Patents by Inventor John P. Blignaut

John P. Blignaut has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 11632388
    Abstract: An apparatus is provided including at least one platform; an intrusion prevention system configured to communicative couple with the at least one platform; a firewall configured to communicative couple with the at least one platform; at least one first data storage configured to communicative couple with the at least one platform; and at least one second data storage configured to communicative couple with the at least one platform. The at least one platform is configured to perform a plurality of operations that collective protect one or more networked devices.
    Type: Grant
    Filed: November 13, 2020
    Date of Patent: April 18, 2023
    Assignee: SecurityProfiling, LLC
    Inventors: Brett M. Oliphant, John P. Blignaut
  • Patent number: 11310262
    Abstract: An apparatus is provided including at least one platform; an intrusion prevention system configured to communicative couple with the at least one platform; a firewall configured to communicative couple with the at least one platform; at least one first data storage configured to communicative couple with the at least one platform; and at least one second data storage configured to communicative couple with the at least one platform. The at least one platform is configured to perform a plurality of operations that collective protect one or more networked devices.
    Type: Grant
    Filed: October 29, 2021
    Date of Patent: April 19, 2022
    Assignee: Security Profiling, LLC
    Inventors: Brett M. Oliphant, John P. Blignaut
  • Patent number: 10893066
    Abstract: A system, method, and computer program product are provided for a database associating a plurality of device vulnerabilities to which computing devices can be subject with a plurality of remediation techniques that collectively remediate the plurality of device vulnerabilities. Each of the device vulnerabilities is associated with at least one remediation technique. Each remediation technique associated with a particular device vulnerability remediates that particular vulnerability. Further, each remediation technique has a remediation type are selected from the type group consisting of patch, policy setting, and configuration option. Still yet, a first one of the device vulnerabilities is associated with at least two alternative remediation techniques.
    Type: Grant
    Filed: May 30, 2017
    Date of Patent: January 12, 2021
    Assignee: SecurityProfiling, LLC
    Inventors: Brett M. Oliphant, John P. Blignaut
  • Patent number: 10873595
    Abstract: An apparatus is provided including at least one platform; an intrusion prevention system configured to communicative couple with the at least one platform; a firewall configured to communicative couple with the at least one platform; at least one first data storage configured to communicative couple with the at least one platform; and at least one second data storage configured to communicative couple with the at least one platform. The at least one platform is configured to perform a plurality of operations that collective protect one or more networked devices.
    Type: Grant
    Filed: January 13, 2020
    Date of Patent: December 22, 2020
    Assignee: SecurityProfiling, LLC
    Inventors: Brett M. Oliphant, John P. Blignaut
  • Patent number: 10609063
    Abstract: A system, method, and computer program product are provided for a database associating a plurality of device vulnerabilities to which computing devices can be subject with a plurality of remediation techniques that collectively remediate the plurality of device vulnerabilities. Each of the device vulnerabilities is associated with at least one remediation technique. Each remediation technique associated with a particular device vulnerability remediates that particular vulnerability. Further, each remediation technique has a remediation type are selected from the type group consisting of patch, policy setting, and configuration option. Still yet, a first one of the device vulnerabilities is associated with at least two alternative remediation techniques.
    Type: Grant
    Filed: May 30, 2017
    Date of Patent: March 31, 2020
    Assignee: SecurityProfiling, LLC
    Inventors: Brett M. Oliphant, John P. Blignaut
  • Patent number: 10547631
    Abstract: An apparatus is provided including at least one platform; an intrusion prevention system configured to communicative couple with the at least one platform; a firewall configured to communicative couple with the at least one platform; at least one first data storage configured to communicative couple with the at least one platform; and at least one second data storage configured to communicative couple with the at least one platform. The at least one platform is configured to perform a plurality of operations that collective protect one or more networked devices, by causing a reporting of at least a first occurrence based on a determination that the first occurrence includes at least one first occurrence packet that is capable of taking advantage of at least one of the actual vulnerability to which the at least one networked device is actually vulnerable.
    Type: Grant
    Filed: May 30, 2017
    Date of Patent: January 28, 2020
    Assignee: SecurityProfiling, LLC
    Inventors: Brett M. Oliphant, John P. Blignaut
  • Patent number: 10154055
    Abstract: An apparatus is provided including at least one platform; an intrusion prevention system configured to communicative couple with the at least one platform; a firewall configured to communicative couple with the at least one platform; at least one first data storage configured to communicative couple with the at least one platform; and at least one second data storage configured to communicative couple with the at least one platform. The at least one platform is configured to perform a plurality of operations that collective protect one or more networked devices.
