Patents by Inventor Christopher D. Coleman
Christopher D. Coleman has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 10511621Abstract: The cyber threat intelligence confidence rating visualization and editing user interface technology (hereinafter “TIC”) provides a user interface that allows a user (e.g., a cyber threat analyst, etc.) to submit ratings for various characteristics associated with a cyber threat indicator. In one embodiment, the TIC may instantiate a user interactive risk evaluation component having a user interface input element for a user to submit calculation weights for one or more characteristics of a cyber threat; generate a graphical representation of a cyber threat confidence score for user interface display via the user interactive risk evaluation component; and dynamically adjust the graphical representation of the threat confidence score using at least one of the one or more characteristics weighted by the user configured weight.Type: GrantFiled: March 10, 2017Date of Patent: December 17, 2019Assignee: Lookingglass Cyber Solutions, Inc.Inventors: Allan Thomson, Christopher D. Coleman
-
Patent number: 10033754Abstract: The cyber threat monitor and control apparatuses, methods and systems (hereinafter “CTMC”) determines risk across a global Internet network graph model for various virtual or physical network elements. In one embodiment, the CTMC defines a factor mechanism representing interactions among the set of network elements, the factor mechanism including a factor indicative of a correlation between a pair of network elements from the set of network elements, and dynamically calculate the probabilistic network security measure for each network element in the global Internet graph model based at least in part on the factor mechanism and any observed threat indicators related to the global Internet graph model.Type: GrantFiled: July 28, 2017Date of Patent: July 24, 2018Assignee: Lookingglass Cyber Solutions, Inc.Inventors: Christopher Paul Pinney Wood, John Joseph Helmsen, Allan Thomson, Christopher D. Coleman
-
Patent number: 10027705Abstract: The real-time cyber threat indicator verification mechanism technology (hereinafter “TIVM”) instantiates one or more virtual client emulators to access a source of a threat, in response to a received threat indicator, so as to evaluate validity and/or severity of the potential threat. In one embodiment, the TIVM may receive a cyber threat indicator having identifying information of a cyber threat source; instantiate, in response to the cyber threat indicator, a virtual client emulator; send a control message to cause the virtual client emulator to interact with the cyber threat source based on the identifying information; obtain a confidence indicator relating to the cyber threat indicator based on interaction between the virtual client emulator and the cyber threat source; and generate a cyber threat indicator confirmation report including the confidence indicator.Type: GrantFiled: March 13, 2017Date of Patent: July 17, 2018Assignee: Lookingglass Cyber Solutions, Inc.Inventors: Christopher D. Coleman, Allan Thomson, Jason A. Lewis
-
Publication number: 20170331851Abstract: The cyber threat monitor and control apparatuses, methods and systems (hereinafter “CTMC”) determines risk across a global Internet network graph model for various virtual or physical network elements. In one embodiment, the CTMC defines a factor mechanism representing interactions among the set of network elements, the factor mechanism including a factor indicative of a correlation between a pair of network elements from the set of network elements, and dynamically calculate the probabilistic network security measure for each network element in the global Internet graph model based at least in part on the factor mechanism and any observed threat indicators related to the global Internet graph model.Type: ApplicationFiled: July 28, 2017Publication date: November 16, 2017Applicant: Lookingglass Cyber Solutions, Inc.Inventors: Christopher Paul PINNEY WOOD, John Joseph HELMSEN, Allan THOMSON, Christopher D. COLEMAN
-
Patent number: 9807108Abstract: Current approaches to managing security intelligence data often address both threat and malicious behavior at the individual computer level, tracked by the Internet Protocol (IP) address. For example, important facts, observed behavior, and other indications that are tracked by security organizations are only tracked with respect to individual IP addresses. Bilateral network inheritance generally refers to inheriting a variety of attributes from parents to children and from children to parents in a computer network hierarchy. The computer network hierarchy may comprise various entities such as, for example, top level entities, autonomous systems, address ranges, and individual IP addresses.Type: GrantFiled: August 18, 2016Date of Patent: October 31, 2017Assignee: Lookingglass Cyber Solutions, Inc.Inventors: Jason A. Lewis, Kenneth B. Hoxworth, Christopher D. Coleman, Derek M. Gabbard
-
Patent number: 9749347Abstract: The cyber threat monitor and control apparatuses, methods and systems (hereinafter “CTMC”) determines risk across a global Internet network graph model for various virtual or physical network elements. In one embodiment, the CTMC defines a factor mechanism representing interactions among the set of network elements, the factor mechanism including a factor indicative of a correlation between a pair of network elements from the set of network elements, and dynamically calculate the probabilistic network security measure for each network element in the global Internet graph model based at least in part on the factor mechanism and any observed threat indicators related to the global Internet graph model.Type: GrantFiled: November 18, 2015Date of Patent: August 29, 2017Assignee: LOOKINGGLASS CYBER SOLUTIONS, INC.Inventors: Christopher Paul Pinney Wood, John Joseph Helmsen, Allan Thomson, Christopher D. Coleman
