Patents by Inventor Bryan Burns
Bryan Burns has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 11938314Abstract: The present disclosure discusses a method of manufacturing an implantable neural electrode. The method includes cutting a metal layer to form a plurality of electrode sites, contact pads and metal traces connecting the electrode sites to the contact pads. A first silicone layer including a mesh is formed and coupled to the metal layer. A second silicone layer is formed and laminated to the first silicone layer coupled with the metal layer. Holes are formed in the first or second silicone layer exposing the contact pads and electrode sites. Wires are welded to the exposed contact pads and a third layer of silicone is overmolded over the contact pads and wires.Type: GrantFiled: July 6, 2020Date of Patent: March 26, 2024Assignee: The Charles Stark Draper Laboratory, Inc.Inventors: John Burns, IV, Julianne Grainger, Bryan McLaughlin, Tirunelveli S. Sriram, John Lachapelle
-
Patent number: 11811793Abstract: Provided herein are systems and methods for targeted attack protection using predictive sandboxing. In exemplary embodiments, a method includes retrieving a Uniform Resource Locator (URL) from a message of a user and performing a preliminary determination to see if the URL can be discarded if it is not a candidate for sandboxing. The exemplary method includes computing a plurality of selection criteria factors for the URL if the URL passes the preliminary determination, each selection criteria factor having a respective factor threshold. The method can further include determining if any of the selection criteria factors for the URL exceeds the respective factor threshold for the respective selection criteria factor. Based on the determining, if any of the selection criteria factors exceeds the factor threshold for the selection criteria factor, the exemplary method includes automatically placing the URL in a sandbox for analysis.Type: GrantFiled: January 15, 2021Date of Patent: November 7, 2023Assignee: PROOFPOINT, INC.Inventors: Steven Robert Sandke, Bryan Burns
-
Patent number: 11404034Abstract: A system and method for automatic drumming. A MIDI decoder (1) receives MIDI serial data in real-time, decodes said MIDI serial data to obtain playing instructions, and signals at least one actuator (2) to strike at least one drum according to said decoded playing instructions. User inputs for selecting the MIDI channel and assigning MIDI notes to drums may be provided. The intensity of percussion may be controlled by the MIDI velocity and may be overridden by the user at the MIDI decoder. The at least one actuator may employ a solenoid and comprises features to mitigate latency between the MIDI serial data received and the drum hit. The at least one actuator may comprise a clamping or securement means enabling fast and convenient repositioning thereof. The at least one actuator may comprise means for substitution of a percussion implement, such as a drumstick, brush, or mallet.Type: GrantFiled: December 31, 2021Date of Patent: August 2, 2022Inventor: Michael Bryan Burns, Jr.
-
Publication number: 20210136094Abstract: Provided herein are systems and methods for targeted attack protection using predictive sandboxing. In exemplary embodiments, a method includes retrieving a Uniform Resource Locator (URL) from a message of a user and performing a preliminary determination to see if the URL can be discarded if it is not a candidate for sandboxing. The exemplary method includes computing a plurality of selection criteria factors for the URL if the URL passes the preliminary determination, each selection criteria factor having a respective factor threshold. The method can further include determining if any of the selection criteria factors for the URL exceeds the respective factor threshold for the respective selection criteria factor. Based on the determining, if any of the selection criteria factors exceeds the factor threshold for the selection criteria factor, the exemplary method includes automatically placing the URL in a sandbox for analysis.Type: ApplicationFiled: January 15, 2021Publication date: May 6, 2021Inventors: Steven Robert Sandle, Bryan Burns
-
Patent number: 10911467Abstract: Provided herein are systems and methods for targeted attack protection using predictive sandboxing. In exemplary embodiments, a method includes retrieving a Uniform Resource Locator (URL) from a message of a user and performing a preliminary determination to see if the URL can be discarded if it is not a candidate for sandboxing. The exemplary method includes computing a plurality of selection criteria factors for the URL if the URL passes the preliminary determination, each selection criteria factor having a respective factor threshold. The method can further include determining if any of the selection criteria factors for the URL exceeds the respective factor threshold for the respective selection criteria factor. Based on the determining, if any of the selection criteria factors exceeds the factor threshold for the selection criteria factor, the exemplary method includes automatically placing the URL in a sandbox for analysis.Type: GrantFiled: July 26, 2019Date of Patent: February 2, 2021Assignee: Proofpoint, Inc.Inventors: Steven Robert Sandke, Bryan Burns
