Patents by Inventor Charles Manser

Charles Manser has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 12231455
    Abstract: A network vulnerability scanning system scans a target device for vulnerabilities to obtain initial network connection data for the target device via a first network interface of the target device, the initial network connection data identifying an initial network connection between the target device and a first hidden network system. The network vulnerability scanning system installs a network scanning application on the target device subsequent to scanning the target device for vulnerabilities to obtain the initial network connection data. The network vulnerability system scans the first hidden network system for vulnerabilities via the network scanning application.
    Type: Grant
    Filed: November 30, 2022
    Date of Patent: February 18, 2025
    Assignee: Charter Communications Operating, LLC
    Inventors: Jeffrey Rowell, Charles Manser
  • Publication number: 20240179172
    Abstract: A network vulnerability scanning system scans a target device for vulnerabilities to obtain network connection data for the target device. The network vulnerability scanning system determines the network connection data includes a network connection between the target device and a hidden network system. The network vulnerability scanning system installs a network scanning application on the target device in response to determining the network connection data includes the network connection between the target device and the hidden network system. The network vulnerability scanning system scans the hidden network system for vulnerabilities via the network scanning application installed on the target device.
    Type: Application
    Filed: November 30, 2022
    Publication date: May 30, 2024
    Inventors: Jeffrey Rowell, Charles Manser
  • Publication number: 20240179171
    Abstract: A network vulnerability scanning system scans a target device for vulnerabilities to obtain initial network connection data for the target device via a first network interface of the target device, the initial network connection data identifying an initial network connection between the target device and a first hidden network system. The network vulnerability scanning system installs a network scanning application on the target device subsequent to scanning the target device for vulnerabilities to obtain the initial network connection data. The network vulnerability system scans the first hidden network system for vulnerabilities via the network scanning application.
    Type: Application
    Filed: November 30, 2022
    Publication date: May 30, 2024
    Inventors: Jeffrey Rowell, Charles Manser
  • Publication number: 20240168976
    Abstract: A set of computing nodes that compose a container orchestration computing cluster are identified. A set of taints that are associated with the set of computing nodes are identified, wherein each taint in the set of taints prohibits scheduling of a container group, which is defined by a container group specification that does not meet a condition defined by the taint, on a computing node associated with the taint. A first container group specification that meets the condition defined by each taint is generated, wherein the first container group specification identifies a container image. The container group, via the first container group specification, is caused to be deployed on each computing node in the set of computing nodes that has an associated taint.
    Type: Application
    Filed: November 23, 2022
    Publication date: May 23, 2024
    Inventors: Jeffrey Rowell, Charles Manser
  • Patent number: 11902305
    Abstract: Method and systems for detecting and mitigating a malicious bot. Threat information is obtained, the threat information identifying one or more indicators of compromise (IOC) corresponding to suspected or known malicious network traffic. A control list (CL) corresponding to the threat information is generated, the CL describing rules for identifying network flows to be logged in a network log. The network log identifying the network flows is obtained and a suspect network flow identified by both the threat information and the network log is identified. An address corresponding to the suspect network flow is identified and the address is correlated with a user identifier. A notification is issued to a user associated with the user identifier, the notification indicating a suspected existence of a malicious bot.
    Type: Grant
    Filed: February 19, 2023
    Date of Patent: February 13, 2024
    Assignee: CHARTER COMMUNICATIONS OPERATING, LLC
    Inventors: Pratik Lotia, Charles Manser
  • Publication number: 20230199009
    Abstract: Method and systems for detecting and mitigating a malicious bot. Threat information is obtained, the threat information identifying one or more indicators of compromise (IOC) corresponding to suspected or known malicious network traffic. A control list (CL) corresponding to the threat information is generated, the CL describing rules for identifying network flows to be logged in a network log. The network log identifying the network flows is obtained and a suspect network flow identified by both the threat information and the network log is identified. An address corresponding to the suspect network flow is identified and the address is correlated with a user identifier. A notification is issued to a user associated with the user identifier, the notification indicating a suspected existence of a malicious bot.
    Type: Application
    Filed: February 19, 2023
    Publication date: June 22, 2023
    Inventors: Pratik Lotia, Charles Manser
  • Patent number: 11627147
    Abstract: Method and systems for detecting and mitigating a malicious bot. Threat information is obtained, the threat information identifying one or more indicators of compromise (IOC) corresponding to suspected or known malicious network traffic. A control list (CL) corresponding to the threat information is generated, the CL describing rules for identifying network flows to be logged in a network log. The network log identifying the network flows is obtained and a suspect network flow identified by both the threat information and the network log is identified. An address corresponding to the suspect network flow is identified and the address is correlated with a user identifier. A notification is issued to a user associated with the user identifier, the notification indicating a suspected existence of a malicious bot.
    Type: Grant
    Filed: May 17, 2019
    Date of Patent: April 11, 2023
    Assignee: CHARTER COMMUNICATIONS OPERATING, LLC
    Inventors: Pratik Lotia, Charles Manser
  • Patent number: 11363063
    Abstract: A method and system for detecting and mitigating a malicious bot is disclosed. Address information is obtained from a third-party threat intelligence provider, the address information corresponding to network traffic that has been identified as malicious network traffic. Network traffic originating on a networked device is inspected in search of packets that correspond to the obtained address information. A check is performed to determine if a given one of the searched packets corresponds to an address associated with the address information and, responsive to the check indicating that the given one of the searched packets corresponds to the address associated with the address information, a managed router service is configured to mitigate the malicious network traffic.
    Type: Grant
    Filed: December 28, 2018
    Date of Patent: June 14, 2022
    Assignee: CHARTER COMMUNICATIONS OPERATING, LLC
    Inventors: Pratik Mukeshchandra Lotia, Charles Manser
  • Publication number: 20200366689
    Abstract: Method and systems for detecting and mitigating a malicious bot. Threat information is obtained, the threat information identifying one or more indicators of compromise (IOC) corresponding to suspected or known malicious network traffic. A control list (CL) corresponding to the threat information is generated, the CL describing rules for identifying network flows to be logged in a network log. The network log identifying the network flows is obtained and a suspect network flow identified by both the threat information and the network log is identified. An address corresponding to the suspect network flow is identified and the address is correlated with a user identifier. A notification is issued to a user associated with the user identifier, the notification indicating a suspected existence of a malicious bot.
    Type: Application
    Filed: May 17, 2019
    Publication date: November 19, 2020
    Inventors: Pratik Lotia, Charles Manser
  • Publication number: 20200213353
    Abstract: A method and system for detecting and mitigating a malicious bot is disclosed. Address information is obtained from a third-party threat intelligence provider, the address information corresponding to network traffic that has been identified as malicious network traffic. Network traffic originating on a networked device is inspected in search of packets that correspond to the obtained address information. A check is performed to determine if a given one of the searched packets corresponds to an address associated with the address information and, responsive to the check indicating that the given one of the searched packets corresponds to the address associated with the address information, a managed router service is configured to mitigate the malicious network traffic.
    Type: Application
    Filed: December 28, 2018
    Publication date: July 2, 2020
    Inventors: Pratik Mukeshchandra Lotia, Charles Manser