Patents by Inventor Ioannis Giokas

Ioannis Giokas has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20230031123
    Abstract: Embodiments of the present invention provide for a distributed adaptive learning transaction fraud detection and prevention system has a meta-model system that accesses a fraud meta-model comprising a real-time fraud detection and prevention engine and a transaction database comprising transaction fraud decision data and transaction fraud feedback data; receives from at least one sub-system a sub-system best performing fraud model; updates the fraud meta-model based at least in part on the sub-system best performing fraud model; and transmits the updated fraud meta-model to the at least one sub-system; and at least one sub-system receives the updated fraud meta-model transmitted from the meta-model system; accessing a sub-system fraud model comprising a real-time fraud detection and prevention engine and a transaction database comprising transaction fraud decision data and transaction fraud feedback data; and updates the sub-system fraud model with the updated fraud meta-model transmitted from the meta-model
    Type: Application
    Filed: July 29, 2022
    Publication date: February 2, 2023
    Applicant: Verge Capital Limited
    Inventor: Ioannis Giokas
  • Patent number: 10911494
    Abstract: A method of providing security to IOT devices operating in an environment is disclosed. The method may include receiving, using a communication device, a plurality of security profiles associated with a plurality of IOT devices from at least one security database. Further, the method may include storing, using a storage device, the plurality of security profiles. Further, the method may include receiving, using the communication device, a plurality of identifiers associated with the plurality of IOT devices from a customer premises equipment. Further, the method may include retrieving, using the storage device, the plurality of security profiles associated with the plurality of IOT devices based on the plurality of identifiers. Further, the method may include and transmitting, using the communication device, the plurality of security profiles to the CPE.
    Type: Grant
    Filed: August 8, 2018
    Date of Patent: February 2, 2021
    Inventor: Ioannis Giokas
  • Publication number: 20190052676
    Abstract: A method of providing security to IOT devices operating in an environment is disclosed. The method may include receiving, using a communication device, a plurality of security profiles associated with a plurality of IOT devices from at least one security database. Further, the method may include storing, using a storage device, the plurality of security profiles. Further, the method may include receiving, using the communication device, a plurality of identifiers associated with the plurality of IOT devices from a customer premises equipment. Further, the method may include retrieving, using the storage device, the plurality of security profiles associated with the plurality of IOT devices based on the plurality of identifiers. Further, the method may include and transmitting, using the communication device, the plurality of security profiles to the CPE.
    Type: Application
    Filed: August 8, 2018
    Publication date: February 14, 2019
    Inventor: Ioannis Giokas
  • Patent number: 9392007
    Abstract: Systems and method of the present disclosure are directed to a network security monitor. The monitor can receive logs of a second computer network indicative of a status of the second computer network determined by a monitoring agent executing on the second computer network. The monitor can generate indexed logs from the logs based on log format. The monitor can retrieving a list of threat indicators from a database based on a schema from a plurality of threat indicators received from a plurality of heterogeneous repositories via the first computer network. The monitor can compare the list of threat indicators with the indexed logs. The monitor can generate a report based on the comparing to identify a threat.
    Type: Grant
    Filed: November 3, 2014
    Date of Patent: July 12, 2016
    Assignee: Crypteia Networks S.A.
    Inventor: Ioannis Giokas
  • Patent number: 9319425
    Abstract: Systems and method of the present disclosure are directed to a network security tool. In some embodiments, the tool identifies a current vulnerability of a private network. The tool can determine a signature of an attack configured to exploit the current vulnerability. The tool can comparing the signature with active and inactive signatures stored in a signature repository. The tool can compare the signatures to identify an inactive signature corresponding to the signature of the attack configured to exploit the current vulnerability. The tool can automatically activate, responsive to the comparison, the identified inactive signature. The tool can use the activated signature to identify an exploit based on data packets received via the private network.
    Type: Grant
    Filed: July 23, 2014
    Date of Patent: April 19, 2016
    Assignee: Crypteia Networks S.A.
    Inventor: Ioannis Giokas
  • Publication number: 20150128274
    Abstract: Systems and method of the present disclosure are directed to a network security monitor. The monitor can receive logs of a second computer network indicative of a status of the second computer network determined by a monitoring agent executing on the second computer network. The monitor can generate indexed logs from the logs based on log format. The monitor can retrieving a list of threat indicators from a database based on a schema from a plurality of threat indicators received from a plurality of heterogeneous repositories via the first computer network. The monitor can compare the list of threat indicators with the indexed logs. The monitor can generate a report based on the comparing to identify a threat.
    Type: Application
    Filed: November 3, 2014
    Publication date: May 7, 2015
    Applicant: CRYPTEIA NETWORKS S.A.
    Inventor: Ioannis Giokas
  • Publication number: 20150033340
    Abstract: Systems and method of the present disclosure are directed to a network security tool. In some embodiments, the tool identifies a current vulnerability of a private network. The tool can determine a signature of an attack configured to exploit the current vulnerability. The tool can comparing the signature with active and inactive signatures stored in a signature repository. The tool can compare the signatures to identify an inactive signature corresponding to the signature of the attack configured to exploit the current vulnerability. The tool can automatically activate, responsive to the comparison, the identified inactive signature. The tool can use the activated signature to identify an exploit based on data packets received via the private network.
    Type: Application
    Filed: July 23, 2014
    Publication date: January 29, 2015
    Inventor: Ioannis Giokas