Patents by Inventor David Alan Myers

David Alan Myers has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 11947670
    Abstract: Examples of the present disclosure describe systems and methods for malicious software detection based on API trust. In an example, a set of software instructions executed by a computing device may call an API. A hook may be generated on the API, such that a threat processor may receive an indication when the API is called. Accordingly, the threat processor may generate a trust metric based on the execution of the set of software instructions, which may be used to determine whether the set of software instructions poses a potential threat. For example, one or more call stack frames may be evaluated to determine whether a return address is preceded by a call instruction, whether the return address is associated with a set of software instructions or memory associated with a set of software instructions, and/or whether the set of software instructions satisfies a variety of security criteria.
    Type: Grant
    Filed: January 2, 2023
    Date of Patent: April 2, 2024
    Assignee: Open Text Inc
    Inventors: Andrew L. Sandoval, David Alan Myers, John R. Shaw, II, Eric Klonowski
  • Publication number: 20230144818
    Abstract: Examples of the present disclosure describe systems and methods for malicious software detection based on API trust. In an example, a set of software instructions executed by a computing device may call an API. A hook may be generated on the API, such that a threat processor may receive an indication when the API is called. Accordingly, the threat processor may generate a trust metric based on the execution of the set of software instructions, which may be used to determine whether the set of software instructions poses a potential threat. For example, one or more call stack frames may be evaluated to determine whether a return address is preceded by a call instruction, whether the return address is associated with a set of software instructions or memory associated with a set of software instructions, and/or whether the set of software instructions satisfies a variety of security criteria.
    Type: Application
    Filed: January 2, 2023
    Publication date: May 11, 2023
    Inventors: Andrew L. Sandoval, David Alan Myers, John R. Shaw, II, Eric Klonowski
  • Patent number: 11544379
    Abstract: Examples of the present disclosure describe systems and methods for malicious software detection based on API trust. In an example, a set of software instructions executed by a computing device may call an API. A hook may be generated on the API, such that a threat processor may receive an indication when the API is called. Accordingly, the threat processor may generate a trust metric based on the execution of the set of software instructions, which may be used to determine whether the set of software instructions poses a potential threat. For example, one or more call stack frames may be evaluated to determine whether a return address is preceded by a call instruction, whether the return address is associated with a set of software instructions or memory associated with a set of software instructions, and/or whether the set of software instructions satisfies a variety of security criteria.
    Type: Grant
    Filed: April 13, 2018
    Date of Patent: January 3, 2023
    Assignee: Webroot Inc.
    Inventors: Andrew L. Sandoval, David Alan Myers, John R. Shaw, II, Eric Klonowski
  • Publication number: 20190318090
    Abstract: Examples of the present disclosure describe systems and methods for malicious software detection based on API trust. In an example, a set of software instructions executed by a computing device may call an API. A hook may be generated on the API, such that a threat processor may receive an indication when the API is called. Accordingly, the threat processor may generate a trust metric based on the execution of the set of software instructions, which may be used to determine whether the set of software instructions poses a potential threat. For example, one or more call stack frames may be evaluated to determine whether a return address is preceded by a call instruction, whether the return address is associated with a set of software instructions or memory associated with a set of software instructions, and/or whether the set of software instructions satisfies a variety of security criteria.
    Type: Application
    Filed: April 13, 2018
    Publication date: October 17, 2019
    Applicant: Webroot Inc.
    Inventors: Andrew L. Sandoval, David Alan Myers, John R. Shaw, II, Eric Klonowski
  • Patent number: 10303868
    Abstract: A storage device may be operably coupleable with a host computing device, and the storage device and/or host computing device may be Bluetooth enabled. The storage device may include authentication information. Access to the storage device may be permitted via Bluetooth communication between the Bluetooth enabled device and at least one of the storage device and a host computing device, wherein the Bluetooth enabled device may be within a maximum Bluetooth range of the storage device. The Bluetooth communication may be performed without Bluetooth pairing.
    Type: Grant
    Filed: December 27, 2012
    Date of Patent: May 28, 2019
    Assignee: Kingston Digital, Inc.
    Inventors: Mark P. Weber, Preetham Varghese, Kevin Peter Vlasich, David Alan Myers, David Blake Farmer, David Paul Duncan