Patents by Inventor John P. Blignaut
John P. Blignaut has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 11632388Abstract: An apparatus is provided including at least one platform; an intrusion prevention system configured to communicative couple with the at least one platform; a firewall configured to communicative couple with the at least one platform; at least one first data storage configured to communicative couple with the at least one platform; and at least one second data storage configured to communicative couple with the at least one platform. The at least one platform is configured to perform a plurality of operations that collective protect one or more networked devices.Type: GrantFiled: November 13, 2020Date of Patent: April 18, 2023Assignee: SecurityProfiling, LLCInventors: Brett M. Oliphant, John P. Blignaut
-
Patent number: 11310262Abstract: An apparatus is provided including at least one platform; an intrusion prevention system configured to communicative couple with the at least one platform; a firewall configured to communicative couple with the at least one platform; at least one first data storage configured to communicative couple with the at least one platform; and at least one second data storage configured to communicative couple with the at least one platform. The at least one platform is configured to perform a plurality of operations that collective protect one or more networked devices.Type: GrantFiled: October 29, 2021Date of Patent: April 19, 2022Assignee: Security Profiling, LLCInventors: Brett M. Oliphant, John P. Blignaut
-
Patent number: 10893066Abstract: A system, method, and computer program product are provided for a database associating a plurality of device vulnerabilities to which computing devices can be subject with a plurality of remediation techniques that collectively remediate the plurality of device vulnerabilities. Each of the device vulnerabilities is associated with at least one remediation technique. Each remediation technique associated with a particular device vulnerability remediates that particular vulnerability. Further, each remediation technique has a remediation type are selected from the type group consisting of patch, policy setting, and configuration option. Still yet, a first one of the device vulnerabilities is associated with at least two alternative remediation techniques.Type: GrantFiled: May 30, 2017Date of Patent: January 12, 2021Assignee: SecurityProfiling, LLCInventors: Brett M. Oliphant, John P. Blignaut
-
Patent number: 10873595Abstract: An apparatus is provided including at least one platform; an intrusion prevention system configured to communicative couple with the at least one platform; a firewall configured to communicative couple with the at least one platform; at least one first data storage configured to communicative couple with the at least one platform; and at least one second data storage configured to communicative couple with the at least one platform. The at least one platform is configured to perform a plurality of operations that collective protect one or more networked devices.Type: GrantFiled: January 13, 2020Date of Patent: December 22, 2020Assignee: SecurityProfiling, LLCInventors: Brett M. Oliphant, John P. Blignaut
-
Patent number: 10609063Abstract: A system, method, and computer program product are provided for a database associating a plurality of device vulnerabilities to which computing devices can be subject with a plurality of remediation techniques that collectively remediate the plurality of device vulnerabilities. Each of the device vulnerabilities is associated with at least one remediation technique. Each remediation technique associated with a particular device vulnerability remediates that particular vulnerability. Further, each remediation technique has a remediation type are selected from the type group consisting of patch, policy setting, and configuration option. Still yet, a first one of the device vulnerabilities is associated with at least two alternative remediation techniques.Type: GrantFiled: May 30, 2017Date of Patent: March 31, 2020Assignee: SecurityProfiling, LLCInventors: Brett M. Oliphant, John P. Blignaut
-
Patent number: 10547631Abstract: An apparatus is provided including at least one platform; an intrusion prevention system configured to communicative couple with the at least one platform; a firewall configured to communicative couple with the at least one platform; at least one first data storage configured to communicative couple with the at least one platform; and at least one second data storage configured to communicative couple with the at least one platform. The at least one platform is configured to perform a plurality of operations that collective protect one or more networked devices, by causing a reporting of at least a first occurrence based on a determination that the first occurrence includes at least one first occurrence packet that is capable of taking advantage of at least one of the actual vulnerability to which the at least one networked device is actually vulnerable.Type: GrantFiled: May 30, 2017Date of Patent: January 28, 2020Assignee: SecurityProfiling, LLCInventors: Brett M. Oliphant, John P. Blignaut
-
Patent number: 10154055Abstract: An apparatus is provided including at least one platform; an intrusion prevention system configured to communicative couple with the at least one platform; a firewall configured to communicative couple with the at least one platform; at least one first data storage configured to communicative couple with the at least one platform; and at least one second data storage configured to communicative couple with the at least one platform. The at least one platform is configured to perform a plurality of operations that collective protect one or more networked devices.Type: GrantFiled: August 24, 2015Date of Patent: December 11, 2018Assignee: SecurityProfiling, LLCInventors: Brett M. Oliphant, John P. Blignaut
-
