Patents by Inventor John P. Blignaut

John P. Blignaut has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 9117069
    Abstract: A security information management system is described, wherein client-side devices preferably collect and monitor information describing the operating system, software, and patches installed on the device(s), as well as configuration thereof A database of this information is maintained, along with data describing vulnerabilities of available software and associated remediation techniques available for it. The system exposes an API to support security-related decisions by other applications. For example, an intrusion detection system (IDS) accesses the database to determine whether an actual threat exists and should be (or has been) blocked.
    Type: Grant
    Filed: December 21, 2013
    Date of Patent: August 25, 2015
    Assignee: SecurityProfiling, LLC
    Inventors: Brett M. Oliphant, John P. Blignaut
  • Patent number: 9118708
    Abstract: A system, method, and computer program product are provided for a database associating a plurality of device vulnerabilities to which computing devices can be subject with a plurality of remediation techniques that collectively remediate the plurality of device vulnerabilities. Each of the device vulnerabilities is associated with at least one remediation technique. Each remediation technique associated with a particular device vulnerability remediates that particular vulnerability. Further, each remediation technique has a remediation type are selected from the type group consisting of patch, policy setting, and configuration option. Still yet, a first one of the device vulnerabilities is associated with at least two alternative remediation techniques.
    Type: Grant
    Filed: September 28, 2014
    Date of Patent: August 25, 2015
    Assignee: SecurityProfiling, LLC
    Inventors: Brett M. Oliphant, John P. Blignaut
  • Patent number: 9118709
    Abstract: A system, method, and computer program product are provided including client and server code configured to cooperate, resulting in display, via at least one user interface, of a plurality of user options for causing different actions of different types in connection with at least one of the networked devices that is actually vulnerable to at least one of a plurality of actual vulnerabilities for at least mitigating an occurrence. The user options include a first user option for causing a first action for dropping packets in connection with the at least one networked device for mitigating the occurrence and a second user option for causing a second action for installation of a patch on the at least one networked device for removing the at least one vulnerability from the at least one networked device.
    Type: Grant
    Filed: September 28, 2014
    Date of Patent: August 25, 2015
    Assignee: SecurityProfiling, LLC
    Inventors: Brett M. Oliphant, John P. Blignaut
  • Patent number: 9118710
    Abstract: A system, method, and computer program product are provided for identifying operating system information associated with at least one of a plurality of networked devices, and an occurrence in connection with the at least one of the networked device. It is also determined whether at least one vulnerability capable being exploited by the occurrence is relevant to the at least one networked device based on the operating system information. To this send, the occurrence is reported in a first manner, if it is determined that the at least one vulnerability capable being exploited by the occurrence is relevant to the at least one networked device based on the operating system information. Further, the occurrence is reported in a second manner different from the first manner, if it is determined that the at least one vulnerability capable being exploited by the occurrence is not relevant to the at least one networked device based on the operating system information.
    Type: Grant
    Filed: September 29, 2014
    Date of Patent: August 25, 2015
    Assignee: SecurityProfiling, LLC
    Inventors: Brett M. Oliphant, John P. Blignaut
  • Patent number: 9100431
    Abstract: A system, method, and computer program product are provided for a database associating a plurality of device vulnerabilities to which computing devices can be subject with a plurality of remediation techniques that collectively remediate the plurality of device vulnerabilities. Each of the device vulnerabilities is associated with at least one remediation technique. Each remediation technique associated with a particular device vulnerability remediates that particular vulnerability. Further, each remediation technique has a remediation type are selected from the type group consisting of patch, policy setting, and configuration option. Still yet, a first one of the device vulnerabilities is associated with at least two alternative remediation techniques.
    Type: Grant
    Filed: September 28, 2014
    Date of Patent: August 4, 2015
    Assignee: SecurityProfiling, LLC
    Inventors: Brett M. Oliphant, John P. Blignaut
  • Patent number: 8984644
    Abstract: A system, method, and computer program product are provided for identifying a first and second occurrence in connection with at least one of the networked device. In use, it is possible that it is determined that the at least one actual vulnerability of the at least one networked device is capable of being taken advantage of by the first occurrence identified in connection with the at least one networked device. Further, it is also possible that it is determined that the at least one actual vulnerability of the at least one networked device is not capable of being taken advantage of by the second occurrence identified in connection with the at least one networked device. To this end, the first occurrence and the second occurrence are reported differently.
