Patents by Inventor David A. Coffey

David A. Coffey has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 11902295
    Abstract: A system, method, and computer-readable medium are disclosed for performing a security operation.
    Type: Grant
    Filed: December 31, 2020
    Date of Patent: February 13, 2024
    Assignee: Forcepoint LLC
    Inventors: Andrew Mortensen, Assaf Almaz, David Coffey, Ofir Arkin
  • Patent number: 11902296
    Abstract: A system, method, and computer-readable medium are disclosed for performing a security operation.
    Type: Grant
    Filed: December 31, 2020
    Date of Patent: February 13, 2024
    Assignee: Forcepoint LLC
    Inventors: Andrew Mortensen, Assaf Almaz, David Coffey, Ofir Arkin
  • Patent number: 11895158
    Abstract: A system, method, and computer-readable medium are disclosed for implementing a cybersecurity system having security policy visualization. At least one embodiment is directed to a computer-implemented method for implementing security policies in a secured network, including: retrieving a set of rules of a security policy; analyzing the set of rules of the security policy using one or more Satisfiability Modulo Theory (SMT) operations to reduce a dimensionality of the security policy; and generating a visual presentation on a user interface using results of the SMT operations, where the visual presentation includes visual indicia representing one or more targeted policy dimensions with respect to one or more fixed policy dimensions. In at least one embodiment, two or more security policies are presented with visual indicia representing differences between the security policies, including representations of one or more targeted policy dimensions with respect to one or more fixed policy dimensions.
    Type: Grant
    Filed: May 19, 2020
    Date of Patent: February 6, 2024
    Assignee: Forcepoint LLC
    Inventors: Lawrence Bruce Huston, III, David Coffey, Andrew Mortensen
  • Patent number: 11888862
    Abstract: A system, method, and computer-readable medium are disclosed for performing a security operation. The security operation includes: monitoring an entity, the monitoring observing at least one electronically-observable data source; identifying an event of analytic utility; analyzing the event of analytic utility, the analyzing the event of analytic utility identifying an entity behavior associated with the event of analytic utility; and, performing the security operation in response to the analyzing the event of analytic utility, where the monitoring, identifying, analyzing and performing are performed via a distributed security analytics framework.
    Type: Grant
    Filed: December 22, 2020
    Date of Patent: January 30, 2024
    Assignee: Forcepoint LLC
    Inventors: Lawrence Bruce Huston, III, David Coffey
  • Patent number: 11888863
    Abstract: A system, method, and computer-readable medium are disclosed for performing a security operation. The security operation includes: monitoring a plurality of actions of an entity, the plurality of actions of the entity corresponding to a plurality of events enacted by the entity; maintaining information relating to the monitoring within a user edge component; identifying an event of analytic utility; analyzing the event of analytic utility at the user edge component, the analyzing generating a security risk assessment; and, providing the security risk assessment to a network edge component.
    Type: Grant
    Filed: December 22, 2020
    Date of Patent: January 30, 2024
    Assignee: Forcepoint LLC
    Inventors: Lawrence Bruce Huston, III, David Coffey
  • Patent number: 11888864
    Abstract: A system, method, and computer-readable medium are disclosed for performing a security analytics mapping operation.
    Type: Grant
    Filed: December 22, 2020
    Date of Patent: January 30, 2024
    Assignee: Forcepoint LLC
    Inventors: Lawrence Bruce Huston, III, David Coffey
  • Patent number: 11528281
    Abstract: A system, method, and computer-readable medium are disclosed for performing a security analytics mapping operation.