Patent number: 10104110Abstract: A system, method, and computer program product are provided for identifying a first and second occurrence in connection with at least one of the networked device. In use, it is possible that it is determined that the at least one actual vulnerability of the at least one networked device is capable of being taken advantage of by the first occurrence identified in connection with the at least one networked device. Further, it is also possible that it is determined that the at least one actual vulnerability of the at least one networked device is not capable of being taken advantage of by the second occurrence identified in connection with the at least one networked device. To this end, the first occurrence and the second occurrence are reported differently.Type: GrantFiled: December 28, 2015Date of Patent: October 16, 2018Assignee: SecurityProfiling, LLCInventors: Brett M. Oliphant, John P. Blignaut
-
Patent number: 10075466Abstract: An apparatus is provided including at least one platform; an intrusion prevention system configured to communicative couple with the at least one platform; a firewall configured to communicative couple with the at least one platform; at least one first data storage configured to communicative couple with the at least one platform; and at least one second data storage configured to communicative couple with the at least one platform. The at least one platform is configured to perform a plurality of operations that collective protect one or more networked devices, by causing a reporting of at least a first occurrence based on a determination that the first occurrence includes at least one first occurrence packet that is capable of taking advantage of at least one of the actual vulnerability to which the at least one networked device is actually vulnerable.Type: GrantFiled: May 30, 2017Date of Patent: September 11, 2018Assignee: SecurityProfiling, LLCInventors: Brett M. Oliphant, John P. Blignaut
-
Patent number: 10050988Abstract: A system, method, and computer program product are provided for a database associating a plurality of device vulnerabilities to which computing devices can be subject with a plurality of remediation techniques that collectively remediate the plurality of device vulnerabilities. Each of the device vulnerabilities is associated with at least one remediation technique. Each remediation technique associated with a particular device vulnerability remediates that particular vulnerability. Further, each remediation technique has a remediation type are selected from the type group consisting of patch, policy setting, and configuration option. Still yet, a first one of the device vulnerabilities is associated with at least two alternative remediation techniques.Type: GrantFiled: August 3, 2015Date of Patent: August 14, 2018Assignee: SecurityProfiling, LLCInventors: Brett M. Oliphant, John P. Blignaut
-
Patent number: 10021124Abstract: A system, method, and computer program product are provided for a database associating a plurality of device vulnerabilities to which computing devices can be subject with a plurality of remediation techniques that collectively remediate the plurality of device vulnerabilities. Each of the device vulnerabilities is associated with at least one remediation technique. Each remediation technique associated with a particular device vulnerability remediates that particular vulnerability. Further, each remediation technique has a remediation type are selected from the type group consisting of patch, policy setting, and configuration option. Still yet, a first one of the device vulnerabilities is associated with at least two alternative remediation techniques.Type: GrantFiled: August 3, 2015Date of Patent: July 10, 2018Assignee: SecurityProfiling, LLCInventors: Brett M. Oliphant, John P. Blignaut
-
Publication number: 20160294861Abstract: A system, method, and computer program product are provided for identifying a first and second occurrence in connection with at least one of the networked device. In use, it is possible that it is determined that the at least one actual vulnerability of the at least one networked device is capable of being taken advantage of by the first occurrence identified in connection with the at least one networked device. Further, it is also possible that it is determined that the at least one actual vulnerability of the at least one networked device is not capable of being taken advantage of by the second occurrence identified in connection with the at least one networked device. To this end, the first occurrence and the second occurrence are reported differently.Type: ApplicationFiled: December 28, 2015Publication date: October 6, 2016Inventors: Brett M. Oliphant, John P. Blignaut
-
Patent number: 9350752Abstract: A system, method, and computer program product are provided for receiving actual vulnerability information from at least one first data storage that is generated utilizing potential vulnerability information from at least one second data storage. The actual vulnerability information is generated utilizing the potential vulnerability information. Further, the actual vulnerability information from the at least one first data storage is capable of identifying the plurality of actual vulnerabilities to which the plurality of networked computers are actually vulnerable. In use, an action may be caused to be automatically completed in connection with at least one of the networked devices.Type: GrantFiled: September 28, 2014Date of Patent: May 24, 2016Assignee: SecurityProfiling, LLCInventors: Brett M. Oliphant, John P. Blignaut
-
