Patents by Inventor Daniel Thanos
Daniel Thanos has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 12081540Abstract: In one approach, a first computing device receives a request from a second computing device. The request is for access by the second computing device to a service provided by a third computing device over a network. In response to receiving the request, the first computing device performs a security evaluation of the second computing device. The evaluation determines a risk level. The first computing device generates, based on the evaluation, a token for the second computing device. The token includes data encoding the risk level. The token is sent to the second computing device and/or third computing device. The sent data is used to configure the service provided to the second computing device.Type: GrantFiled: May 4, 2021Date of Patent: September 3, 2024Assignee: Lookout, Inc.Inventors: Aaron Cockerill, David Richardson, Daniel Thanos, William Neil Robinson, Brian James Buck, Kevin Patrick Mahaffey
-
Patent number: 11662760Abstract: The embodiments described herein provide a system including an intelligent electronic device (IED) comprising a first processor configured to communicate control commands to power equipment, receive measurements from the power equipment, use a secure wireless system to send data to an access point, wherein the data includes the measurements, and use the secure system to communicate with a management device, via the access point, to receive configuration information, command information, or any combination thereof.Type: GrantFiled: July 12, 2017Date of Patent: May 30, 2023Assignee: General Electric Technology GmbHInventors: Anca Lucia Cioraca, Daniel Thanos, Evgeny Pronin, Michael Shane Pilon
-
Publication number: 20210258304Abstract: In one approach, a first computing device receives a request from a second computing device. The request is for access by the second computing device to a service provided by a third computing device over a network. In response to receiving the request, the first computing device performs a security evaluation of the second computing device. The evaluation determines a risk level. The first computing device generates, based on the evaluation, a token for the second computing device. The token includes data encoding the risk level. The token is sent to the second computing device and/or third computing device. The sent data is used to configure the service provided to the second computing device.Type: ApplicationFiled: May 4, 2021Publication date: August 19, 2021Inventors: Aaron Cockerill, David Richardson, Daniel Thanos, William Neil Robinson, Brian James Buck, Kevin Patrick Mahaffey
-
Patent number: 11038876Abstract: A method includes: receiving a request regarding access by a first computing device (e.g., a mobile device of a user) to a service; in response to the request, performing, by a second computing device (e.g., a device risk evaluation server, or a server of an identity provider), an evaluation that includes creating a fingerprint of the first computing device; and determining, by the second computing device, whether the fingerprint matches a fingerprint of one or more other computing devices. The second computing devices determines whether to authorize access to the service based on the evaluation.Type: GrantFiled: January 7, 2019Date of Patent: June 15, 2021Assignee: Lookout, Inc.Inventors: Aaron Cockerill, David Richardson, Daniel Thanos, William Neil Robinson, Brian James Buck, Kevin Patrick Mahaffey
-
Publication number: 20210037040Abstract: A security testing platform can provide security teams with an extensible, cost-effective and flexible platform which can continuously test, evaluate and tune deployed security tools & policies. The security testing platform allows users to automatically simulate security threat attacks in order to measure the effectiveness of a security stack's prevention, detection and mitigation capabilities. A set of endpoints within the controlled environment may be configured to simulate the environment of the application being tested, which may be configured across multiple endpoints. Additional endpoints may also be configured as ‘attackers’ to orchestrate security attacks on the simulated environment. The security testing platform 100 may also integrate monitoring tools to gain automated insights into the detection, reliability and performance capabilities of the current security policies, rules and configurations.Type: ApplicationFiled: July 22, 2020Publication date: February 4, 2021Inventors: Nicholas Richard Aleks, Daniel Thanos, Kelechukwu Kalu Udonsi, Joël Perron-Langlois, Fahad Ahmed Khan, Amir Schor, Andrew Alexander Micek, Darcey MacInnes, Ashton Sidhu, Jason Rombough
-
Patent number: 10657253Abstract: A first set of code, for example source code, and a second code, for example binary code, are compared to find corresponding functions. A comparison of features can be used to find correspondences of functions. The comparison of functions can be iterated and can be refined and can be further used to carry out a further, stricter comparison of functions found to correspond to reduce the chance of falsely finding a function in the second code to be accountable in the first code.Type: GrantFiled: May 18, 2017Date of Patent: May 19, 2020Assignee: THE GOVERNING COUNCIL OF THE UNIVERSITY OF TORONTOInventors: David Lie, Dhaval Miyani, Janahan Skandaraniyam, Daniel Thanos
