Patents by Inventor Edward G. Amoroso
Edward G. Amoroso has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 11652847Abstract: Concepts and technologies are disclosed herein for decoupling hardware and software components of network security devices to provide security software as a service in a distributed computing environment. A computer system includes a processor that can execute computer-executable instructions to perform various operations. The processor can perform operations to provide security services to one or more customer platforms. The operations can include receiving a network security software component from a security service provider, and deploying the network security software component within a distributed computing environment so that the network security software component can be executed by a computing resource of the distributed computing environment to provide a security service to the customer platform(s). The network security software component includes a software component that has been decoupled from a hardware component of a network security device by the security service provider.Type: GrantFiled: October 1, 2018Date of Patent: May 16, 2023Assignee: KYOCERA CorporationInventors: William A. O'Hern, Edward G. Amoroso, Michelle Barry, Anthony Ramos, Daniel Solero, Duncan Kirkwood Sparrell, Rodney Dilts
-
Patent number: 11575713Abstract: A computer system and method provides cloud-based network security software as a service in a distributed computing environment. A computer system executing on a portion of hardware computing resources associated with the distributed computing environment receives a security service request from a customer platform device external to the distributed computing environment, the request identifying a customer platform asset within the distributed computing environment and instructing that a security service selected by the customer platform device be provided to the identified customer platform asset. In response to receiving the security service request, a network security software component associated with the selected security service on one or more virtual machines within the distributed computing environment is executed to provide the selected security service to the identified customer platform asset.Type: GrantFiled: January 26, 2021Date of Patent: February 7, 2023Assignee: KYOCERA CorporationInventors: William A. O'Hern, Edward G. Amoroso, Michelle Barry, Anthony Ramos, Daniel Solero, Duncan Kirkwood Sparrell, Rodney Dilts
-
Publication number: 20210152608Abstract: A computer system and method provides cloud-based network security software as a service in a distributed computing environment. A computer system executing on a portion of hardware computing resources associated with the distributed computing environment receives a security service request from a customer platform device external to the distributed computing environment, the request identifying a customer platform asset within the distributed computing environment and instructing that a security service selected by the customer platform device be provided to the identified customer platform asset. In response to receiving the security service request, a network security software component associated with the selected security service on one or more virtual machines within the distributed computing environment is executed to provide the selected security service to the identified customer platform asset.Type: ApplicationFiled: January 26, 2021Publication date: May 20, 2021Applicant: KYOCERA CorporationInventors: William A. O'HERN, Edward G. AMOROSO, Michelle BARRY, Anthony RAMOS, Daniel SOLERO, Duncan Kirkwood SPARRELL, Rodney DILTS
-
Patent number: 10382453Abstract: Concepts and technologies are disclosed herein for filtering network traffic using protected filtering mechanisms. An indication that traffic is to be filtered can be received, and a hash key, a signature representation, and an obfuscated signature can be identified or generated. The hash key and the signature representation can be provided to a first device without exposing the contents of the signature to the second device, and the obfuscated signature can be provided to a second device without exposing the contents of the signature to the second device. The first device and the second device can execute independent operations to collectively determine if the traffic is to be filtered.Type: GrantFiled: June 11, 2018Date of Patent: August 13, 2019Assignee: AT&T Intellectual Property I, L.P.Inventors: Edward G. Amoroso, Nishanth Chandran, Evgene Vahlis
-