Publication number: 20160094576Abstract: A system, method, and computer program product are provided for accessing at least one data storage identifying a plurality of mitigation techniques that mitigate effects of attacks that take advantage of vulnerabilities, such that: each mitigation technique is capable of mitigating an effect of an attack that takes advantage of a corresponding vulnerability, and each mitigation technique has a mitigation type including at least one of a patch, a policy setting, or a configuration option. Further, the system, method, and computer program product are provided for displaying at least one mitigation technique in connection with at least one vulnerability to be applied as an attack response, and receiving user input for selecting the at least one mitigation technique in connection with the at least one vulnerability.Type: ApplicationFiled: August 24, 2015Publication date: March 31, 2016Inventors: Brett M. Oliphant, John P. Blignaut
-
Publication number: 20160088010Abstract: An apparatus is provided including at least one platform; an intrusion prevention system configured to communicative couple with the at least one platform; a firewall configured to communicative couple with the at least one platform; at least one first data storage configured to communicative couple with the at least one platform; and at least one second data storage configured to communicative couple with the at least one platform. The at least one platform is configured to perform a plurality of operations that collective protect one or more networked devices.Type: ApplicationFiled: August 24, 2015Publication date: March 24, 2016Inventors: Brett M. Oliphant, John P. Blignaut
-
Publication number: 20160036852Abstract: A system, method, and computer program product are provided for a database associating a plurality of device vulnerabilities to which computing devices can be subject with a plurality of remediation techniques that collectively remediate the plurality of device vulnerabilities. Each of the device vulnerabilities is associated with at least one remediation technique. Each remediation technique associated with a particular device vulnerability remediates that particular vulnerability. Further, each remediation technique has a remediation type are selected from the type group consisting of patch, policy setting, and configuration option. Still yet, a first one of the device vulnerabilities is associated with at least two alternative remediation techniques.Type: ApplicationFiled: August 3, 2015Publication date: February 4, 2016Inventors: Brett M. Oliphant, John P. Blignaut
-
Publication number: 20160036846Abstract: A system, method, and computer program product are provided for a database associating a plurality of device vulnerabilities to which computing devices can be subject with a plurality of remediation techniques that collectively remediate the plurality of device vulnerabilities. Each of the device vulnerabilities is associated with at least one remediation technique. Each remediation technique associated with a particular device vulnerability remediates that particular vulnerability. Further, each remediation technique has a remediation type are selected from the type group consisting of patch, policy setting, and configuration option. Still yet, a first one of the device vulnerabilities is associated with at least two alternative remediation techniques.Type: ApplicationFiled: August 3, 2015Publication date: February 4, 2016Inventors: Brett M. Oliphant, John P. Blignaut
-
Patent number: 9225686Abstract: A system, method, and computer program product are provided for identifying a first and second occurrence in connection with at least one of the networked device. In use, it is possible that it is determined that the at least one actual vulnerability of the at least one networked device is capable of being taken advantage of by the first occurrence identified in connection with the at least one networked device. Further, it is also possible that it is determined that the at least one actual vulnerability of the at least one networked device is not capable of being taken advantage of by the second occurrence identified in connection with the at least one networked device. To this end, the first occurrence and the second occurrence are reported differently.Type: GrantFiled: March 16, 2015Date of Patent: December 29, 2015Assignee: SecurityProfiling, LLCInventors: Brett M. Oliphant, John P. Blignaut
-
Publication number: 20150271142Abstract: A system, method, and computer program product are provided for identifying a first and second occurrence in connection with at least one of the networked device. In use, it is possible that it is determined that the at least one actual vulnerability of the at least one networked device is capable of being taken advantage of by the first occurrence identified in connection with the at least one networked device. Further, it is also possible that it is determined that the at least one actual vulnerability of the at least one networked device is not capable of being taken advantage of by the second occurrence identified in connection with the at least one networked device. To this end, the first occurrence and the second occurrence are reported differently.Type: ApplicationFiled: March 16, 2015Publication date: September 24, 2015Inventors: Brett M. Oliphant, John P. Blignaut
-
Patent number: 9118711Abstract: A system, method, and computer program product are provided for displaying, via at least one user interface, a plurality of techniques of different technique types including a first technique for setting or modifying a policy for mitigating a first occurrence, and a second technique for dropping packets in connection with at least one networked device for mitigating the first occurrence. Based on user input selecting the first technique for setting or modifying the policy for mitigating the first occurrence, the first technique is automatically applied for setting or modifying the policy for mitigating the first occurrence. Based on the user input selecting the second technique for dropping packets in connection with the at least one networked device for mitigating the first occurrence, the second technique is applied for dropping packets in connection with the at least one networked device for mitigating the first occurrence.Type: GrantFiled: September 29, 2014Date of Patent: August 25, 2015Assignee: SecurityProfiling, LLCInventors: Brett M. Oliphant, John P. Blignaut