    Type: Grant
    Filed: August 24, 2015
    Date of Patent: December 11, 2018
    Assignee: SecurityProfiling, LLC
    Inventors: Brett M. Oliphant, John P. Blignaut
  • Patent number: 10104110
    Abstract: A system, method, and computer program product are provided for identifying a first and second occurrence in connection with at least one of the networked device. In use, it is possible that it is determined that the at least one actual vulnerability of the at least one networked device is capable of being taken advantage of by the first occurrence identified in connection with the at least one networked device. Further, it is also possible that it is determined that the at least one actual vulnerability of the at least one networked device is not capable of being taken advantage of by the second occurrence identified in connection with the at least one networked device. To this end, the first occurrence and the second occurrence are reported differently.
    Type: Grant
    Filed: December 28, 2015
    Date of Patent: October 16, 2018
    Assignee: SecurityProfiling, LLC
    Inventors: Brett M. Oliphant, John P. Blignaut
  • Patent number: 10075466
    Abstract: An apparatus is provided including at least one platform; an intrusion prevention system configured to communicative couple with the at least one platform; a firewall configured to communicative couple with the at least one platform; at least one first data storage configured to communicative couple with the at least one platform; and at least one second data storage configured to communicative couple with the at least one platform. The at least one platform is configured to perform a plurality of operations that collective protect one or more networked devices, by causing a reporting of at least a first occurrence based on a determination that the first occurrence includes at least one first occurrence packet that is capable of taking advantage of at least one of the actual vulnerability to which the at least one networked device is actually vulnerable.
    Type: Grant
    Filed: May 30, 2017
    Date of Patent: September 11, 2018
    Assignee: SecurityProfiling, LLC
    Inventors: Brett M. Oliphant, John P. Blignaut
  • Patent number: 10050988
    Abstract: A system, method, and computer program product are provided for a database associating a plurality of device vulnerabilities to which computing devices can be subject with a plurality of remediation techniques that collectively remediate the plurality of device vulnerabilities. Each of the device vulnerabilities is associated with at least one remediation technique. Each remediation technique associated with a particular device vulnerability remediates that particular vulnerability. Further, each remediation technique has a remediation type are selected from the type group consisting of patch, policy setting, and configuration option. Still yet, a first one of the device vulnerabilities is associated with at least two alternative remediation techniques.
    Type: Grant
    Filed: August 3, 2015
    Date of Patent: August 14, 2018
    Assignee: SecurityProfiling, LLC
    Inventors: Brett M. Oliphant, John P. Blignaut
  • Patent number: 10021124
    Abstract: A system, method, and computer program product are provided for a database associating a plurality of device vulnerabilities to which computing devices can be subject with a plurality of remediation techniques that collectively remediate the plurality of device vulnerabilities. Each of the device vulnerabilities is associated with at least one remediation technique. Each remediation technique associated with a particular device vulnerability remediates that particular vulnerability. Further, each remediation technique has a remediation type are selected from the type group consisting of patch, policy setting, and configuration option. Still yet, a first one of the device vulnerabilities is associated with at least two alternative remediation techniques.
    Type: Grant
    Filed: August 3, 2015
    Date of Patent: July 10, 2018
    Assignee: SecurityProfiling, LLC
    Inventors: Brett M. Oliphant, John P. Blignaut
  • Publication number: 20160294861
    Abstract: A system, method, and computer program product are provided for identifying a first and second occurrence in connection with at least one of the networked device. In use, it is possible that it is determined that the at least one actual vulnerability of the at least one networked device is capable of being taken advantage of by the first occurrence identified in connection with the at least one networked device. Further, it is also possible that it is determined that the at least one actual vulnerability of the at least one networked device is not capable of being taken advantage of by the second occurrence identified in connection with the at least one networked device. To this end, the first occurrence and the second occurrence are reported differently.
    Type: Application
    Filed: December 28, 2015
    Publication date: October 6, 2016
    Inventors: Brett M. Oliphant, John P. Blignaut
  • Patent number: 9350752
    Abstract: A system, method, and computer program product are provided for receiving actual vulnerability information from at least one first data storage that is generated utilizing potential vulnerability information from at least one second data storage. The actual vulnerability information is generated utilizing the potential vulnerability information. Further, the actual vulnerability information from the at least one first data storage is capable of identifying the plurality of actual vulnerabilities to which the plurality of networked computers are actually vulnerable. In use, an action may be caused to be automatically completed in connection with at least one of the networked devices.
    Type: Grant
    Filed: September 28, 2014
    Date of Patent: May 24, 2016
    Assignee: SecurityProfiling, LLC
    Inventors: Brett M. Oliphant, John P. Blignaut
  • Publication number: 20160094576
    Abstract: A system, method, and computer program product are provided for accessing at least one data storage identifying a plurality of mitigation techniques that mitigate effects of attacks that take advantage of vulnerabilities, such that: each mitigation technique is capable of mitigating an effect of an attack that takes advantage of a corresponding vulnerability, and each mitigation technique has a mitigation type including at least one of a patch, a policy setting, or a configuration option. Further, the system, method, and computer program product are provided for displaying at least one mitigation technique in connection with at least one vulnerability to be applied as an attack response, and receiving user input for selecting the at least one mitigation technique in connection with the at least one vulnerability.
