Patents by Inventor Jeffrey Rhines

Jeffrey Rhines has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 11704405
    Abstract: This disclosure provides techniques for pooling and searching network security events reported by multiple sources. As information representing a security event is received from one source, it is searched against a central or distributed database representing events reported from multiple, diverse sources (e.g., different client networks). Either the search or correlated results can be filtered and/or routed according at least one characteristic associated with the networks, for example, to limit correlation to events reported by what are presumed to be similarly situated networks. The disclosed techniques facilitate faster identification of high-relevancy security event information, and thereby help facilitate faster threat identification and mitigation. Various techniques can be implemented as standalone software (e.g., for use by a private network) or for a central pooling and/or query service. This disclosure also provides different examples of actions that can be taken in response to search results.
    Type: Grant
    Filed: December 1, 2021
    Date of Patent: July 18, 2023
    Assignee: ServiceNow, Inc.
    Inventors: Richard Reybok, Andreas Seip Haugsnes, Kurt Joseph Zettel, II, Jeffrey Rhines, Henry Geddes, Volodymyr Osypov, Scott Lewis, Sean Brady, Mark Manning
  • Patent number: 11539720
    Abstract: Systems and methods are disclosed for computer network threat assessment. For example, methods may include receiving from client networks respective threat data and storing the respective threat data in a security event database; maintaining affiliations for groups of the client networks; detecting correlation between a network threat and one of the groups; identifying an indicator associated with the network threat, and, dependent on the affiliation for the group, identifying a client network and generating a message, which conveys an alert to the client network, comprising the indicator; responsive to the message, receiving, from the client network, a report of detected correlation between the indicator and security event data maintained by the client network; and updating the security event database responsive to the report of detected correlation.
    Type: Grant
    Filed: June 15, 2020
    Date of Patent: December 27, 2022
    Assignee: ServiceNow, Inc.
    Inventors: Richard Reybok, Jr., Jeffrey Rhines, Kurt Joseph Zettel, II, Henry Geddes
  • Publication number: 20220083653
    Abstract: This disclosure provides techniques for pooling and searching network security events reported by multiple sources. As information representing a security event is received from one source, it is searched against a central or distributed database representing events reported from multiple, diverse sources (e.g., different client networks). Either the search or correlated results can be filtered and/or routed according at least one characteristic associated with the networks, for example, to limit correlation to events reported by what are presumed to be similarly situated networks. The disclosed techniques facilitate faster identification of high-relevancy security event information, and thereby help facilitate faster threat identification and mitigation. Various techniques can be implemented as standalone software (e.g., for use by a private network) or for a central pooling and/or query service. This disclosure also provides different examples of actions that can be taken in response to search results.
    Type: Application
    Filed: December 1, 2021
    Publication date: March 17, 2022
    Inventors: Richard Reybok, Andreas Seip Haugsnes, Kurt Joseph Zettel, III, Jeffrey Rhines, Henry Geddes, Volodymyr Osypov, Scott Lewis, Sean Brady, Mark Manning
  • Patent number: 11222111
    Abstract: This disclosure provides techniques for pooling and searching network security events reported by multiple sources. As information representing a security event is received from one source, it is searched against a central or distributed database representing events reported from multiple, diverse sources (e.g., different client networks). Either the search or correlated results can be filtered and/or routed according at least one characteristic associated with the networks, for example, to limit correlation to events reported by what are presumed to be similarly situated networks. The disclosed techniques facilitate faster identification of high-relevancy security event information, and thereby help facilitate faster threat identification and mitigation. Various techniques can be implemented as standalone software (e.g., for use by a private network) or for a central pooling and/or query service. This disclosure also provides different examples of actions that can be taken in response to search results.
    Type: Grant
    Filed: March 23, 2020
    Date of Patent: January 11, 2022
    Assignee: ServiceNow, Inc.
    Inventors: Richard Reybok, Andreas Seip Haugsnes, Kurt Joseph Zettel, II, Jeffrey Rhines, Henry Geddes, Volodymyr Osypov, Scott Lewis, Sean Brady, Mark Manning
  • Publication number: 20200356666
    Abstract: This disclosure provides techniques for pooling and searching network security events reported by multiple sources. As information representing a security event is received from one source, it is searched against a central or distributed database representing events reported from multiple, diverse sources (e.g., different client networks). Either the search or correlated results can be filtered and/or routed according at least one characteristic associated with the networks, for example, to limit correlation to events reported by what are presumed to be similarly situated networks. The disclosed techniques facilitate faster identification of high-relevancy security event information, and thereby help facilitate faster threat identification and mitigation. Various techniques can be implemented as standalone software (e.g., for use by a private network) or for a central pooling and/or query service. This disclosure also provides different examples of actions that can be taken in response to search results.