Publication number: 20190036974Abstract: Concepts and technologies are disclosed herein for decoupling hardware and software components of network security devices to provide security software as a service in a distributed computing environment. A computer system includes a processor that can execute computer-executable instructions to perform various operations. The processor can perform operations to provide security services to one or more customer platforms. The operations can include receiving a network security software component from a security service provider, and deploying the network security software component within a distributed computing environment so that the network security software component can be executed by a computing resource of the distributed computing environment to provide a security service to the customer platform(s). The network security software component includes a software component that has been decoupled from a hardware component of a network security device by the security service provider.Type: ApplicationFiled: October 1, 2018Publication date: January 31, 2019Applicant: AT&T Intellectual Property I, L.P.Inventors: William A. O'Hern, Edward G. Amoroso, Michelle Barry, Anthony Ramos, Daniel Solero, Duncan Kirkwood Sparrell, Rodney Dilts
-
Publication number: 20180295139Abstract: Concepts and technologies are disclosed herein for filtering network traffic using protected filtering mechanisms. An indication that traffic is to be filtered can be received, and a hash key, a signature representation, and an obfuscated signature can be identified or generated. The hash key and the signature representation can be provided to a first device without exposing the contents of the signature to the second device, and the obfuscated signature can be provided to a second device without exposing the contents of the signature to the second device. The first device and the second device can execute independent operations to collectively determine if the traffic is to be filtered.Type: ApplicationFiled: June 11, 2018Publication date: October 11, 2018Applicant: AT&T Intellectual Property I, L.P.Inventors: Edward G. Amoroso, Nishanth Chandran, Evgene Vahlis
-
Patent number: 10091245Abstract: Concepts and technologies are disclosed herein for decoupling hardware and software components of network security devices to provide security software as a service in a distributed computing environment. A computer system includes a processor that can execute computer-executable instructions to perform various operations. The processor can perform operations to provide security services to one or more customer platforms. The operations can include receiving a network security software component from a security service provider, and deploying the network security software component within a distributed computing environment so that the network security software component can be executed by a computing resource of the distributed computing environment to provide a security service to the customer platform(s). The network security software component includes a software component that has been decoupled from a hardware component of a network security device by the security service provider.Type: GrantFiled: September 26, 2016Date of Patent: October 2, 2018Assignee: AT&T Intellectual Property I, L.P.Inventors: William A. O'Hern, Edward G. Amoroso, Michelle Barry, Anthony Ramos, Daniel Solero, Duncan Kirkwood Sparrell, Rodney Dilts
-
Patent number: 9998479Abstract: Concepts and technologies are disclosed herein for filtering network traffic using protected filtering mechanisms. An indication that traffic is to be filtered can be received, and a hash key, a signature representation, and an obfuscated signature can be identified or generated. The hash key and the signature representation can be provided to a first device without exposing the contents of the signature to the second device, and the obfuscated signature can be provided to a second device without exposing the contents of the signature to the second device. The first device and the second device can execute independent operations to collectively determine if the traffic is to be filtered.Type: GrantFiled: December 15, 2015Date of Patent: June 12, 2018Assignee: AT&T Intellectual Property I, L.P.Inventors: Edward G. Amoroso, Nishanth Chandran, Evgene Vahlis
-
Patent number: 9825973Abstract: Websites are monitored for changes over time. A domain name server resolves a domain name to a single internet protocol address and then performs a reverse resolution for the single internet protocol address. When multiple alias records resolve to the same host name, the domain name server determines the single internet protocol address virtually hosts multiple domain names.Type: GrantFiled: September 23, 2015Date of Patent: November 21, 2017Assignee: AT&T INTELLECTUAL PROPERTY I, L.P.Inventors: Daniel Sheleheda, Edward G. Amoroso, Cynthia Cama, Junlan Feng, Gregory Leibolt, Sanjay Macwan, William O'Hern, Valerie Torres, Yuhong Yu
-
