Patents by Inventor Jonathan B. King
Jonathan B. King has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 10951476Abstract: Methods, apparatus, systems, and articles of manufacture are disclosed for dynamic network classification using authenticated neighbor detection. An example includes a network comparator to determine whether a network to be connected by a computing device is a managed network based on network configuration information associated with the network, in response to determining the network is not a managed network, a neighbor comparator to determine a number of different computing devices on the network that are managed computing devices, and in response to determining that the number of the managed computing devices satisfies a threshold, a sensor controller to invoke a sensor of the computing device to obtain data from computing devices associated with the network, the computing devices including the managed computing devices.Type: GrantFiled: September 11, 2019Date of Patent: March 16, 2021Assignee: MCAFEE, LLCInventors: Eric D. Wuehler, Jonathan B. King, Arthur S. Zeigler
-
Publication number: 20210075681Abstract: Methods, apparatus, systems, and articles of manufacture are disclosed for dynamic network classification using authenticated neighbor detection. An example includes a network comparator to determine whether a network to be connected by a computing device is a managed network based on network configuration information associated with the network, in response to determining the network is not a managed network, a neighbor comparator to determine a number of different computing devices on the network that are managed computing devices, and in response to determining that the number of the managed computing devices satisfies a threshold, a sensor controller to invoke a sensor of the computing device to obtain data from computing devices associated with the network, the computing devices including the managed computing devices.Type: ApplicationFiled: September 11, 2019Publication date: March 11, 2021Inventors: Eric D. Wuehler, Jonathan B. King, Arthur S. Zeigler
-
Publication number: 20210019403Abstract: There is disclosed in one example a computer-implemented anti-ransomware method, including: selecting a file for inspection; assigning the file to a type class according to a file type identifier; receiving an expected byte correlation for the type class; computing, according to a byte distribution of the file, a byte correlation for the file; comparing, via statistical analysis, the byte correlation to the expected byte correlation; and determining that the file has been compromised, including determining that the file has a byte correlation that deviates from the expected byte correlation by more than a threshold, taking a ransomware remediation action for the file.Type: ApplicationFiled: October 5, 2020Publication date: January 21, 2021Applicant: McAfee, LLCInventors: Kunal Mehta, Sherin Mary Mathews, Carl D. Woodward, Celeste R. Fralick, Jonathan B. King
-
Publication number: 20210021547Abstract: Particular embodiments described herein provide for a system that can be configured to communicate chat session data during a chat session to a first display of a first electronic device, communicate the chat session data during the chat session to a second display of a second electronic device, receive sensitive data during the chat session from the first electronic device, and protect the sensitive data from being displayed on the second display during the chat session without breaking continuity of the chat session.Type: ApplicationFiled: October 6, 2020Publication date: January 21, 2021Applicant: McAfee, LLCInventors: Robert L. Vaughn, David M. Durham, Cedric Cochin, Jonathan B. King
-
Patent number: 10834027Abstract: Particular embodiments described herein provide for a system that can be configured to communicate chat session data during a chat session to a first display of a first electronic device, communicate the chat session data during the chat session to a second display of a second electronic device, receive sensitive data during the chat session from the first electronic device, and protect the sensitive data from being displayed on the second display during the chat session without breaking continuity of the chat session.Type: GrantFiled: June 27, 2015Date of Patent: November 10, 2020Assignee: McAfee, LLCInventors: Robert L. Vaughn, David M. Durham, Cedric Cochin, Jonathan B. King
-
Patent number: 10795994Abstract: There is disclosed in one example a ransomware mitigation engine, including: a processor; a convolutional neural network configured to provide file type identification (FTI) services including: identifying an access operation of a file as a write to the file or newly creating the file; computing a byte correlation factor for the file; classifying the file as belonging to a file type; determining with a screening confidence that the file type is correct for the file; determining that the screening confidence is below a screening confidence threshold; and circuitry and logic to provide heuristic analysis including: receiving notification that the confidence is below the confidence threshold; performing a statistical analysis of the file to determine a difference between an expected value and a computed value; determining from the difference, with a detection confidence, that the file has been compromised; and identifying the file as having been compromised by a ransomware attack.Type: GrantFiled: September 26, 2018Date of Patent: October 6, 2020Assignee: McAfee, LLCInventors: Kunal Mehta, Sherin Mary Mathews, Carl D. Woodward, Celeste R. Fralick, Jonathan B. King
-
Patent number: 10695247Abstract: A patient support includes a cover defining an interior region, an air permeable first layer located in the interior region, and a support layer located beneath the air permeable first layer. A pressure sensing layer is located underneath the support layer. At least one air supply is coupled to the support layer. A controller is coupled to the air supply and to the pressure sensing layer. The controller controls inflation and deflation of the support layer in response to a signal from the pressure sensing layer.Type: GrantFiled: October 2, 2018Date of Patent: June 30, 2020Assignee: Hill-Rom Services, Inc.Inventors: Bradley T. Wilson, Charles A. Lachenbruch, Christopher R. O'Keefe, Daniel K. Stevens, Darrell L. Borgman, Dennis S. Flessate, Eric R. Meyer, Gregory W. Branson, John Alan Bobey, Jonathan H. Mueller, Karen Janoff, Kenith W. Chambers, Rachel Hopkins King, Rebecca Anne Ginther, Reza Hakamiun, Richard B. Stacy, Sohrab Soltani, Stephen L. Douglas