-
Patent number: 9596256Abstract: The cyber threat intelligence confidence rating visualization and editing user interface technology (hereinafter “TIC”) provides a user interface that allows a user (e.g., a cyber threat analyst, etc.) to submit ratings for various characteristics associated with a cyber threat indicator. In one embodiment, the TIC may instantiate a user interactive risk evaluation component having a user interface input element for a user to submit calculation weights for one or more characteristics of a cyber threat; generate a graphical representation of a cyber threat confidence score for user interface display via the user interactive risk evaluation component; and dynamically adjust the graphical representation of the threat confidence score using at least one of the one or more characteristics weighted by the user configured weight.Type: GrantFiled: August 24, 2015Date of Patent: March 14, 2017Assignee: Lookingglass Cyber Solutions, Inc.Inventors: Allan Thomson, Christopher D. Coleman
-
Patent number: 9596266Abstract: The real-time cyber threat indicator verification mechanism technology (hereinafter “TIVM”) instantiates one or more virtual client emulators to access a source of a threat, in response to a received threat indicator, so as to evaluate validity and/or severity of the potential threat. In one embodiment, the TIVM may receive a cyber threat indicator having identifying information of a cyber threat source; instantiate, in response to the cyber threat indicator, a virtual client emulator; send a control message to cause the virtual client emulator to interact with the cyber threat source based on the identifying information; obtain a confidence indicator relating to the cyber threat indicator based on interaction between the virtual client emulator and the cyber threat source; and generate a cyber threat indicator confirmation report including the confidence indicator.Type: GrantFiled: July 23, 2014Date of Patent: March 14, 2017Assignee: Lookingglass Cyber Solutions, Inc.Inventors: Christopher D. Coleman, Allan Thomson, Jason A Lewis
-
Publication number: 20160359898Abstract: Current approaches to managing security intelligence data often address both threat and malicious behavior at the individual computer level, tracked by the Internet Protocol (IP) address. For example, important facts, observed behavior, and other indications that are tracked by security organizations are only tracked with respect to individual IP addresses. Bilateral network inheritance generally refers to inheriting a variety of attributes from parents to children and from children to parents in a computer network hierarchy. The computer network hierarchy may comprise various entities such as, for example, top level entities, autonomous systems, address ranges, and individual IP addresses.Type: ApplicationFiled: August 18, 2016Publication date: December 8, 2016Applicant: Lookingglass Cyber Solutions, Inc.Inventors: Jason A. Lewis, Kenneth B. Hoxworth, Christopher D. Coleman, Derek M. Gabbard
-
Patent number: 9509712Abstract: The cyber threat monitor and control apparatuses, methods and systems (hereinafter “CTMC”) determines risk across a global Internet network graph model for various virtual or physical network elements. In one embodiment, the CTMC defines a factor mechanism representing interactions among the set of network elements, the factor mechanism including a factor indicative of a correlation between a pair of network elements from the set of network elements, and dynamically calculate the probabilistic network security measure for each network element in the global Internet graph model based at least in part on the factor mechanism and any observed threat indicators related to the global Internet graph model.Type: GrantFiled: November 18, 2015Date of Patent: November 29, 2016Assignee: Lookingglass Cyber Solutions, Inc.Inventors: Christopher Paul Pinney Wood, John Joseph Helmsen, Allan Thomson, Christopher D. Coleman
-
Patent number: 9455993Abstract: Current approaches to managing security intelligence data often address both threat and malicious behavior at the individual computer level, tracked by the Internet Protocol (IP) address. For example, important facts, observed behavior, and other indications that are tracked by security organizations are only tracked with respect to individual IP addresses. Bilateral network inheritance generally refers to inheriting a variety of attributes from parents to children and from children to parents in a computer network hierarchy. The computer network hierarchy may comprise various entities such as, for example, top level entities, autonomous systems, address ranges, and individual IP addresses.Type: GrantFiled: February 10, 2014Date of Patent: September 27, 2016Assignee: Lookingglass Cyber Solutions, Inc.Inventors: Jason A. Lewis, Kenneth B. Hoxworth, Christopher D. Coleman, Derek M. Gabbard
-
