Patents by Inventor Eric Winsborrow

Eric Winsborrow has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 10193924
    Abstract: Methods, devices, and systems are described for diverting a computer hacker from a physical or other targeted production computer to a decoy software-based host emulator that emulates the physical computer. The decoy has the exact same IP address as the physical computer. In order to avoid packet collisions, a programmable physical switch and a virtual networking switch are employed, both of which can use software-defined networking (SDN). The virtual switch prevents packets from the decoy from flowing out of its virtual network until commanded. Upon a command, the physical switch redirects specific flows to the virtual switch, and the virtual switch opens specific flows from the decoy. The specific flows are those with packets containing the hacker's computer IP address, production computer IP address, and production computer port. The packets are associated with TCP connections or UDP sessions. The decoy host emulator can be a virtual machine (VM) running alongside many other VMs in a single computer.
    Type: Grant
    Filed: September 8, 2015
    Date of Patent: January 29, 2019
    Assignee: ACALVIO TECHNOLOGIES, INC.
    Inventors: Johnson L. Wu, Catherine V. Hart, Leo R. Versola, Eric Winsborrow
  • Patent number: 9729567
    Abstract: A shadow network, which can be a virtual reproduction of a real, physical, base computer network, is described. Shadow networks duplicate the topology, services, host, and network traffic of the base network using shadow hosts, which are low interaction, minimal-resource-using host emulators. The shadow networks are connected to the base network through virtual switches, etc. in order to form a large obfuscated network. When a hacker probes into a host emulator, a more resource-intensive virtual machine can be swapped in to take its place. When a connection is attempted from a host emulator to a physical computer, the a host emulator can step in to take the place of the physical computer, and software defined networking (SDN) can prevent collisions between the duplicated IP addresses. Replicating the shadow networks within the network introduces problems for hackers and allows a system administrator easier ways to identify intrusions.
    Type: Grant
    Filed: April 21, 2016
    Date of Patent: August 8, 2017
    Assignee: Acalvio Technologies, Inc.
    Inventors: Steven M. Silva, Yadong Zhang, Eric Winsborrow, Johnson L. Wu, Craig A. Schultz
  • Publication number: 20160234236
    Abstract: A shadow network, which can be a virtual reproduction of a real, physical, base computer network, is described. Shadow networks duplicate the topology, services, host, and network traffic of the base network using shadow hosts, which are low interaction, minimal-resource-using host emulators. The shadow networks are connected to the base network through virtual switches, etc. in order to form a large obfuscated network. When a hacker probes into a host emulator, a more resource-intensive virtual machine can be swapped in to take its place. When a connection is attempted from a host emulator to a physical computer, the a host emulator can step in to take the place of the physical computer, and software defined networking (SDN) can prevent collisions between the duplicated IP addresses. Replicating the shadow networks within the network introduces problems for hackers and allows a system administrator easier ways to identify intrusions.
    Type: Application
    Filed: April 21, 2016
    Publication date: August 11, 2016
    Applicant: Acalvio Technologies, Inc.
    Inventors: Steven M. Silva, Yadong Zhang, Eric Winsborrow, Johnson L. Wu, Craig A. Schultz
  • Patent number: 9350751
    Abstract: A shadow network, which can be a virtual reproduction of a real, physical, base computer network, is described. Shadow networks duplicate the topology, services, host, and network traffic of the base network using shadow hosts, which are low interaction, minimal-resource-using host emulators. The shadow networks are connected to the base network through virtual switches, etc. in order to form a large obfuscated network. When a hacker probes into a host emulator, a more resource-intensive virtual machine can be swapped in to take its place. When a connection is attempted from a host emulator to a physical computer, the a host emulator can step in to take the place of the physical computer, and software defined networking (SDN) can prevent collisions between the duplicated IP addresses. Replicating the shadow networks within the network introduces problems for hackers and allows a system administrator easier ways to identify intrusions.
    Type: Grant
    Filed: April 23, 2015
    Date of Patent: May 24, 2016
    Assignee: ACALVIO TECHNOLOGIES, INC.
