Patents by Inventor Hal Lonas
Hal Lonas has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Publication number: 20240119178Abstract: Systems and methods for anonymizing personal information are provided. A set of data may be received that includes a first subset of data that corresponds to a unique identifier, a second subset of data that corresponds to a timestamp, and a third subset of data that corresponds to a personal identifiable information (PII) record. The PII record may include a plurality of fields, one or more of which may include values. The set of data may be pre-processed. A respective embedding may be generated, for each value of a respective field, of the plurality of fields, that includes a value. The pre-processed set of data may be anonymized to generate an anonymized set of data, in the form of a graph structure. The graph structure may be stored in a database, and a fraud risk model may be trained, based on the database.Type: ApplicationFiled: October 6, 2023Publication date: April 11, 2024Inventors: Mauritius Schmidtler, Hal Lonas, Chahm An, Nathan Russo, Etienne Doidic
-
Publication number: 20240031377Abstract: Examples of the present disclosure describe systems and methods of providing real-time scanning of IP addresses. In aspects, input may be received by a real-time IP scanning system. The system may generate one or more work orders based on the input. A scanner associated with the system may access a work order and attempt to communicate with one or more devices identified by the work order. If the attempted communication with a device is successful, a protocol analyzer may be used to provide a predefined payload to the device. If the response from the device matches an expected string, the device may be determined to be a safe and/or legitimate device. If the response from the device does not match an expected string, the device may be determined to be a malicious device.Type: ApplicationFiled: September 29, 2023Publication date: January 25, 2024Inventors: Huy Dang Ho, Hal Lonas, Trung Tran
-
Patent number: 11811785Abstract: Examples of the present disclosure describe systems and methods of providing real-time scanning of IP addresses. In aspects, input may be received by a real-time IP scanning system. The system may generate one or more work orders based on the input. A scanner associated with the system may access a work order and attempt to communicate with one or more devices identified by the work order. If the attempted communication with a device is successful, a protocol analyzer may be used to provide a predefined payload to the device. If the response from the device matches an expected string, the device may be determined to be a safe and/or legitimate device. If the response from the device does not match an expected string, the device may be determined to be a malicious device.Type: GrantFiled: October 7, 2021Date of Patent: November 7, 2023Assignee: OPEN TEXT INCInventors: Huy Dang Ho, Hal Lonas, Trung Tran
-
Publication number: 20230040895Abstract: A method and system for controlling access to an Internet resource is disclosed herein. When a request for an Internet resource, such as a Web site, is transmitted by an end-user of a LAN, a security appliance for the LAN analyzes a reputation index for the Internet resource before transmitting the request over the Internet. The reputation index is based on a plurality of factors for the Internet resource. A client application's access to the Internet resource can be allowed or denied based on the reputation index of the Internet resource.Type: ApplicationFiled: October 7, 2022Publication date: February 9, 2023Inventors: Ron Hegli, Hal Lonas, Christopher K. Harris
-
Patent number: 11489857Abstract: A method and system for controlling access to an Internet resource is disclosed herein. When a request for an Internet resource, such as a Web site, is transmitted by an end-user of a LAN, a security appliance for the LAN analyzes a reputation index for the Internet resource before transmitting the request over the Internet. The reputation index is based on a reputation vector which includes a plurality of factors for the Internet resource such as country of domain registration, country of service hosting, country of an internet protocol address block, age of a domain registration, popularity rank, internet protocol address, number of hosts, to-level domain, a plurality of run-time behaviors, JavaScript block count, picture count, immediate redirect and response latency. If the reputation index for the Internet resource is at or above a threshold value established for the LAN, then access to the Internet resource is permitted.Type: GrantFiled: May 6, 2013Date of Patent: November 1, 2022Assignee: Webroot Inc.Inventors: Ron Hegli, Hal Lonas, Christopher K. Harris
-
Publication number: 20220200956Abstract: A firewall monitors network activity and stores information about that network activity in a network activity log. The network activity is analyzed to identify a potential threat. The potential threat is further analyzed to identify other potential threats that are related to the potential threat, and are likely to pose a future risk to a protected network. A block list is updated to include the potential threat and the other potential threats to protect the protected network from the potential threat and the other potential threats.Type: ApplicationFiled: March 11, 2022Publication date: June 23, 2022Inventors: Hal Lonas, David Dufour, Chip Witt, Patrick Kar Yin Chang
-
