Patents by Inventor Christopher M. Poulin

Christopher M. Poulin has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 10742664
    Abstract: Methods and systems for event detection include defining a plurality of conditions that represent one or more synthetic events. Data from a plurality of data sources is aggregated across a period of time, multiple attack surfaces, and geographically distinct locations. The aggregated data is matched to the conditions to determine whether a synthetic event has occurred. A response to the synthetic event is formed to resist an attack.
    Type: Grant
    Filed: October 20, 2015
    Date of Patent: August 11, 2020
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Robert R. Friedlander, James R. Kraemer, Jeb Linton, Christopher M. Poulin
  • Patent number: 10681030
    Abstract: A computer-implemented method validates firmware levels for peer-to-peer communication in a network. Communication rules between a first device and a second device are utilized to validate firmware levels between the first device and the second device on a network using zero knowledge communication authentications. Communication between the first device and the second device via the network is disabled in response to determining that firmware in the first device is not compatible with firmware in the second device.
    Type: Grant
    Filed: April 26, 2019
    Date of Patent: June 9, 2020
    Assignee: International Business Machines Corporation
    Inventors: Jeb R. Linton, Christopher M. Poulin
  • Publication number: 20190253405
    Abstract: A computer-implemented method validates firmware levels for peer-to-peer communication in a network. Communication rules between a first device and a second device are utilized to validate firmware levels between the first device and the second device on a network using zero knowledge communication authentications. Communication between the first device and the second device via the network is disabled in response to determining that firmware in the first device is not compatible with firmware in the second device.
    Type: Application
    Filed: April 26, 2019
    Publication date: August 15, 2019
    Inventors: JEB R. LINTON, CHRISTOPHER M. POULIN
  • Patent number: 10333713
    Abstract: A computer-implemented method validates Internet of Things (IoT) device firmware levels for peer-to-peer communication in a network using a peer-to-peer registry. Each device in an IoT is registered anonymously by utilizing a unique device identifier and a firmware level in a peer-to-peer registry. Communication rules are provided by the peer-to-peer registry based on the device type and firmware level of each of the devices, in order to validate IoT firmware device levels between the first device and the second device on a network. The first device utilizes a first zero knowledge communication authentication with the second device to get a first assessment and a first proof. The second device utilizes a second zero knowledge communication authentication with the first device to get a second assessment and a second proof. Communication between the first device and the second device via the network is disabled until all assessments are a pass.
    Type: Grant
    Filed: October 11, 2016
    Date of Patent: June 25, 2019
    Assignee: International Business Machines Corporation
    Inventors: Jeb R. Linton, Christopher M. Poulin
  • Patent number: 10326749
    Abstract: A computer-implemented method validates Internet of Things (IoT) device firmware levels for peer-to-peer communication in a network. Communication rules between a first device and a second device are utilized to establish a session to validate IoT device firmware levels between the first device and the second device on a network. The first device utilizes a first zero knowledge communication authentication with the second device to get a first assessment and a first proof. The second device utilizes a second zero knowledge communication authentication with the first device to get a second assessment and a second proof. Communication between the first device and the second device via the network is disabled until all assessments are a pass.
    Type: Grant
    Filed: October 11, 2016
    Date of Patent: June 18, 2019
    Assignee: International Business Machines Corporation
    Inventors: Jeb R. Linton, Christopher M. Poulin
  • Publication number: 20180102901
    Abstract: A computer-implemented method validates Internet of Things (IoT) device firmware levels for peer-to-peer communication in a network using a peer-to-peer registry. Each device in an IoT is registered anonymously by utilizing a unique device identifier and a firmware level in a peer-to-peer registry. Communication rules are provided by the peer-to-peer registry based on the device type and firmware level of each of the devices, in order to validate IoT firmware device levels between the first device and the second device on a network. The first device utilizes a first zero knowledge communication authentication with the second device to get a first assessment and a first proof. The second device utilizes a second zero knowledge communication authentication with the first device to get a second assessment and a second proof. Communication between the first device and the second device via the network is disabled until all assessments are a pass.
    Type: Application
    Filed: October 11, 2016
    Publication date: April 12, 2018
    Inventors: JEB R. LINTON, CHRISTOPHER M. POULIN
  • Publication number: 20180103023
    Abstract: A computer-implemented method validates Internet of Things (IoT) device firmware levels for peer-to-peer communication in a network. Communication rules between a first device and a second device are utilized to establish a session to validate IoT device firmware levels between the first device and the second device on a network. The first device utilizes a first zero knowledge communication authentication with the second device to get a first assessment and a first proof. The second device utilizes a second zero knowledge communication authentication with the first device to get a second assessment and a second proof. Communication between the first device and the second device via the network is disabled until all assessments are a pass.
    Type: Application
    Filed: October 11, 2016
    Publication date: April 12, 2018
    Inventors: JEB R. LINTON, CHRISTOPHER M. POULIN
  • Publication number: 20170111376
    Abstract: Methods and systems for event detection include defining a plurality of conditions that represent one or more synthetic events. Data from a plurality of data sources is aggregated across a period of time, multiple attack surfaces, and geographically distinct locations. The aggregated data is matched to the conditions to determine whether a synthetic event has occurred. A response to the synthetic event is formed to resist an attack.
    Type: Application
    Filed: October 20, 2015
    Publication date: April 20, 2017
    Inventors: Robert R. Friedlander, James R. Kraemer, Jeb Linton, Christopher M. Poulin
  • Publication number: 20160352762
    Abstract: A method, system, and/or computer program product probabilistically detects a low intensity threat event against an attack surface. A notification of disparate anomalies experienced by each of multiple attack surfaces is received. The disparate anomalies occur over an extended period of time that exceeds a maximum threshold time period required to identify a high intensity attack against one or more of the multiple attack surfaces. A synthetic event that includes all of the disparate anomalies experienced by the multiple attack surfaces is generated. In response to receiving a notification that the at least one particular attack surface is experiencing a predefined quantity of the disparate anomalies found in the synthetic event, an alert that a malicious attack is being attempted against one or more attack surfaces is generated.
    Type: Application
    Filed: May 26, 2015
    Publication date: December 1, 2016
    Inventors: Robert R. Friedlander, James R. Kraemer, Jeb R. Linton, Christopher M. Poulin