Patents by Inventor Daniel W. Brown

Daniel W. Brown has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20190207969
    Abstract: Example techniques detect incidents based on events from or at monitored computing devices. A control unit can detect events of various types within a time interval and aggregate the detected events into an incident. The control unit can detect patterns within the events based at least in part on predetermined criterion. In examples, the control unit can determine pattern scores for the patterns based on the probability of occurrence for the patterns and determine a composite score based on the pattern scores. The control unit can determine that an incident indicating malicious activity has been detected based in part determining that the composite score is above a predetermined threshold score. In some examples, the control unit can classify and rank the incidents. The control unit can determine if an incident indicates malicious activity including malware or targeted attack.
    Type: Application
    Filed: February 22, 2019
    Publication date: July 4, 2019
    Inventor: Daniel W. Brown
  • Publication number: 20190147163
    Abstract: A security agent implemented on a monitored computing device is described herein. The security agent is configured to detect an action of interest (AoI) that may be probative of a security exploit and to determine a context in which that AoI occurred. Based on that context, the security agent is further configured to decide whether the AoI is a security exploit and can take preventative action to prevent the exploit from being completed.
    Type: Application
    Filed: January 9, 2019
    Publication date: May 16, 2019
    Inventors: Daniel W. Brown, Loren C. Robinson, Ion-Alexandru Ionescu
  • Patent number: 10243972
    Abstract: A security agent implemented on a monitored computing device is described herein. The security agent is configured to receive an event notification indicative of execution of an object and store, in a data structure on the monitored computing device, information associated with the event notification and the object. The security agent is further configured to receive an event notification indicative of an occurrence on the monitored computing device of an activity. Based at least in part on the stored information, the security agent correlates the occurrence of the activity with the execution of the object and generates an exploit detection event based on the correlating.
    Type: Grant
    Filed: April 11, 2016
    Date of Patent: March 26, 2019
    Assignee: CrowdStrike, Inc.
    Inventor: Daniel W. Brown
  • Patent number: 10216934
    Abstract: A security agent implemented on a monitored computing device is described herein. The security agent is configured to detect an action of interest (AoI) that may be probative of a security exploit and to determine a context in which that AoI occurred. Based on that context, the security agent is further configured to decide whether the AoI is a security exploit and can take preventative action to prevent the exploit from being completed.
    Type: Grant
    Filed: July 18, 2016
    Date of Patent: February 26, 2019
    Assignee: CrowdStrike, Inc.
    Inventors: Daniel W. Brown, Ion-Alexandru Ionescu, Loren C. Robinson
  • Publication number: 20180367557
    Abstract: Example techniques herein search a graph data structure and retrieve data associated with a result node or edge. The graph can include nodes and edges between them. A control unit can produce a discrete finite automaton (DFA) based on a query. The control unit can traverse the DFA in conjunction with the graph, from an initial DFA state and an entry-point graph node, to reach a result graph node associated with a DFA triggering state. Traversal can include, e.g., unwinding upon reaching a terminal state of the DFA. Some examples can determine a schema of output data. Some examples can store information associated with nodes while traversing, and discard the information when unwinding traversal. Some examples can process queries including edge types not members of a set of edge types associated with a graph. Some examples can apply traversal-limiting instructions specified in a query.
    Type: Application
    Filed: May 15, 2018
    Publication date: December 20, 2018
    Inventors: Daniel W. Brown, David F. Diehl
  • Publication number: 20180365289
    Abstract: Example techniques herein search a graph data structure and retrieve data associated with a result node or edge. The graph can include nodes representing, e.g., processes or files, and edges between the nodes. A control unit can produce a discrete finite automaton (DFA) based on a query. The control unit can traverse the DFA in conjunction with the graph, beginning at an initial state of the DFA and an entry-point node of the graph, to reach a result node of the graph associated with a triggering state of the DFA. Traversal can include unwinding upon reaching a terminal state of the DFA, in some examples. The control unit can retrieve data associated with the result node or an edge connected there to, and can provide the data via a communications interface. A data-retrieval system can communicate with a data-storage system via the communications interface, in some examples.
