Patents by Inventor Jamie Gamble

Jamie Gamble has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20230231869
    Abstract: Systems and methods for monitoring suspicious communication network traffic. The methods include obtaining data associated with a sequence of communication events transmitted via the communication network and determining an entropy approximation measure associated at least one event attribute for the sequence of communication events. The method includes generating a threat prediction value based on an anomaly classification model and the entropy approximation measure. The anomaly classification model is trained based on prior sequences of communication events to identify a non-outlier anomaly range associated with the at least one event attribute. The threat prediction value is generated based on classification of the entropy approximation measure relative to the non-outlier anomaly range associated with the at least one attribute for identifying a potential threat. The method includes transmitting a signal for communicating that the sequence is a potential threat within the communication network.
    Type: Application
    Filed: March 17, 2023
    Publication date: July 20, 2023
    Inventors: Jamie GAMBLE, Nariman MAMMADLI
  • Patent number: 11627153
    Abstract: Systems and methods for monitoring suspicious communication network traffic. The methods include obtaining data associated with a sequence of communication events transmitted via the communication network and determining an entropy approximation measure associated at least one event attribute for the sequence of communication events. The method includes generating a threat prediction value based on an anomaly classification model and the entropy approximation measure. The anomaly classification model is trained based on prior sequences of communication events to identify a non-outlier anomaly range associated with the at least one event attribute. The threat prediction value is generated based on classification of the entropy approximation measure relative to the non-outlier anomaly range associated with the at least one attribute for identifying a potential threat. The method includes transmitting a signal for communicating that the sequence is a potential threat within the communication network.
    Type: Grant
    Filed: September 25, 2020
    Date of Patent: April 11, 2023
    Assignee: ROYAL BANK OF CANADA
    Inventors: Jamie Gamble, Nariman Mammadli
  • Publication number: 20220124108
    Abstract: A cybersecurity platform is described that processes collected data using a data model to identify and link anomalies and in order to identify generate security events and intrusions. The platform generates graph data structures using the security anomalies extended using additional data. The graph data structures represent links between nodes, the links being events, the nodes being machines and user accounts. The platform processes the graph data structures by combining similar nodes or grouping security events with common features to behaviour indicative of a single or multiple security events to identify chains of events which together represent an attack.
    Type: Application
    Filed: December 23, 2021
    Publication date: April 21, 2022
    Inventors: Jamie GAMBLE, Sahar RAHMANI, Amitkumar TIWARI
  • Patent number: 11212299
    Abstract: A cybersecurity platform is described that processes collected data using a data model to identify and link anomalies and in order to identify generate security events and intrusions. The platform generates graph data structures using the security anomalies extended using additional data. The graph data structures represent links between nodes, the links being events, the nodes being machines and user accounts. The platform processes the graph data structures by combining similar nodes or grouping security events with common features to behaviour indicative of a single or multiple security events to identify chains of events which together represent an attack.
    Type: Grant
    Filed: May 1, 2019
    Date of Patent: December 28, 2021
    Assignee: Royal Bank of Canada
    Inventors: Jamie Gamble, Sahar Rahmani, Amitkumar Tiwari
  • Patent number: 11171970
    Abstract: A cybersecurity platform that process collected data using a data model to generate security events linked to IP addresses, locations, or other variable information. The platform identifies potential false positive security events using a stability measure based on the variable information, which is then used to constrain the set of security events to reduce the effect of or remove the false positive security events from an output data structure.
    Type: Grant
    Filed: May 1, 2019
    Date of Patent: November 9, 2021
    Assignee: ROYAL BANK OF CANADA
    Inventor: Jamie Gamble
  • Patent number: 11134091
    Abstract: A cybersecurity platform that process collected data using a data model to generate security events linked to IP addresses, locations, or other variable information. The platform identifies potential false positive security events using a stability measure based on the variable information, which is then used to constrain the set of security events to reduce the effect of or remove the false positive security events from an output data structure.
    Type: Grant
    Filed: May 1, 2019
    Date of Patent: September 28, 2021
    Assignee: ROYAL BANK OF CANADA
    Inventor: Jamie Gamble
  • Publication number: 20210241281
    Abstract: Transaction destinations are identified by identifying requests for a login page of a web server for a financial institution and determining a referring website for each of the requests; classifying the referring websites into classes, each of the classes having a risk rating; identifying logins to access the web server and determining a user associated with each login; associating each of the logins with one of the requests and the referring website for that request; for each of the users, identifying transactions occurring within a time period from when the login was initiated; for each of the transactions occurring within the time period, associating a transaction destination of that transaction with the referring website for that login; and assigning a risk rating to each of the transaction destinations based at least in part on a risk rating of the class of the associated referring website.