Publication number: 20220030007Abstract: Examples of the present disclosure describe systems and methods of providing real-time scanning of IP addresses. In aspects, input may be received by a real-time IP scanning system. The system may generate one or more work orders based on the input. A scanner associated with the system may access a work order and attempt to communicate with one or more devices identified by the work order. If the attempted communication with a device is successful, a protocol analyzer may be used to provide a predefined payload to the device. If the response from the device matches an expected string, the device may be determined to be a safe and/or legitimate device. If the response from the device does not match an expected string, the device may be determined to be a malicious device.Type: ApplicationFiled: October 7, 2021Publication date: January 27, 2022Inventors: Huy Dang Ho, Hal Lonas, Trung Tran
-
Patent number: 11153329Abstract: Examples of the present disclosure describe systems and methods of providing real-time scanning of IP addresses. In aspects, input may be received by a real-time IP scanning system. The system may generate one or more work orders based on the input. A scanner associated with the system may access a work order and attempt to communicate with one or more devices identified by the work order. If the attempted communication with a device is successful, a protocol analyzer may be used to provide a predefined payload to the device. If the response from the device matches an expected string, the device may be determined to be a safe and/or legitimate device. If the response from the device does not match an expected string, the device may be determined to be a malicious device.Type: GrantFiled: February 14, 2020Date of Patent: October 19, 2021Assignee: WEBROOT INC.Inventors: Huy Dang Ho, Hal Lonas, Trung Tran
-
Publication number: 20200336459Abstract: A firewall monitors network activity and stores information about that network activity in a network activity log. The network activity is analyzed to identify a potential threat. The potential threat is further analyzed to identify other potential threats that are related to the potential threat, and are likely to pose a future risk to a protected network. A block list is updated to include the potential threat and the other potential threats to protect the protected network from the potential threat and the other potential threats.Type: ApplicationFiled: May 7, 2020Publication date: October 22, 2020Inventors: Hal Lonas, David Dufour, Chip Witt, Patrick Kar Yin Chang
-
Patent number: 10735401Abstract: Examples of the present disclosure describe systems and methods of determining online identity reputation. In aspects, an online identity of an entity may engage in online interactions. The content provided by the online identity may be accessed and analyzed to determine interaction characteristics and reputation metrics for the online identity. Based on the reputation metrics, the online identity and/or entity (and content therefrom) may be filtered from further online interactions. In some aspects, interaction data may be stored in a data store. An interaction mapping component having access to the data store may analyze the data store data to determine mappings between online identities, entities and interactions. In at least one aspect, an opt-in certificate system may also be provided. The opt-in system may provide an online identity or entity a certificate to securely validate identity.Type: GrantFiled: September 15, 2016Date of Patent: August 4, 2020Assignee: Webroot Inc.Inventor: Hal Lonas
-
Patent number: 10686759Abstract: A firewall monitors network activity and stores information about that network activity in a network activity log. The network activity is analyzed to identify a potential threat. The potential threat is further analyzed to identify other potential threats that are related to the potential threat, and are likely to pose a future risk to a protected network. A block list is updated to include the potential threat and the other potential threats to protect the protected network from the potential threat and the other potential threats.Type: GrantFiled: June 22, 2015Date of Patent: June 16, 2020Assignee: Webroot, Inc.Inventors: Hal Lonas, David Dufour, Chip Witt, Patrick Kar Yin Chang
-
Publication number: 20200186541Abstract: Examples of the present disclosure describe systems and methods of providing real-time scanning of IP addresses. In aspects, input may be received by a real-time IP scanning system. The system may generate one or more work orders based on the input. A scanner associated with the system may access a work order and attempt to communicate with one or more devices identified by the work order. If the attempted communication with a device is successful, a protocol analyzer may be used to provide a predefined payload to the device. If the response from the device matches an expected string, the device may be determined to be a safe and/or legitimate device. If the response from the device does not match an expected string, the device may be determined to be a malicious device.Type: ApplicationFiled: February 14, 2020Publication date: June 11, 2020Inventors: Huy Dang Ho, Hal Lonas, Trung Tran
-
Patent number: 10567396Abstract: Examples of the present disclosure describe systems and methods of providing real-time scanning of IP addresses. In aspects, input may be received by a real-time IP scanning system. The system may generate one or more work orders based on the input. A scanner associated with the system may access a work order and attempt to communicate with one or more devices identified by the work order. If the attempted communication with a device is successful, a protocol analyzer may be used to provide a predefined payload to the device. If the response from the device matches an expected string, the device may be determined to be a safe and/or legitimate device. If the response from the device does not match an expected string, the device may be determined to be a malicious device.Type: GrantFiled: March 8, 2016Date of Patent: February 18, 2020Assignee: Webroot Inc.Inventors: Huy Dang Ho, Hal Lonas, Trung Tran
