Patents by Inventor Gregory John Tevis
Gregory John Tevis has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 11882094Abstract: A system includes a memory and at least one processor to set a network throughput level setting to a default network traffic rate in a computer network, begin a data protection operation at the network throughput level setting in the computer network, continually monitor the computer network and determine that a condition has occurred in the computer network, dynamically adjust the network throughput level setting in response to the condition by one of decreasing the network throughput level setting by a network traffic rate increment and increasing the network throughput level setting by the network traffic rate increment, and dynamically shape network or storage traffic for the data protection operation using the network throughput level setting.Type: GrantFiled: June 15, 2021Date of Patent: January 23, 2024Assignee: Cobalt Iron, Inc.Inventors: Richard Raymond Spurlock, Robert Merrill Marett, James Thomas Kost, Gregory John Tevis
-
Publication number: 20230421588Abstract: A system continuously stores, as machine learning data, metadata results associated with a previous cyber-attack, a previous inspection class policy definition at a time of the previous cyber-attack, and a result of a previous data protection operation taken upon indication of the previous cyber-attack; continuously monitors for a new security condition or event; detects the new security condition or event; determines an appropriate inspection class policy from a plurality of inspection class policies based on the new security condition or event; based on the determined inspection class policy and the machine learning training data, determines a specific class of inspection tool from a plurality of classes of inspection tools or a specific level of inspection from a plurality of different levels of inspection for the new security condition or event; and executes the specific class of inspection tool or the specific level of inspection using the specific class of inspection tool on a particular data object toType: ApplicationFiled: August 8, 2023Publication date: December 28, 2023Inventors: Robert Merrill Marett, Richard Raymond Spurlock, Gregory John Tevis
-
Patent number: 11843665Abstract: A system includes a memory and at least one processor to monitor for a condition associated with a first cloud computing resource performing a cloud computing operation, determine that the condition associated with the first cloud computing resource has occurred, analyze the condition associated with the first cloud computing resource and compare the first cloud computing resource with a second cloud computing resource that is capable of performing at least a subset of the cloud computing operation, automatically modify the cloud computing operation that uses the first cloud computing resource to use the second cloud computing resource, and send at least one notification to a computing device about the condition associated with the first cloud computing resource and information associated with a modification of the cloud computing operation from the first cloud computing resource to the second cloud computing resource.Type: GrantFiled: November 16, 2021Date of Patent: December 12, 2023Assignee: Cobalt Iron, Inc.Inventors: Richard Raymond Spurlock, Robert Merrill Marett, Gregory John Tevis
-
Patent number: 11765187Abstract: A system continuously stores metadata results associated with a plurality of ransomware attacks, a plurality of inspection class policy definitions, a plurality of data protection operations, and operational forensics data as machine learning training data, continuously monitors for one of a new security condition and event, detects one of the new security condition and event, determines an appropriate inspection class policy based on the one of the new security condition and event, based on the inspection class policy, determines one to implement of a class of inspection operation, a cyber security analysis, and a data protection operation, and executes one of the class of inspection operation, the cyber security analysis, and the data protection operation based on the machine learning training data.Type: GrantFiled: November 10, 2020Date of Patent: September 19, 2023Assignee: Cobalt Iron, Inc.Inventors: Robert Merrill Marett, Richard Raymond Spurlock, Gregory John Tevis
-
Publication number: 20230259657Abstract: A system continuously monitors, by at least one inspector, an inspection work queue for a class of inspection operation request, detects, by the at least one inspector, the class of inspection operation request in the inspection work queue, removes, by the at least one inspector, the class of inspection operation request from the inspection work queue, determines, by the at least one inspector, one of a class of inspection tool and a specific level of inspection to perform for the class of inspection operation request that references a data object, and executes, by the at least one inspector, the one of the class of inspection tool and the specific level of inspection for the class of inspection operation request that references the data object at one of a certain time and a certain event during a data lifecycle of the data object.Type: ApplicationFiled: April 24, 2023Publication date: August 17, 2023Inventors: Robert Merrill Marett, Richard Raymond Spurlock, Gregory John Tevis
-
Patent number: 11663362Abstract: A system continuously monitors, by at least one inspector, an inspection work queue for a class of inspection operation request, detects, by the at least one inspector, the class of inspection operation request in the inspection work queue, removes, by the at least one inspector, the class of inspection operation request from the inspection work queue, determines, by the at least one inspector, one of a class of inspection tool and a specific level of inspection to perform for the class of inspection operation request that references a data object, and executes, by the at least one inspector, the one of the class of inspection tool and the specific level of inspection for the class of inspection operation request that references the data object at one of a certain time and a certain event during a data lifecycle of the data object.Type: GrantFiled: November 10, 2020Date of Patent: May 30, 2023Assignee: Cobalt Iron, Inc.Inventors: Robert Merrill Marett, Richard Raymond Spurlock, Gregory John Tevis
-
