Patents by Inventor Craig A. Schultz
Craig A. Schultz has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 10757127Abstract: A system and method are presented for forecasting the risk of cyber-attacks on targeted networks. The described technology quantifies linear and non-linear damages to network-dependent assets by propagating probabilistic distributions of events in sequence and time in order to forecast damages over specified periods. Damage-forecasts are used to estimate probabilistically time-varying financial losses for cyber-attacks. The described technology incorporates quantities and dependencies for pricing insurance, re-insurance, and self-insurance, assessing cost-benefit tradeoffs for sequenced implementation of security control measures, and detecting attacks in the targeted network.Type: GrantFiled: June 9, 2017Date of Patent: August 25, 2020Assignee: Neo Prime, LLCInventors: Craig A Schultz, John J. Nitao, Jeffrey M. Starr, John Compton
-
Publication number: 20170279843Abstract: A system and method are presented for forecasting the risk of cyber-attacks on targeted networks. The described technology quantifies linear and non-linear damages to network-dependent assets by propagating probabilistic distributions of events in sequence and time in order to forecast damages over specified periods. Damage-forecasts are used to estimate probabilistically time-varying financial losses for cyber-attacks. The described technology incorporates quantities and dependencies for pricing insurance, re-insurance, and self-insurance, assessing cost-benefit tradeoffs for sequenced implementation of security control measures, and detecting attacks in the targeted network.Type: ApplicationFiled: June 9, 2017Publication date: September 28, 2017Inventors: Craig A Schultz, John J. Nitao, Jeffrey M. Starr, John Compton
-
Patent number: 9773109Abstract: Methods and systems are presented of presenting false and/or decoy content to an intruder operating on a computer system by obfuscating critical files on a computer storage device with data that directs subsequent infiltration and propagation to designated decoy hosts and decoy applications. Method and systems are provided for selectively presenting different contents to different viewers/users of application resource files for the purpose of preventing the valuable content from being read, tampered with, exfiltrated, or used as a means to perform subsequent attacks on network resources.Type: GrantFiled: January 6, 2017Date of Patent: September 26, 2017Assignee: Acalvio Technologies, Inc.Inventors: Yadong Zhang, Ching-Hai Tsai, Johnson L. Wu, Craig A. Schultz
-
Patent number: 9729567Abstract: A shadow network, which can be a virtual reproduction of a real, physical, base computer network, is described. Shadow networks duplicate the topology, services, host, and network traffic of the base network using shadow hosts, which are low interaction, minimal-resource-using host emulators. The shadow networks are connected to the base network through virtual switches, etc. in order to form a large obfuscated network. When a hacker probes into a host emulator, a more resource-intensive virtual machine can be swapped in to take its place. When a connection is attempted from a host emulator to a physical computer, the a host emulator can step in to take the place of the physical computer, and software defined networking (SDN) can prevent collisions between the duplicated IP addresses. Replicating the shadow networks within the network introduces problems for hackers and allows a system administrator easier ways to identify intrusions.Type: GrantFiled: April 21, 2016Date of Patent: August 8, 2017Assignee: Acalvio Technologies, Inc.Inventors: Steven M. Silva, Yadong Zhang, Eric Winsborrow, Johnson L. Wu, Craig A. Schultz
-
Publication number: 20170206349Abstract: Methods and systems are presented of presenting false and/or decoy content to an intruder operating on a computer system by obfuscating critical files on a computer storage device with data that directs subsequent infiltration and propagation to designated decoy hosts and decoy applications. Method and systems are provided for selectively presenting different contents to different viewers/users of application resource files for the purpose of preventing the valuable content from being read, tampered with, exfiltrated, or used as a means to perform subsequent attacks on network resources.Type: ApplicationFiled: January 6, 2017Publication date: July 20, 2017Applicant: Acalvio Technologies, Inc.Inventors: Yadong Zhang, Ching-Hai Tsai, Johnson L. Wu, Craig A. Schultz
-
Patent number: 9680855Abstract: A system and method are presented for forecasting the risk of cyber-attacks on targeted networks. The described technology quantifies linear and non-linear damages to network-dependent assets by propagating probabilistic distributions of events in sequence and time in order to forecast damages over specified periods. Damage-forecasts are used to estimate probabilistically time-varying financial losses for cyber-attacks. The described technology incorporates quantities and dependencies for pricing insurance, re-insurance, and self-insurance, assessing cost-benefit tradeoffs for sequenced implementation of security control measures, and detecting attacks in the targeted network.Type: GrantFiled: June 30, 2014Date of Patent: June 13, 2017Assignee: NEO PRIME, LLCInventors: Craig A. Schultz, John J. Nitao, Jeffrey M. Starr, John Compton