    Inventors: Steven M. Silva, Yadong Zhang, Eric Winsborrow, Johnson L. Wu, Craig A. Schultz
  • Publication number: 20160080415
    Abstract: Methods, devices, and systems are described for diverting a computer hacker from a physical or other targeted production computer to a decoy software-based host emulator that emulates the physical computer. The decoy has the exact same IP address as the physical computer. In order to avoid packet collisions, a programmable physical switch and a virtual networking switch are employed, both of which can use software-defined networking (SDN). The virtual switch prevents packets from the decoy from flowing out of its virtual network until commanded. Upon a command, the physical switch redirects specific flows to the virtual switch, and the virtual switch opens specific flows from the decoy. The specific flows are those with packets containing the hacker's computer IP address, production computer IP address, and production computer port. The packets are associated with TCP connections or UDP sessions. The decoy host emulator can be a virtual machine (VM) running alongside many other VMs in a single computer.
    Type: Application
    Filed: September 8, 2015
    Publication date: March 17, 2016
    Applicant: Shadow Networks, Inc.
    Inventors: Johnson L. Wu, Catherine V. Hart, Leo R. Versola, Eric Winsborrow
  • Publication number: 20150229663
    Abstract: A shadow network, which can be a virtual reproduction of a real, physical, base computer network, is described. Shadow networks duplicate the topology, services, host, and network traffic of the base network using shadow hosts, which are low interaction, minimal-resource-using host emulators. The shadow networks are connected to the base network through virtual switches, etc. in order to form a large obfuscated network. When a hacker probes into a host emulator, a more resource-intensive virtual machine can be swapped in to take its place. When a connection is attempted from a host emulator to a physical computer, the a host emulator can step in to take the place of the physical computer, and software defined networking (SDN) can prevent collisions between the duplicated IP addresses. Replicating the shadow networks within the network introduces problems for hackers and allows a system administrator easier ways to identify intrusions.
    Type: Application
    Filed: April 23, 2015
    Publication date: August 13, 2015
    Applicant: Shadow Networks, Inc.
    Inventors: Steven M. Silva, Yadong Zhang, Eric Winsborrow, Johnson L. Wu, Craig A. Schultz
  • Patent number: 9021092
    Abstract: A shadow network, which can be a virtual reproduction of a real, physical, base computer network, is described. Shadow networks duplicate the topology, services, host, and network traffic of the base network using shadow hosts, which are low interaction, minimal-resource-using host emulators. The shadow networks are connected to the base network through virtual switches, etc. in order to form a large obfuscated network. When a hacker probes into a host emulator, a more resource-intensive virtual machine can be swapped in to take its place. When a connection is attempted from a host emulator to a physical computer, the a host emulator can step in to take the place of the physical computer, and software defined networking (SDN) can prevent collisions between the duplicated IP addresses. Replicating the shadow networks within the network introduces problems for hackers and allows a system administrator easier ways to identify intrusions.
    Type: Grant
    Filed: October 18, 2013
    Date of Patent: April 28, 2015
    Assignee: Shadow Networks, Inc.
    Inventors: Steven M. Silva, Yadong Zhang, Eric Winsborrow, Johnson L. Wu, Craig A. Schultz
  • Publication number: 20140115706
    Abstract: A shadow network, which can be a virtual reproduction of a real, physical, base computer network, is described. Shadow networks duplicate the topology, services, host, and network traffic of the base network using shadow hosts, which are low interaction, minimal-resource-using host emulators. The shadow networks are connected to the base network through virtual switches, etc. in order to form a large obfuscated network. When a hacker probes into a host emulator, a more resource-intensive virtual machine can be swapped in to take its place. When a connection is attempted from a host emulator to a physical computer, the a host emulator can step in to take the place of the physical computer, and software defined networking (SDN) can prevent collisions between the duplicated IP addresses. Replicating the shadow networks within the network introduces problems for hackers and allows a system administrator easier ways to identify intrusions.
    Type: Application
    Filed: October 18, 2013
    Publication date: April 24, 2014
    Applicant: ZanttZ,Inc.
    Inventors: Steven M. Silva, Yadong Zhang, Eric Winsborrow, Johnson L. Wu, Craig A. Schultz