    Type: Grant
    Filed: September 4, 2020
    Date of Patent: December 13, 2022
    Assignee: Forcepoint LLC
    Inventors: Andrew Mortensen, Assaf Almaz, David Coffey, Ofir Arkin
  • Patent number: 11516206
    Abstract: A system, method, and computer-readable medium are disclosed for implementing a cybersecurity system having a digital certificate reputation system. At least one embodiment is directed to a computer-implemented method executing operations including receiving a communication having an internet protocol (IP) address and a digital certificate at a device within the secured network; determining whether the IP address is identified as having a high-security risk level; if the IP address has a high-security risk level, assigning a security risk level to the digital certificate based on the security risk level of the IP address; and using the security risk level for the digital certificate in executing the one or more security policies. Other embodiments include corresponding computer systems, apparatus, and computer programs recorded on one or more computer storage devices.
    Type: Grant
    Filed: May 1, 2020
    Date of Patent: November 29, 2022
    Assignee: Forcepoint LLC
    Inventors: Lawrence Bruce Huston, III, David Coffey
  • Publication number: 20220070191
    Abstract: A system, method, and computer-readable medium are disclosed for performing a security analytics mapping operation.
    Type: Application
    Filed: September 4, 2020
    Publication date: March 3, 2022
    Inventors: Andrew Mortensen, Assaf Almaz, David Coffey, Ofir Arkin
  • Publication number: 20210367979
    Abstract: A system, method, and computer-readable medium are disclosed for implementing a cybersecurity system having security policy visualization. At least one embodiment is directed to a computer-implemented method for implementing security policies in a secured network, including: retrieving a set of rules of a security policy; analyzing the set of rules of the security policy using one or more Satisfiability Modulo Theory (SMT) operations to reduce a dimensionality of the security policy; and generating a visual presentation on a user interface using results of the SMT operations, where the visual presentation includes visual indicia representing one or more targeted policy dimensions with respect to one or more fixed policy dimensions. In at least one embodiment, two or more security policies are presented with visual indicia representing differences between the security policies, including representations of one or more targeted policy dimensions with respect to one or more fixed policy dimensions.
    Type: Application
    Filed: May 19, 2020
    Publication date: November 25, 2021
    Inventors: Lawrence Bruce Huston, III, David Coffey, Andrew Mortensen
  • Patent number: 11171980
    Abstract: A method, system, and computer-usable medium for protecting against contagion-based risk events are disclosed for monitoring behavior of users to construct a contagion network relationship map of connection and influence relationships between different users and then analyzing a received stream of events from the users to identify a critical event performed by a first user having a first risk score so that one or more propagated risk scores can be generated from the first risk score for at least a first connected user based on connection and influence relationships between the first user and the first connected user that are extracted from the contagion network relationship so that an adaptive response may be automatically generated to protect and control against actions by at least the first connected user based on the one or more propagated risk scores.
    Type: Grant
    Filed: November 2, 2018
    Date of Patent: November 9, 2021
    Assignee: Forcepoint LLC
    Inventors: David Coffey, Richard A. Ford, Ann Irvine, Kristin Machacek Leary
  • Publication number: 20210344667
    Abstract: A system, method, and computer-readable medium are disclosed for implementing a cybersecurity system having a digital certificate reputation system. At least one embodiment is directed to a computer-implemented method executing operations including receiving a communication having an internet protocol (IP) address and a digital certificate at a device within the secured network; determining whether the IP address is identified as having a high-security risk level; if the IP address has a high-security risk level, assigning a security risk level to the digital certificate based on the security risk level of the IP address; and using the security risk level for the digital certificate in executing the one or more security policies. Other embodiments include corresponding computer systems, apparatus, and computer programs recorded on one or more computer storage devices.
    Type: Application
    Filed: May 1, 2020
    Publication date: November 4, 2021
    Inventors: Lawrence Bruce Huston, III, David Coffey
  • Publication number: 20210297437
    Abstract: A system, method, and computer-readable medium are disclosed for implementing a security analytics system configured to instantiate user behavior baselines using historical data stored on an endpoint device. At least one embodiment is directed to a computer-implemented method including: accessing historical data stored on an endpoint device during an initialization of the endpoint device on the secured network, instantiating user behavior baselines for the endpoint device using the accessed historical data, and storing the instantiated user behavior baselines on a security system of the secured network for detecting instances of anomalous user behavior occurring at the endpoint device. Other embodiments of this aspect include corresponding computer systems, apparatus, and computer programs recorded on one or more computer storage devices, each configured to perform the actions of the methods.
