Patents by Inventor Christopher Joseph O'Connell

Christopher Joseph O'Connell has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 11968175
    Abstract: A method of filtering a URL against a blacklist includes receiving at least a portion of a Uniform Resource Locator (URL), and determining which of a plurality of XOR filters is applicable to the received at least a portion of a URL, where each of the plurality of XOR filters represents a different portion of a URL blacklist. At least a portion of a URL is forwarded to the applicable one of the plurality of XOR filters, and the at least a portion of the URL is processed in the applicable one of the plurality of XOR filters to produce an output indicating whether the URL is likely on the blacklist.
    Type: Grant
    Filed: January 4, 2022
    Date of Patent: April 23, 2024
    Assignee: Avast Software s.r.o.
    Inventors: Hai Tung Nguyen, Christopher Joseph O'Connell, Barna Csukas, Thomas Salomon
  • Patent number: 11750580
    Abstract: A system, computer-readable storage medium, and method for secure network communication. A first device employs a first secret to establish a stream between the first and a second device. A third key, first ciphertext based on a first key, and hash of the first key are received from the second device by the first. A second key is applied to recover a second secret from the first ciphertext. The third key is encrypted to generate a second ciphertext including a third secret. Fourth and fifth keys are derived based on the first, second, and third secrets. A message authentication code is generated based on the fourth and third keys, first ciphertext, hash of the first key, and second ciphertext. The second ciphertext and message authentication code are transmitted by the first to the second device, and the fifth key is employed by the first device to modify the stream.
    Type: Grant
    Filed: February 3, 2022
    Date of Patent: September 5, 2023
    Assignee: Avast Software s.r.o.
    Inventors: Christopher Joseph O'Connell, Barna Csukas, Gabor Miklos, Vitalii Sydorovych, Rui Santos, Michal Hojsík
  • Publication number: 20230231828
    Abstract: A method of filtering a URL against a blacklist includes receiving at least a portion of a Uniform Resource Locator (URL), and determining which of a plurality of XOR filters is applicable to the received at least a portion of a URL, where each of the plurality of XOR filters represents a different portion of a URL blacklist. At least a portion of a URL is forwarded to the applicable one of the plurality of XOR filters, and the at least a portion of the URL is processed in the applicable one of the plurality of XOR filters to produce an output indicating whether the URL is likely on the blacklist.
    Type: Application
    Filed: January 4, 2022
    Publication date: July 20, 2023
    Applicant: Avast Software s.r.o.
    Inventors: Hai Tung Nguyen, Christopher Joseph O'Connell, Barna Csukas, Thomas Salomon
  • Patent number: 11165825
    Abstract: System and method for extending zones of control through a hotspot for communications to and from computing devices based on specific criteria corresponding to zones of control. An encrypted virtual private network (VPN) for a browsing session may be established at a first computing device and remote server computers matching the parameters of the established zone. Then, a user of the first computing device may further establish a wireless hotspot network suited to allow additional remote computing devices to piggy-back on the one or more established encrypted virtual private networks. Thus, other connected devices using the hotspot connection to reach a broader computer network (e.g., the Internet) are then also taking advantage of the encrypted VPN being provided by the host of the hotspot. Each connected computing device may then also have various communications isolated through zonal control from the hotspot device.
    Type: Grant
    Filed: February 16, 2018
    Date of Patent: November 2, 2021
    Assignee: Emerald Cactus Ventures, Inc.
    Inventors: Jesse Aaron Adams, Christopher Joseph O'Connell, Jennifer Marie Catanduanes McEwen
  • Patent number: 11165751
    Abstract: System and method for establishing simultaneous zones of control for various communications to and from a computing devices based on specific criteria corresponding to more than one zone of control encompassing similarly-situated network locations. A browser (or any other common term for a networked computing session GUI) executing on a computing device may establish several zones of restricted data interaction based on specific user-defined criteria, thereby establishing simultaneous zones that respectively correspond to one or more specific parameters with regard to networked computer interactions. For example, a first zone may be associated with only other computers located in the United States (as determined by DNS records and the like) and a second zone may be associated with only other computers located with a specific domain (e.g., www.mybusiness.com).
