Patents by Inventor Bryan Burns

Bryan Burns has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 11938314
    Abstract: The present disclosure discusses a method of manufacturing an implantable neural electrode. The method includes cutting a metal layer to form a plurality of electrode sites, contact pads and metal traces connecting the electrode sites to the contact pads. A first silicone layer including a mesh is formed and coupled to the metal layer. A second silicone layer is formed and laminated to the first silicone layer coupled with the metal layer. Holes are formed in the first or second silicone layer exposing the contact pads and electrode sites. Wires are welded to the exposed contact pads and a third layer of silicone is overmolded over the contact pads and wires.
    Type: Grant
    Filed: July 6, 2020
    Date of Patent: March 26, 2024
    Assignee: The Charles Stark Draper Laboratory, Inc.
    Inventors: John Burns, IV, Julianne Grainger, Bryan McLaughlin, Tirunelveli S. Sriram, John Lachapelle
  • Patent number: 11811793
    Abstract: Provided herein are systems and methods for targeted attack protection using predictive sandboxing. In exemplary embodiments, a method includes retrieving a Uniform Resource Locator (URL) from a message of a user and performing a preliminary determination to see if the URL can be discarded if it is not a candidate for sandboxing. The exemplary method includes computing a plurality of selection criteria factors for the URL if the URL passes the preliminary determination, each selection criteria factor having a respective factor threshold. The method can further include determining if any of the selection criteria factors for the URL exceeds the respective factor threshold for the respective selection criteria factor. Based on the determining, if any of the selection criteria factors exceeds the factor threshold for the selection criteria factor, the exemplary method includes automatically placing the URL in a sandbox for analysis.
    Type: Grant
    Filed: January 15, 2021
    Date of Patent: November 7, 2023
    Assignee: PROOFPOINT, INC.
    Inventors: Steven Robert Sandke, Bryan Burns
  • Patent number: 11404034
    Abstract: A system and method for automatic drumming. A MIDI decoder (1) receives MIDI serial data in real-time, decodes said MIDI serial data to obtain playing instructions, and signals at least one actuator (2) to strike at least one drum according to said decoded playing instructions. User inputs for selecting the MIDI channel and assigning MIDI notes to drums may be provided. The intensity of percussion may be controlled by the MIDI velocity and may be overridden by the user at the MIDI decoder. The at least one actuator may employ a solenoid and comprises features to mitigate latency between the MIDI serial data received and the drum hit. The at least one actuator may comprise a clamping or securement means enabling fast and convenient repositioning thereof. The at least one actuator may comprise means for substitution of a percussion implement, such as a drumstick, brush, or mallet.
    Type: Grant
    Filed: December 31, 2021
    Date of Patent: August 2, 2022
    Inventor: Michael Bryan Burns, Jr.
  • Publication number: 20210136094
    Abstract: Provided herein are systems and methods for targeted attack protection using predictive sandboxing. In exemplary embodiments, a method includes retrieving a Uniform Resource Locator (URL) from a message of a user and performing a preliminary determination to see if the URL can be discarded if it is not a candidate for sandboxing. The exemplary method includes computing a plurality of selection criteria factors for the URL if the URL passes the preliminary determination, each selection criteria factor having a respective factor threshold. The method can further include determining if any of the selection criteria factors for the URL exceeds the respective factor threshold for the respective selection criteria factor. Based on the determining, if any of the selection criteria factors exceeds the factor threshold for the selection criteria factor, the exemplary method includes automatically placing the URL in a sandbox for analysis.
    Type: Application
    Filed: January 15, 2021
    Publication date: May 6, 2021
    Inventors: Steven Robert Sandle, Bryan Burns
  • Patent number: 10911467
    Abstract: Provided herein are systems and methods for targeted attack protection using predictive sandboxing. In exemplary embodiments, a method includes retrieving a Uniform Resource Locator (URL) from a message of a user and performing a preliminary determination to see if the URL can be discarded if it is not a candidate for sandboxing. The exemplary method includes computing a plurality of selection criteria factors for the URL if the URL passes the preliminary determination, each selection criteria factor having a respective factor threshold. The method can further include determining if any of the selection criteria factors for the URL exceeds the respective factor threshold for the respective selection criteria factor. Based on the determining, if any of the selection criteria factors exceeds the factor threshold for the selection criteria factor, the exemplary method includes automatically placing the URL in a sandbox for analysis.