-
Publication number: 20190356681Abstract: Provided herein are systems and methods for targeted attack protection using predictive sandboxing. In exemplary embodiments, a method includes retrieving a Uniform Resource Locator (URL) from a message of a user and performing a preliminary determination to see if the URL can be discarded if it is not a candidate for sandboxing. The exemplary method includes computing a plurality of selection criteria factors for the URL if the URL passes the preliminary determination, each selection criteria factor having a respective factor threshold. The method can further include determining if any of the selection criteria factors for the URL exceeds the respective factor threshold for the respective selection criteria factor. Based on the determining, if any of the selection criteria factors exceeds the factor threshold for the selection criteria factor, the exemplary method includes automatically placing the URL in a sandbox for analysis.Type: ApplicationFiled: July 26, 2019Publication date: November 21, 2019Inventors: Steven Robert Sandke, Bryan Burns
-
Patent number: 10419464Abstract: Provided herein are systems and methods for targeted attack protection using predictive sandboxing. In exemplary embodiments, a method includes retrieving a Uniform Resource Locator (URL) from a message of a user and performing a preliminary determination to see if the URL can be discarded if it is not a candidate for sandboxing. The exemplary method includes computing a plurality of selection criteria factors for the URL if the URL passes the preliminary determination, each selection criteria factor having a respective factor threshold. The method can further include determining if any of the selection criteria factors for the URL exceeds the respective factor threshold for the respective selection criteria factor. Based on the determining, if any of the selection criteria factors exceeds the factor threshold for the selection criteria factor, the exemplary method includes automatically placing the URL in a sandbox for analysis.Type: GrantFiled: May 22, 2018Date of Patent: September 17, 2019Assignee: Proofpoint, Inc.Inventors: Steven Robert Sandke, Bryan Burns
-
Publication number: 20180270258Abstract: Provided herein are systems and methods for targeted attack protection using predictive sandboxing. In exemplary embodiments, a method includes retrieving a URL from a message of a user and performing a preliminary determination to see if the URL can be discarded if it is not a candidate for sandboxing. The exemplary method includes computing a plurality of selection criteria factors for the URL if the URL passes the preliminary determination, each selection criteria factor having a respective factor threshold. The method can further include determining if any of the selection criteria factors for the URL exceeds the respective factor threshold for the respective selection criteria factor. Based on the determining, if any of the selection criteria factors exceeds the factor threshold for the selection criteria factor, the exemplary method includes automatically placing the URL in a sandbox for analysis.Type: ApplicationFiled: May 22, 2018Publication date: September 20, 2018Inventors: Steven Robert Sandke, Bryan Burns
-
Patent number: 10033696Abstract: An intrusion detection system (“IDS”) device is described that includes a flow analysis module to receive a first packet flow from a client and to receive a second packet flow from a server. The IDS includes a forwarding component to send the first packet flow to the server and the second packet flow to the client and a stateful inspection engine to apply one or more sets of patterns to the first packet flow to determine whether the first packet flow represents a network attack. The IDS also includes an application identification module to perform an initial identification of a type of software application and communication protocol associated with the first packet flow and to reevaluate the identification of the type of software application and protocol according to the second packet flow. The IDS may help eliminate false positive and false negative attack identifications.Type: GrantFiled: July 14, 2017Date of Patent: July 24, 2018Assignee: Juniper Networks, Inc.Inventors: Bryan Burns, Siying Yang, Julien Sobrier
-
Patent number: 10009362Abstract: Provided herein are systems and methods for targeted attack protection using predictive sandboxing. In exemplary embodiments, a method includes retrieving a URL from a message of a user and performing a preliminary determination to see if the URL can be discarded if it is not a candidate for sandboxing. The exemplary method includes computing a plurality of selection criteria factors for the URL if the URL passes the preliminary determination, each selection criteria factor having a respective factor threshold. The method can further include determining if any of the selection criteria factors for the URL exceeds the respective factor threshold for the respective selection criteria factor. Based on the determining, if any of the selection criteria factors exceeds the factor threshold for the selection criteria factor, the exemplary method includes automatically placing the URL in a sandbox for analysis.Type: GrantFiled: August 2, 2017Date of Patent: June 26, 2018Assignee: Proofpoint, Inc.Inventors: Steven Robert Sandke, Bryan Burns