-
Patent number: 10685171Abstract: A steganographic coding detector (and method) analyzes one or more pages of a file. For each page containing text strings, the detector counts a number of A0h and 20h characters for the text string. For each text string for which the number of A0h characters is greater than a first threshold, the detector sets a flag to a first state, The first threshold is computed based on the number of 20h characters in that text string. For each text string for which the number of 20h characters is less than the first threshold, the detector sets the flag to a second state. Responsive to the number of text strings that have a flag at the first state being greater than a second threshold, the detector marks the file as being steganographically encoded.Type: GrantFiled: January 31, 2018Date of Patent: June 16, 2020Assignee: McAfee, LLCInventors: German Lancioni, Jonathan B. King, Eric D. Wuehler
-
Publication number: 20200097653Abstract: There is disclosed in one example a ransomware mitigation engine, including: a processor; a convolutional neural network configured to provide file type identification (FTI) services including: identifying an access operation of a file as a write to the file or newly creating the file; computing a byte correlation factor for the file; classifying the file as belonging to a file type; determining with a screening confidence that the file type is correct for the file; determining that the screening confidence is below a screening confidence threshold; and circuitry and logic to provide heuristic analysis including: receiving notification that the confidence is below the confidence threshold; performing a statistical analysis of the file to determine a difference between an expected value and a computed value; determining from the difference, with a detection confidence, that the file has been compromised; and identifying the file as having been compromised by a ransomware attack.Type: ApplicationFiled: September 26, 2018Publication date: March 26, 2020Inventors: Kunal Mehta, Sherin Mary Mathews, Carl D. Woodward, Celeste R. Fralick, Jonathan B. King
-
Patent number: 10507147Abstract: This disclosure describes certain exemplary embodiments of a patient support having a plurality of vertically-oriented on substantially can-shaped inflatable bladders. In one embodiment, the patient support includes a support layer positioned above the vertical bladders. In another embodiment, the patient support includes a high air loss device. In still another embodiment, the patient support includes a pneumatic device located within the patient support.Type: GrantFiled: June 7, 2017Date of Patent: December 17, 2019Assignee: Hill-Rom Services, Inc.Inventors: John A. Bobey, Gregory W. Branson, Rebecca A. Ginther, Reza Hakamiun, Charles A. Lachenbruch, Jonathan H. Mueller, Sohrab Soltani, Bradley T. Wilson, Stephen L. Douglas, Kenith W. Chambers, Rachel H. King, Eric R. Meyer, Christopher R. O'Keefe, Richard B. Stacy, Thomas E. Uzzle
-
Publication number: 20190236119Abstract: A steganographic coding detector (and method) analyzes one or more pages of a file. For each page containing text strings, the detector counts a number of A0h and 20h characters for the text string. For each text string for which the number of A0h characters is greater than a first threshold, the detector sets a flag to a first state, The first threshold is computed based on the number of 20h characters in that text string. For each text string for which the number of 20h characters is less than the first threshold, the detector sets the flag to a second state. Responsive to the number of text strings that have a flag at the first state being greater than a second threshold, the detector marks the file as being steganographically encoded.Type: ApplicationFiled: January 31, 2018Publication date: August 1, 2019Inventors: German Lancioni, Jonathan B. King, Eric D. Wuehler
-
Publication number: 20160380927Abstract: Particular embodiments described herein provide for a system that can be configured to communicate chat session data during a chat session to a first display of a first electronic device, communicate the chat session data during the chat session to a second display of a second electronic device, receive sensitive data during the chat session from the first electronic device, and protect the sensitive data from being displayed on the second display during the chat session without breaking continuity of the chat session.Type: ApplicationFiled: June 27, 2015Publication date: December 29, 2016Applicant: McAfee, Inc.Inventors: Robert L. Vaughn, David M. Durham, Cedric Cochin, Jonathan B. King
-
Patent number: 9525707Abstract: This disclosure describes systems, methods, and computer-readable media related to an incident response tool using data exchange layer. In some embodiments, a data collector may be generated by an incident response server. The incident response server may transmit a data collector to multiple broker servers, where each broker server may transmit the data collector to multiple user devices associated with the broker server. The incident response server may receive data from the data collectors executing on the user devices and may analyze the received data.Type: GrantFiled: December 23, 2014Date of Patent: December 20, 2016Assignee: McAfee, Inc.Inventors: James Bean, Torry B. Campbell, Jonathan B. King
-
Publication number: 20160182566Abstract: This disclosure describes systems, methods, and computer-readable media related to an incident response tool using data exchange layer. In some embodiments, a data collector may be generated by an incident response server. The incident response server may transmit a data collector to multiple broker servers, where each broker server may transmit the data collector to multiple user devices associated with the broker server. The incident response server may receive data from the data collectors executing on the user devices and may analyze the received data.Type: ApplicationFiled: December 23, 2014Publication date: June 23, 2016Inventors: James Bean, Torry B. Campbell, Jonathan B. King