Patents by Inventor John S. Flowers
John S. Flowers has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 10862923Abstract: A digital security threat management system is disclosed. The system detects the presence of a computing system, on a network, that has been compromised by an undetected and/or unknown digital security threat. The digital security threat management system recognizes characteristic emanations from a computer system that has been compromised. Because the characteristic emanations that result from a known threat can be the same as the characteristic emanations that result from an undetected and/or unknown threat, the digital security threat management system can learn to detect a computing system that has been compromised by an unknown threat if the security threat management system recognizes characteristic emanations from a previous attack, based on a known threat, of the computing system. In this way, the system can detect the presence of a compromised computing system, even if the cause of the compromise remains undetected and/or unknown. Appropriate remedial action may be taken upon detection.Type: GrantFiled: December 27, 2018Date of Patent: December 8, 2020Assignee: SecureSky, Inc.Inventors: John S. Flowers, Ridgely C. Evers
-
Patent number: 10701027Abstract: A self-organizing distributed network architecture is described. An example method includes, by a network node, sending via a network gateway node a DNS lookup request to a DNS service. The DNS lookup request comprises a string that at least includes a MAC address of the network gateway node that is used by the DNS service to identify a network address for the network node to access the network service of interest. The method further includes receiving via the network gateway node a DNS lookup response from the DNS service. The DNS lookup response comprises the network address for the network node to access the network service of interest. The method further includes accessing the network service of interest from another network node in the network system that is addressable by the received network address.Type: GrantFiled: July 2, 2018Date of Patent: June 30, 2020Assignee: SecureSky, Inc.Inventors: John S. Flowers, Martin Quiroga
-
Publication number: 20200014709Abstract: Network activity detectors, such as firewalls, communicate with one another to form a Unified Threat Management System. A first network activity detector sends a request for configuration settings to a second network activity detector. The second network activity detector sends a set of configuration settings in response to the request. The configuration settings include information for detecting digital security threats and/or for responding to detected digital security threats. In this way, configuration settings are propagated from one network activity detector to another so that network activity detectors within a UTMS system are configured consistently, e.g., have up-to-date information for detecting and/or responding to digital security threats.Type: ApplicationFiled: September 17, 2019Publication date: January 9, 2020Inventor: John S. FLOWERS
-
Patent number: 10440038Abstract: Network activity detectors, such as firewalls, communicate with one another to form a Unified Threat Management System. A first network activity detector sends a request for configuration settings to a second network activity detector. The second network activity detector sends a set of configuration settings in response to the request. The configuration settings include information for detecting digital security threats and/or for responding to detected digital security threats. In this way, configuration settings are propagated from one network activity detector to another so that network activity detectors within a UTMS system are configured consistently, e.g., have up-to-date information for detecting and/or responding to digital security threats.Type: GrantFiled: February 5, 2018Date of Patent: October 8, 2019Inventor: John S. Flowers
-
Publication number: 20190297099Abstract: A network activity detection system is trained to detect network activities of interest such as threats by malicious computer data. The training involves distilling the characteristics of known network activities of interest (e.g., intrusion by computer viruses, exploits, worms, or the like) into a minimal set of meta-expressions. At run-time, the network activity detection system combines the minimal set of meta-expressions with efficient computer algorithms for evaluating meta-expressions to detect known network activities of interest, as well as their unknown variants, among an unknown set of network activity. The network activity detection system may produce appropriate responses upon the detection of network activities of interest.Type: ApplicationFiled: June 14, 2019Publication date: September 26, 2019Inventor: John S. FLOWERS
-
Patent number: 10326784Abstract: A network activity detection system is trained to detect network activities of interest such as threats by malicious computer data. The training involves distilling the characteristics of known network activities of interest (e.g., intrusion by computer viruses, exploits, worms, or the like) into a minimal set of meta-expressions. At run-time, the network activity detection system combines the minimal set of meta-expressions with efficient computer algorithms for evaluating meta-expressions to detect known network activities of interest, as well as their unknown variants, among an unknown set of network activity. The network activity detection system may produce appropriate responses upon the detection of network activities of interest.Type: GrantFiled: November 13, 2017Date of Patent: June 18, 2019Assignee: EVENGX, LLCInventor: John S. Flowers
-
Publication number: 20190141007Abstract: A self-organizing distributed network architecture is described. An example method includes, by a network node, sending via a network gateway node a DNS lookup request to a DNS service. The DNS lookup request comprises a string that at least includes a MAC address of the network gateway node that is used by the DNS service to identify a network address for the network node to access the network service of interest. The method further includes receiving via the network gateway node a DNS lookup response from the DNS service. The DNS lookup response comprises the network address for the network node to access the network service of interest. The method further includes accessing the network service of interest from another network node in the network system that is addressable by the received network address.Type: ApplicationFiled: July 2, 2018Publication date: May 9, 2019Applicant: EVENGX, LLCInventors: John S. FLOWERS, Martin QUIROGA