    Type: Application
    Filed: March 23, 2020
    Publication date: September 23, 2021
    Inventors: Lawrence Bruce Huston, III, David Coffey
  • Publication number: 20210152570
    Abstract: A system, method, and computer-readable medium are disclosed for performing a security operation.
    Type: Application
    Filed: December 31, 2020
    Publication date: May 20, 2021
    Inventors: Andrew Mortensen, Assaf Almaz, David Coffey, Ofir Arkin
  • Publication number: 20210152569
    Abstract: A system, method, and computer-readable medium are disclosed for performing a security operation.
    Type: Application
    Filed: December 31, 2020
    Publication date: May 20, 2021
    Inventors: Andrew Mortensen, Assaf Almaz, David Coffey, Ofir Arkin
  • Publication number: 20210112077
    Abstract: A system, method, and computer-readable medium are disclosed for performing a security operation. The security operation includes: monitoring a plurality of actions of an entity, the plurality of actions of the entity corresponding to a plurality of events enacted by the entity; maintaining information relating to the monitoring within a user edge component; identifying an event of analytic utility; analyzing the event of analytic utility at the user edge component, the analyzing generating a security risk assessment; and, providing the security risk assessment to a network edge component.
    Type: Application
    Filed: December 22, 2020
    Publication date: April 15, 2021
    Inventors: Lawrence Bruce Huston, III, David Coffey
  • Publication number: 20210112078
    Abstract: A system, method, and computer-readable medium are disclosed for performing a security analytics mapping operation.
    Type: Application
    Filed: December 22, 2020
    Publication date: April 15, 2021
    Inventors: Lawrence Bruce Huston, III, David Coffey
  • Publication number: 20210112076
    Abstract: A system, method, and computer-readable medium are disclosed for performing a security operation. The security operation includes: monitoring an entity, the monitoring observing at least one electronically-observable data source; identifying an event of analytic utility; analyzing the event of analytic utility, the analyzing the event of analytic utility identifying an entity behavior associated with the event of analytic utility; and, performing the security operation in response to the analyzing the event of analytic utility, where the monitoring, identifying, analyzing and performing are performed via a distributed security analytics framework.
    Type: Application
    Filed: December 22, 2020
    Publication date: April 15, 2021
    Inventors: Lawrence Bruce Huston, III, David Coffey
  • Publication number: 20200145447
    Abstract: A method, system, and computer-usable medium for protecting against contagion-based risk events are disclosed for monitoring behavior of users to construct a contagion network relationship map of connection and influence relationships between different users and then analyzing a received stream of events from the users to identify a critical event performed by a first user having a first risk score so that one or more propagated risk scores can be generated from the first risk score for at least a first connected user based on connection and influence relationships between the first user and the first connected user that are extracted from the contagion network relationship so that an adaptive response may be automatically generated to protect and control against actions by at least the first connected user based on the one or more propagated risk scores.
    Type: Application
    Filed: November 2, 2018
    Publication date: May 7, 2020
    Inventors: David Coffey, Richard A. Ford, Ann Irvine, Kristin Machacek Leary
  • Publication number: 20190380324
    Abstract: In various implementations, a knotting aid may facilitate hand tying of line(s). A knotting aid may include two or more arms extending from a base. A first arm of the knotting aid may include a stationary coupling member and a second arm of the knotting aid may include a sliding coupling member. The coupling members may be able to retain line(s) without substantially damaging the line(s). The knots produced by a user utilizing the knotting aid may have a lower variation in knot strength.
    Type: Application
    Filed: August 19, 2019
    Publication date: December 19, 2019
    Inventors: Robert Shawn Hamell, Michael Jon Hamell, Eric David Coffey