Patents by Inventor Craig Schultz

Craig Schultz has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 9729567
    Abstract: A shadow network, which can be a virtual reproduction of a real, physical, base computer network, is described. Shadow networks duplicate the topology, services, host, and network traffic of the base network using shadow hosts, which are low interaction, minimal-resource-using host emulators. The shadow networks are connected to the base network through virtual switches, etc. in order to form a large obfuscated network. When a hacker probes into a host emulator, a more resource-intensive virtual machine can be swapped in to take its place. When a connection is attempted from a host emulator to a physical computer, the a host emulator can step in to take the place of the physical computer, and software defined networking (SDN) can prevent collisions between the duplicated IP addresses. Replicating the shadow networks within the network introduces problems for hackers and allows a system administrator easier ways to identify intrusions.
    Type: Grant
    Filed: April 21, 2016
    Date of Patent: August 8, 2017
    Assignee: Acalvio Technologies, Inc.
    Inventors: Steven M. Silva, Yadong Zhang, Eric Winsborrow, Johnson L. Wu, Craig A. Schultz
  • Publication number: 20170206349
    Abstract: Methods and systems are presented of presenting false and/or decoy content to an intruder operating on a computer system by obfuscating critical files on a computer storage device with data that directs subsequent infiltration and propagation to designated decoy hosts and decoy applications. Method and systems are provided for selectively presenting different contents to different viewers/users of application resource files for the purpose of preventing the valuable content from being read, tampered with, exfiltrated, or used as a means to perform subsequent attacks on network resources.
    Type: Application
    Filed: January 6, 2017
    Publication date: July 20, 2017
    Applicant: Acalvio Technologies, Inc.
    Inventors: Yadong Zhang, Ching-Hai Tsai, Johnson L. Wu, Craig A. Schultz
  • Patent number: 9680855
    Abstract: A system and method are presented for forecasting the risk of cyber-attacks on targeted networks. The described technology quantifies linear and non-linear damages to network-dependent assets by propagating probabilistic distributions of events in sequence and time in order to forecast damages over specified periods. Damage-forecasts are used to estimate probabilistically time-varying financial losses for cyber-attacks. The described technology incorporates quantities and dependencies for pricing insurance, re-insurance, and self-insurance, assessing cost-benefit tradeoffs for sequenced implementation of security control measures, and detecting attacks in the targeted network.
    Type: Grant
    Filed: June 30, 2014
    Date of Patent: June 13, 2017
    Assignee: NEO PRIME, LLC
    Inventors: Craig A. Schultz, John J. Nitao, Jeffrey M. Starr, John Compton
  • Patent number: 9576145
    Abstract: Methods and systems are presented of presenting false and/or decoy content to an intruder operating on a computer system by obfuscating critical files on a computer storage device with data that directs subsequent infiltration and propagation to designated decoy hosts and decoy applications. Method and systems are provided for selectively presenting different contents to different viewers/users of application resource files for the purpose of preventing the valuable content from being read, tampered with, exfiltrated, or used as a means to perform subsequent attacks on network resources.
    Type: Grant
    Filed: September 30, 2014
    Date of Patent: February 21, 2017
    Assignee: ACALVIO TECHNOLOGIES, INC.
    Inventors: Yadong Zhang, Ching-Hai Tsai, Johnson L. Wu, Craig A. Schultz
  • Publication number: 20160234236
    Abstract: A shadow network, which can be a virtual reproduction of a real, physical, base computer network, is described. Shadow networks duplicate the topology, services, host, and network traffic of the base network using shadow hosts, which are low interaction, minimal-resource-using host emulators. The shadow networks are connected to the base network through virtual switches, etc. in order to form a large obfuscated network. When a hacker probes into a host emulator, a more resource-intensive virtual machine can be swapped in to take its place. When a connection is attempted from a host emulator to a physical computer, the a host emulator can step in to take the place of the physical computer, and software defined networking (SDN) can prevent collisions between the duplicated IP addresses. Replicating the shadow networks within the network introduces problems for hackers and allows a system administrator easier ways to identify intrusions.
    Type: Application
    Filed: April 21, 2016
    Publication date: August 11, 2016
    Applicant: Acalvio Technologies, Inc.
    Inventors: Steven M. Silva, Yadong Zhang, Eric Winsborrow, Johnson L. Wu, Craig A. Schultz
  • Patent number: 9350751
    Abstract: A shadow network, which can be a virtual reproduction of a real, physical, base computer network, is described. Shadow networks duplicate the topology, services, host, and network traffic of the base network using shadow hosts, which are low interaction, minimal-resource-using host emulators. The shadow networks are connected to the base network through virtual switches, etc. in order to form a large obfuscated network. When a hacker probes into a host emulator, a more resource-intensive virtual machine can be swapped in to take its place. When a connection is attempted from a host emulator to a physical computer, the a host emulator can step in to take the place of the physical computer, and software defined networking (SDN) can prevent collisions between the duplicated IP addresses. Replicating the shadow networks within the network introduces problems for hackers and allows a system administrator easier ways to identify intrusions.