-
Patent number: 9576145Abstract: Methods and systems are presented of presenting false and/or decoy content to an intruder operating on a computer system by obfuscating critical files on a computer storage device with data that directs subsequent infiltration and propagation to designated decoy hosts and decoy applications. Method and systems are provided for selectively presenting different contents to different viewers/users of application resource files for the purpose of preventing the valuable content from being read, tampered with, exfiltrated, or used as a means to perform subsequent attacks on network resources.Type: GrantFiled: September 30, 2014Date of Patent: February 21, 2017Assignee: ACALVIO TECHNOLOGIES, INC.Inventors: Yadong Zhang, Ching-Hai Tsai, Johnson L. Wu, Craig A. Schultz
-
Publication number: 20160234236Abstract: A shadow network, which can be a virtual reproduction of a real, physical, base computer network, is described. Shadow networks duplicate the topology, services, host, and network traffic of the base network using shadow hosts, which are low interaction, minimal-resource-using host emulators. The shadow networks are connected to the base network through virtual switches, etc. in order to form a large obfuscated network. When a hacker probes into a host emulator, a more resource-intensive virtual machine can be swapped in to take its place. When a connection is attempted from a host emulator to a physical computer, the a host emulator can step in to take the place of the physical computer, and software defined networking (SDN) can prevent collisions between the duplicated IP addresses. Replicating the shadow networks within the network introduces problems for hackers and allows a system administrator easier ways to identify intrusions.Type: ApplicationFiled: April 21, 2016Publication date: August 11, 2016Applicant: Acalvio Technologies, Inc.Inventors: Steven M. Silva, Yadong Zhang, Eric Winsborrow, Johnson L. Wu, Craig A. Schultz
-
Patent number: 9350751Abstract: A shadow network, which can be a virtual reproduction of a real, physical, base computer network, is described. Shadow networks duplicate the topology, services, host, and network traffic of the base network using shadow hosts, which are low interaction, minimal-resource-using host emulators. The shadow networks are connected to the base network through virtual switches, etc. in order to form a large obfuscated network. When a hacker probes into a host emulator, a more resource-intensive virtual machine can be swapped in to take its place. When a connection is attempted from a host emulator to a physical computer, the a host emulator can step in to take the place of the physical computer, and software defined networking (SDN) can prevent collisions between the duplicated IP addresses. Replicating the shadow networks within the network introduces problems for hackers and allows a system administrator easier ways to identify intrusions.Type: GrantFiled: April 23, 2015Date of Patent: May 24, 2016Assignee: ACALVIO TECHNOLOGIES, INC.Inventors: Steven M. Silva, Yadong Zhang, Eric Winsborrow, Johnson L. Wu, Craig A. Schultz
-
Publication number: 20150381649Abstract: A system and method are presented for forecasting the risk of cyber-attacks on targeted networks. The described technology quantifies linear and non-linear damages to network-dependent assets by propagating probabilistic distributions of events in sequence and time in order to forecast damages over specified periods. Damage-forecasts are used to estimate probabilistically time-varying financial losses for cyber-attacks. The described technology incorporates quantities and dependencies for pricing insurance, re-insurance, and self-insurance, assessing cost-benefit tradeoffs for sequenced implementation of security control measures, and detecting attacks in the targeted network.Type: ApplicationFiled: June 30, 2014Publication date: December 31, 2015Inventors: Craig A. Schultz, John J. Nitao, Jeffrey M. Starr, John Compton
-
Publication number: 20150229663Abstract: A shadow network, which can be a virtual reproduction of a real, physical, base computer network, is described. Shadow networks duplicate the topology, services, host, and network traffic of the base network using shadow hosts, which are low interaction, minimal-resource-using host emulators. The shadow networks are connected to the base network through virtual switches, etc. in order to form a large obfuscated network. When a hacker probes into a host emulator, a more resource-intensive virtual machine can be swapped in to take its place. When a connection is attempted from a host emulator to a physical computer, the a host emulator can step in to take the place of the physical computer, and software defined networking (SDN) can prevent collisions between the duplicated IP addresses. Replicating the shadow networks within the network introduces problems for hackers and allows a system administrator easier ways to identify intrusions.Type: ApplicationFiled: April 23, 2015Publication date: August 13, 2015Applicant: Shadow Networks, Inc.Inventors: Steven M. Silva, Yadong Zhang, Eric Winsborrow, Johnson L. Wu, Craig A. Schultz