    Type: Grant
    Filed: February 16, 2018
    Date of Patent: November 2, 2021
    Assignee: Emerald Cactus Ventures, Inc.
    Inventors: Jesse Aaron Adams, Christopher Joseph O'Connell, Jennifer Marie Catanduanes McEwen
  • Patent number: 11122013
    Abstract: A system and method for establishing zones of control for communications among computing devices. Zones of control refer to the concept of unique user-controlled silos separating the interactions between computer devices over the network. When the user of a device connects to a networked computing environment of any kind, at least some data may be sent from the user's device onto the network, as well as downloaded to the user's device. These “data interactions” are usually frequent and numerous. With a private encrypted browsing session established, communications within an established zone of control may be isolated from all other communications and vice versa.
    Type: Grant
    Filed: January 9, 2018
    Date of Patent: September 14, 2021
    Assignee: Emerald Cactus Ventures, Inc.
    Inventors: Jesse Aaron Adams, Christopher Joseph O'Connell, Jennifer Marie Catanduanes McEwen
  • Publication number: 20180234396
    Abstract: System and method for establishing zones of restricted data interaction based on specific user-defined parameters. In an embodiment, a first zone may be established having user-selected parameters for a first type of network traffic such as traffic associated with only other computers located in the United States (as determined by DNS records and the like) and a second zone may be established having user-selected parameters for a second type of network traffic such as network traffic associated with only other computers located with a specific domain (e.g., www.mybusiness.com). In such an established and zoned interaction environment, data that is free to be shared in one zone will not be free to be shared in any other zone. Thus, one may establish a virtual private network (VPN) using encrypted communications for a work session with specific user-selected parameters in establishing various zones of control.
    Type: Application
    Filed: February 16, 2018
    Publication date: August 16, 2018
    Inventors: Jesse Aaron Adams, Christopher Joseph O'Connell, Jennifer Marie Catanduanes McEwen
  • Publication number: 20180234456
    Abstract: System and method for extending zones of control through a hotspot for communications to and from computing devices based on specific criteria corresponding to zones of control. An encrypted virtual private network (VPN) for a browsing session may be established at a first computing device and remote server computers matching the parameters of the established zone. Then, a user of the first computing device may further establish a wireless hotspot network suited to allow additional remote computing devices to piggy-back on the one or more established encrypted virtual private networks. Thus, other connected devices using the hotspot connection to reach a broader computer network (e.g., the Internet) are then also taking advantage of the encrypted VPN being provided by the host of the hotspot. Each connected computing device may then also have various communications isolated through zonal control from the hotspot device.
    Type: Application
    Filed: February 16, 2018
    Publication date: August 16, 2018
    Inventors: Jesse Aaron Adams, Christopher Joseph O'Connell, Jennifer Marie Catanduanes McEwen
  • Publication number: 20180234387
    Abstract: System and method for establishing simultaneous zones of control for various communications to and from a computing devices based on specific criteria corresponding to more than one zone of control encompassing similarly-situated network locations. A browser (or any other common term for a networked computing session GUI) executing on a computing device may establish several zones of restricted data interaction based on specific user-defined criteria, thereby establishing simultaneous zones that respectively correspond to one or more specific parameters with regard to networked computer interactions. For example, a first zone may be associated with only other computers located in the United States (as determined by DNS records and the like) and a second zone may be associated with only other computers located with a specific domain (e.g., www.mybusiness.com).
    Type: Application
    Filed: February 16, 2018
    Publication date: August 16, 2018
    Inventors: Jesse Aaron Adams, Christopher Joseph O'Connell, Jennifer Marie Catanduanes McEwan
  • Publication number: 20180234394
    Abstract: A system and method for establishing zones of control for communications among computing devices. Zones of control refer to the concept of unique user-controlled silos separating the interactions between computer devices over the network. When the user of a device connects to a networked computing environment of any kind, at least some data may be sent from the user's device onto the network, as well as downloaded to the user's device. These “data interactions” are usually frequent and numerous. With a private encrypted browsing session established, communications within an established zone of control may be isolated from all other communications and vice versa.
    Type: Application
    Filed: January 9, 2018
    Publication date: August 16, 2018
    Inventors: Jesse Aaron Adams, Christopher Joseph O'Connell, Jennifer Marie Catanduanes McEwen