Patents by Inventor David E. Hooks

David E. Hooks has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 8707427
    Abstract: Systems and methods for detecting malware in a selected computer that is part of a network of computers. The approach includes inspecting a predetermined set of operational attributes of the selected computer to detect a change in a state of the selected computer. In response to a detected change in state, the selected computer is scanned to create a snapshot of the overall state of the selected computer. The snapshot is transmitted to an analytic system wherein it is compared with an aggregated collection of snapshots previously respectively received from a plurality of computers in the computer network. Based on the comparison, anomalous state of the selected computer can be identified. In turn, a probe of the selected computer is launched to gather additional information related to the anomalous state of the selected computer so that a remediation action for the anomalous state of the selected computer can be generated.
    Type: Grant
    Filed: April 6, 2010
    Date of Patent: April 22, 2014
    Assignee: Triumfant, Inc.
    Inventors: David E. Hooks, Mitchell N. Quinn
  • Patent number: 8104087
    Abstract: Systems and methods for correcting an anomaly in a target computer that is part of a network of computers. An anomaly is detected in data stored on a target computer and it is determined what corrective data is needed to correct the anomaly. A donor computer with the corrective data is located and requested to provide the corrective data to the target computer. The corrective data is used to correct the anomaly on the target computer and the target computer may acknowledge receipt of the corrective data. In one embodiment, an arbitrator component receives the requests for the corrective data, passes the requests to potential donor computers, and receives the acknowledgements from the target computers.
    Type: Grant
    Filed: January 8, 2008
    Date of Patent: January 24, 2012
    Assignee: Triumfant, Inc.
    Inventors: Mitchell N. Quinn, David E. Hooks
  • Publication number: 20110247071
    Abstract: Systems and methods for detecting malware in a selected computer that is part of a network of computers. The approach includes inspecting a predetermined set of operational attributes of the selected computer to detect a change in a state of the selected computer. In response to a detected change in state, the selected computer is scanned to create a snapshot of the overall state of the selected computer. The snapshot is transmitted to an analytic system wherein it is compared with an aggregated collection of snapshots previously respectively received from a plurality of computers in the computer network. Based on the comparison, anomalous state of the selected computer can be identified. In turn, a probe of the selected computer is launched to gather additional information related to the anomalous state of the selected computer so that a remediation action for the anomalous state of the selected computer can be generated.
    Type: Application
    Filed: April 6, 2010
    Publication date: October 6, 2011
    Applicant: TRIUMFANT, INC.
    Inventors: David E. Hooks, Mitchell N. Quinn
  • Publication number: 20090177913
    Abstract: Systems and methods for correcting an anomaly in a target computer that is part of a network of computers. An anomaly is detected in data stored on a target computer and it is determined what corrective data is needed to correct the anomaly. A donor computer with the corrective data is located and requested to provide the corrective data to the target computer. The corrective data is used to correct the anomaly on the target computer and the target computer may acknowledge receipt of the corrective data. In one embodiment, an arbitrator component receives the requests for the corrective data, passes the requests to potential donor computers, and receives the acknowledgements from the target computers.
    Type: Application
    Filed: January 8, 2008
    Publication date: July 9, 2009
    Applicant: TRIUMFANT, INC.
    Inventors: Mitchell N. Quinn, David E. Hooks