-
Patent number: 9838427Abstract: A network device comprises one or more processors coupled to a memory, and a dynamic services module configured for execution by the one or more processors to receive, from a client device, a service request specifying a service. The dynamic service module is further configured for execution by the one or more processors to, in response to obtaining a negative indication for the service, send a representation of the service request to a honeypot to cause the honeypot to offer the service to the client device.Type: GrantFiled: October 28, 2016Date of Patent: December 5, 2017Assignee: Juniper Networks, Inc.Inventors: Daniel J. Quinlan, Oskar Ibatullin, Bryan Burns, Oliver Tavakoli, Robert W. Cameron
-
Publication number: 20170331843Abstract: Provided herein are systems and methods for targeted attack protection using predictive sandboxing. In exemplary embodiments, a method includes retrieving a URL from a message of a user and performing a preliminary determination to see if the URL can be discarded if it is not a candidate for sandboxing. The exemplary method includes computing a plurality of selection criteria factors for the URL if the URL passes the preliminary determination, each selection criteria factor having a respective factor threshold. The method can further include determining if any of the selection criteria factors for the URL exceeds the respective factor threshold for the respective selection criteria factor. Based on the determining, if any of the selection criteria factors exceeds the factor threshold for the selection criteria factor, the exemplary method includes automatically placing the URL in a sandbox for analysis.Type: ApplicationFiled: August 2, 2017Publication date: November 16, 2017Inventors: Steven Robert Sandke, Bryan Burns
-
Patent number: 9762609Abstract: Provided herein are systems and methods for targeted attack protection using predictive sandboxing. In exemplary embodiments, a method includes retrieving a URL from a message of a user and performing a preliminary determination to see if the URL can be discarded if it is not a candidate for sandboxing. The exemplary method includes computing a plurality of selection criteria factors for the URL if the URL passes the preliminary determination, each selection criteria factor having a respective factor threshold. The method can further include determining if any of the selection criteria factors for the URL exceeds the respective factor threshold for the respective selection criteria factor. Based on the determining, if any of the selection criteria factors exceeds the factor threshold for the selection criteria factor, the exemplary method includes automatically placing the URL in a sandbox for analysis.Type: GrantFiled: January 27, 2017Date of Patent: September 12, 2017Assignee: Proofpoint, Inc.Inventors: Steven Robert Sandke, Bryan Burns
-
Patent number: 9712490Abstract: An intrusion detection system (“IDS”) device is described that includes a flow analysis module to receive a first packet flow from a client and to receive a second packet flow from a server. The IDS includes a forwarding component to send the first packet flow to the server and the second packet flow to the client and a stateful inspection engine to apply one or more sets of patterns to the first packet flow to determine whether the first packet flow represents a network attack. The IDS also includes an application identification module to perform an initial identification of a type of software application and communication protocol associated with the first packet flow and to reevaluate the identification of the type of software application and protocol according to the second packet flow. The IDS may help eliminate false positive and false negative attack identifications.Type: GrantFiled: October 15, 2012Date of Patent: July 18, 2017Assignee: Juniper Networks, Inc.Inventors: Bryan Burns, Siying Yang, Julien Sobrier
-
Publication number: 20170142150Abstract: Provided herein are systems and methods for targeted attack protection using predictive sandboxing. In exemplary embodiments, a method includes retrieving a URL from a message of a user and performing a preliminary determination to see if the URL can be discarded if it is not a candidate for sandboxing. The exemplary method includes computing a plurality of selection criteria factors for the URL if the URL passes the preliminary determination, each selection criteria factor having a respective factor threshold. The method can further include determining if any of the selection criteria factors for the URL exceeds the respective factor threshold for the respective selection criteria factor. Based on the determining, if any of the selection criteria factors exceeds the factor threshold for the selection criteria factor, the exemplary method includes automatically placing the URL in a sandbox for analysis.Type: ApplicationFiled: January 27, 2017Publication date: May 18, 2017Inventors: Steven Robert Sandke, Bryan Burns
