Patents by Inventor Jordan Wright
Jordan Wright has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 12107973Abstract: Systems and methods of improving public key infrastructure using PUF arrays are disclosed. The systems and methods are usable to improve PKI based on Lattice and Code cryptography. In the disclosed system, a client device includes an enrolled PUF array, and a server device acting as a Certification Authority includes an image of the PUF array including previously measured responses data for the devices in the PUF array. The CA sends a set of addresses to the client device, which generates a public key from measuring the response of PUF devices with the addresses. The CA receives the generated public key, and determines that the enrolled PUF was used to generate the key.Type: GrantFiled: November 10, 2021Date of Patent: October 1, 2024Assignee: ARIZONA BOARD OF REGENTS ON BEHALF OF NORTHERN ARIZONA UNIVERSITYInventors: Bertrand F Cambou, Michael Gowanlock, Bahattin Yildiz, Dina Ghanaimiandoab, Kaitlyn Lee, Stefan W Nelson, Christopher Philabaum, Alyssa J Stenberg, Jordan A Wright
-
Publication number: 20240052366Abstract: A nucleotide sequence encoding the RNA genome of a lentiviral vector, wherein the major splice donor site in the RNA genome of the lentiviral vector is inactivated, and wherein the cryptic splice donor site 3? to the major splice donor site is inactivated.Type: ApplicationFiled: February 4, 2021Publication date: February 15, 2024Inventors: Daniel Farley, Jordan Wright
-
Patent number: 11729214Abstract: Disclosed herein are systems and methods that may generate so-called “honey credentials” that are transmitted to a “phishing” website, and are then stored into a honey credential database. The honey credentials appear to be valid credentials, but whenever a bad actor attempts to access an enterprise using the honey credentials, security appliances the enterprise may update the records of the honey credential database to include one or more unique identifiers for each bad actor device that attempts to access the enterprise network using the honey credentials. A server may automatically query the honey credential database to identify other accounts that have been accessed by devices that used the honey credentials to access the enterprise. The server may then flag the accounts and restrict their functionality.Type: GrantFiled: August 26, 2021Date of Patent: August 15, 2023Assignee: United Services Automobile Association (USAA)Inventors: Jordan Wright, William Jennings Woodson, Justin Gray
-
Publication number: 20230183742Abstract: The present invention provides novel methods for producing a viral vector. Corresponding viral vector production systems and uses are also provided.Type: ApplicationFiled: May 14, 2021Publication date: June 15, 2023Inventors: Rui Andre Saraiva Raposo, Charles Moore-Kelly, Jordan Wright, Daniel Farley
-
Publication number: 20230118587Abstract: The present invention provides a lentiviral vector genome comprising at least one modified viral cis-acting sequence, wherein at least one internal open reading frame (ORF) in the viral cis-acting sequence is disrupted.Type: ApplicationFiled: March 11, 2021Publication date: April 20, 2023Inventor: Jordan Wright
-
Publication number: 20220348958Abstract: A modified U1 snRNA, wherein said modified U1 snRNA has been modified to bind to a nucleotide sequence within the packaging region of a lentiviral vector genome sequence.Type: ApplicationFiled: July 23, 2020Publication date: November 3, 2022Inventors: Daniel Farley, Jordan Wright
-
Patent number: 11316895Abstract: Disclosed herein are systems and methods that may generate so-called “honey credentials” that are transmitted to a “phishing” website, and are then stored into a honey credential database. The honey credentials appear to be valid credentials, but whenever a bad actor attempts to access an enterprise using the honey credentials, security appliances the enterprise may update the records of the honey credential database to include one or more unique identifiers for each bad actor device that attempts to access the enterprise network using the honey credentials. A server may automatically query the honey credential database to identify other accounts that have been accessed by devices that used the honey credentials to access the enterprise. The server may then flag the accounts and restrict their functionality.Type: GrantFiled: October 20, 2017Date of Patent: April 26, 2022Assignee: United Services Automobile Association (USAA)Inventors: Jordan Wright, William Jennings Woodson, Justin Sommers Gray
-
Patent number: 11057427Abstract: Systems and methods for hindering cyber-attacks include: modifying a target website of a remote service provider, wherein modifying the target website includes: reconfiguring a structure of the target website to include a tattler, wherein when the tattler is executed at a non-authorized copy of the target website, the tattler is configured to transmit to a cyber-attack mitigation platform tattler data associated with the non-authorized copy of the target website; receiving the tattler data, wherein the tattler data includes website monitoring data, wherein the website monitoring data comprises a URL of the non-authorized copy of the target website; using the website monitoring data to evaluate the non-authorized copy of the target website, wherein the evaluating includes identifying whether the non-authorized copy of the target website comprises an attack website; and implementing one or more attack mitigation protocols when the non-authorized copy of the target website comprises the attack website.Type: GrantFiled: October 31, 2019Date of Patent: July 6, 2021Assignee: CISCO TECHNOLOGY, INC.Inventors: Jordan Wright, Jon Oberheide
-
Publication number: 20200067979Abstract: Systems and methods for hindering cyber-attacks include: modifying a target website of a remote service provider, wherein modifying the target website includes: reconfiguring a structure of the target website to include a tattler, wherein when the tattler is executed at a non-authorized copy of the target website, the tattler is configured to transmit to a cyber-attack mitigation platform tattler data associated with the non-authorized copy of the target website; receiving the tattler data, wherein the tattler data includes website monitoring data, wherein the website monitoring data comprises a URL of the non-authorized copy of the target website; using the website monitoring data to evaluate the non-authorized copy of the target website, wherein the evaluating includes identifying whether the non-authorized copy of the target website comprises an attack website; and implementing one or more attack mitigation protocols when the non-authorized copy of the target website comprises the attack website.Type: ApplicationFiled: October 31, 2019Publication date: February 27, 2020Inventors: Jordan Wright, Jon Oberheide
