Patents by Inventor David Spencer Tyree
David Spencer Tyree has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 9349013Abstract: A machine-actionable memory comprises one or more machine-actionable records arranged according to a data structure. Such a data structure may include links that respectively map between a remediation, at least one action, and at least two vulnerabilities. A method of selecting a remediation, that is appropriate to a vulnerability which is present on a machine to be remediated, may include: providing a machine-actionable memory as mentioned above; and indexing into the memory using: a given vulnerability identifier to determine (A) at least one of a remediation mapped thereto and (B) at least one action mapped to the given vulnerability identifier; and/or a given remediation to determine at least two vulnerabilities mapped thereto.Type: GrantFiled: August 16, 2013Date of Patent: May 24, 2016Assignee: Fortinet, Inc.Inventors: Kurt D'Mello, David Spencer Tyree, Sudhir Gandhe
-
Patent number: 9189560Abstract: In some embodiments, a mobile device includes an interface configured to scan information from a communication tag associated with an asset, a memory operable to store the information, and a processor communicatively coupled to the memory. The information comprises a header describing the information, business application data, and asset identification data uniquely identifying the asset. The processor is configured to extract the business application data from the information scanned from the communication tag and extract the asset identification data from the information scanned from the communication tag.Type: GrantFiled: February 13, 2012Date of Patent: November 17, 2015Assignee: CA, Inc.Inventors: David Spencer Tyree, Nathan Giardina
-
Patent number: 8635702Abstract: A machine-actionable memory comprises one or more machine-actionable records arranged according to a data structure. Such a data structure may include links that respectively map between: a RID field, the contents of which denote an identification (ID) of a remediation (RID); at least one TID field, the contents of which denotes an ID of at least two technologies (TIDs), respectively; and at least one ACTID field, the contents of which denotes an ID of an action (ACTID). A method, of selecting a remediation that is appropriate to a technology present on a machine to be remediated, may include: providing such a machine-actionable memory; and indexing into the memory using a given RID value and a given TID value to determine values of the at-least-one ACTID corresponding to the given RID value and appropriate to the given TID value.Type: GrantFiled: April 4, 2012Date of Patent: January 21, 2014Assignee: Fortinet, inc.Inventors: Kurt D'Mello, David Spencer Tyree, Sudhir Gandhe, Eric David O'Brien
-
Publication number: 20130333044Abstract: A machine-actionable memory comprises one or more machine-actionable records arranged according to a data structure. Such a data structure may include links that respectively map between a remediation, at least one action, and at least two vulnerabilities. A method of selecting a remediation, that is appropriate to a vulnerability which is present on a machine to be remediated, may include: providing a machine-actionable memory as mentioned above; and indexing into the memory using: a given vulnerability identifier to determine (A) at least one of a remediation mapped thereto and (B) at least one action mapped to the given vulnerability identifier; and/or a given remediation to determine at least two vulnerabilities mapped thereto.Type: ApplicationFiled: August 16, 2013Publication date: December 12, 2013Applicant: Fortinet, Inc.Inventors: Kurt D'Mello, David Spencer Tyree, Sudhir Gandhe
-
Patent number: 8561197Abstract: A machine-actionable memory comprises one or more machine-actionable records arranged according to a data structure. Such a data structure may include links that respectively map between a remediation, at least one action, and at least two vulnerabilities. A method of selecting a remediation, that is appropriate to a vulnerability which is present on a machine to be remediated, may include: providing a machine-actionable memory as mentioned above; and indexing into the memory using: a given vulnerability identifier to determine (A) at least one of a remediation mapped thereto and (B) at least one action mapped to the given vulnerability identifier; and/or a given remediation to determine at least two vulnerabilities mapped thereto.Type: GrantFiled: April 22, 2010Date of Patent: October 15, 2013Assignee: Fortinet, Inc.Inventors: Kurt D'Mello, David Spencer Tyree, Sudhir Gandhe
-
Publication number: 20130212117Abstract: In some embodiments, a mobile device includes an interface configured to scan information from a communication tag associated with an asset, a memory operable to store the information, and a processor communicatively coupled to the memory. The information comprises a header describing the information, business application data, and asset identification data uniquely identifying the asset. The processor is configured to extract the business application data from the information scanned from the communication tag and extract the asset identification data from the information scanned from the communication tag.Type: ApplicationFiled: February 13, 2012Publication date: August 15, 2013Applicant: Computer Associates Think, Inc.Inventors: David Spencer Tyree, Nathan Giardina
-
Patent number: 8468606Abstract: A security device may receive information relating to a security event in a customer network. The security device may further determine, in response to receiving the information, a likelihood score that reflects a likelihood that the security event will succeed and an impact score that provides an indication of an impact that the security event will have on the customer network. The security device may also determine a risk score based on the likelihood score and the impact score, where the risk score provides an indication of a risk that the security event will affect the customer network. The security device may provide the risk score to a customer associated with the customer network.Type: GrantFiled: December 8, 2009Date of Patent: June 18, 2013Assignee: Verizon Patent and Licensing Inc.Inventors: Yves Van De Weyer, David Spencer Tyree, Henk Van Wulpen
-