    Type: Grant
    Filed: July 26, 2019
    Date of Patent: February 2, 2021
    Assignee: Proofpoint, Inc.
    Inventors: Steven Robert Sandke, Bryan Burns
  • Publication number: 20190356681
    Abstract: Provided herein are systems and methods for targeted attack protection using predictive sandboxing. In exemplary embodiments, a method includes retrieving a Uniform Resource Locator (URL) from a message of a user and performing a preliminary determination to see if the URL can be discarded if it is not a candidate for sandboxing. The exemplary method includes computing a plurality of selection criteria factors for the URL if the URL passes the preliminary determination, each selection criteria factor having a respective factor threshold. The method can further include determining if any of the selection criteria factors for the URL exceeds the respective factor threshold for the respective selection criteria factor. Based on the determining, if any of the selection criteria factors exceeds the factor threshold for the selection criteria factor, the exemplary method includes automatically placing the URL in a sandbox for analysis.
    Type: Application
    Filed: July 26, 2019
    Publication date: November 21, 2019
    Inventors: Steven Robert Sandke, Bryan Burns
  • Patent number: 10419464
    Abstract: Provided herein are systems and methods for targeted attack protection using predictive sandboxing. In exemplary embodiments, a method includes retrieving a Uniform Resource Locator (URL) from a message of a user and performing a preliminary determination to see if the URL can be discarded if it is not a candidate for sandboxing. The exemplary method includes computing a plurality of selection criteria factors for the URL if the URL passes the preliminary determination, each selection criteria factor having a respective factor threshold. The method can further include determining if any of the selection criteria factors for the URL exceeds the respective factor threshold for the respective selection criteria factor. Based on the determining, if any of the selection criteria factors exceeds the factor threshold for the selection criteria factor, the exemplary method includes automatically placing the URL in a sandbox for analysis.
    Type: Grant
    Filed: May 22, 2018
    Date of Patent: September 17, 2019
    Assignee: Proofpoint, Inc.
    Inventors: Steven Robert Sandke, Bryan Burns
  • Publication number: 20180270258
    Abstract: Provided herein are systems and methods for targeted attack protection using predictive sandboxing. In exemplary embodiments, a method includes retrieving a URL from a message of a user and performing a preliminary determination to see if the URL can be discarded if it is not a candidate for sandboxing. The exemplary method includes computing a plurality of selection criteria factors for the URL if the URL passes the preliminary determination, each selection criteria factor having a respective factor threshold. The method can further include determining if any of the selection criteria factors for the URL exceeds the respective factor threshold for the respective selection criteria factor. Based on the determining, if any of the selection criteria factors exceeds the factor threshold for the selection criteria factor, the exemplary method includes automatically placing the URL in a sandbox for analysis.
    Type: Application
    Filed: May 22, 2018
    Publication date: September 20, 2018
    Inventors: Steven Robert Sandke, Bryan Burns
  • Patent number: 10033696
    Abstract: An intrusion detection system (“IDS”) device is described that includes a flow analysis module to receive a first packet flow from a client and to receive a second packet flow from a server. The IDS includes a forwarding component to send the first packet flow to the server and the second packet flow to the client and a stateful inspection engine to apply one or more sets of patterns to the first packet flow to determine whether the first packet flow represents a network attack. The IDS also includes an application identification module to perform an initial identification of a type of software application and communication protocol associated with the first packet flow and to reevaluate the identification of the type of software application and protocol according to the second packet flow. The IDS may help eliminate false positive and false negative attack identifications.
    Type: Grant
    Filed: July 14, 2017
    Date of Patent: July 24, 2018
    Assignee: Juniper Networks, Inc.
    Inventors: Bryan Burns, Siying Yang, Julien Sobrier
  • Patent number: 10009362
    Abstract: Provided herein are systems and methods for targeted attack protection using predictive sandboxing. In exemplary embodiments, a method includes retrieving a URL from a message of a user and performing a preliminary determination to see if the URL can be discarded if it is not a candidate for sandboxing. The exemplary method includes computing a plurality of selection criteria factors for the URL if the URL passes the preliminary determination, each selection criteria factor having a respective factor threshold. The method can further include determining if any of the selection criteria factors for the URL exceeds the respective factor threshold for the respective selection criteria factor. Based on the determining, if any of the selection criteria factors exceeds the factor threshold for the selection criteria factor, the exemplary method includes automatically placing the URL in a sandbox for analysis.
