Patents by Inventor Charles Manser
Charles Manser has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 12231455Abstract: A network vulnerability scanning system scans a target device for vulnerabilities to obtain initial network connection data for the target device via a first network interface of the target device, the initial network connection data identifying an initial network connection between the target device and a first hidden network system. The network vulnerability scanning system installs a network scanning application on the target device subsequent to scanning the target device for vulnerabilities to obtain the initial network connection data. The network vulnerability system scans the first hidden network system for vulnerabilities via the network scanning application.Type: GrantFiled: November 30, 2022Date of Patent: February 18, 2025Assignee: Charter Communications Operating, LLCInventors: Jeffrey Rowell, Charles Manser
-
Publication number: 20240179172Abstract: A network vulnerability scanning system scans a target device for vulnerabilities to obtain network connection data for the target device. The network vulnerability scanning system determines the network connection data includes a network connection between the target device and a hidden network system. The network vulnerability scanning system installs a network scanning application on the target device in response to determining the network connection data includes the network connection between the target device and the hidden network system. The network vulnerability scanning system scans the hidden network system for vulnerabilities via the network scanning application installed on the target device.Type: ApplicationFiled: November 30, 2022Publication date: May 30, 2024Inventors: Jeffrey Rowell, Charles Manser
-
Publication number: 20240179171Abstract: A network vulnerability scanning system scans a target device for vulnerabilities to obtain initial network connection data for the target device via a first network interface of the target device, the initial network connection data identifying an initial network connection between the target device and a first hidden network system. The network vulnerability scanning system installs a network scanning application on the target device subsequent to scanning the target device for vulnerabilities to obtain the initial network connection data. The network vulnerability system scans the first hidden network system for vulnerabilities via the network scanning application.Type: ApplicationFiled: November 30, 2022Publication date: May 30, 2024Inventors: Jeffrey Rowell, Charles Manser
-
Publication number: 20240168976Abstract: A set of computing nodes that compose a container orchestration computing cluster are identified. A set of taints that are associated with the set of computing nodes are identified, wherein each taint in the set of taints prohibits scheduling of a container group, which is defined by a container group specification that does not meet a condition defined by the taint, on a computing node associated with the taint. A first container group specification that meets the condition defined by each taint is generated, wherein the first container group specification identifies a container image. The container group, via the first container group specification, is caused to be deployed on each computing node in the set of computing nodes that has an associated taint.Type: ApplicationFiled: November 23, 2022Publication date: May 23, 2024Inventors: Jeffrey Rowell, Charles Manser
-
Patent number: 11902305Abstract: Method and systems for detecting and mitigating a malicious bot. Threat information is obtained, the threat information identifying one or more indicators of compromise (IOC) corresponding to suspected or known malicious network traffic. A control list (CL) corresponding to the threat information is generated, the CL describing rules for identifying network flows to be logged in a network log. The network log identifying the network flows is obtained and a suspect network flow identified by both the threat information and the network log is identified. An address corresponding to the suspect network flow is identified and the address is correlated with a user identifier. A notification is issued to a user associated with the user identifier, the notification indicating a suspected existence of a malicious bot.Type: GrantFiled: February 19, 2023Date of Patent: February 13, 2024Assignee: CHARTER COMMUNICATIONS OPERATING, LLCInventors: Pratik Lotia, Charles Manser
-
Publication number: 20230199009Abstract: Method and systems for detecting and mitigating a malicious bot. Threat information is obtained, the threat information identifying one or more indicators of compromise (IOC) corresponding to suspected or known malicious network traffic. A control list (CL) corresponding to the threat information is generated, the CL describing rules for identifying network flows to be logged in a network log. The network log identifying the network flows is obtained and a suspect network flow identified by both the threat information and the network log is identified. An address corresponding to the suspect network flow is identified and the address is correlated with a user identifier. A notification is issued to a user associated with the user identifier, the notification indicating a suspected existence of a malicious bot.Type: ApplicationFiled: February 19, 2023Publication date: June 22, 2023Inventors: Pratik Lotia, Charles Manser
-
Patent number: 11627147Abstract: Method and systems for detecting and mitigating a malicious bot. Threat information is obtained, the threat information identifying one or more indicators of compromise (IOC) corresponding to suspected or known malicious network traffic. A control list (CL) corresponding to the threat information is generated, the CL describing rules for identifying network flows to be logged in a network log. The network log identifying the network flows is obtained and a suspect network flow identified by both the threat information and the network log is identified. An address corresponding to the suspect network flow is identified and the address is correlated with a user identifier. A notification is issued to a user associated with the user identifier, the notification indicating a suspected existence of a malicious bot.Type: GrantFiled: May 17, 2019Date of Patent: April 11, 2023Assignee: CHARTER COMMUNICATIONS OPERATING, LLCInventors: Pratik Lotia, Charles Manser
-
Patent number: 11363063Abstract: A method and system for detecting and mitigating a malicious bot is disclosed. Address information is obtained from a third-party threat intelligence provider, the address information corresponding to network traffic that has been identified as malicious network traffic. Network traffic originating on a networked device is inspected in search of packets that correspond to the obtained address information. A check is performed to determine if a given one of the searched packets corresponds to an address associated with the address information and, responsive to the check indicating that the given one of the searched packets corresponds to the address associated with the address information, a managed router service is configured to mitigate the malicious network traffic.Type: GrantFiled: December 28, 2018Date of Patent: June 14, 2022Assignee: CHARTER COMMUNICATIONS OPERATING, LLCInventors: Pratik Mukeshchandra Lotia, Charles Manser
-
Publication number: 20200366689Abstract: Method and systems for detecting and mitigating a malicious bot. Threat information is obtained, the threat information identifying one or more indicators of compromise (IOC) corresponding to suspected or known malicious network traffic. A control list (CL) corresponding to the threat information is generated, the CL describing rules for identifying network flows to be logged in a network log. The network log identifying the network flows is obtained and a suspect network flow identified by both the threat information and the network log is identified. An address corresponding to the suspect network flow is identified and the address is correlated with a user identifier. A notification is issued to a user associated with the user identifier, the notification indicating a suspected existence of a malicious bot.Type: ApplicationFiled: May 17, 2019Publication date: November 19, 2020Inventors: Pratik Lotia, Charles Manser
-
Publication number: 20200213353Abstract: A method and system for detecting and mitigating a malicious bot is disclosed. Address information is obtained from a third-party threat intelligence provider, the address information corresponding to network traffic that has been identified as malicious network traffic. Network traffic originating on a networked device is inspected in search of packets that correspond to the obtained address information. A check is performed to determine if a given one of the searched packets corresponds to an address associated with the address information and, responsive to the check indicating that the given one of the searched packets corresponds to the address associated with the address information, a managed router service is configured to mitigate the malicious network traffic.Type: ApplicationFiled: December 28, 2018Publication date: July 2, 2020Inventors: Pratik Mukeshchandra Lotia, Charles Manser