-
Publication number: 20190141030Abstract: A method includes: receiving a request regarding access by a first computing device (e.g., a mobile device of a user) to a service; in response to the request, performing, by a second computing device (e.g., a device risk evaluation server, or a server of an identity provider), an evaluation that includes creating a fingerprint of the first computing device; and determining, by the second computing device, whether the fingerprint matches a fingerprint of one or more other computing devices. The second computing devices determines whether to authorize access to the service based on the evaluation.Type: ApplicationFiled: January 7, 2019Publication date: May 9, 2019Inventors: Aaron Cockerill, David Richardson, Daniel Thanos, William Neil Robinson, Brian James Buck, Kevin Patrick Mahaffey
-
Patent number: 10218697Abstract: A method includes: receiving a request regarding access by a first computing device (e.g., a mobile device of a user) to a service; in response to the request, performing, by a second computing device (e.g., a device risk evaluation server, or a server of an identity provider), an evaluation of the first computing device; and performing, by the second computing device, an action (e.g., authorizing access to the service) based on the evaluation.Type: GrantFiled: June 9, 2017Date of Patent: February 26, 2019Assignee: LOOKOUT, INC.Inventors: Aaron Cockerill, David Richardson, Daniel Thanos, William Neil Robinson, Brian James Buck, Kevin Patrick Mahaffey
-
Publication number: 20180359244Abstract: A method includes: receiving a request regarding access by a first computing device (e.g., a mobile device of a user) to a service; in response to the request, performing, by a second computing device (e.g., a device risk evaluation server, or a server of an identity provider), an evaluation of the first computing device; and performing, by the second computing device, an action (e.g., authorizing access to the service) based on the evaluation.Type: ApplicationFiled: June 9, 2017Publication date: December 13, 2018Inventors: Aaron Cockerill, David Richardson, Daniel Thanos, William Neil Robinson, Brian James Buck, Kevin Patrick Mahaffey
-
Patent number: 10142355Abstract: A protection system for a telecommunications network includes an evaluation engine that receives information about threats from user devices using the network and determines a threat level to the network. Threats to the network are mitigated based on the determined threat level.Type: GrantFiled: September 18, 2015Date of Patent: November 27, 2018Assignee: TELUS Communications Inc.Inventors: Daniel Thanos, Janahan Skandaraniyam, Erez Maharshak
-
Patent number: 9998326Abstract: The subject matter disclosed herein relates to intelligent electronic devices (IEDs), and, more specifically, to systems and methods for initial configuration or commissioning of IEDs after installation. In an embodiment, a system includes an intelligent electronic device (IED) configuring system having an IED that is configured with a wireless network configuration prior to deployment that enables the IED to automatically connect to a particular wireless network when it is detected. The IED configuring system also includes an IED configuring device configured to host the particular wireless network according to the wireless network configuration of the IED. Furthermore, the IED configuring device is configured to communicate a plurality of configuration settings to the IED via the wireless network to commission the IED once the IED has connected to the wireless network.Type: GrantFiled: February 13, 2014Date of Patent: June 12, 2018Assignee: General Electric CompanyInventors: Daniel Thanos, Janahan Skandaraniyam, Anca Cioraca
-
Patent number: 9866575Abstract: A system includes reception of data at a computing network, generation of alerts at the computing network based on received data and on cyber sensor data, the cyber sensor data defining data attribute, reception of alerts from the computing network at a defense engine, detection of events based on the received alerts at the defense engine, generation threat data based on the detected events, generation of first cyber sensor data based on the threat data, and initiation of deployment of the first cyber sensor data within the computing network.Type: GrantFiled: October 2, 2015Date of Patent: January 9, 2018Assignee: GENERAL ELECTRIC COMPANYInventors: Matthew Richard Schwartz, Daniel Thanos
-
Publication number: 20170344047Abstract: The embodiments described herein provide a system including an intelligent electronic device (IED) comprising a first processor configured to communicate control commands to power equipment, receive measurements from the power equipment, use a secure wireless system to send data to an access point, wherein the data includes the measurements, and use the secure system to communicate with a management device, via the access point, to receive configuration information, command information, or any combination thereof.Type: ApplicationFiled: July 12, 2017Publication date: November 30, 2017Inventors: Anca Lucia Cioraca, Daniel Thanos, Evgeny Pronin, Michael Shane Pilon