-
Patent number: 9021092Abstract: A shadow network, which can be a virtual reproduction of a real, physical, base computer network, is described. Shadow networks duplicate the topology, services, host, and network traffic of the base network using shadow hosts, which are low interaction, minimal-resource-using host emulators. The shadow networks are connected to the base network through virtual switches, etc. in order to form a large obfuscated network. When a hacker probes into a host emulator, a more resource-intensive virtual machine can be swapped in to take its place. When a connection is attempted from a host emulator to a physical computer, the a host emulator can step in to take the place of the physical computer, and software defined networking (SDN) can prevent collisions between the duplicated IP addresses. Replicating the shadow networks within the network introduces problems for hackers and allows a system administrator easier ways to identify intrusions.Type: GrantFiled: October 18, 2013Date of Patent: April 28, 2015Assignee: Shadow Networks, Inc.Inventors: Steven M. Silva, Yadong Zhang, Eric Winsborrow, Johnson L. Wu, Craig A. Schultz
-
Publication number: 20150096048Abstract: Methods and systems are presented of presenting false and/or decoy content to an intruder operating on a computer system by obfuscating critical files on a computer storage device with data that directs subsequent infiltration and propagation to designated decoy hosts and decoy applications. Method and systems are provided for selectively presenting different contents to different viewers/users of application resource files for the purpose of preventing the valuable content from being read, tampered with, exfiltrated, or used as a means to perform subsequent attacks on network resources.Type: ApplicationFiled: September 30, 2014Publication date: April 2, 2015Applicant: Shadow Networks, Inc.Inventors: Yadong Zhang, Ching-Hai Tsai, Johnson L. Wu, Craig A. Schultz
-
Publication number: 20140115706Abstract: A shadow network, which can be a virtual reproduction of a real, physical, base computer network, is described. Shadow networks duplicate the topology, services, host, and network traffic of the base network using shadow hosts, which are low interaction, minimal-resource-using host emulators. The shadow networks are connected to the base network through virtual switches, etc. in order to form a large obfuscated network. When a hacker probes into a host emulator, a more resource-intensive virtual machine can be swapped in to take its place. When a connection is attempted from a host emulator to a physical computer, the a host emulator can step in to take the place of the physical computer, and software defined networking (SDN) can prevent collisions between the duplicated IP addresses. Replicating the shadow networks within the network introduces problems for hackers and allows a system administrator easier ways to identify intrusions.Type: ApplicationFiled: October 18, 2013Publication date: April 24, 2014Applicant: ZanttZ,Inc.Inventors: Steven M. Silva, Yadong Zhang, Eric Winsborrow, Johnson L. Wu, Craig A. Schultz
-
Patent number: 7440858Abstract: A method and apparatus is utilized to determine the bearing and/or location of sources, such as, alternating current (A.C.) generators and loads, power lines, transformers and/or radio-frequency (RF) transmitters, emitting electromagnetic-wave energy for which a Poynting-Vector can be defined. When both a source and field sensors (electric and magnetic) are static, a bearing to the electromagnetic source can be obtained. If a single set of electric (E) and magnetic (B) sensors are in motion, multiple measurements permit location of the source. The method can be extended to networks of sensors allowing determination of the location of both stationary and moving sources.Type: GrantFiled: April 13, 2006Date of Patent: October 21, 2008Assignee: Lawrence Livermore National Security, LLCInventors: David J. Simons, Charles R. Carrigan, Philip E. Harben, Barry A. Kirkendall, Craig A. Schultz
-
Patent number: 6240984Abstract: An automated liquid handler includes a probe assembly with a probe foot that can be moved down against the top of sample containers of a variety of sizes and shapes defined by racks, tubes or plates. A seal at the bottom of the foot provides a seal between the foot and the containers making it possible to prepare a SPE sample by using positive, probe introduced pressure within the containers to force liquid samples out through media at the bottom of the container. The foot seal is self sealing without the need for adhesives or other potential contaminates, and is removeably mounted to the probe foot.Type: GrantFiled: March 8, 2000Date of Patent: June 5, 2001Assignee: Gilson, Inc.Inventors: Kevin Richard Fawcett, John Paul Hlavachek, Craig A. Schultz