Patent number: 11636207Abstract: A system includes a memory and at least one processor to disable automatic prioritization of at least one data protection operation in a computer network, begin the at least one data protection operation in the computer network, continually monitor the computer network and determine that a condition has occurred in the computer network, activate automatic prioritization of the at least one data protection operation in the computer network, and instruct backup server tooling software to direct backup data for the at least one data protection operation to move from a first target storage repository to a second target storage repository.Type: GrantFiled: March 22, 2022Date of Patent: April 25, 2023Assignee: COBALT IRON, INC.Inventors: Richard Raymond Spurlock, Robert Merrill Marett, James Thomas Kost, Gregory John Tevis
-
Patent number: 11632374Abstract: A system includes at least one processor to receive training data and generate at least one machine learning rule based on the training data to apply when a condition occurs, continually monitor at least one resource associated with a computing network for the condition in the computing network that may trigger an authorization control modification, the condition comprising one of an active project that uses the at least one resource, a security alert level change, a resource locality change, metadata associated with the condition, a skill assessment, and a business state analysis, determine that the condition has occurred in the computing network, and dynamically and automatically modify a user authorization control for at least one particular user responsive to the machine learning rule.Type: GrantFiled: March 21, 2022Date of Patent: April 18, 2023Assignee: Cobalt Iron, Inc.Inventors: Richard Raymond Spurlock, Robert Merrill Marett, Gregory John Tevis
-
Publication number: 20220215096Abstract: A system includes a memory and at least one processor to disable automatic prioritization of at least one data protection operation in a computer network, begin the at least one data protection operation in the computer network, continually monitor the computer network and determine that a condition has occurred in the computer network, activate automatic prioritization of the at least one data protection operation in the computer network, and instruct backup server tooling software to direct backup data for the at least one data protection operation to move from a first target storage repository to a second target storage repository.Type: ApplicationFiled: March 22, 2022Publication date: July 7, 2022Inventors: Richard Raymond Spurlock, Robert Merrill Marett, James Thomas Kost, Gregory John Tevis
-
Publication number: 20220217149Abstract: A system includes at least one processor to receive training data and generate at least one machine learning rule based on the training data to apply when a condition occurs, continually monitor at least one resource associated with a computing network for the condition in the computing network that may trigger an authorization control modification, the condition comprising one of an active project that uses the at least one resource, a security alert level change, a resource locality change, metadata associated with the condition, a skill assessment, and a business state analysis, determine that the condition has occurred in the computing network, and dynamically and automatically modify a user authorization control for at least one particular user responsive to the machine learning rule.Type: ApplicationFiled: March 21, 2022Publication date: July 7, 2022Inventors: Richard Raymond Spurlock, Robert Merrill Marett, Gregory John Tevis
-
Publication number: 20220147657Abstract: A system continuously monitors, by at least one inspector, an inspection work queue for a class of inspection operation request, detects, by the at least one inspector, the class of inspection operation request in the inspection work queue, removes, by the at least one inspector, the class of inspection operation request from the inspection work queue, determines, by the at least one inspector, one of a class of inspection tool and a specific level of inspection to perform for the class of inspection operation request that references a data object, and executes, by the at least one inspector, the one of the class of inspection tool and the specific level of inspection for the class of inspection operation request that references the data object at one of a certain time and a certain event during a data lifecycle of the data object.Type: ApplicationFiled: November 10, 2020Publication date: May 12, 2022Inventors: Robert Merrill Marett, Richard Raymond Spurlock, Gregory John Tevis
-
Publication number: 20220150265Abstract: A system continuously stores metadata results associated with a plurality of ransomware attacks, a plurality of inspection class policy definitions, a plurality of data protection operations, and operational forensics data as machine learning training data, continuously monitors for one of a new security condition and event, detects one of the new security condition and event, determines an appropriate inspection class policy based on the one of the new security condition and event, based on the inspection class policy, determines one to implement of a class of inspection operation, a cyber security analysis, and a data protection operation, and executes one of the class of inspection operation, the cyber security analysis, and the data protection operation based on the machine learning training data.Type: ApplicationFiled: November 10, 2020Publication date: May 12, 2022Inventors: Robert Merrill Marett, Richard Raymond Spurlock, Gregory John Tevis
-
Patent number: 11308209Abstract: A system includes a memory and at least one processor to disable automatic prioritization of at least one data protection operation in a computer network, begin the at least one data protection operation in the computer network, continually monitor the computer network and determine that a condition has occurred in the computer network, activate automatic prioritization of the at least one data protection operation in the computer network, and instruct backup server tooling software to direct backup data for the at least one data protection operation to move from a first target storage repository to a second target storage repository.Type: GrantFiled: January 18, 2019Date of Patent: April 19, 2022Assignee: Cobalt Iron, Inc.Inventors: Richard Raymond Spurlock, Robert Merrill Marett, James Thomas Kost, Gregory John Tevis
-