Publication number: 20170013020Abstract: Concepts and technologies are disclosed herein for decoupling hardware and software components of network security devices to provide security software as a service in a distributed computing environment. A computer system includes a processor that can execute computer-executable instructions to perform various operations. The processor can perform operations to provide security services to one or more customer platforms. The operations can include receiving a network security software component from a security service provider, and deploying the network security software component within a distributed computing environment so that the network security software component can be executed by a computing resource of the distributed computing environment to provide a security service to the customer platform(s). The network security software component includes a software component that has been decoupled from a hardware component of a network security device by the security service provider.Type: ApplicationFiled: September 26, 2016Publication date: January 12, 2017Applicant: AT&T Intellectual Property I, L.P.Inventors: William A. O'Hern, Edward G. Amoroso, Michelle Barry, Anthony Ramos, Daniel Solero, Duncan Kirkwood Sparrell, Rodney Dilts
-
Patent number: 9456003Abstract: Concepts and technologies are disclosed herein for decoupling hardware and software components of network security devices to provide security software as a service in a distributed computing environment. A computer system includes a processor that can execute computer-executable instructions to perform various operations. The processor can perform operations to provide security services to one or more customer platforms. The operations can include receiving a network security software component from a security service provider, and deploying the network security software component within a distributed computing environment so that the network security software component can be executed by a computing resource of the distributed computing environment to provide a security service to the customer platform(s). The network security software component includes a software component that has been decoupled from a hardware component of a network security device by the security service provider.Type: GrantFiled: July 24, 2013Date of Patent: September 27, 2016Assignee: AT&T Intellectual Property I, L.P.Inventors: William A. O'Hern, Edward G. Amoroso, Michelle Barry, Anthony Ramos, Daniel Solero, Duncan Kirkwood Sparrell, Rodney Dilts
-
Publication number: 20160105452Abstract: Concepts and technologies are disclosed herein for filtering network traffic using protected filtering mechanisms. An indication that traffic is to be filtered can be received, and a hash key, a signature representation, and an obfuscated signature can be identified or generated. The hash key and the signature representation can be provided to a first device without exposing the contents of the signature to the second device, and the obfuscated signature can be provided to a second device without exposing the contents of the signature to the second device. The first device and the second device can execute independent operations to collectively determine if the traffic is to be filtered.Type: ApplicationFiled: December 15, 2015Publication date: April 14, 2016Applicant: AT&T Intellectual Property I, L.P.Inventors: Edward G. Amoroso, Nishanth Chandran, Evgene Vahlis
-
Publication number: 20160014145Abstract: Websites are monitored for changes over time. A domain name server resolves a domain name to a single internet protocol address and then performs a reverse resolution for the single internet protocol address. When multiple alias records resolve to the same host name, the domain name server determines the single internet protocol address virtually hosts multiple domain names.Type: ApplicationFiled: September 23, 2015Publication date: January 14, 2016Applicant: AT&T INTELLECTUAL PROPERTY I, L.P.Inventors: Daniel Sheleheda, Edward G. Amoroso, Cynthia Cama, Junlan Feng, Gregory Leibolt, Sanjay Macwan, William O'Hern, Valerie Torres, Yuhong Yu
-
Publication number: 20160004870Abstract: Concepts and technologies disclosed herein are directed to a personal security agent. According to one aspect disclosed herein, a compute resource includes a processor that can execute the personal security agent to perform operations. The compute resource can receive data from a data source. The compute resource can receive a job request to provide security for an entity. The job request can include a job requirement. The compute resource can analyze the job requirement and the data to determine an action. The compute resource can provide instructions for executing the action to a controller domain. The controller domain can execute the action in at least partial fulfillment of the job requirement.Type: ApplicationFiled: July 1, 2014Publication date: January 7, 2016Applicant: AT&T INTELLECTUAL PROPERTY I, L.P.Inventors: Andrea Forte, Edward G. Amoroso, Gustavo de los Reyes, Mikhail Istomin
-