-
Patent number: 10558797Abstract: A system and method includes at an authentication platform that is implemented via one or more computing servers: identifying compromised credential data, wherein compromised credential data comprise compromised credentials for one or more compromised accounts that have been exposed to a malicious actor via an illegitimate method, the compromised credentials including credentials that are useable for authentication to or for accessing the one or more compromised accounts; testing the compromised credentials, wherein testing compromised credentials includes using the compromised credentials to determine a useablility of the compromised credentials to attack one or more different accounts from the one or more compromised accounts; and modifying account access associated with one or more of (i) the one or more compromised accounts and (ii) the one or more different accounts.Type: GrantFiled: July 26, 2017Date of Patent: February 11, 2020Inventors: Jordan Wright, Jon Oberheide
-
Patent number: 10498761Abstract: Systems and methods for hindering cyber-attacks include: modifying a target website of a remote service provider, wherein modifying the target website includes: reconfiguring a structure of the target website to include a tattler, wherein when the tattler is executed at a non-authorized copy of the target website, the tattler is configured to transmit to a cyber-attack mitigation platform tattler data associated with the non-authorized copy of the target website; receiving the tattler data, wherein the tattler data includes website monitoring data, wherein the website monitoring data comprises a URL of the non-authorized copy of the target website; using the website monitoring data to evaluate the non-authorized copy of the target website, wherein the evaluating includes identifying whether the non-authorized copy of the target website comprises an attack website; and implementing one or more attack mitigation protocols when the non-authorized copy of the target website comprises the attack website.Type: GrantFiled: August 22, 2017Date of Patent: December 3, 2019Inventors: Jordan Wright, Jon Oberheide
-
Patent number: 10193923Abstract: Systems and methods for mitigating cyber intrusions includes: receiving target domain input, wherein the target domain input comprises a domain name associated with a target entity or target entity data that is useable to generate phishing attack domain names; using the target domain name input to generate the phishing attack domain names, wherein the phishing attack domain names include a plurality of domain names each having a phishing value comprising a likelihood or a probability of being used in a phishing campaign against the digital resources, where the likelihood or the probability satisfies a predetermined phishing value threshold; arranging the phishing attack domain names in a hierarchical order; and implementing one or more digital resources security protocols that mitigates the likelihood or the probability that selected domain names of the phishing attack domain names may be used in the phishing campaign against the digital resources.Type: GrantFiled: July 12, 2017Date of Patent: January 29, 2019Assignee: Duo Security, Inc.Inventors: Jordan Wright, Jon Oberheide
-
Publication number: 20180063190Abstract: Systems and methods for hindering cyber-attacks include: modifying a target website of a remote service provider, wherein modifying the target website includes: reconfiguring a structure of the target website to include a tattler, wherein when the tattler is executed at a non-authorized copy of the target website, the tattler is configured to transmit to a cyber-attack mitigation platform tattler data associated with the non-authorized copy of the target website; receiving the tattler data, wherein the tattler data includes website monitoring data, wherein the website monitoring data comprises a URL of the non-authorized copy of the target website; using the website monitoring data to evaluate the non-authorized copy of the target website, wherein the evaluating includes identifying whether the non-authorized copy of the target website comprises an attack website; and implementing one or more attack mitigation protocols when the non-authorized copy of the target website comprises the attack website.Type: ApplicationFiled: August 22, 2017Publication date: March 1, 2018Inventors: Jordan Wright, Jon Oberheide
-
Publication number: 20180046796Abstract: A system and method includes at an authentication platform that is implemented via one or more computing servers: identifying compromised credential data, wherein compromised credential data comprise compromised credentials for one or more compromised accounts that have been exposed to a malicious actor via an illegitimate method, the compromised credentials including credentials that are useable for authentication to or for accessing the one or more compromised accounts; testing the compromised credentials, wherein testing compromised credentials includes using the compromised credentials to determine a useablility of the compromised credentials to attack one or more different accounts from the one or more compromised accounts; and modifying account access associated with one or more of (i) the one or more compromised accounts and (ii) the one or more different accounts.Type: ApplicationFiled: July 26, 2017Publication date: February 15, 2018Inventors: Jordan Wright, Jon Oberheide
-
Publication number: 20180027013Abstract: Systems and methods for mitigating cyber intrusions includes: receiving target domain input, wherein the target domain input comprises a domain name associated with a target entity or target entity data that is useable to generate phishing attack domain names; using the target domain name input to generate the phishing attack domain names, wherein the phishing attack domain names include a plurality of domain names each having a phishing value comprising a likelihood or a probability of being used in a phishing campaign against the digital resources, where the likelihood or the probability satisfies a predetermined phishing value threshold; arranging the phishing attack domain names in a hierarchical order; and implementing one or more digital resources security protocols that mitigates the likelihood or the probability that selected domain names of the phishing attack domain names may be used in the phishing campaign against the digital resources.Type: ApplicationFiled: July 12, 2017Publication date: January 25, 2018Inventors: Jordan Wright, Jon Oberheide