Patent number: 11310237Abstract: A system includes at least one processor to receive training data and generate at least one machine learning rule based on the training data to apply when a condition occurs, continually monitor at least one resource associated with a computing network for the condition in the computing network that may trigger an authorization control modification, the condition comprising one of an active project that uses the at least one resource, a security alert level change, a resource locality change, metadata associated with the condition, a skill assessment, and a business state analysis, determine that the condition has occurred in the computing network, and dynamically and automatically modify a user authorization control for at least one particular user responsive to the machine learning rule.Type: GrantFiled: February 1, 2019Date of Patent: April 19, 2022Assignee: Cobalt Iron, Inc.Inventors: Richard Raymond Spurlock, Robert Merrill Marett, Gregory John Tevis
-
Publication number: 20220078237Abstract: A system includes a memory and at least one processor to monitor for a condition associated with a first cloud computing resource performing a cloud computing operation, determine that the condition associated with the first cloud computing resource has occurred, analyze the condition associated with the first cloud computing resource and compare the first cloud computing resource with a second cloud computing resource that is capable of performing at least a subset of the cloud computing operation, automatically modify the cloud computing operation that uses the first cloud computing resource to use the second cloud computing resource, and send at least one notification to a computing device about the condition associated with the first cloud computing resource and information associated with a modification of the cloud computing operation from the first cloud computing resource to the second cloud computing resource.Type: ApplicationFiled: November 16, 2021Publication date: March 10, 2022Inventors: Richard Raymond Spurlock, Robert Merrill Marett, Gregory John Tevis
-
Patent number: 11206306Abstract: A system includes a memory and at least one processor to monitor for a condition associated with a first cloud computing resource performing a cloud computing operation, determine that the condition associated with the first cloud computing resource has occurred, analyze the condition associated with the first cloud computing resource and compare the first cloud computing resource with a second cloud computing resource that is capable of performing at least a subset of the cloud computing operation, automatically modify the cloud computing operation that uses the first cloud computing resource to use the second cloud computing resource, and send at least one notification to a computing device about the condition associated with the first cloud computing resource and information associated with a modification of the cloud computing operation from the first cloud computing resource to the second cloud computing resource.Type: GrantFiled: May 21, 2019Date of Patent: December 21, 2021Assignee: Cobalt Iron, Inc.Inventors: Richard Raymond Spurlock, Robert Merrill Marett, Gregory John Tevis
-
Publication number: 20210314295Abstract: A system includes a memory and at least one processor to set a network throughput level setting to a default network traffic rate in a computer network, begin a data protection operation at the network throughput level setting in the computer network, continually monitor the computer network and determine that a condition has occurred in the computer network, dynamically adjust the network throughput level setting in response to the condition by one of decreasing the network throughput level setting by a network traffic rate increment and increasing the network throughput level setting by the network traffic rate increment, and dynamically shape network or storage traffic for the data protection operation using the network throughput level setting.Type: ApplicationFiled: June 15, 2021Publication date: October 7, 2021Inventors: Richard Raymond Spurlock, Robert Merrill Marett, James Thomas Kost, Gregory John Tevis
-
Patent number: 11063907Abstract: A system includes a memory and at least one processor to set a network throughput level setting to a default network traffic rate in a computer network, begin a data protection operation at the network throughput level setting in the computer network, continually monitor the computer network and determine that a condition has occurred in the computer network, dynamically adjust the network throughput level setting in response to the condition by one of decreasing the network throughput level setting by a network traffic rate increment and increasing the network throughput level setting by the network traffic rate increment, and dynamically shape network or storage traffic for the data protection operation using the network throughput level setting.Type: GrantFiled: January 18, 2019Date of Patent: July 13, 2021Assignee: COBALT IRON, INC.Inventors: Richard Raymond Spurlock, Robert Merrill Marett, James Thomas Kost, Gregory John Tevis
-
Publication number: 20200374348Abstract: A system includes a memory and at least one processor to monitor for a condition associated with a first cloud computing resource performing a cloud computing operation, determine that the condition associated with the first cloud computing resource has occurred, analyze the condition associated with the first cloud computing resource and compare the first cloud computing resource with a second cloud computing resource that is capable of performing at least a subset of the cloud computing operation, automatically modify the cloud computing operation that uses the first cloud computing resource to use the second cloud computing resource, and send at least one notification to a computing device about the condition associated with the first cloud computing resource and information associated with a modification of the cloud computing operation from the first cloud computing resource to the second cloud computing resource.Type: ApplicationFiled: May 21, 2019Publication date: November 26, 2020Inventors: Richard Raymond Spurlock, Robert Merrill Marett, Gregory John Tevis
-
Publication number: 20200236085Abstract: A system includes a memory and at least one processor to set a network throughput level setting to a default network traffic rate in a computer network, begin a data protection operation at the network throughput level setting in the computer network, continually monitor the computer network and determine that a condition has occurred in the computer network, dynamically adjust the network throughput level setting in response to the condition by one of decreasing the network throughput level setting by a network traffic rate increment and increasing the network throughput level setting by the network traffic rate increment, and dynamically shape network or storage traffic for the data protection operation using the network throughput level setting.Type: ApplicationFiled: January 18, 2019Publication date: July 23, 2020Inventors: Richard Raymond Spurlock, Robert Merrill Marett, James Thomas Kost, Gregory John Tevis