Patents by Inventor Gregory Andrew Mosher

Gregory Andrew Mosher has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 8898787
    Abstract: This paper describes a mechanism for minimizing the exploitation of vulnerabilities on software installed on a computing system. At a transport layer (e.g., transmission communication protocol (TCP) sockets layer), network traffic is monitored using a security component installed on a target computer. When a message destined for the computing system is received, data included in the message is compared with exploit evidence used to identify malicious code. The exploit evidence is provided to the security component by security service that gathers information about the malicious code. Based on the comparison of data in the message with the exploit evidence, rules are identified that instruct the security component to take an appropriate action on the message received.
    Type: Grant
    Filed: March 26, 2007
    Date of Patent: November 25, 2014
    Assignee: AVG Netherlands, B.V.
    Inventors: Roger John Thompson, Gregory Andrew Mosher
  • Patent number: 8769690
    Abstract: Instructions allowing their recipient to access content via a computer network are intercepted at a destination device sending the instructions via a host-server. Content of an instruction is analyzed at the destination device for malicious components, and results of the analysis are associated with the content prior to being presented to viewers of the content.
    Type: Grant
    Filed: July 9, 2010
    Date of Patent: July 1, 2014
    Assignee: AVG Netherlands B.V.
    Inventors: Yuval Ben-Itzhak, Gregory Andrew Mosher
  • Publication number: 20070226797
    Abstract: This paper describes a mechanism for minimizing the exploitation of vulnerabilities on software installed on a computing system. At a transport layer (e.g., transmission communication protocol (TCP) sockets layer), network traffic is monitored using a security component installed on a target computer. When a message destined for the computing system is received, data included in the message is compared with exploit evidence used to identify malicious code. The exploit evidence is provided to the security component by security service that gathers information about the malicious code. Based on the comparison of data in the message with the exploit evidence, rules are identified that instruct the security component to take an appropriate action on the message received.
    Type: Application
    Filed: March 26, 2007
    Publication date: September 27, 2007
    Applicant: Exploit Prevention Labs, Inc.
    Inventors: Roger John Thompson, Gregory Andrew Mosher