    Type: Application
    Filed: January 29, 2021
    Publication date: August 5, 2021
    Inventors: Jamie GAMBLE, Gadi SHPITS, Ilya KOLMANOVICH, Cormac O'KEEFFE
  • Patent number: 11053766
    Abstract: A shear ram system includes an upper block positioned to transition from a first location outside a bore to a second location within the bore, the upper block including a blade control arm having a first contact surface. The shear ram system includes a lower block positioned to transition from the first location outside the bore to the second location within the bore, the lower block including a second contact surface proximate the first contact surface. The shear ram system includes a progressive gap between the first contact surface and the second contact surface larger at a first end than at a second end such that a first gap distance at the first end is greater than a second gap distance the second end.
    Type: Grant
    Filed: March 29, 2019
    Date of Patent: July 6, 2021
    Assignee: HYDRIL USA DISTRIBUTION LLC
    Inventors: Brian Scott Baker, Kevin Sweeney, Andrew Ingram, Jamie Gamble
  • Publication number: 20210160280
    Abstract: Websites, having associated features, are clustered by filtering entries that may be legitimate, determining feature similarity scores between the website features, and generating an aggregated similarity matrix containing website similarity scores between the websites. Websites are clustered into clusters or groups, based in part on the aggregated similarity matrix. Each cluster is identified by a cluster identifier and represents a centroid website and other websites at a normalized similarity score from the centroid. It is determined for each website whether the normalized similarity score is less than a threshold, and if so is identified as weakly-similar. Above the threshold, the website is labelled with the cluster identifier. Further clustering and thresholding is performed on the weakly-similar websites into additional clusters.
    Type: Application
    Filed: November 20, 2020
    Publication date: May 27, 2021
    Inventors: Vikash YADAV, Jamie GAMBLE, Ilya KOLMANOVICH, Cormac O'KEEFFE
  • Publication number: 20210092141
    Abstract: Systems and methods for monitoring suspicious communication network traffic. The methods include obtaining data associated with a sequence of communication events transmitted via the communication network and determining an entropy approximation measure associated at least one event attribute for the sequence of communication events. The method includes generating a threat prediction value based on an anomaly classification model and the entropy approximation measure. The anomaly classification model is trained based on prior sequences of communication events to identify a non-outlier anomaly range associated with the at least one event attribute. The threat prediction value is generated based on classification of the entropy approximation measure relative to the non-outlier anomaly range associated with the at least one attribute for identifying a potential threat. The method includes transmitting a signal for communicating that the sequence is a potential threat within the communication network.
    Type: Application
    Filed: September 25, 2020
    Publication date: March 25, 2021
    Inventors: Jamie GAMBLE, Nariman MAMMADLI
  • Publication number: 20190342307
    Abstract: A cybersecurity platform is described that processes collected data using a data model to identify and link anomalies and in order to identify generate security events and intrusions. The platform generates graph data structures using the security anomalies extended using additional data. The graph data structures represent links between nodes, the links being events, the nodes being machines and user accounts. The platform processes the graph data structures by combining similar nodes or grouping security events with common features to behaviour indicative of a single or multiple security events to identify chains of events which together represent an attack.
    Type: Application
    Filed: May 1, 2019
    Publication date: November 7, 2019
    Inventors: Jamie GAMBLE, Sahar RAHMANI, Amitkumar TIWARI
  • Publication number: 20190340354
    Abstract: A cybersecurity platform that process collected data using a data model to generate security events linked to IP addresses, locations, or other variable information. The platform identifies potential false positive security events using a stability measure based on the variable information, which is then used to constrain the set of security events to reduce the effect of or remove the false positive security events from an output data structure.
    Type: Application
    Filed: May 1, 2019
    Publication date: November 7, 2019
    Inventor: Jamie GAMBLE
  • Publication number: 20190309596
    Abstract: A shear ram system includes an upper block positioned to transition from a first location outside a bore to a second location within the bore, the upper block including a blade control arm having a first contact surface. The shear ram system includes a lower block positioned to transition from the first location outside the bore to the second location within the bore, the lower block including a second contact surface proximate the first contact surface. The shear ram system includes a progressive gap between the first contact surface and the second contact surface larger at a first end than at a second end such that a first gap distance at the first end is greater than a second gap distance the second end.
    Type: Application
    Filed: March 29, 2019
    Publication date: October 10, 2019
    Applicant: Hydril USA Distribution LLC
    Inventors: Brian Scott Baker, Kevin Sweeney, Andrew Ingram, Jamie Gamble
  • Publication number: 20150322978
    Abstract: A water submerged device for generating a force under water. The device includes an enclosure having a piston that drives a ram, the piston dividing the enclosure into closing and opening chambers, the opening chamber connected to the low pressure recipient, and containing a first fluid. The device further includes a low pressure recipient for containing a first fluid having a lower pressure than the first fluid, and in selective fluid communication with the opening chamber of the enclosure via a first valve. In addition, the device includes a control module connected to the enclosure and in selective communication with the opening chamber of the enclosure via a second valve. The first and second valves are controlled so that only one of the low pressure recipient or the control module is in fluid communication with the opening chamber of the enclosure at a time.
    Type: Application
    Filed: May 8, 2014
    Publication date: November 12, 2015
    Applicant: Hydril USA Manufacturing LLC
    Inventors: Jamie Gamble, Ryan Gustafson, Robert Arnold Judge