    Type: Application
    Filed: March 23, 2020
    Publication date: November 12, 2020
    Inventors: Richard Reybok, Andreas Seip Haugsnes, Kurt Joseph Zettel, II, Jeffrey Rhines, Henry Geddes, Volodymyr Osypov, Scott Lewis, Sean Brady, Mark Manning
  • Publication number: 20200314124
    Abstract: Systems and methods are disclosed for computer network threat assessment. For example, methods may include receiving from client networks respective threat data and storing the respective threat data in a security event database; maintaining affiliations for groups of the client networks; detecting correlation between a network threat and one of the groups; identifying an indicator associated with the network threat, and, dependent on the affiliation for the group, identifying a client network and generating a message, which conveys an alert to the client network, comprising the indicator; responsive to the message, receiving, from the client network, a report of detected correlation between the indicator and security event data maintained by the client network; and updating the security event database responsive to the report of detected correlation.
    Type: Application
    Filed: June 15, 2020
    Publication date: October 1, 2020
    Inventors: Richard Reybok, JR., Jeffrey Rhines, Kurt Joseph Zettel, II, Henry Geddes
  • Patent number: 10686805
    Abstract: Systems and methods are disclosed for computer network threat assessment. For example, methods may include receiving from client networks respective threat data and storing the respective threat data in a security event database; maintaining affiliations for groups of the client networks; detecting correlation between a network threat and one of the groups; identifying an indicator associated with the network threat, and, dependent on the affiliation for the group, identifying a client network and generating a message, which conveys an alert to the client network, comprising the indicator; responsive to the message, receiving, from the client network, a report of detected correlation between the indicator and security event data maintained by the client network; and updating the security event database responsive to the report of detected correlation.
    Type: Grant
    Filed: December 9, 2016
    Date of Patent: June 16, 2020
    Assignee: ServiceNow, Inc.
    Inventors: Richard Reybok, Jr., Jeffrey Rhines, Kurt Joseph Zettel, II, Henry Geddes
  • Patent number: 10628582
    Abstract: This disclosure provides techniques for pooling and searching network security events reported by multiple sources. As information representing a security event is received from one source, it is searched against a central or distributed database representing events reported from multiple, diverse sources (e.g., different client networks). Either the search or correlated results can be filtered and/or routed according at least one characteristic associated with the networks, for example, to limit correlation to events reported by what are presumed to be similarly situated networks. The disclosed techniques facilitate faster identification of high-relevancy security event information, and thereby help facilitate faster threat identification and mitigation. Various techniques can be implemented as standalone software (e.g., for use by a private network) or for a central pooling and/or query service. This disclosure also provides different examples of actions that can be taken in response to search results.
    Type: Grant
    Filed: October 3, 2018
    Date of Patent: April 21, 2020
    Assignee: ServiceNow, Inc.
    Inventors: Richard Reybok, Andreas Seip Haugsnes, Kurt Joseph Zettel, II, Jeffrey Rhines, Henry Geddes, Volodymyr Osypov, Scott Lewis, Sean Brady, Mark Manning
  • Publication number: 20190034626
    Abstract: This disclosure provides techniques for pooling and searching network security events reported by multiple sources. As information representing a security event is received from one source, it is searched against a central or distributed database representing events reported from multiple, diverse sources (e.g., different client networks). Either the search or correlated results can be filtered and/or routed according at least one characteristic associated with the networks, for example, to limit correlation to events reported by what are presumed to be similarly situated networks. The disclosed techniques facilitate faster identification of high-relevancy security event information, and thereby help facilitate faster threat identification and mitigation. Various techniques can be implemented as standalone software (e.g., for use by a private network) or for a central pooling and/or query service. This disclosure also provides different examples of actions that can be taken in response to search results.