    Type: Grant
    Filed: September 28, 2014
    Date of Patent: March 17, 2015
    Assignee: SecurityProfiling, LLC
    Inventors: Brett M. Oliphant, John P. Blignaut
  • Publication number: 20150040232
    Abstract: A system, method, and computer program product are provided for identifying a first and second occurrence in connection with at least one of the networked device. In use, it is possible that it is determined that the at least one actual vulnerability of the at least one networked device is capable of being taken advantage of by the first occurrence identified in connection with the at least one networked device. Further, it is also possible that it is determined that the at least one actual vulnerability of the at least one networked device is not capable of being taken advantage of by the second occurrence identified in connection with the at least one networked device. To this end, the first occurrence and the second occurrence are reported differently.
    Type: Application
    Filed: September 28, 2014
    Publication date: February 5, 2015
    Inventors: Brett M. Oliphant, John P. Blignaut
  • Publication number: 20150040231
    Abstract: A system, method, and computer program product are provided for a database associating a plurality of device vulnerabilities to which computing devices can be subject with a plurality of remediation techniques that collectively remediate the plurality of device vulnerabilities. Each of the device vulnerabilities is associated with at least one remediation technique. Each remediation technique associated with a particular device vulnerability remediates that particular vulnerability. Further, each remediation technique has a remediation type are selected from the type group consisting of patch, policy setting, and configuration option. Still yet, a first one of the device vulnerabilities is associated with at least two alternative remediation techniques.
    Type: Application
    Filed: September 28, 2014
    Publication date: February 5, 2015
    Inventors: Brett M. Oliphant, John P. Blignaut
  • Publication number: 20150040230
    Abstract: A system, method, and computer program product are provided for a database associating a plurality of device vulnerabilities to which computing devices can be subject with a plurality of remediation techniques that collectively remediate the plurality of device vulnerabilities. Each of the device vulnerabilities is associated with at least one remediation technique. Each remediation technique associated with a particular device vulnerability remediates that particular vulnerability. Further, each remediation technique has a remediation type are selected from the type group consisting of patch, policy setting, and configuration option. Still yet, a first one of the device vulnerabilities is associated with at least two alternative remediation techniques.
    Type: Application
    Filed: September 28, 2014
    Publication date: February 5, 2015
    Inventors: Brett M. Oliphant, John P. Blignaut
  • Publication number: 20150040233
    Abstract: A system, method, and computer program product are provided including a vulnerability component and a software developer kit (SDK) for allowing access to the vulnerability component via an application program interface (API) for causing an action to be automatically completed in connection with at least one networked device that is actually vulnerable to at least one actual vulnerability.
    Type: Application
    Filed: September 29, 2014
    Publication date: February 5, 2015
    Inventors: Brett M. Oliphant, John P. Blignaut
  • Publication number: 20150033350
    Abstract: A system, method, and computer program product are provided including at least one server including at least one first data storage that stores potential vulnerability information describing a plurality of potential vulnerabilities. Also included is a vulnerability component including at least one second data storage for storing actual vulnerability information, and an intrusion prevention component operable for a variety of functionality.
    Type: Application
    Filed: September 28, 2014
    Publication date: January 29, 2015
    Inventors: Brett M. Oliphant, John P. Blignaut
  • Publication number: 20150033348
    Abstract: A system, method, and computer program product are provided for a database associating a plurality of device vulnerabilities to which computing devices can be subject with a plurality of remediation techniques that collectively remediate the plurality of device vulnerabilities. Each of the device vulnerabilities is associated with at least one remediation technique. Each remediation technique associated with a particular device vulnerability remediates that particular vulnerability. Further, each remediation technique has a remediation type are selected from the type group consisting of patch, policy setting, and configuration option. Still yet, a first one of the device vulnerabilities is associated with at least two alternative remediation techniques.