-
Patent number: 9785173Abstract: The embodiments described herein provide a system including an intelligent electronic device (IED) comprising a first processor configured to communicate control commands to power equipment, receive measurements from the power equipment, use a secure wireless system to send data to an access point, wherein the data includes the measurements, and use the secure system to communicate with a management device, via the access point, to receive configuration information, command information, or any combination thereof.Type: GrantFiled: March 15, 2013Date of Patent: October 10, 2017Assignee: General Electric CompanyInventors: Anca Lucia Cioraca, Daniel Thanos, Evgeny Pronin, Michael Shane Pilon
-
Patent number: 9647834Abstract: Provided is an arbitrary automation system for secure communications. The system includes a utility device configured for processing critical data associated with the arbitrary automation system, the critical data being structured in accordance with utility device access levels. A key management module (i) provides a data protection key (DPK) for protecting the critical data in accordance with each of the utility device access levels and (ii) generates a user key encryption key (UKEK) for encrypting the DPK based upon the device access levels. The system additionally includes a software module configured for masking an execution state of software within the utility device and the key management module via principles of evasion and resistance.Type: GrantFiled: March 22, 2016Date of Patent: May 9, 2017Assignee: Aclara Meters LLCInventors: Daniel Thanos, Satish Sharad Khanke
-
Publication number: 20170099305Abstract: A system includes reception of data at a computing network, generation of alerts at the computing network based on received data and on cyber sensor data, the cyber sensor data defining data attribute, reception of alerts from the computing network at a defense engine, detection of events based on the received alerts at the defense engine, generation threat data based on the detected events, generation of first cyber sensor data based on the threat data, and initiation of deployment of the first cyber sensor data within the computing network.Type: ApplicationFiled: October 2, 2015Publication date: April 6, 2017Inventors: Matthew Richard Schwartz, Daniel Thanos
-
Publication number: 20170085580Abstract: A protection system for a telecommunications network includes an evaluation engine that receives information about threats from user devices using the network and determines a threat level to the network. Threats to the network are mitigated based on the determined threat level.Type: ApplicationFiled: September 18, 2015Publication date: March 23, 2017Inventors: Daniel Thanos, Janahan Skandaraniyam, Erez Maharshak
-
Patent number: 9405900Abstract: The embodiments described herein include a system and a method. In one embodiment, a system includes a device monitoring component configured to measure control system behavior and an intrusion prevention system communicatively coupled to the device monitoring component and a communications network. The intrusion prevention system includes a control system analysis component configured to analyze the control system behavior measured by the device monitoring component against a first rule set to determine whether an anomaly, an intrusion, or both are present.Type: GrantFiled: March 13, 2013Date of Patent: August 2, 2016Assignee: General Electric CompanyInventors: Paritosh Dixit, Daniel Thanos
-
Publication number: 20160204935Abstract: Provided is an arbitrary automation system for secure communications. The system includes a utility device configured for processing critical data associated with the arbitrary automation system, the critical data being structured in accordance with utility device access levels. A key management module (i) provides a data protection key (DPK) for protecting the critical data in accordance with each of the utility device access levels and (ii) generates a user key encryption key (UKEK) for encrypting the DPK based upon the device access levels. The system additionally includes a software module configured for masking an execution state of software within the utility device and the key management module via principles of evasion and resistance.Type: ApplicationFiled: March 22, 2016Publication date: July 14, 2016Inventors: Daniel Thanos, Satish Sharad Khanke
-
Publication number: 20150324589Abstract: An industrial environment includes an industrial system device. The industrial system device includes a processor to receive a certificate describing a security policy of one or more access constraints for the industrial system device and to implement the security policy on the industrial system device. Accordingly, access to the device may be customizable based upon a particular job to be completed on the device, providing more appropriate device access. Further, the security policy certificate may be provided to the device without relying on an “always-on” server-based system, resulting in fewer points of failure for accessing the device.Type: ApplicationFiled: May 9, 2014Publication date: November 12, 2015Applicant: General Electric CompanyInventors: Daniel Thanos, Anca Lucia Cioraca