    Type: Application
    Filed: June 15, 2017
    Publication date: December 20, 2018
    Inventors: Daniel W. Brown, David F. Diehl
  • Publication number: 20180322286
    Abstract: A security agent implemented on a monitored computing device is described herein. The security agent has access to parametric behavioral pattern definitions that, in combination with canonical patterns of behavior, configure the security agent to match observed behavior with known computing behavior that is benign or malignant. This arrangement of the definitions and the pattern of behavior allow the security agent's behavior to be updated by a remote security service without updating a configuration of the security agent. The remote security service can create, modify, and disseminate these definitions and patterns of behavior, giving the security agent real-time ability to respond to new behaviors exhibited by the monitored computing device.
    Type: Application
    Filed: May 2, 2017
    Publication date: November 8, 2018
    Inventors: David F. Diehl, Daniel W. Brown, Aaron Javon Marks, Kirby Koster, Daniel T. Martin
  • Publication number: 20180322276
    Abstract: A security agent can implement a least recently used (LRU)-based approach to suppressing events observed on a computing device. The security agent may observe events that occur on a computing device. These observed events may then be inserted into a LRU table that tracks, for a subset of the observed events maintained in the LRU table, a rate-based statistic for multiple event groups in which the subset of the observed events are classified. In response to a value of the rate-based statistic for a particular event group satisfying a threshold for the LRU-table, observed events that are classified in the event group can be sent to a remote security system with suppression by refraining from sending, to the remote security system, at least some of the observed events in the event group. The security agent may cease suppression after the rate-based statistic falls below a predetermined threshold level.
    Type: Application
    Filed: May 4, 2017
    Publication date: November 8, 2018
    Inventor: Daniel W. Brown
  • Publication number: 20180121650
    Abstract: A security agent implemented on a computing device is described herein. The security agent is configured to detect file-modifying malware by detecting that a process is traversing a directory of the memory of the computing device and detecting that the process is accessing files in the memory according to specified file access patterns. The security agent can also be configured to correlate actions of multiple processes that correspond to a specified file access pattern and detect that one or more of the multiple processes are malware by correlating their behavior.
    Type: Application
    Filed: October 31, 2016
    Publication date: May 3, 2018
    Inventor: Daniel W. Brown
  • Publication number: 20180018460
    Abstract: A security agent implemented on a monitored computing device is described herein. The security agent is configured to detect an action of interest (AoI) that may be probative of a security exploit and to determine a context in which that AoI occurred. Based on that context, the security agent is further configured to decide whether the AoI is a security exploit and can take preventative action to prevent the exploit from being completed.
    Type: Application
    Filed: July 18, 2016
    Publication date: January 18, 2018
    Inventors: Daniel W. Brown, Ion-Alexandru Ionescu, Loren C. Robinson
  • Publication number: 20170295190
    Abstract: A security agent implemented on a monitored computing device is described herein. The security agent is configured to receive an event notification indicative of execution of an object and store, in a data structure on the monitored computing device, information associated with the event notification and the object. The security agent is further configured to receive an event notification indicative of an occurrence on the monitored computing device of an activity. Based at least in part on the stored information, the security agent correlates the occurrence of the activity with the execution of the object and generates an exploit detection event based on the correlating.
    Type: Application
    Filed: April 11, 2016
    Publication date: October 12, 2017
    Inventor: Daniel W. Brown
  • Patent number: 7357955
    Abstract: This invention is directed to an acid beverage composition having a pH of from 3.0 to 4.5 having (A) a hydrated protein stabilizing agent; (B) at least one flavoring material; and (C) a slurry of an aqueous protein material prepared by a process including preparing an aqueous extract from a protein containing material, adjusting the pH of same to precipitate the protein material, separating the precipitated protein and forming a suspension of same in water, adjusting the pH of the suspension to a particular pH value, and pasteurizing same.
    Type: Grant
    Filed: April 15, 2004
    Date of Patent: April 15, 2008
    Assignee: Solae, LLC
    Inventors: Cheng Shen, Theresa Cox, Daniel W. Brown, Jonathan W. Delcamp