Patents by Inventor Derek Pearcy
Derek Pearcy has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 12079336Abstract: A system for securing electronic devices includes a processor, non-transitory machine readable storage medium communicatively coupled to the processor, security applications, and a security controller. The security controller includes computer-executable instructions on the medium that are readable by the processor. The security application is configured to determine a suspicious file from a client using the security applications, identify whether the suspicious file has been encountered by other clients using the security applications, calculate a time range for which the suspicious file has been present on the clients, determine resources accessed by the suspicious file during the time range, and create a visualization of the suspicious file, a relationship between the suspicious file and the clients, the time range, and the resources accessed by the suspicious file during the time range.Type: GrantFiled: December 30, 2022Date of Patent: September 3, 2024Assignee: Musarubra US LLCInventors: Derek Pearcy, Jessica Heinrich, Michael Bishop, Cristian Fiorentino, Jessica Gaskins, Martina Borkowsky
-
Publication number: 20230135590Abstract: A system for securing electronic devices includes a processor, non-transitory machine readable storage medium communicatively coupled to the processor, security applications, and a security controller. The security controller includes computer-executable instructions on the medium that are readable by the processor. The security application is configured to determine a suspicious file from a client using the security applications, identify whether the suspicious file has been encountered by other clients using the security applications, calculate a time range for which the suspicious file has been present on the clients, determine resources accessed by the suspicious file during the time range, and create a visualization of the suspicious file, a relationship between the suspicious file and the clients, the time range, and the resources accessed by the suspicious file during the time range.Type: ApplicationFiled: December 30, 2022Publication date: May 4, 2023Inventors: Derek Pearcy, Jessica Heinrich, Michael Bishop, Cristian Fiorentino, Jessica Gaskins, Martina Borkowsky
-
Patent number: 11556641Abstract: A system for securing electronic devices includes a processor, non-transitory machine readable storage medium communicatively coupled to the processor, security applications, and a security controller. The security controller includes computer-executable instructions on the medium that are readable by the processor. The security application is configured to determine a suspicious file from a client using the security applications, identify whether the suspicious file has been encountered by other clients using the security applications, calculate a time range for which the suspicious file has been present on the clients, determine resources accessed by the suspicious file during the time range, and create a visualization of the suspicious file, a relationship between the suspicious file and the clients, the time range, and the resources accessed by the suspicious file during the time range.Type: GrantFiled: August 5, 2020Date of Patent: January 17, 2023Assignee: Musarubra US LLCInventors: Derek Pearcy, Jessica Heinrich, Michael Bishop, Cristian Fiorentino, Jessica Gaskins, Martina Borkowsky
-
Publication number: 20200364335Abstract: A system for securing electronic devices includes a processor, non-transitory machine readable storage medium communicatively coupled to the processor, security applications, and a security controller. The security controller includes computer-executable instructions on the medium that are readable by the processor. The security application is configured to determine a suspicious file from a client using the security applications, identify whether the suspicious file has been encountered by other clients using the security applications, calculate a time range for which the suspicious file has been present on the clients, determine resources accessed by the suspicious file during the time range, and create a visualization of the suspicious file, a relationship between the suspicious file and the clients, the time range, and the resources accessed by the suspicious file during the time range.Type: ApplicationFiled: August 5, 2020Publication date: November 19, 2020Inventors: Derek Pearcy, Jessica Heinrich, Michael Bishop, Cristian Fiorentino, Jessica Gaskins, Martina Borkowsky
-
Patent number: 10769276Abstract: A system for securing electronic devices includes a processor, non-transitory machine readable storage medium communicatively coupled to the processor, security applications, and a security controller. The security controller includes computer-executable instructions on the medium that are readable by the processor. The security application is configured to determine a suspicious file from a client using the security applications, identify whether the suspicious file has been encountered by other clients using the security applications, calculate a time range for which the suspicious file has been present on the clients, determine resources accessed by the suspicious file during the time range, and create a visualization of the suspicious file, a relationship between the suspicious file and the clients, the time range, and the resources accessed by the suspicious file during the time range.Type: GrantFiled: September 17, 2018Date of Patent: September 8, 2020Assignee: McAfee, LLCInventors: Derek Pearcy, Jessica Heinrich, Michael Bishop, Cristian Fiorentino, Jessica Gaskins, Martina Borkowsky
-
Publication number: 20190018957Abstract: A system for securing electronic devices includes a processor, non-transitory machine readable storage medium communicatively coupled to the processor, security applications, and a security controller. The security controller includes computer-executable instructions on the medium that are readable by the processor. The security application is configured to determine a suspicious file from a client using the security applications, identify whether the suspicious file has been encountered by other clients using the security applications, calculate a time range for which the suspicious file has been present on the clients, determine resources accessed by the suspicious file during the time range, and create a visualization of the suspicious file, a relationship between the suspicious file and the clients, the time range, and the resources accessed by the suspicious file during the time range.Type: ApplicationFiled: September 17, 2018Publication date: January 17, 2019Inventors: Derek Pearcy, Jessica Heinrich, Michael Bishop, Cristian Fiorentino, Jessica Gaskins, Martina Borkowsky
-
Patent number: 10078753Abstract: A system for securing electronic devices includes a processor, non-transitory machine readable storage medium communicatively coupled to the processor, and a security controller. The security controller includes computer-executable instructions on the medium that are readable by the processor. The security controller is configured to determine a suspicious file from a client using security applications, identify whether the suspicious file has been encountered by other clients using the security applications, calculate a time range for which the suspicious file has been present on the clients, determine resources accessed by the suspicious file during the time range, and create a visualization of the suspicious file, a relationship between the suspicious file and the clients, the time range, and the resources accessed by the suspicious file during the time range.Type: GrantFiled: December 23, 2015Date of Patent: September 18, 2018Assignee: McAfee, LLCInventors: Derek Pearcy, Jessica Heinrich, Michael Bishop, Cristian Fiorentino, Jessica Gaskins, Martina Borkowsky
-
Publication number: 20170116416Abstract: A system for securing electronic devices includes a processor, non-transitory machine readable storage medium communicatively coupled to the processor, and a security controller. The security controller includes computer-executable instructions on the medium that are readable by the processor. The security controller is configured to determine a suspicious file from a client using security applications, identify whether the suspicious file has been encountered by other clients using the security applications, calculate a time range for which the suspicious file has been present on the clients, determine resources accessed by the suspicious file during the time range, and create a visualization of the suspicious file, a relationship between the suspicious file and the clients, the time range, and the resources accessed by the suspicious file during the time range.Type: ApplicationFiled: December 23, 2015Publication date: April 27, 2017Inventors: Derek Pearcy, Jessica Heinrich, Michael Bishop, Cristian Fiorentino, Jessica Gaskins, Martina Borkowsky
-
Publication number: 20050010821Abstract: A system and method for a vulnerability assessment mechanism that serves to actively scan for vulnerabilities on a continuous basis and interpret the resulting traffic in context of policy is provided. Vulnerability information is presented within an enterprise manager system enabling the user to access vulnerability information, recommended remediation procedures, and associated network traffic. A studio mechanism is used to add scanners to the appropriate policies and control the scope and distribution of scans within the target network.Type: ApplicationFiled: April 29, 2004Publication date: January 13, 2005Inventors: Geoffrey Cooper, Luis Pereira Valente, Derek Pearcy, Harry Richardson