-
Patent number: 10484400Abstract: Examples of the present disclosure describe systems and methods for generating dynamic sensors. In aspects, a device may be detected on a network. If the device is not recognized by the network, a generic container may be created. If the device is recognized by the network, a device-specific container may be created, and device-specific threat protection and/or a device-specific machine model may be loaded into the container. In either case, a threat intelligence model and/or an ecosystem-specific machine model may also be loaded into the container. The container may then be deployed to one or more networks. In aspects, the container may be used to analyze network traffic to sense potential threats for ecosystems comprising varying devices and topologies.Type: GrantFiled: July 20, 2017Date of Patent: November 19, 2019Assignee: Webroot Inc.Inventors: David Dufour, Hal Lonas
-
Publication number: 20180077146Abstract: Examples of the present disclosure describe systems and methods of determining online identity reputation. In aspects, an online identity of an entity may engage in online interactions. The content provided by the online identity may be accessed and analyzed to determine interaction characteristics and reputation metrics for the online identity. Based on the reputation metrics, the online identity and/or entity (and content therefrom) may be filtered from further online interactions. In some aspects, interaction data may be stored in a data store. An interaction mapping component having access to the data store may analyze the data store data to determine mappings between online identities, entities and interactions. In at least one aspect, an opt-in certificate system may also be provided. The opt-in system may provide an online identity or entity a certificate to securely validate identity.Type: ApplicationFiled: September 15, 2016Publication date: March 15, 2018Applicant: Webroot Inc.Inventor: Hal Lonas
-
Publication number: 20180026995Abstract: Examples of the present disclosure describe systems and methods for generating dynamic sensors. In aspects, a device may be detected on a network. If the device is not recognized by the network, a generic container may be created. If the device is recognized by the network, a device-specific container may be created, and device-specific threat protection and/or a device-specific machine model may be loaded into the container. In either case, a threat intelligence model and/or an ecosystem-specific machine model may also be loaded into the container. The container may then be deployed to one or more networks. In aspects, the container may be used to analyze network traffic to sense potential threats for ecosystems comprising varying devices and topologies.Type: ApplicationFiled: July 20, 2017Publication date: January 25, 2018Applicant: Webroot Inc.Inventors: David Dufour, Hal Lonas
-
Publication number: 20170171221Abstract: Examples of the present disclosure describe systems and methods of providing real-time scanning of IP addresses. In aspects, input may be received by a real-time IP scanning system. The system may generate one or more work orders based on the input. A scanner associated with the system may access a work order and attempt to communicate with one or more devices identified by the work order. If the attempted communication with a device is successful, a protocol analyzer may be used to provide a predefined payload to the device. If the response from the device matches an expected string, the device may be determined to be a safe and/or legitimate device. If the response from the device does not match an expected string, the device may be determined to be a malicious device.Type: ApplicationFiled: March 8, 2016Publication date: June 15, 2017Applicant: Webroot Inc.Inventors: Huy Dang Ho, Hal Lonas, Trung Tran
-
Patent number: 9558241Abstract: A method and system a method for compressing and searching a plurality of strings. The method includes inputting a plurality of strings into a compression engine. The method also includes converting each of the plurality of strings into a new, prefix-preserving compressed string, using the compression engine. For every string P that is a strict prefix of a string S, P's resulting compressed string is a strict prefix of S's resulting compressed string.Type: GrantFiled: October 13, 2015Date of Patent: January 31, 2017Assignee: Webroot Inc.Inventors: Christopher Harris, Hal Lonas
-
Publication number: 20160055213Abstract: A method and system a method for compressing and searching a plurality of strings. The method includes inputting a plurality of strings into a compression engine. The method also includes converting each of the plurality of strings into a new, prefix-preserving compressed string, using the compression engine. For every string P that is a strict prefix of a string S, P's resulting compressed string is a strict prefix of S's resulting compressed string.Type: ApplicationFiled: October 13, 2015Publication date: February 25, 2016Applicant: WEBROOT INC.Inventors: Christopher Harris, Hal Lonas
-
Publication number: 20150372976Abstract: A firewall monitors network activity and stores information about that network activity in a network activity log. The network activity is analyzed to identify a potential threat. The potential threat is further analyzed to identify other potential threats that are related to the potential threat, and are likely to pose a future risk to a protected network. A block list is updated to include the potential threat and the other potential threats to protect the protected network from the potential threat and the other potential threats.Type: ApplicationFiled: June 22, 2015Publication date: December 24, 2015Inventors: Hal Lonas, David Dufour, Chip Witt