Patents by Inventor Joel Robert Spurlock

Joel Robert Spurlock has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20240007491
    Abstract: Methods and systems for detecting malicious attacks in a network and preventing lateral movement in the network by identity control are disclosed. According to an implementation, a security appliance may receive telemetry data from an endpoint device collected during a period of time. The security appliance may determine a threat behavior based on the telemetry data. The threat behavior may be associated with a user identity or user account. The security appliance further determines one or more additional user identities based on the user identity connected to the threat behavior. The security appliance may enforce one or more security actions on the user identity and the one or more additional user identities to prevent attacks to a plurality of computing domains from the endpoint device using the one or more additional user identities. The security appliance may be implemented on any network participants including servers, cloud device, cloud-based services/platforms, etc.
    Type: Application
    Filed: June 30, 2022
    Publication date: January 4, 2024
    Inventors: Joel Robert Spurlock, Elia Zaitsev, Daniel W. Brown, Thomas R. Hobson
  • Publication number: 20230421587
    Abstract: A distributed security system includes instances of a compute engine that can receive an event stream comprising event data associated with an occurrence of one or more events on one or more client computing devices and generate new event data based on the event data in the event stream. A predictions engine coupled in communication with the compute engine(s) receives the new event data and applies at least a portion of the received new event data to one or more machine learning models of the distributed security system based to the received new event data. The one or more machine learning models generate a prediction result that indicates whether the occurrence of the one or more events from which the new event data was generated represents one or more target behaviors, based on the applying of at least the portion of the received new event data to the one or more machine learning models according to the received new event data.
    Type: Application
    Filed: June 24, 2022
    Publication date: December 28, 2023
    Inventors: Brett Meyer, Joel Robert Spurlock, Andrew Forth, Kirby Koster, Joseph L. Faulhaber
  • Publication number: 20230344843
    Abstract: Techniques and systems for a security service system configured with a sensor component including a machine learning (ML) malware classifier to perform behavioral detection on host devices. The security service system may deploy a sensor component to monitor behavioral events on a host device. The sensor component may generate events data corresponding to monitored operations targeted by malware. The system may map individual events from events data onto a behavioral activity pattern and generate process trees. The system may extract behavioral artifacts to build a feature vector used for malware classification and generate a machine learning (ML) malware classifier. The sensor component may use the ML malware classifier to perform asynchronous behavioral detection on a host device and process system events for malware detection.
    Type: Application
    Filed: April 20, 2022
    Publication date: October 26, 2023
    Inventors: Vitaly Zaytsev, Brett Meyer, Joel Robert Spurlock
  • Patent number: 8572732
    Abstract: A system, method, and computer program product are provided for enabling communication between security systems. In use, a first communication protocol of a first security system and a second communication protocol of a second security system are identified, where the first communication protocol and the second communication protocol are different such that the first security system and the second security system are incapable of communicating therebetween. Further, the first security system is updated with a first security definition and/or the second security system is updated with a second security definition for enabling communication between the first security system and the second security system.
    Type: Grant
    Filed: February 27, 2012
    Date of Patent: October 29, 2013
    Assignee: McAfee, Inc.
    Inventors: Igor Muttik, Steve O. Hearnden, Joel Robert Spurlock
  • Patent number: 8392994
    Abstract: A system, method and computer program product are provided for detecting unwanted data. A scan for unwanted data is performed to generate results of the scan. A context of the scan is then identified. Further, the presence of unwanted data is conditionally indicated based on both the results of the scan and the context of the scan.
    Type: Grant
    Filed: March 28, 2011
    Date of Patent: March 5, 2013
    Assignee: McAfee, Inc.
    Inventors: Joel Robert Spurlock, Craig D. Schmugar, Fraser Peter Howard
  • Patent number: 8327439
    Abstract: A security data structure, method and computer program product are provided. In use, computer code is received. Furthermore, functions in the computer code that control a behavior of the computer code when executed are statically identified.
    Type: Grant
    Filed: July 11, 2011
    Date of Patent: December 4, 2012
    Assignee: McAfee, Inc.
    Inventors: Joel Robert Spurlock, Aditya Kapoor
  • Publication number: 20120167166
    Abstract: A system, method, and computer program product are provided for enabling communication between security systems. In use, a first communication protocol of a first security system and a second communication protocol of a second security system are identified, where the first communication protocol and the second communication protocol are different such that the first security system and the second security system are incapable of communicating therebetween. Further, the first security system is updated with a first security definition and/or the second security system is updated with a second security definition for enabling communication between the first security system and the second security system.
    Type: Application
    Filed: February 27, 2012
    Publication date: June 28, 2012
    Inventors: Igor Muttik, Steve O. Hearnden, Joel Robert Spurlock
  • Patent number: 8161551
    Abstract: A system, method, and computer program product are provided for enabling communication between security systems. In use, a first communication protocol of a first security system and a second communication protocol of a second security system are identified, where the first communication protocol and the second communication protocol are different such that the first security system and the second security system are incapable of communicating therebetween. Further, the first security system is updated with a first security definition and/or the second security system is updated with a second security definition for enabling communication between the first security system and the second security system.