Publication number: 20160164906Abstract: The cyber threat monitor and control apparatuses, methods and systems (hereinafter “CTMC”) determines risk across a global Internet network graph model for various virtual or physical network elements. In one embodiment, the CTMC defines a factor mechanism representing interactions among the set of network elements, the factor mechanism including a factor indicative of a correlation between a pair of network elements from the set of network elements, and dynamically calculate the probabilistic network security measure for each network element in the global Internet graph model based at least in part on the factor mechanism and any observed threat indicators related to the global Internet graph model.Type: ApplicationFiled: November 18, 2015Publication date: June 9, 2016Applicant: LOOKINGGLASS CYBER SOLUTIONS, INC.Inventors: Christopher Paul Pinney Wood, John Joseph Helmsen, Allan Thomson, Christopher D. Coleman
-
Publication number: 20160164905Abstract: The cyber threat monitor and control apparatuses, methods and systems (hereinafter “CTMC”) determines risk across a global Internet network graph model for various virtual or physical network elements. In one embodiment, the CTMC defines a factor mechanism representing interactions among the set of network elements, the factor mechanism including a factor indicative of a correlation between a pair of network elements from the set of network elements, and dynamically calculate the probabilistic network security measure for each network element in the global Internet graph model based at least in part on the factor mechanism and any observed threat indicators related to the global Internet graph model.Type: ApplicationFiled: November 18, 2015Publication date: June 9, 2016Applicant: LOOKINGGLASS CYBER SOLUTIONS, INC.Inventors: Christopher Paul Pinney Wood, John Joseph Helmsen, Allan Thomson, Christopher D. Coleman
-
Publication number: 20160080408Abstract: The cyber security assessment mechanism system is disclosed, including a first cyber threat intelligence processing component to calculate a cyber threat indicator confidence score associated with at least one of a cyber threat indicator or a network element after the cyber threat indicator is received. The cyber security assessment further includes a cyber security index component to generate a cyber threat index value for the cyber network based on the cyber threat indicator confidence score associated with the network elements after the cyber threat indicator confidence score is associated. The cyber security index component further sends the cyber threat index value for the cyber network, to a second cyber threat intelligence processing component disposed at a remote location from the data center such that the second cyber threat processing component generates a user interface visualization representing the cyber threat index value.Type: ApplicationFiled: September 15, 2014Publication date: March 17, 2016Inventors: Christopher D. Coleman, Allan Thomson, Jason A. Lewis
-
Patent number: 9210185Abstract: The cyber threat monitor and control apparatuses, methods and systems (hereinafter “CTMC”) determines risk across a global Internet network graph model for various virtual or physical network elements. In one embodiment, the CTMC defines a factor mechanism representing interactions among the set of network elements, the factor mechanism including a factor indicative of a correlation between a pair of network elements from the set of network elements, and dynamically calculate the probabilistic network security measure for each network element in the global Internet graph model based at least in part on the factor mechanism and any observed threat indicators related to the global Internet graph model.Type: GrantFiled: December 5, 2014Date of Patent: December 8, 2015Assignee: Lookingglass Cyber Solutions, Inc.Inventors: Christopher Paul Pinney Wood, John Joseph Helmsen, Allan Thomson, Christopher D. Coleman
-
Patent number: 9118714Abstract: The cyber threat intelligence confidence rating visualization and editing user interface technology (hereinafter “TIC”) provides a user interface that allows a user (e.g., a cyber threat analyst, etc.) to submit ratings for various characteristics associated with a cyber threat indicator. In one embodiment, the TIC may instantiate a user interactive risk evaluation component having a user interface input element for a user to submit calculation weights for one or more characteristics of a cyber threat; generate a graphical representation of a cyber threat confidence score for user interface display via the user interactive risk evaluation component; and dynamically adjust the graphical representation of the threat confidence score using at least one of the one or more characteristics weighted by the user configured weight.Type: GrantFiled: July 23, 2014Date of Patent: August 25, 2015Assignee: Lookingglass Cyber Solutions, Inc.Inventors: Allan Thomson, Christopher D. Coleman
-
Publication number: 20140283070Abstract: Current approaches to managing security intelligence data often address both threat and malicious behavior at the individual computer level, tracked by the Internet Protocol (IP) address. For example, important facts, observed behavior, and other indications that are tracked by security organizations are only tracked with respect to individual IP addresses. Bilateral network inheritance generally refers to inheriting a variety of attributes from parents to children and from children to parents in a computer network hierarchy. The computer network hierarchy may comprise various entities such as, for example, top level entities, autonomous systems, address ranges, and individual IP addresses.Type: ApplicationFiled: February 10, 2014Publication date: September 18, 2014Inventors: Jason A. Lewis, Kenneth B. Hoxworth, Christopher D. Coleman, Derek M. Gabbard