Patents by Inventor John A. BORAK

John A. BORAK has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20220182412
    Abstract: The present application describes a method for evaluating probes. One step of the method includes configuring a client with a service to lure a probe associated with traffic flowing via an encrypted pathway to a node on a network. Another step of the method includes monitoring activity of the probe on the network and an interaction between the probe and the service on the node. Yet another step of the method includes determining, via a trained predictive machine learning model, in real-time whether the activity or the interaction exceeds a confidence threshold indicating a threat to the network. A further step of the method includes tagging the probe based upon the determination. Yet even a further step of the method includes updating a security policy of the network in view of the tagged probe.
    Type: Application
    Filed: January 27, 2022
    Publication date: June 9, 2022
    Inventor: John A. BORAK
  • Publication number: 20220116416
    Abstract: The present application describes method including a step of determining, via a trained predictive machine learning model assessing real-time information exceeding a confidence threshold and impacting a node present at a geographic location on a first network, that an imminent event proximate to or directly at the node/router will disrupt traffic flowing via an encrypted pathway between the node and a second network. Another step of the method may include transmitting, to an administrator or a gateway at a third network, a request to transfer the traffic based upon the determined imminent event. Yet another step of the method may include receiving, via the administrator or the gateway at the third network, an acceptance of the traffic transfer request. A further step of the method may include coordinating, with the gateway, for the traffic to flow via another encrypted pathway to the second network.
    Type: Application
    Filed: December 21, 2021
    Publication date: April 14, 2022
    Inventor: John A. Borak
  • Publication number: 20220078171
    Abstract: The present application describes, in an embodiment, a method including one or more steps. One step of the method may include receiving, at a gateway including an encrypted pathway, traffic from a third party originating outside a multi-hop network intended for a client inside the network. Another step of the method may include determining, using a trained machine learning model, a probe of the received traffic attempting to obtain confidential information about the multi-hop network. Yet another step of the method may include flagging the third party based on determined probe.
    Type: Application
    Filed: August 30, 2021
    Publication date: March 10, 2022
    Inventors: John A. BORAK, Eric W. HSIUNG, Michael J. CHEN
  • Publication number: 20220078174
    Abstract: The present application describes, in an embodiment, a system which includes a non-transitory memory including executable instructions for obfuscating traffic. The system also includes a processor operably coupled to the non-transitory memory configured to execute a set of instructions. The set of instructions may include receiving, at a gateway, traffic from plural clients on a home network. The set of instructions may also include identifying a protocol type of the received traffic. The set of instructions may also include parsing the received traffic based on the protocol type. The set of instructions may also include creating an encrypted pathway to support flow of the received traffic associated with the protocol type to a destination. The set of instructions may also include transmitting, via the created encrypted pathway, the traffic associated with the protocol type to a destination.
    Type: Application
    Filed: August 30, 2021
    Publication date: March 10, 2022
    Inventors: John A. BORAK, Eric W. HSIUNG, Michael J. CHEN
  • Patent number: 9326100
    Abstract: A method of detecting a home location first determines a location of a vehicle using either a WI-FI signal or a navigation system. A distance between the vehicle and the home location is determined followed by determining whether the distance between the vehicle and the home location is greater than a transmission range of a wireless device controller. If the distance between the location of the vehicle and the home location is less than the transmission range of the wireless device controller, an indication is provided in the vehicle to a vehicle occupant that the wireless device controller is within its transmission range of the home location.
    Type: Grant
    Filed: July 1, 2013
    Date of Patent: April 26, 2016
    Assignee: Continental Automotive Systems, Inc.
    Inventors: Youliang Guo, John Borak
  • Publication number: 20150002310
    Abstract: A method of detecting a home location first determines a location of a vehicle using either a WI-FI signal or a navigation system. A distance between the vehicle and the home location is determined followed by determining whether the distance between the vehicle and the home location is greater than a transmission range of a wireless device controller. If the distance between the location of the vehicle and the home location is less than the transmission range of the wireless device controller, an indication is provided in the vehicle to a vehicle occupant that the wireless device controller is within its transmission range of the home location.
    Type: Application
    Filed: July 1, 2013
    Publication date: January 1, 2015
    Inventors: Youliang Guo, John Borak