    Type: Grant
    Filed: April 23, 2015
    Date of Patent: May 24, 2016
    Assignee: ACALVIO TECHNOLOGIES, INC.
    Inventors: Steven M. Silva, Yadong Zhang, Eric Winsborrow, Johnson L. Wu, Craig A. Schultz
  • Publication number: 20150381649
    Abstract: A system and method are presented for forecasting the risk of cyber-attacks on targeted networks. The described technology quantifies linear and non-linear damages to network-dependent assets by propagating probabilistic distributions of events in sequence and time in order to forecast damages over specified periods. Damage-forecasts are used to estimate probabilistically time-varying financial losses for cyber-attacks. The described technology incorporates quantities and dependencies for pricing insurance, re-insurance, and self-insurance, assessing cost-benefit tradeoffs for sequenced implementation of security control measures, and detecting attacks in the targeted network.
    Type: Application
    Filed: June 30, 2014
    Publication date: December 31, 2015
    Inventors: Craig A. Schultz, John J. Nitao, Jeffrey M. Starr, John Compton
  • Publication number: 20150229663
    Abstract: A shadow network, which can be a virtual reproduction of a real, physical, base computer network, is described. Shadow networks duplicate the topology, services, host, and network traffic of the base network using shadow hosts, which are low interaction, minimal-resource-using host emulators. The shadow networks are connected to the base network through virtual switches, etc. in order to form a large obfuscated network. When a hacker probes into a host emulator, a more resource-intensive virtual machine can be swapped in to take its place. When a connection is attempted from a host emulator to a physical computer, the a host emulator can step in to take the place of the physical computer, and software defined networking (SDN) can prevent collisions between the duplicated IP addresses. Replicating the shadow networks within the network introduces problems for hackers and allows a system administrator easier ways to identify intrusions.
    Type: Application
    Filed: April 23, 2015
    Publication date: August 13, 2015
    Applicant: Shadow Networks, Inc.
    Inventors: Steven M. Silva, Yadong Zhang, Eric Winsborrow, Johnson L. Wu, Craig A. Schultz
  • Patent number: 9021092
    Abstract: A shadow network, which can be a virtual reproduction of a real, physical, base computer network, is described. Shadow networks duplicate the topology, services, host, and network traffic of the base network using shadow hosts, which are low interaction, minimal-resource-using host emulators. The shadow networks are connected to the base network through virtual switches, etc. in order to form a large obfuscated network. When a hacker probes into a host emulator, a more resource-intensive virtual machine can be swapped in to take its place. When a connection is attempted from a host emulator to a physical computer, the a host emulator can step in to take the place of the physical computer, and software defined networking (SDN) can prevent collisions between the duplicated IP addresses. Replicating the shadow networks within the network introduces problems for hackers and allows a system administrator easier ways to identify intrusions.
    Type: Grant
    Filed: October 18, 2013
    Date of Patent: April 28, 2015
    Assignee: Shadow Networks, Inc.
    Inventors: Steven M. Silva, Yadong Zhang, Eric Winsborrow, Johnson L. Wu, Craig A. Schultz
  • Publication number: 20150096048
    Abstract: Methods and systems are presented of presenting false and/or decoy content to an intruder operating on a computer system by obfuscating critical files on a computer storage device with data that directs subsequent infiltration and propagation to designated decoy hosts and decoy applications. Method and systems are provided for selectively presenting different contents to different viewers/users of application resource files for the purpose of preventing the valuable content from being read, tampered with, exfiltrated, or used as a means to perform subsequent attacks on network resources.
    Type: Application
    Filed: September 30, 2014
    Publication date: April 2, 2015
    Applicant: Shadow Networks, Inc.
    Inventors: Yadong Zhang, Ching-Hai Tsai, Johnson L. Wu, Craig A. Schultz
  • Publication number: 20140115706
    Abstract: A shadow network, which can be a virtual reproduction of a real, physical, base computer network, is described. Shadow networks duplicate the topology, services, host, and network traffic of the base network using shadow hosts, which are low interaction, minimal-resource-using host emulators. The shadow networks are connected to the base network through virtual switches, etc. in order to form a large obfuscated network. When a hacker probes into a host emulator, a more resource-intensive virtual machine can be swapped in to take its place. When a connection is attempted from a host emulator to a physical computer, the a host emulator can step in to take the place of the physical computer, and software defined networking (SDN) can prevent collisions between the duplicated IP addresses. Replicating the shadow networks within the network introduces problems for hackers and allows a system administrator easier ways to identify intrusions.
    Type: Application
    Filed: October 18, 2013
    Publication date: April 24, 2014
    Applicant: ZanttZ,Inc.
    Inventors: Steven M. Silva, Yadong Zhang, Eric Winsborrow, Johnson L. Wu, Craig A. Schultz
  • Patent number: 7440858
    Abstract: A method and apparatus is utilized to determine the bearing and/or location of sources, such as, alternating current (A.C.) generators and loads, power lines, transformers and/or radio-frequency (RF) transmitters, emitting electromagnetic-wave energy for which a Poynting-Vector can be defined. When both a source and field sensors (electric and magnetic) are static, a bearing to the electromagnetic source can be obtained. If a single set of electric (E) and magnetic (B) sensors are in motion, multiple measurements permit location of the source. The method can be extended to networks of sensors allowing determination of the location of both stationary and moving sources.