    Type: Application
    Filed: August 24, 2015
    Publication date: March 31, 2016
    Inventors: Brett M. Oliphant, John P. Blignaut
  • Publication number: 20160088010
    Abstract: An apparatus is provided including at least one platform; an intrusion prevention system configured to communicative couple with the at least one platform; a firewall configured to communicative couple with the at least one platform; at least one first data storage configured to communicative couple with the at least one platform; and at least one second data storage configured to communicative couple with the at least one platform. The at least one platform is configured to perform a plurality of operations that collective protect one or more networked devices.
    Type: Application
    Filed: August 24, 2015
    Publication date: March 24, 2016
    Inventors: Brett M. Oliphant, John P. Blignaut
  • Publication number: 20160036852
    Abstract: A system, method, and computer program product are provided for a database associating a plurality of device vulnerabilities to which computing devices can be subject with a plurality of remediation techniques that collectively remediate the plurality of device vulnerabilities. Each of the device vulnerabilities is associated with at least one remediation technique. Each remediation technique associated with a particular device vulnerability remediates that particular vulnerability. Further, each remediation technique has a remediation type are selected from the type group consisting of patch, policy setting, and configuration option. Still yet, a first one of the device vulnerabilities is associated with at least two alternative remediation techniques.
    Type: Application
    Filed: August 3, 2015
    Publication date: February 4, 2016
    Inventors: Brett M. Oliphant, John P. Blignaut
  • Publication number: 20160036846
    Abstract: A system, method, and computer program product are provided for a database associating a plurality of device vulnerabilities to which computing devices can be subject with a plurality of remediation techniques that collectively remediate the plurality of device vulnerabilities. Each of the device vulnerabilities is associated with at least one remediation technique. Each remediation technique associated with a particular device vulnerability remediates that particular vulnerability. Further, each remediation technique has a remediation type are selected from the type group consisting of patch, policy setting, and configuration option. Still yet, a first one of the device vulnerabilities is associated with at least two alternative remediation techniques.
    Type: Application
    Filed: August 3, 2015
    Publication date: February 4, 2016
    Inventors: Brett M. Oliphant, John P. Blignaut
  • Patent number: 9225686
    Abstract: A system, method, and computer program product are provided for identifying a first and second occurrence in connection with at least one of the networked device. In use, it is possible that it is determined that the at least one actual vulnerability of the at least one networked device is capable of being taken advantage of by the first occurrence identified in connection with the at least one networked device. Further, it is also possible that it is determined that the at least one actual vulnerability of the at least one networked device is not capable of being taken advantage of by the second occurrence identified in connection with the at least one networked device. To this end, the first occurrence and the second occurrence are reported differently.
    Type: Grant
    Filed: March 16, 2015
    Date of Patent: December 29, 2015
    Assignee: SecurityProfiling, LLC
    Inventors: Brett M. Oliphant, John P. Blignaut
  • Publication number: 20150271142
    Abstract: A system, method, and computer program product are provided for identifying a first and second occurrence in connection with at least one of the networked device. In use, it is possible that it is determined that the at least one actual vulnerability of the at least one networked device is capable of being taken advantage of by the first occurrence identified in connection with the at least one networked device. Further, it is also possible that it is determined that the at least one actual vulnerability of the at least one networked device is not capable of being taken advantage of by the second occurrence identified in connection with the at least one networked device. To this end, the first occurrence and the second occurrence are reported differently.
    Type: Application
    Filed: March 16, 2015
    Publication date: September 24, 2015
    Inventors: Brett M. Oliphant, John P. Blignaut
  • Patent number: 9118711
    Abstract: A system, method, and computer program product are provided for displaying, via at least one user interface, a plurality of techniques of different technique types including a first technique for setting or modifying a policy for mitigating a first occurrence, and a second technique for dropping packets in connection with at least one networked device for mitigating the first occurrence. Based on user input selecting the first technique for setting or modifying the policy for mitigating the first occurrence, the first technique is automatically applied for setting or modifying the policy for mitigating the first occurrence. Based on the user input selecting the second technique for dropping packets in connection with the at least one networked device for mitigating the first occurrence, the second technique is applied for dropping packets in connection with the at least one networked device for mitigating the first occurrence.
    Type: Grant
    Filed: September 29, 2014
    Date of Patent: August 25, 2015
    Assignee: SecurityProfiling, LLC
    Inventors: Brett M. Oliphant, John P. Blignaut