-
Patent number: 9596264Abstract: Provided herein are systems and methods for targeted attack protection using predictive sandboxing. In exemplary embodiments, a method includes retrieving a URL from a message of a user and performing a preliminary determination to see if the URL can be discarded if it is not a candidate for sandboxing. The exemplary method includes computing a plurality of selection criteria factors for the URL if the URL passes the preliminary determination, each selection criteria factor having a respective factor threshold. The method can further include determining if any of the selection criteria factors for the URL exceeds the respective factor threshold for the respective selection criteria factor. Based on the determining, if any of the selection criteria factors exceeds the factor threshold for the selection criteria factor, the exemplary method automatically processes the URL using a sandbox.Type: GrantFiled: February 18, 2015Date of Patent: March 14, 2017Assignee: Proofpoint, Inc.Inventors: Steven Robert Sandke, Bryan Burns
-
Publication number: 20170048274Abstract: A network device comprises one or more processors coupled to a memory, and a dynamic services module configured for execution by the one or more processors to receive, from a client device, a service request specifying a service. The dynamic service module is further configured for execution by the one or more processors to, in response to obtaining a negative indication for the service, send a representation of the service request to a honeypot to cause the honeypot to offer the service to the client device.Type: ApplicationFiled: October 28, 2016Publication date: February 16, 2017Inventors: Daniel J. Quinlan, Oskar Ibatullin, Bryan Burns, Oliver Tavakoli, Robert W. Cameron
-
Patent number: 9485276Abstract: A network device comprises one or more processors coupled to a memory, and a dynamic services module configured for execution by the one or more processors to receive, from a client device, a service request specifying a service. The dynamic service module is further configured for execution by the one or more processors to, in response to obtaining a negative indication for the service, send a representation of the service request to a honeypot to cause the honeypot to offer the service to the client device.Type: GrantFiled: December 30, 2014Date of Patent: November 1, 2016Assignee: Juniper Networks, Inc.Inventors: Daniel J. Quinlan, Oskar Ibatullin, Bryan Burns, Oliver Tavakoli, Robert W. Cameron
-
Patent number: 9344445Abstract: This disclosure describes techniques for determining whether a network session originates from an automated software agent. In one example, a network device, such as a router, includes a network interface to receive packets of a network session, a bot detection module to calculate a plurality of scores for network session data based on a plurality of metrics, wherein each of the metrics corresponds to a characteristic of a network session originated by an automated software agent, to produce an aggregate score from an aggregate of the plurality of scores, and to determine that the network session is originated by an automated software agent when the aggregate score exceeds a threshold, and an attack detection module to perform a programmed response when the network session is determined to be originated by an automated software agent. Each score represents a likelihood that the network session is originated by an automated software agent.Type: GrantFiled: December 15, 2014Date of Patent: May 17, 2016Assignee: Juniper Networks, Inc.Inventors: Bryan Burns, Krishna Narayanaswamy
-
Publication number: 20150237068Abstract: Provided herein are systems and methods for targeted attack protection using predictive sandboxing. In exemplary embodiments, a method includes retrieving a URL from a message of a user and performing a preliminary determination to see if the URL can be discarded if it is not a candidate for sandboxing. The exemplary method includes computing a plurality of selection criteria factors for the URL if the URL passes the preliminary determination, each selection criteria factor having a respective factor threshold. The method can further include determining if any of the selection criteria factors for the URL exceeds the respective factor threshold for the respective selection criteria factor. Based on the determining, if any of the selection criteria factors exceeds the factor threshold for the selection criteria factor, the exemplary method automatically processes the URL using a sandbox.Type: ApplicationFiled: February 18, 2015Publication date: August 20, 2015Inventors: Steven Robert Sandke, Bryan Burns