Publication number: 20120192281Abstract: A machine-actionable memory comprises one or more machine-actionable records arranged according to a data structure. Such a data structure may include links that respectively map between: a RID field, the contents of which denote an identification (ID) of a remediation (RID); at least one TID field, the contents of which denotes an ID of at least two technologies (TIDs), respectively; and at least one ACTID field, the contents of which denotes an ID of an action (ACTID). A method, of selecting a remediation that is appropriate to a technology present on a machine to be remediated, may include: providing such a machine-actionable memory; and indexing into the memory using a given RID value and a given TID value to determine values of the at-least-one ACTID corresponding to the given RID value and appropriate to the given TID value.Type: ApplicationFiled: April 4, 2012Publication date: July 26, 2012Applicant: Fortinet, Inc.Inventors: Kurt D'Mello, David Spencer Tyree, Eric David O'Brien, Sudhir Gandhe
-
Patent number: 8171555Abstract: A machine-actionable memory comprises one or more machine-actionable records arranged according to a data structure. Such a data structure may include links that respectively map between: a RID field, the contents of which denote an identification (ID) of a remediation (RID); at least one TID field, the contents of which denotes an ID of at least two technologies (TIDs), respectively; and at least one ACTID field, the contents of which denotes an ID of an action (ACTID). A method, of selecting a remediation that is appropriate to a technology present on a machine to be remediated, may include: providing such a machine-actionable memory; and indexing into the memory using a given RID value and a given TID value to determine values of the at-least-one ACTID corresponding to the given RID value and appropriate to the given TID value.Type: GrantFiled: July 23, 2004Date of Patent: May 1, 2012Assignee: Fortinet, Inc.Inventors: Kurt D'Mello, David Spencer Tyree, Eric David O'Brien, Sudhir Gandhe
-
Publication number: 20110138471Abstract: A security device may receive information relating to a security event in a customer network. The security device may further determine, in response to receiving the information, a likelihood score that reflects a likelihood that the security event will succeed and an impact score that provides an indication of an impact that the security event will have on the customer network. The security device may also determine a risk score based on the likelihood score and the impact score, where the risk score provides an indication of a risk that the security event will affect the customer network. The security device may provide the risk score to a customer associated with the customer network.Type: ApplicationFiled: December 8, 2009Publication date: June 9, 2011Applicants: VERIZON PATENT AND LICENSING, INC., CYBERTRUST BELGIUM NVInventors: Yves VAN DE WEYER, David Spencer TYREE, Henk VAN WULPEN
-
Patent number: 7774848Abstract: A method of mapping a remediation to a plurality of vulnerabilities may include: assessing susceptibility of an non-remediated machine to a first vulnerability, which results in a first set of two or more vulnerabilities to which the machine is susceptible; implementing the remediation upon the machine; assessing susceptibility of the remediated machine to the first vulnerability, which results in a second set of vulnerabilities to which the machine is susceptible; and creating a machine-actionable map between the remediation and two or more members of the first set based upon differences between the first and second sets.Type: GrantFiled: July 23, 2004Date of Patent: August 10, 2010Assignee: Fortinet, Inc.Inventors: Kurt D'Mello, David Spencer Tyree, Sudhir Gandhe
-
Publication number: 20100199353Abstract: A machine-actionable memory comprises one or more machine-actionable records arranged according to a data structure. Such a data structure may include links that respectively map between a remediation, at least one action, and at least two vulnerabilities. A method of selecting a remediation, that is appropriate to a vulnerability which is present on a machine to be remediated, may include: providing a machine-actionable memory as mentioned above; and indexing into the memory using: a given vulnerability identifier to determine (A) at least one of a remediation mapped thereto and (B) at least one action mapped to the given vulnerability identifier; and/or a given remediation to determine at least two vulnerabilities mapped thereto.Type: ApplicationFiled: April 22, 2010Publication date: August 5, 2010Applicant: Fortinet, Inc.Inventors: Kurt D'Mello, David Spencer Tyree, Sudhir Gandhe
-
Patent number: 7694337Abstract: A machine-actionable memory comprises one or more machine-actionable records arranged according to a data structure. Such a data structure may include links that respectively map between a remediation, at least one action, and at least two vulnerabilities. A method of selecting a remediation, that is appropriate to a vulnerability which is present on a machine to be remediated, may include: providing a machine-actionable memory as mentioned above; and indexing into the memory using: a given vulnerability identifier to determine (A) at least one of a remediation mapped thereto and (B) at least one action mapped to the given vulnerability identifier; and/or a given remediation to determine at least two vulnerabilities mapped thereto.Type: GrantFiled: September 20, 2004Date of Patent: April 6, 2010Assignee: Fortinet, Inc.Inventors: Kurt D'Mello, David Spencer Tyree, Eric David O'Brien, Sudhir Gandhe
-
Publication number: 20020120853Abstract: A system, method and computer program product can include a test performed by a computer to determine whether a requestor of resources is a human user or a computer software scripted agent. If the test is passed, then the computer of the present invention assumes that the requestor of resources is a valid human user and access to resources is granted. In an exemplary embodiment of the present invention a system, method and computer program product for controlling access to resources. In an exemplary embodiment the method can include the steps of receiving a request from an entity; presenting the entity with a test; determining from the test whether or not the entity is an intelligent being; and granting the request only if the entity is determined to be an intelligent being.Type: ApplicationFiled: February 27, 2001Publication date: August 29, 2002Applicant: NETWORKS ASSOCIATES TECHNOLOGY, INC.Inventor: David Spencer Tyree