Patents by Inventor Casey John Ellis

Casey John Ellis has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20230019180
    Abstract: Techniques are disclosed for predicting cybersecurity vulnerabilities automatically in IT assets/targets based on known vulnerabilities of various available technologies/products. This is accomplished by loading and linking one or more ontologies in a graph database containing vulnerability information about the technologies. The assets/targets preferably belong to a bug-bounty program. An optional discovery tool maps the attack surface of each target. A profiler collects the various technologies or traits used by the target and links them to the target. Then the graph database is queried to predict the cybersecurity vulnerabilities associated with the traits and consequently with the targets. The system is preferably implemented with a service-oriented architecture (SOA) so feedback/predictions can be provided to the user in near/real-time.
    Type: Application
    Filed: July 8, 2021
    Publication date: January 19, 2023
    Inventors: Gilein de Nijs, Michael Katsevman, Damien Michael Radford, Casey John Ellis
  • Patent number: 11019091
    Abstract: This invention discloses systems and methods for detecting vulnerabilities in IT assets by utilizing crowdsourcing techniques. A corpus containing vulnerability data of IT assets with known vulnerabilities is established. Vulnerability data in the corpus comprises security aspects or attributes related to the IT assets. The security aspects of an IT asset constitute its attack surface which is represented as a feature vector in a feature space. A determination is made as to how similar/close a target asset whose unknown vulnerabilities are to be detected, is to the rest of the IT assets in the corpus. This determination is made based on a measure of similarity/distance between the respective feature vectors in the feature space. Based on the review of similarity results by a community of researchers/experts, a determination of unknown vulnerabilities in the target system is made.
    Type: Grant
    Filed: October 30, 2019
    Date of Patent: May 25, 2021
    Assignee: Bugcrowd Inc.
    Inventors: Jonathan Cran, Michael James O'Kelly, Casey John Ellis
  • Patent number: 10972494
    Abstract: This invention discloses systems and methods for detecting vulnerabilities in IT assets by utilizing crowdsourcing techniques. A corpus containing vulnerability data of IT assets with known vulnerabilities is established. Vulnerability data in the corpus comprises security aspects or attributes related to the IT assets. The security aspects of an IT asset constitute its attack surface which is represented as a feature vector in a feature space. A determination is made as to how similar/close a target asset whose unknown vulnerabilities are to be detected, is to the rest of the IT assets in the corpus. This determination is made based on a measure of similarity/distance between the respective feature vectors in the feature space. Based on the review of similarity results by a community of researchers/experts, a determination of unknown vulnerabilities in the target system is made.
    Type: Grant
    Filed: October 10, 2016
    Date of Patent: April 6, 2021
    Assignee: BugCrowd, Inc.
    Inventors: Jonathan Cran, Michael James O'Kelly, Casey John Ellis
  • Publication number: 20200076847
    Abstract: This invention discloses systems and methods for detecting vulnerabilities in IT assets by utilizing crowdsourcing techniques. A corpus containing vulnerability data of IT assets with known vulnerabilities is established. Vulnerability data in the corpus comprises security aspects or attributes related to the IT assets. The security aspects of an IT asset constitute its attack surface which is represented as a feature vector in a feature space. A determination is made as to how similar/close a target asset whose unknown vulnerabilities are to be detected, is to the rest of the IT assets in the corpus. This determination is made based on a measure of similarity/distance between the respective feature vectors in the feature space. Based on the review of similarity results by a community of researchers/experts, a determination of unknown vulnerabilities in the target system is made.
    Type: Application
    Filed: October 30, 2019
    Publication date: March 5, 2020
    Inventors: Jonathan Cran, Michael James O'Kelly, Casey John Ellis