    Type: Grant
    Filed: August 2, 2017
    Date of Patent: June 26, 2018
    Assignee: Proofpoint, Inc.
    Inventors: Steven Robert Sandke, Bryan Burns
  • Patent number: 9838427
    Abstract: A network device comprises one or more processors coupled to a memory, and a dynamic services module configured for execution by the one or more processors to receive, from a client device, a service request specifying a service. The dynamic service module is further configured for execution by the one or more processors to, in response to obtaining a negative indication for the service, send a representation of the service request to a honeypot to cause the honeypot to offer the service to the client device.
    Type: Grant
    Filed: October 28, 2016
    Date of Patent: December 5, 2017
    Assignee: Juniper Networks, Inc.
    Inventors: Daniel J. Quinlan, Oskar Ibatullin, Bryan Burns, Oliver Tavakoli, Robert W. Cameron
  • Publication number: 20170331843
    Abstract: Provided herein are systems and methods for targeted attack protection using predictive sandboxing. In exemplary embodiments, a method includes retrieving a URL from a message of a user and performing a preliminary determination to see if the URL can be discarded if it is not a candidate for sandboxing. The exemplary method includes computing a plurality of selection criteria factors for the URL if the URL passes the preliminary determination, each selection criteria factor having a respective factor threshold. The method can further include determining if any of the selection criteria factors for the URL exceeds the respective factor threshold for the respective selection criteria factor. Based on the determining, if any of the selection criteria factors exceeds the factor threshold for the selection criteria factor, the exemplary method includes automatically placing the URL in a sandbox for analysis.
    Type: Application
    Filed: August 2, 2017
    Publication date: November 16, 2017
    Inventors: Steven Robert Sandke, Bryan Burns
  • Patent number: 9762609
    Abstract: Provided herein are systems and methods for targeted attack protection using predictive sandboxing. In exemplary embodiments, a method includes retrieving a URL from a message of a user and performing a preliminary determination to see if the URL can be discarded if it is not a candidate for sandboxing. The exemplary method includes computing a plurality of selection criteria factors for the URL if the URL passes the preliminary determination, each selection criteria factor having a respective factor threshold. The method can further include determining if any of the selection criteria factors for the URL exceeds the respective factor threshold for the respective selection criteria factor. Based on the determining, if any of the selection criteria factors exceeds the factor threshold for the selection criteria factor, the exemplary method includes automatically placing the URL in a sandbox for analysis.
    Type: Grant
    Filed: January 27, 2017
    Date of Patent: September 12, 2017
    Assignee: Proofpoint, Inc.
    Inventors: Steven Robert Sandke, Bryan Burns
  • Patent number: 9712490
    Abstract: An intrusion detection system (“IDS”) device is described that includes a flow analysis module to receive a first packet flow from a client and to receive a second packet flow from a server. The IDS includes a forwarding component to send the first packet flow to the server and the second packet flow to the client and a stateful inspection engine to apply one or more sets of patterns to the first packet flow to determine whether the first packet flow represents a network attack. The IDS also includes an application identification module to perform an initial identification of a type of software application and communication protocol associated with the first packet flow and to reevaluate the identification of the type of software application and protocol according to the second packet flow. The IDS may help eliminate false positive and false negative attack identifications.
    Type: Grant
    Filed: October 15, 2012
    Date of Patent: July 18, 2017
    Assignee: Juniper Networks, Inc.
    Inventors: Bryan Burns, Siying Yang, Julien Sobrier
  • Publication number: 20170142150
    Abstract: Provided herein are systems and methods for targeted attack protection using predictive sandboxing. In exemplary embodiments, a method includes retrieving a URL from a message of a user and performing a preliminary determination to see if the URL can be discarded if it is not a candidate for sandboxing. The exemplary method includes computing a plurality of selection criteria factors for the URL if the URL passes the preliminary determination, each selection criteria factor having a respective factor threshold. The method can further include determining if any of the selection criteria factors for the URL exceeds the respective factor threshold for the respective selection criteria factor. Based on the determining, if any of the selection criteria factors exceeds the factor threshold for the selection criteria factor, the exemplary method includes automatically placing the URL in a sandbox for analysis.