    Type: Application
    Filed: October 3, 2018
    Publication date: January 31, 2019
    Inventors: Richard Reybok, Andreis Seip Haugsnes, Kurt Joseph Zettel, II, Jeffrey Rhines, Henry Geddes, Volodymyr Osypov, Scott Lewis, Sean Brady, Mark Manning
  • Patent number: 10032020
    Abstract: This disclosure provides techniques for pooling and searching network security events reported by multiple sources. As information representing a security event is received from one source, it is searched against a central or distributed database representing events reported from multiple, diverse sources (e.g., different client networks). Either the search or correlated results can be filtered and/or routed according at least one characteristic associated with the networks, for example, to limit correlation to events reported by what are presumed to be similarly situated networks. The disclosed techniques facilitate faster identification of high-relevancy security event information, and thereby help facilitate faster threat identification and mitigation. Various techniques can be implemented as standalone software (e.g., for use by a private network) or for a central pooling and/or query service. This disclosure also provides different examples of actions that can be taken in response to search results.
    Type: Grant
    Filed: July 17, 2017
    Date of Patent: July 24, 2018
    Assignee: ServiceNow, Inc.
    Inventors: Richard Reybok, Andreis Seip Haugsnes, Kurt Joseph Zettel, II, Jeffrey Rhines, Henry Geddes, Volodymyr Osypov, Scott Lewis, Sean Brady, Mark Manning
  • Publication number: 20170316203
    Abstract: This disclosure provides techniques for pooling and searching network security events reported by multiple sources. As information representing a security event is received from one source, it is searched against a central or distributed database representing events reported from multiple, diverse sources (e.g., different client networks). Either the search or correlated results can be filtered and/or routed according at least one characteristic associated with the networks, for example, to limit correlation to events reported by what are presumed to be similarly situated networks. The disclosed techniques facilitate faster identification of high-relevancy security event information, and thereby help facilitate faster threat identification and mitigation. Various techniques can be implemented as standalone software (e.g., for use by a private network) or for a central pooling and/or query service. This disclosure also provides different examples of actions that can be taken in response to search results.
    Type: Application
    Filed: July 17, 2017
    Publication date: November 2, 2017
    Inventors: Richard Reybok, Andreis Seip Haugsnes, Kurt Joseph Zettel, II, Jeffrey Rhines, Henry Geddes, Volodymyr Osypov, Scott Lewis, Sean Brady, Mark Manning
  • Patent number: 9710644
    Abstract: This disclosure provides techniques for pooling and searching network security events reported by multiple sources. As information representing a security event is received from one source, it is searched against a central or distributed database representing events reported from multiple, diverse sources (e.g., different client networks). Either the search or correlated results can be filtered and/or routed according at least one characteristic associated with the networks, for example, to limit correlation to events reported by what are presumed to be similarly situated networks. The disclosed techniques facilitate faster identification of high-relevancy security event information, and thereby help facilitate faster threat identification and mitigation. Various techniques can be implemented as standalone software (e.g., for use by a private network) or for a central pooling and/or query service. This disclosure also provides different examples of actions that can be taken in response to search results.
    Type: Grant
    Filed: February 5, 2015
    Date of Patent: July 18, 2017
    Assignee: ServiceNow, Inc.
    Inventors: Richard Reybok, Andreas Seip Haugsnes, Kurt Joseph Zettel, II, Jeffrey Rhines, Henry Geddes, Volodymyr Osypov, Scott Lewis, Sean Brady, Mark Manning
  • Publication number: 20170171231
    Abstract: Systems and methods are disclosed for computer network threat assessment. For example, methods may include receiving from client networks respective threat data and storing the respective threat data in a security event database; maintaining affiliations for groups of the client networks; detecting correlation between a network threat and one of the groups; identifying an indicator associated with the network threat, and, dependent on the affiliation for the group, identifying a client network and generating a message, which conveys an alert to the client network, comprising the indicator; responsive to the message, receiving, from the client network, a report of detected correlation between the indicator and security event data maintained by the client network; and updating the security event database responsive to the report of detected correlation.
    Type: Application
    Filed: December 9, 2016
    Publication date: June 15, 2017
    Inventors: Richard Reybok, JR., Jeffrey Rhines, Kurt Joseph Zettel, II, Henry Geddes
  • Patent number: 9298920
    Abstract: An improved approach for classifying computer files as malicious (malware) or benign (whiteware) is disclosed. The invention classifies any computer file as malware or whiteware after using Bayes Theorem to evaluate each observable feature of each file with respect to other observable features of the same computer file with reference to statistical information gathered from repositories of known whiteware and malware files.
    Type: Grant
    Filed: May 6, 2015
    Date of Patent: March 29, 2016
    Assignee: THE UNITED STATES OF AMERICA, AS REPRESENTED BY THE SECRETARY OF THE AIR FORCE
    Inventors: Mark L Mason, Ming-Shih Wong, Jeffrey A. Rhines, Joshua M. Mitchell
  • Patent number: 9286568
    Abstract: Technologies for wireless device battery analysis and prediction are disclosed.