Patent number: 9219747Abstract: Concepts and technologies are disclosed herein for filtering network traffic using protected filtering mechanisms. An indication that traffic is to be filtered can be received, and a hash key, a signature representation, and an obfuscated signature can be identified or generated. The hash key and the signature representation can be provided to a first device without exposing the contents of the signature to the second device, and the obfuscated signature can be provided to a second device without exposing the contents of the signature to the second device. The first device and the second device can execute independent operations to collectively determine if the traffic is to be filtered.Type: GrantFiled: October 28, 2013Date of Patent: December 22, 2015Assignee: AT&T Intellectual Property I, L.P.Inventors: Edward G. Amoroso, Nishanth Chandran, Evgene Vahlis
-
Patent number: 9172712Abstract: A method for locating and monitoring websites is provided that includes finding websites and contained hyperlinks, downloading a first snapshot of a web page taken at a first time, and downloading a second snapshot of the web page taken at a second time later than the first time. The method also includes enabling a comparison of the first snapshot and the second snapshot. A system for monitoring websites is provided. The system includes means for enabling a comparison of the first snapshot and the second snapshot visually or through the use of content data from that web site. A computer-readable recording medium having recorded thereon an executable program is provided. The program when executed causes a processor to perform a method for monitoring websites.Type: GrantFiled: October 7, 2009Date of Patent: October 27, 2015Assignee: AT&T INTELLECTUAL PROPERTY I, L.P.Inventors: Daniel Sheleheda, Edward G. Amoroso, Cynthia Cama, Junlan Feng, Gregory Leibolt, Sanjay Macwan, William O'Hern, Valerie Torres, Yuhong Yu
-
Publication number: 20150170488Abstract: A security device for detecting the position of a manhole cover includes a pinger device, such as an acoustic pinger, that transmits a signal in the direction of the expected position of the manhole cover. The device takes energy samples to determine if the signal has been reflected back by the manhole cover. If the device determines the signal has not been reflected, it determines that the manhole cover has been moved from the expected position. In response, the device captures an image of an area around the expected position of the manhole cover. In addition, the device can notify a remote security station via a network that the manhole cover has been moved.Type: ApplicationFiled: February 24, 2015Publication date: June 18, 2015Inventors: Robert R. Miller, Edward G. Amoroso, Susan R. Bailey, Lusheng Ji, Harry R. Worstell, David M. Britz
-
Publication number: 20150121525Abstract: Concepts and technologies are disclosed herein for filtering network traffic using protected filtering mechanisms. An indication that traffic is to be filtered can be received, and a hash key, a signature representation, and an obfuscated signature can be identified or generated. The hash key and the signature representation can be provided to a first device without exposing the contents of the signature to the second device, and the obfuscated signature can be provided to a second device without exposing the contents of the signature to the second device. The first device and the second device can execute independent operations to collectively determine if the traffic is to be filtered.Type: ApplicationFiled: October 28, 2013Publication date: April 30, 2015Applicant: AT&T INTELLECTUAL PROPERTY I, L.P.Inventors: Edward G. Amoroso, Nishanth Chandran, Evgene Vahlis
-
Publication number: 20150089007Abstract: Recommending actions for incoming messages based upon past historical email behavior information is presented herein. The historical email behavior information represents a user's behavior for a plurality of past messages and an action is recommended based on a comparison of the incoming messages to the historical email behavior information.Type: ApplicationFiled: December 5, 2014Publication date: March 26, 2015Inventors: Edward G. Amoroso, Ari Craine, Sanjay Macwan
-
Patent number: 8976038Abstract: A security device for detecting the position of a manhole cover includes a pinger device, such as an acoustic pinger, that transmits a signal in the direction of the expected position of the manhole cover. The device takes energy samples to determine if the signal has been reflected back by the manhole cover. If the device determines the signal has not been reflected, it determines that the manhole cover has been moved from the expected position. In response, the device captures an image of an area around the expected position of the manhole cover. In addition, the device can notify a remote security station via a network that the manhole cover has been moved.Type: GrantFiled: November 30, 2012Date of Patent: March 10, 2015Assignee: AT&T Intellectual Property I, L.P.Inventors: Robert R. Miller, II, Edward G. Amoroso, Susan R. Bailey, Lusheng Ji, Harry R. Worstell, David M. Britz