security issues, especially of the kind where privileged data may be stolen by steganographic, data manipulation or any form of exfiltration attempts. Such attempts may be made by rogue users or admins from the inside of a network, or from outside hackers who are able to intrude into the network and impersonate themselves as legitimate users. The system and methods use a triangulation process whereby analytical results pertaining to data protocol, user-behavior and packet content are combined to establish a baseline for the data. Subsequent incoming data is then scored and compared against the baseline to detect any security anomalies. A centroid representing the normal population of the data packets is identified. The movement or drift of the centroid in response to various events is measured and analyzed. This allows the system to evolve its baseline over time thereby preventing issuing false positives for such events.Type: GrantFiled: August 8, 2018Date of Patent: December 31, 2019Assignee: Flying Cloud Technologies, Inc.Inventor: Brian P. Christian
-
Patent number: 10516689Abstract: Data surveillance techniques are presented for the detection of security issues, especially of the kind where privileged data may be stolen by steganographic, data manipulation or any form of exfiltration attempts. Such attempts may be made by rogue users or admins from the inside of a network, or from outside hackers who are able to intrude into the network and impersonate themselves as legitimate users. The system and methods use a triangulation process whereby analytical results pertaining to data protocol, user-behavior and packet content are combined to establish a baseline for the data. Subsequent incoming data is then scored and compared against the baseline to detect any security anomalies. The design incorporates deployment in a distributed network so that the devices of the network participate in the detection of anomalies as a community.Type: GrantFiled: December 13, 2018Date of Patent: December 24, 2019Assignee: Flying Cloud Technologies, Inc.Inventor: Brian P. Christian
-
Publication number: 20190132346Abstract: Data surveillance techniques are presented for the detection of security issues, especially of the kind where privileged data may be stolen by steganographic, data manipulation or any form of exfiltration attempts. Such attempts may be made by rogue users or admins from the inside of a network, or from outside hackers who are able to intrude into the network and impersonate themselves as legitimate users. The system and methods use a triangulation process whereby analytical results pertaining to data protocol, user-behavior and packet content are combined to establish a baseline for the data. Subsequent incoming data is then scored and compared against the baseline to detect any security anomalies. The design incorporates deployment in a distributed network so that the devices of the network participate in the detection of anomalies as a community.Type: ApplicationFiled: December 13, 2018Publication date: May 2, 2019Inventor: Brian P. Christian
-
Publication number: 20190098033Abstract: Data surveillance techniques are presented for the detection of security issues, especially of the kind where privileged data may be stolen by steganographic, data manipulation or any form of exfiltration attempts. Such attempts may be made by rogue users or admins from the inside of a network, or from outside hackers who are able to intrude into the network and impersonate themselves as legitimate users. The system and methods use a triangulation process whereby analytical results pertaining to data protocol, user-behavior and packet content are combined to establish a baseline for the data. Subsequent incoming data is then scored and compared against the baseline to detect any security anomalies. A centroid representing the normal population of the data packets is identified. The movement or drift of the centroid in response to various events is measured and analyzed. This allows the system to evolve its baseline over time thereby preventing issuing false positives for such events.Type: ApplicationFiled: August 8, 2018Publication date: March 28, 2019Inventor: Brian P. Christian
-
Patent number: 10178118Abstract: Data surveillance techniques are presented for the detection of security issues, especially of the kind where privileged data may be stolen by steganographic, data manipulation or any form of exfiltration attempts. Such attempts may be made by rogue users or admins from the inside of a network, or from outside hackers who are able to intrude into the network and impersonate themselves as legitimate users. The system and methods use a triangulation process whereby analytical results pertaining to data protocol, user-behavior and packet content are combined to establish a baseline for the data. Subsequent incoming data is then scored and compared against the baseline to detect any security anomalies. A set of metadata layers related to the analysis are also maintained. The techniques are also applicable for detecting performance issues indicative of a system malfunction or deterioration.Type: GrantFiled: March 28, 2018Date of Patent: January 8, 2019Assignee: Flying Cloud Technologies, Inc.Inventor: Brian P. Christian
-
Publication number: 20180375888Abstract: Data surveillance techniques are presented for the detection of security issues, especially of the kind where privileged data may be stolen by steganographic, data manipulation or any form of exfiltration attempts. Such attempts may be made by rogue users or admins from the inside of a network, or from outside hackers who are able to intrude into the network and impersonate themselves as legitimate users. The system and methods use a triangulation process whereby analytical results pertaining to data protocol, user-behavior and packet content are combined to establish a baseline for the data. Subsequent incoming data is then scored and compared against the baseline to detect any security anomalies. A centroid representing the normal population of the data packets is identified. The design allows establishing the context of various events of interest in the organization, thus enabling dynamic management of security policies.Type: ApplicationFiled: September 4, 2018Publication date: December 27, 2018Inventor: Brian P. Christian
-
Publication number: 20180219898Abstract: Data surveillance techniques are presented for the detection of security issues, especially of the kind where privileged data may be stolen by steganographic, data manipulation or any form of exfiltration attempts. Such attempts may be made by rogue users or admins from the inside of a network, or from outside hackers who are able to intrude into the network and impersonate themselves as legitimate users. The system and methods use a triangulation process whereby analytical results pertaining to data protocol, user-behavior and packet content are combined to establish a baseline for the data. Subsequent incoming data is then scored and compared against the baseline to detect any security anomalies. A set of metadata layers related to the analysis are also maintained. The techniques are also applicable for detecting performance issues indicative of a system malfunction or deterioration.Type: ApplicationFiled: March 28, 2018Publication date: August 2, 2018Inventor: Brian P. Christian
-
Patent number: 9979740Abstract: Data surveillance techniques are presented for the detection of security issues, especially of the kind where privileged data may be stolen by steganographic, data manipulation or any form of exfiltration attempts. Such attempts may be made by rogue users or admins from the inside of a network, or from outside hackers who are able to intrude into the network and impersonate themselves as legitimate users. The system and methods use a triangulation process whereby analytical results pertaining to data protocol, user-behavior and packet content are combined to establish a baseline for the data. Subsequent incoming data is then scored and compared against the baseline to detect any security anomalies. The techniques are also applicable for detecting performance issues indicative of a system malfunction or deterioration.Type: GrantFiled: December 15, 2015Date of Patent: May 22, 2018Assignee: Flying Cloud Technologies, Inc.Inventor: Brian P. Christian