Patents by Inventor Dickon Humphrey
Dickon Humphrey has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Publication number: 20240121263Abstract: An autonomous report composer composes a type of report on cyber threats that is composed in a human-readable format with natural language prose, terminology, and level of detail on the cyber threats aimed at a target audience. The autonomous report composer cooperates with libraries with prewritten text templates with i) standard pre-written sentences written in the natural language prose and ii) prewritten text templates with fillable blanks that are populated with data for the cyber threats specific for a current report being composed, where a template for the type of report contains two or more sections in that template. Each section having different standard pre-written sentences written in the natural language prose.Type: ApplicationFiled: June 22, 2023Publication date: April 11, 2024Inventors: Dickon Humphrey, Timothy Bazalgette, David Palmer
-
Publication number: 20240022595Abstract: A cyber threat defense system can leverage identifying threats by spotting deviations from normal behavior to create a system-wide inoculation regimen. The cyber threat defense system can have a comparison module to execute a comparison of input data for a network entity to at least one machine-learning model of a generic network entity using a normal behavior benchmark to spot behavior deviating from normal benign behavior. The comparison module can identify whether the network entity is in a breach state. The cyber threat defense system can have a cyber threat module to identify whether the breach state and a chain of relevant behavioral parameters correspond to a cyber threat. The cyber threat defense system can have an inoculation module to send an inoculation notice to warn of a potential cyber threat to a target device.Type: ApplicationFiled: September 26, 2023Publication date: January 18, 2024Inventors: Dickon Humphrey, Matthew Bispham, Jack Stockdale
-
Patent number: 11799898Abstract: A cyber threat defense system can leverage identifying threats by spotting deviations from normal behavior to create a system-wide inoculation regimen. The cyber threat defense system can have a comparison module to execute a comparison of input data for a network entity to at least one machine-learning model of a generic network entity using a normal behavior benchmark to spot behavior deviating from normal benign behavior. The comparison module can identify whether the network entity is in a breach state. The cyber threat defense system can have a cyber threat module to identify whether the breach state and a chain of relevant behavioral parameters correspond to a cyber threat. The cyber threat defense system can have an inoculation module to send an inoculation notice to warn of a potential cyber threat to a target device.Type: GrantFiled: February 19, 2019Date of Patent: October 24, 2023Assignee: Darktrace Holdings LimitedInventors: Dickon Humphrey, Matthew Bispham, Jack Stockdale
-
Publication number: 20230308472Abstract: An autonomous email-report composer composes a type of report on cyber threats that is composed in a human-readable format with natural language prose, terminology, and level of detail on the cyber threats aimed at a target audience. The autonomous email-report composer cooperates with libraries with prewritten text templates with i) standard pre-written sentences written in the natural language prose and ii) prewritten text templates with fillable blanks that are populated with data for the cyber threats specific for a current report being composed, where a template for the type of report contains two or more sections in that template. Each section having different standard pre-written sentences written in the natural language prose.Type: ApplicationFiled: July 29, 2020Publication date: September 28, 2023Inventors: John Anthony Boyer, Dickon Humphrey, Matthew Dunn
-
Patent number: 11689557Abstract: An autonomous report composer composes a type of report on cyber threats that is composed in a human-readable format with natural language prose, terminology, and level of detail on the cyber threats aimed at a target audience. The autonomous report composer cooperates with libraries with prewritten text templates with i) standard pre-written sentences written in the natural language prose and ii) prewritten text templates with fillable blanks that are populated with data for the cyber threats specific for a current report being composed, where a template for the type of report contains two or more sections in that template. Each section having different standard pre-written sentences written in the natural language prose.Type: GrantFiled: February 19, 2019Date of Patent: June 27, 2023Assignee: Darktrace Holdings LimitedInventors: Dickon Humphrey, Timothy Bazalgette, David Palmer
-
Publication number: 20220353286Abstract: An analyzer module forms a hypothesis on what are a possible set of cyber threats that could include the identified abnormal behavior and/or suspicious activity with AI models trained with machine learning on possible cyber threats. The Analyzer analyzes a collection of system data, including metric data, to support or refute each of the possible cyber threat hypotheses that could include the identified abnormal behavior and/or suspicious activity data with the AI models. A formatting and ranking module outputs supported possible cyber threat hypotheses into a formalized report that is presented in 1) printable report, 2) presented digitally on a user interface, or 3) both.Type: ApplicationFiled: May 16, 2022Publication date: November 3, 2022Inventors: Timothy Bazalgette, Dickon Humphrey, Carl Salji, Jack Stockdale
-