-
Publication number: 20190132335Abstract: A digital security threat management system is disclosed. The system detects the presence of a computing system, on a network, that has been compromised by an undetected and/or unknown digital security threat. The digital security threat management system recognizes characteristic emanations from a computer system that has been compromised. Because the characteristic emanations that result from a known threat can be the same as the characteristic emanations that result from an undetected and/or unknown threat, the digital security threat management system can learn to detect a computing system that has been compromised by an unknown threat if the security threat management system recognizes characteristic emanations from a previous attack, based on a known threat, of the computing system. In this way, the system can detect the presence of a compromised computing system, even if the cause of the compromise remains undetected and/or unknown. Appropriate remedial action may be taken upon detection.Type: ApplicationFiled: December 27, 2018Publication date: May 2, 2019Inventors: John S. FLOWERS, Ridgely C. EVERS
-
Publication number: 20190058716Abstract: Network activity detectors, such as firewalls, communicate with one another to form a Unified Threat Management System. A first network activity detector sends a request for configuration settings to a second network activity detector. The second network activity detector sends a set of configuration settings in response to the request. The configuration settings include information for detecting digital security threats and/or for responding to detected digital security threats. In this way, configuration settings are propagated from one network activity detector to another so that network activity detectors within a UTMS system are configured consistently, e.g., have up-to-date information for detecting and/or responding to digital security threats.Type: ApplicationFiled: February 5, 2018Publication date: February 21, 2019Inventor: JOHN S. FLOWERS
-
Patent number: 10182070Abstract: A digital security threat management system is disclosed. The system detects the presence of a computing system, on a network, that has been compromised by an undetected and/or unknown digital security threat. The digital security threat management system recognizes characteristic emanations from a computer system that has been compromised. Because the characteristic emanations that result from a known threat can be the same as the characteristic emanations that result from an undetected and/or unknown threat, the digital security threat management system can learn to detect a computing system that has been compromised by an unknown threat if the security threat management system recognizes characteristic emanations from a previous attack, based on a known threat, of the computing system. In this way, the system can detect the presence of a compromised computing system, even if the cause of the compromise remains undetected and/or unknown. Appropriate remedial action may be taken upon detection.Type: GrantFiled: October 9, 2017Date of Patent: January 15, 2019Assignee: EVENGX, LLCInventors: John S. Flowers, Ridgely C. Evers
-
Patent number: 10015239Abstract: A self-organizing distributed network architecture is described. An example method includes, by a network node, sending via a network gateway node a DNS lookup request to a DNS service. The DNS lookup request comprises a string that at least includes a MAC address of the network gateway node that is used by the DNS service to identify a network address for the network node to access the network service of interest. The method further includes receiving via the network gateway node a DNS lookup response from the DNS service. The DNS lookup response comprises the network address for the network node to access the network service of interest. The method further includes accessing the network service of interest from another network node in the network system that is addressable by the received network address.Type: GrantFiled: August 11, 2016Date of Patent: July 3, 2018Assignee: EVENGX, LLCInventors: John S. Flowers, Martin Quiroga
-
Publication number: 20180069877Abstract: A network activity detection system is trained to detect network activities of interest such as threats by malicious computer data. The training involves distilling the characteristics of known network activities of interest (e.g., intrusion by computer viruses, exploits, worms, or the like) into a minimal set of meta-expressions. At run-time, the network activity detection system combines the minimal set of meta-expressions with efficient computer algorithms for evaluating meta-expressions to detect known network activities of interest, as well as their unknown variants, among an unknown set of network activity. The network activity detection system may produce appropriate responses upon the detection of network activities of interest.Type: ApplicationFiled: November 13, 2017Publication date: March 8, 2018Inventor: John S. FLOWERS
-
Patent number: 9888018Abstract: Network activity detectors, such as firewalls, communicate with one another to form a Unified Threat Management System. A first network activity detector sends a request for configuration settings to a second network activity detector. The second network activity detector sends a set of configuration settings in response to the request. The configuration settings include information for detecting digital security threats and/or for responding to detected digital security threats. In this way, configuration settings are propagated from one network activity detector to another so that network activity detectors within a UTMS system are configured consistently, e.g., have up-to-date information for detecting and/or responding to digital security threats.Type: GrantFiled: March 24, 2015Date of Patent: February 6, 2018Assignee: EVENGX, LLCInventor: John S. Flowers
-