    Type: Application
    Filed: September 28, 2014
    Publication date: January 29, 2015
    Inventors: Brett M. Oliphant, John P. Blignaut
  • Publication number: 20150033287
    Abstract: A system, method, and computer program product are provided for displaying, via at least one user interface, a plurality of techniques of different technique types including a first technique for setting or modifying a policy for mitigating a first occurrence, and a second technique for dropping packets in connection with at least one networked device for mitigating the first occurrence. Based on user input selecting the first technique for setting or modifying the policy for mitigating the first occurrence, the first technique is automatically applied for setting or modifying the policy for mitigating the first occurrence. Based on the user input selecting the second technique for dropping packets in connection with the at least one networked device for mitigating the first occurrence, the second technique is applied for dropping packets in connection with the at least one networked device for mitigating the first occurrence.
    Type: Application
    Filed: September 29, 2014
    Publication date: January 29, 2015
    Inventors: Brett M. Oliphant, John P. Blignaut
  • Publication number: 20150033352
    Abstract: A system, method, and computer program product are provided for identifying operating system information associated with at least one of a plurality of networked devices, and an occurrence in connection with the at least one of the networked device. It is also determined whether at least one vulnerability capable being exploited by the occurrence is relevant to the at least one networked device based on the operating system information. To this send, the occurrence is reported in a first manner, if it is determined that the at least one vulnerability capable being exploited by the occurrence is relevant to the at least one networked device based on the operating system information. Further, the occurrence is reported in a second manner different from the first manner, if it is determined that the at least one vulnerability capable being exploited by the occurrence is not relevant to the at least one networked device based on the operating system information.
    Type: Application
    Filed: September 29, 2014
    Publication date: January 29, 2015
    Inventors: Brett M. Oliphant, John P. Blignaut
  • Publication number: 20150033349
    Abstract: A system, method, and computer program product are provided for receiving actual vulnerability information from at least one first data storage that is generated utilizing potential vulnerability information from at least one second data storage. The actual vulnerability information is generated utilizing the potential vulnerability information. Further, the actual vulnerability information from the at least one first data storage is capable of identifying the plurality of actual vulnerabilities to which the plurality of networked computers are actually vulnerable. In use, an action may be caused to be automatically completed in connection with at least one of the networked devices.
    Type: Application
    Filed: September 28, 2014
    Publication date: January 29, 2015
    Inventors: Brett M. Oliphant, John P. Blignaut
  • Publication number: 20150033353
    Abstract: A system, method, and computer program product are provided for determining whether an operating system of at least one networked device is actually vulnerable to at least one actual operating system vulnerability based on operating system configuration information. In response to determining that the operating system of the at least one networked device is actually vulnerable to the at least one actual operating system vulnerability, automatic completion of installation of an operating system patch on the operating system of the at least one networked device is caused, utilizing the client code, for removing the at least one actual operating system vulnerability from the operating system of the at least one networked device.
    Type: Application
    Filed: September 29, 2014
    Publication date: January 29, 2015
    Inventors: Brett M. Oliphant, John P. Blignaut
  • Publication number: 20150033351
    Abstract: A system, method, and computer program product are provided including client and server code configured to cooperate, resulting in display, via at least one user interface, of a plurality of user options for causing different actions of different types in connection with at least one of the networked devices that is actually vulnerable to at least one of a plurality of actual vulnerabilities for at least mitigating an occurrence. The user options include a first user option for causing a first action for dropping packets in connection with the at least one networked device for mitigating the occurrence and a second user option for causing a second action for installation of a patch on the at least one networked device for removing the at least one vulnerability from the at least one networked device.
    Type: Application
    Filed: September 28, 2014
    Publication date: January 29, 2015
    Inventors: Brett M. Oliphant, John P. Blignaut
  • Publication number: 20150033323
    Abstract: A system, method, and computer program product are provided for displaying, via at least one user interface, at least one option for dropping packets in connection with the at least one networked device for attack prevention. In use, it is determined whether an occurrence in connection with the at least one networked device is capable of taking advantage of the at least one actual vulnerability to which the at least one networked device is actually vulnerable. Further, based on the user input, packets are dropped in connection with the occurrence in immediate response to the detection thereof, to prevent an attack prior to completion of patch installation.
    Type: Application
    Filed: September 29, 2014
    Publication date: January 29, 2015
    Inventors: Brett M. Oliphant, John P. Blignaut