Patent number: 11457030Abstract: A cyber threat defense system can autonomously gather research data about external hosts visited by a network entity and present that information in a format integrated with a threat-tracking graphical user interface. A collation module can collect input data from the network entity. A cyber threat module can identify a cyber threat from the input data. A host module can determine at least one host metric for an external host in the input data based on the identified cyber threat. A researcher module can collect host research data describing the external host. A scoring module can analyze the host research data using the at least one host metric. The scoring module can generate an automatic threat score describing a threat level presented by the external host. A user interface module can present a threat-tracking graphical user interface displaying the automatic threat score.Type: GrantFiled: February 19, 2019Date of Patent: September 27, 2022Assignee: Darktrace Holdings LimitedInventors: Dickon Humphrey, David Palmer
-
Patent number: 11336669Abstract: An analyzer module forms a hypothesis on what are a possible set of cyber threats that could include the identified abnormal behavior and/or suspicious activity with AI models trained with machine learning on possible cyber threats. The Analyzer analyzes a collection of system data, including metric data, to support or refute each of the possible cyber threat hypotheses that could include the identified abnormal behavior and/or suspicious activity data with the AI models. A formatting and ranking module outputs supported possible cyber threat hypotheses into a formalized report that is presented in 1) printable report, 2) presented digitally on a user interface, or 3) both.Type: GrantFiled: February 19, 2019Date of Patent: May 17, 2022Assignee: Darktrace Holdings LimitedInventors: Timothy Bazalgette, Dickon Humphrey, Carl Salji, Jack Stockdale
-
Publication number: 20190260782Abstract: A cyber threat defense system can autonomously gather research data about external hosts visited by a network entity and present that information in a format integrated with a threat-tracking graphical user interface. A collation module can collect input data from the network entity. A cyber threat module can identify a cyber threat from the input data. A host module can determine at least one host metric for an external host in the input data based on the identified cyber threat. A researcher module can collect host research data describing the external host. A scoring module can analyze the host research data using the at least one host metric. The scoring module can generate an automatic threat score describing a threat level presented by the external host. A user interface module can present a threat-tracking graphical user interface displaying the automatic threat score.Type: ApplicationFiled: February 19, 2019Publication date: August 22, 2019Inventors: Dickon Humphrey, David Palmer
-
Publication number: 20190260764Abstract: An autonomous report composer composes a type of report on cyber threats that is composed in a human-readable format with natural language prose, terminology, and level of detail on the cyber threats aimed at a target audience. The autonomous report composer cooperates with libraries with prewritten text templates with i) standard pre-written sentences written in the natural language prose and ii) prewritten text templates with fillable blanks that are populated with data for the cyber threats specific for a current report being composed, where a template for the type of report contains two or more sections in that template. Each section having different standard pre-written sentences written in the natural language prose.Type: ApplicationFiled: February 19, 2019Publication date: August 22, 2019Inventors: Dickon Humphrey, Timothy Bazalgette, David Palmer
-
Publication number: 20190260779Abstract: An analyzer module forms a hypothesis on what are a possible set of cyber threats that could include the identified abnormal behavior and/or suspicious activity with AI models trained with machine learning on possible cyber threats. The Analyzer analyzes a collection of system data, including metric data, to support or refute each of the possible cyber threat hypotheses that could include the identified abnormal behavior and/or suspicious activity data with the AI models. A formatting and ranking module outputs supported possible cyber threat hypotheses into a formalized report that is presented in 1) printable report, 2) presented digitally on a user interface, or 3) both.Type: ApplicationFiled: February 19, 2019Publication date: August 22, 2019Inventors: Timothy Bazalgette, Dickon Humphrey, Carl Salji, Jack Stockdale
-
Publication number: 20190260783Abstract: A cyber threat defense system can leverage identifying threats by spotting deviations from normal behavior to create a system-wide inoculation regimen. The cyber threat defense system can have a comparison module to execute a comparison of input data for a network entity to at least one machine-learning model of a generic network entity using a normal behavior benchmark to spot behavior deviating from normal benign behavior. The comparison module can identify whether the network entity is in a breach state. The cyber threat defense system can have a cyber threat module to identify whether the breach state and a chain of relevant behavioral parameters correspond to a cyber threat. The cyber threat defense system can have an inoculation module to send an inoculation notice to warn of a potential cyber threat to a target device.Type: ApplicationFiled: February 19, 2019Publication date: August 22, 2019Inventors: Dickon Humphrey, Matthew Bispham, Jack Stockdale