    Type: Grant
    Filed: May 3, 2013
    Date of Patent: March 15, 2016
    Assignee: Asurion, LLC
    Inventors: Jeffrey Rhines, Cory Adams, Glen Tregoning, Heather Lee Wilson, Michael Ballou, Christopher Morgan, Nathanial Beck, Richard Reybok, Shawn O'Donnell, Lindsay Thompson
  • Patent number: 9129110
    Abstract: An improved approach for classifying computer files as malicious (malware) or benign (whiteware) is disclosed. The invention classifies any computer file as malware or whiteware after using Bayes Theorem to evaluate each observable feature of each file with respect to other observable features of the same computer file with reference to statistical information gathered from repositories of known whiteware and malware files.
    Type: Grant
    Filed: September 30, 2013
    Date of Patent: September 8, 2015
    Assignee: The United States of America as represented by the Secretary of the Air Force
    Inventors: Mark L. Mason, Ming-Shih Wong, Jeffrey A. Rhines, Josh Mitchell
  • Publication number: 20150207813
    Abstract: This disclosure provides techniques for pooling and searching network security events reported by multiple sources. As information representing a security event is received from one source, it is searched against a central or distributed database representing events reported from multiple, diverse sources (e.g., different client networks). Either the search or correlated results can be filtered and/or routed according at least one characteristic associated with the networks, for example, to limit correlation to events reported by what are presumed to be similarly situated networks. The disclosed techniques facilitate faster identification of high-relevancy security event information, and thereby help facilitate faster threat identification and mitigation. Various techniques can be implemented as standalone software (e.g., for use by a private network) or for a central pooling and/or query service. This disclosure also provides different examples of actions that can be taken in response to search results.
    Type: Application
    Filed: February 5, 2015
    Publication date: July 23, 2015
    Inventors: Richard Reybok, Andreas Seip Haugsnes, Kurt Joseph Zettel, II, Jeffrey Rhines, Henry Geddes, Volodymyr Osypov, Scott Lewis, Sean Brady, Mark Manning
  • Publication number: 20150161633
    Abstract: Technologies related to data analysis and reporting are disclosed. Data is gathered from multiple social media sources, including gathering data related to issues that users are experiencing related to the use of a deployed device. Trending data is identified based at least in part on an analysis of the gathered data. The trending data is classified into categories. Data similarity between the trending data in a respective category is measured to create groups. Groups and information related to issues associated with a given group are reported.
    Type: Application
    Filed: December 6, 2013
    Publication date: June 11, 2015
    Applicant: Asurion, LLC
    Inventors: Cory Adams, Jeffrey Rhines, Richard Reybok
  • Patent number: 8805764
    Abstract: Technologies for wireless device battery analysis and prediction are disclosed. A described technology includes collecting wireless device information including battery drain information relating to a battery of a wireless device; determining, based on the collected wireless device information, a plurality of prediction outcomes corresponding respectively to a plurality of different battery usage prediction models; determining accuracies respectively for the battery usage prediction models; generating weight values respectively for the battery usage prediction models based on the determined accuracies; and generating a battery prediction result for the wireless device based on the prediction outcomes and the generated weight values.
    Type: Grant
    Filed: October 1, 2013
    Date of Patent: August 12, 2014
    Assignee: Asurion, LLC
    Inventors: Jeffrey Rhines, Cory Adams, Glen Tregoning, Heather Lee Wilson, Michael Ballou, Christopher Morgan, Nathanial Beck, Richard Reybok, Shawn O'Donnell, Lindsay Thompson
  • Publication number: 20070152802
    Abstract: A sensor device for detecting whether a tractor and a trailer of a truck are connected includes a container having a plurality of tabs extending radially outwardly to engage an inside surface of a bearing plate of the trailer when the container is located in a hole in the bearing plate. A spring extends from a base of the container away from the face surface to bear upon an interior wall of the trailer to bias the tabs into contact with the inside wall when the container is located in the hole to maintain a position of the container therein. A sensor is also provided for sensing proximity of a ferrous material and being located in the container. The sensor senses proximity of ferrous material of a coupler carried by the tractor without sensing ferrous material of the bearing plate.
    Type: Application
    Filed: August 24, 2006
    Publication date: July 5, 2007
    Inventors: Paul Knoll, Jeffrey Rhine, Kip Leggett, John Oeth, David Stillinger, David DeVinny