Publication number: 20180034830Abstract: A digital security threat management system is disclosed. The system detects the presence of a computing system, on a network, that has been compromised by an undetected and/or unknown digital security threat. The digital security threat management system recognizes characteristic emanations from a computer system that has been compromised. Because the characteristic emanations that result from a known threat can be the same as the characteristic emanations that result from an undetected and/or unknown threat, the digital security threat management system can learn to detect a computing system that has been compromised by an unknown threat if the security threat management system recognizes characteristic emanations from a previous attack, based on a known threat, of the computing system. In this way, the system can detect the presence of a compromised computing system, even if the cause of the compromise remains undetected and/or unknown. Appropriate remedial action may be taken upon detection.Type: ApplicationFiled: October 9, 2017Publication date: February 1, 2018Inventors: John S. FLOWERS, Ridgely C. EVERS
-
Patent number: 9819692Abstract: A network activity detection system is trained to detect network activities of interest such as threats by malicious computer data. The training involves distilling the characteristics of known network activities of interest (e.g., intrusion by computer viruses, exploits, worms, or the like) into a minimal set of meta-expressions. At run-time, the network activity detection system combines the minimal set of meta-expressions with efficient computer algorithms for evaluating meta-expressions to detect known network activities of interest, as well as their unknown variants, among an unknown set of network activity. The network activity detection system may produce appropriate responses upon the detection of network activities of interest.Type: GrantFiled: December 13, 2016Date of Patent: November 14, 2017Assignee: EVENGX, LLCInventor: John S. Flowers
-
Patent number: 9787713Abstract: A digital security threat management system is disclosed. The system detects the presence of a computing system, on a network, that has been compromised by an undetected and/or unknown digital security threat. The digital security threat management system recognizes characteristic emanations from a computer system that has been compromised. Because the characteristic emanations that result from a known threat can be the same as the characteristic emanations that result from an undetected and/or unknown threat, the digital security threat management system can learn to detect a computing system that has been compromised by an unknown threat if the security threat management system recognizes characteristic emanations from a previous attack, based on a known threat, of the computing system. In this way, the system can detect the presence of a compromised computing system, even if the cause of the compromise remains undetected and/or unknown. Appropriate remedial action may be taken upon detection.Type: GrantFiled: April 24, 2016Date of Patent: October 10, 2017Assignee: EVENGX, LLCInventors: John S. Flowers, Ridgely C. Evers
-
Publication number: 20170279821Abstract: An instruction sequence detection system is trained to detect instruction sequences of interest, such as threats by malicious computer data. Training includes distilling the characteristics of known instruction sequences of interest (e.g., intrusion by computer viruses, exploits, worms, or the like) into a set of meta-expressions. At run-time, the instruction sequence detection system combines the minimal set of meta-expressions with efficient computer algorithms for evaluating meta-expressions to detect known instruction sequences of interest, as well as their unknown variants, among an unknown set of instruction sequences. The instruction sequence detection system may provide an appropriate response upon the detection of instruction sequences of interest.Type: ApplicationFiled: March 21, 2017Publication date: September 28, 2017Applicant: TrustPipe LLCInventors: John S. FLOWERS, Martin QUIROGA
-
Publication number: 20170163667Abstract: A network activity detection system is trained to detect network activities of interest such as threats by malicious computer data. The training involves distilling the characteristics of known network activities of interest (e.g., intrusion by computer viruses, exploits, worms, or the like) into a minimal set of meta-expressions. At run-time, the network activity detection system combines the minimal set of meta-expressions with efficient computer algorithms for evaluating meta-expressions to detect known network activities of interest, as well as their unknown variants, among an unknown set of network activity. The network activity detection system may produce appropriate responses upon the detection of network activities of interest.Type: ApplicationFiled: December 13, 2016Publication date: June 8, 2017Inventor: John S. FLOWERS
-
Patent number: 9621578Abstract: A network activity detection system is trained to detect network activities of interest such as threats by malicious computer data. The training involves distilling the characteristics of known network activities of interest (e.g., intrusion by computer viruses, exploits, worms, or the like) into a minimal set of meta-expressions. At run-time, the network activity detection system combines the minimal set of meta-expressions with efficient computer algorithms for evaluating meta-expressions to detect known network activities of interest, as well as their unknown variants, among an unknown set of network activity. The network activity detection system may produce appropriate responses upon the detection of network activities of interest.Type: GrantFiled: December 10, 2012Date of Patent: April 11, 2017Assignee: TrustPipe LLCInventor: John S. Flowers
-
Patent number: 9548992Abstract: Systems and methods for detecting a visual characteristic of interest within an image are disclosed. An example method involves obtaining an image that includes at least one pixel representing a visual characteristic of interest, creating a first sequence and a second sequence of bitwise data from values associated with the pixel, and converting these bitwise sequences into a first sequence of integers and a second sequence of integers. Using a distance function, a similarity metric is determined between the first sequence of integers and the second sequence of integers. Based on the similarity metric, a third sequence of integers is created and stored. The third sequence of integers can be used to facilitate the identification of the visual characteristic of interest in other images.Type: GrantFiled: December 28, 2012Date of Patent: January 17, 2017Assignee: TRUSTPIPE LLCInventor: John S. Flowers