    Type: Grant
    Filed: April 21, 2009
    Date of Patent: April 17, 2012
    Assignee: McAfee, Inc.
    Inventors: Igor Muttik, Steve O. Hearnden, Joel Robert Spurlock
  • Publication number: 20110271346
    Abstract: A security data structure, method and computer program product are provided. In use, computer code is received. Furthermore, functions in the computer code that control a behavior of the computer code when executed are statically identified.
    Type: Application
    Filed: July 11, 2011
    Publication date: November 3, 2011
    Inventors: Joel Robert Spurlock, Aditya Kapoor
  • Patent number: 8001595
    Abstract: A security data structure, method and computer program product are provided. In use, computer code is received. Furthermore, functions in the computer code that control a behavior of the computer code when executed are statically identified.
    Type: Grant
    Filed: May 10, 2006
    Date of Patent: August 16, 2011
    Assignee: McAfee, Inc.
    Inventors: Joel Robert Spurlock, Aditya Kapoor
  • Publication number: 20110179491
    Abstract: A system, method and computer program product are provided for detecting unwanted data. A scan for unwanted data is performed to generate results of the scan. A context of the scan is then identified. Further, the presence of unwanted data is conditionally indicated based on both the results of the scan and the context of the scan.
    Type: Application
    Filed: March 28, 2011
    Publication date: July 21, 2011
    Inventors: Joel Robert Spurlock, Craig D. Schmugar, Fraser Peter Howard
  • Patent number: 7917955
    Abstract: A system, method and computer program product are provided for detecting unwanted data. A scan for unwanted data is performed to generate results of the scan. A context of the scan is then identified. Further, the presence of unwanted data is conditionally indicated based on both the results of the scan and the context of the scan.
    Type: Grant
    Filed: January 14, 2005
    Date of Patent: March 29, 2011
    Assignee: McAfee, Inc.
    Inventors: Joel Robert Spurlock, Craig D. Schmugar, Fraser Peter Howard
  • Patent number: 7150042
    Abstract: The present invention relates to a proxy device, computer program product and method for performing malware scanning of files stored within a file storage device of a computer network. The computer network has a plurality of client devices arranged to issue access requests using a dedicated file access protocol to the file storage device in order to access files stored on the file storage device, with the proxy device being arranged so as to intercept access requests issued to the file storage device. The proxy device comprises a first interface for receiving an access request issued by one of the client devices to the file storage device using the dedicated file access protocol, and a second interface for communicating with the file storage device to cause the file storage device to process the access request. Further, processing logic is provided for causing selected malware scanning algorithms to be executed to determine whether the file identified by the access request is to be considered as malware.
    Type: Grant
    Filed: December 6, 2001
    Date of Patent: December 12, 2006
    Assignee: McAfee, Inc.
    Inventors: Daniel Joseph Wolff, Joel Robert Spurlock, Jonathan Lewis Edwards
  • Patent number: 7093002
    Abstract: The present invention provides a load balancing device, computer program product, and method for balancing the load across a plurality of proxy devices arranged to perform malware scanning of files stored within a file storage device of a computer network. The computer network has a plurality of client devices arranged to issue access requests using a dedicated file access protocol to the file storage device in order to access files stored on the file storage device. The load balancing device is arranged so as to intercept access requests issued to the file storage device, and comprises a client interface for receiving an access request issued to the file storage device using the dedicated file access protocol.
    Type: Grant
    Filed: December 6, 2001
    Date of Patent: August 15, 2006
    Assignee: McAfee, Inc.
    Inventors: Daniel Joseph Wolff, Joel Robert Spurlock, Jonathan Lewis Edwards
  • Publication number: 20030110391
    Abstract: The present invention relates to a proxy device, computer program product and method for performing malware scanning of files stored within a file storage device of a computer network. The computer network has a plurality of client devices arranged to issue access requests using a dedicated file access protocol to the file storage device in order to access files stored on the file storage device, with the proxy device being arranged so as to intercept access requests issued to the file storage device. The proxy device comprises a first interface for receiving an access request issued by one of the client devices to the file storage device using the dedicated file access protocol, and a second interface for communicating with the file storage device to cause the file storage device to process the access request. Further, processing logic is provided for causing selected malware scanning algorithms to be executed to determine whether the file identified by the access request is to be considered as malware.
    Type: Application
    Filed: December 6, 2001
    Publication date: June 12, 2003
    Inventors: Daniel Joseph Wolff, Joel Robert Spurlock, Jonathan Lewis Edwards
  • Publication number: 20030110258
    Abstract: The present invention provides a load balancing device, computer program product, and method for balancing the load across a plurality of proxy devices arranged to perform malware scanning of files stored within a file storage device of a computer network. The computer network has a plurality of client devices arranged to issue access requests using a dedicated file access protocol to the file storage device in order to access files stored on the file storage device. The load balancing device is arranged so as to intercept access requests issued to the file storage device, and comprises a client interface for receiving an access request issued to the file storage device using the dedicated file access protocol.
    Type: Application
    Filed: December 6, 2001
    Publication date: June 12, 2003
    Inventors: Daniel Joseph Wolff, Joel Robert Spurlock, Jonathan Lewis Edwards