    Type: Application
    Filed: January 27, 2017
    Publication date: May 18, 2017
    Inventors: Steven Robert Sandke, Bryan Burns
  • Patent number: 9596264
    Abstract: Provided herein are systems and methods for targeted attack protection using predictive sandboxing. In exemplary embodiments, a method includes retrieving a URL from a message of a user and performing a preliminary determination to see if the URL can be discarded if it is not a candidate for sandboxing. The exemplary method includes computing a plurality of selection criteria factors for the URL if the URL passes the preliminary determination, each selection criteria factor having a respective factor threshold. The method can further include determining if any of the selection criteria factors for the URL exceeds the respective factor threshold for the respective selection criteria factor. Based on the determining, if any of the selection criteria factors exceeds the factor threshold for the selection criteria factor, the exemplary method automatically processes the URL using a sandbox.
    Type: Grant
    Filed: February 18, 2015
    Date of Patent: March 14, 2017
    Assignee: Proofpoint, Inc.
    Inventors: Steven Robert Sandke, Bryan Burns
  • Publication number: 20170048274
    Abstract: A network device comprises one or more processors coupled to a memory, and a dynamic services module configured for execution by the one or more processors to receive, from a client device, a service request specifying a service. The dynamic service module is further configured for execution by the one or more processors to, in response to obtaining a negative indication for the service, send a representation of the service request to a honeypot to cause the honeypot to offer the service to the client device.
    Type: Application
    Filed: October 28, 2016
    Publication date: February 16, 2017
    Inventors: Daniel J. Quinlan, Oskar Ibatullin, Bryan Burns, Oliver Tavakoli, Robert W. Cameron
  • Patent number: 9485276
    Abstract: A network device comprises one or more processors coupled to a memory, and a dynamic services module configured for execution by the one or more processors to receive, from a client device, a service request specifying a service. The dynamic service module is further configured for execution by the one or more processors to, in response to obtaining a negative indication for the service, send a representation of the service request to a honeypot to cause the honeypot to offer the service to the client device.
    Type: Grant
    Filed: December 30, 2014
    Date of Patent: November 1, 2016
    Assignee: Juniper Networks, Inc.
    Inventors: Daniel J. Quinlan, Oskar Ibatullin, Bryan Burns, Oliver Tavakoli, Robert W. Cameron
  • Patent number: 9344445
    Abstract: This disclosure describes techniques for determining whether a network session originates from an automated software agent. In one example, a network device, such as a router, includes a network interface to receive packets of a network session, a bot detection module to calculate a plurality of scores for network session data based on a plurality of metrics, wherein each of the metrics corresponds to a characteristic of a network session originated by an automated software agent, to produce an aggregate score from an aggregate of the plurality of scores, and to determine that the network session is originated by an automated software agent when the aggregate score exceeds a threshold, and an attack detection module to perform a programmed response when the network session is determined to be originated by an automated software agent. Each score represents a likelihood that the network session is originated by an automated software agent.
    Type: Grant
    Filed: December 15, 2014
    Date of Patent: May 17, 2016
    Assignee: Juniper Networks, Inc.
    Inventors: Bryan Burns, Krishna Narayanaswamy
  • Publication number: 20150237068
    Abstract: Provided herein are systems and methods for targeted attack protection using predictive sandboxing. In exemplary embodiments, a method includes retrieving a URL from a message of a user and performing a preliminary determination to see if the URL can be discarded if it is not a candidate for sandboxing. The exemplary method includes computing a plurality of selection criteria factors for the URL if the URL passes the preliminary determination, each selection criteria factor having a respective factor threshold. The method can further include determining if any of the selection criteria factors for the URL exceeds the respective factor threshold for the respective selection criteria factor. Based on the determining, if any of the selection criteria factors exceeds the factor threshold for the selection criteria factor, the exemplary method automatically processes the URL using a sandbox.
    Type: Application
    Filed: February 18, 2015
    Publication date: August 20, 2015
    Inventors: Steven Robert Sandke, Bryan Burns