    Type: Grant
    Filed: April 13, 2006
    Date of Patent: October 21, 2008
    Assignee: Lawrence Livermore National Security, LLC
    Inventors: David J. Simons, Charles R. Carrigan, Philip E. Harben, Barry A. Kirkendall, Craig A. Schultz
  • Publication number: 20070094854
    Abstract: A handle hardware assembly for attaching a handle to the sidewall of a casket. The hardware assembly comprises a lifting arm and clevis each having a pair of pivot arms or flanges. Each clevis pivot flange has a protrusion which is engageable with three radially spaced depressions of a corresponding lifting arm pivot arm. The selected depression the protrusion is engaged in determines the fixed position of the handle relative to sidewall of the casket. Also, a bolt is insertable from inside the casket such that the sharp end of the bolt is between the clevis pivot flanges to avoid injury to a funeral director or others.
    Type: Application
    Filed: September 28, 2006
    Publication date: May 3, 2007
    Inventor: Craig Schultz
  • Publication number: 20070062358
    Abstract: A punch tool for the punching of a shape through a sheet of material. The punch tool includes a punch and a die portion disposed within a housing having a slot for receiving a sheet of material. A lower ramp is disposed within the housing and, when rotated, raises the punch to engage the die. The lower ramp may be rotated regardless of the orientation of the punch tool. Thus, the punch tool may be used even when in an inverted position.
    Type: Application
    Filed: September 16, 2005
    Publication date: March 22, 2007
    Inventors: Luc Lam, Kevin Schmidt, Craig Schultz
  • Publication number: 20060235633
    Abstract: A method and apparatus is utilized to determine the bearing and/or location of sources, such as, alternating current (A.C.) generators and loads, power lines, transformers and/or radio-frequency (RF) transmitters, emitting electromagnetic-wave energy for which a Poynting-Vector can be defined. When both a source and field sensors (electric and magnetic) are static, a bearing to the electromagnetic source can be obtained. If a single set of electric (E) and magnetic (B) sensors are in motion, multiple measurements permit location of the source. The method can be extended to networks of sensors allowing determination of the location of both stationary and moving sources. It is emphasized that this abstract is provided to comply with the rules requiring an abstract which will allow a searcher or other reader to quickly ascertain the subject matter of the technical disclosure. It is submitted with the understanding that it will not be used to interpret or limit the scope or the meaning of the claims.
    Type: Application
    Filed: April 13, 2006
    Publication date: October 19, 2006
    Inventors: David Simons, Charles Carrigan, Philip Harben, Barry Kirkendall, Craig Schultz
  • Patent number: 7092639
    Abstract: A transmitter comprises an oscillator, a phase lock loop, a serializer, and an electrical-to-optical converter. The oscillator is enclosed in a metal shield. The metal shield is soldered to a ground ring of the printed circuit board. In one embodiment, the oscillator is voltage-controlled oscillator.
    Type: Grant
    Filed: December 27, 2001
    Date of Patent: August 15, 2006
    Assignee: Intel Corporation
    Inventors: Craig Schultz, Joshua Oen
  • Publication number: 20050130495
    Abstract: An integrated circuit packages comprises a printed circuit board, a non-metal connector, and a metal casing. The printed circuit board includes a ground ring around the non-metal connector. The metal casing substantially encloses the printed circuit board, and has an opening that allows access to the non-metal connector. The metal casing has a metal lip that makes physical and electrical contact with the ground ring of the printed circuit board. The metal casing may be used to help reduce EMI from a transmitter.
    Type: Application
    Filed: January 5, 2005
    Publication date: June 16, 2005
    Inventors: Craig Schultz, Todd Petit, Joshua Oen
  • Publication number: 20050121954
    Abstract: A back for a chair includes fabric panel with a flexible carrier attached to the panel around its periphery. The carrier is configured to be secured along a bottom edge to a bottom portion of a chair back frame member. The carrier is also secured to two vertical frame supports at its two upper corners. Preferably, the upper carrier and frame connections are ball and socket joints. A lumbar support is provided that is easily height adjustable, by providing tension to the back frame and requires no screws or adjustment knobs in its adjustment mechanism.
    Type: Application
    Filed: November 18, 2004
    Publication date: June 9, 2005
    Inventors: Tim Coffield, Marcus Koepke, Jay Machael, Craig Schultz, Erik Steffensen
  • Publication number: 20050076485
    Abstract: A decorative ornament is attached to a casket having an ornament attachment plate. The ornament may be attached to corner member or other portion of the casket. Each ornament attachment plate has a pair of grooves including a straight groove and a curved groove for receiving fasteners on the back of the ornament.
    Type: Application
    Filed: September 2, 2004
    Publication date: April 14, 2005
    Inventor: Craig Schultz
  • Patent number: D588421
    Type: Grant
    Filed: July 28, 2008
    Date of Patent: March 17, 2009
    Inventor: Craig Schultz