Patents by Inventor Kyle Adams
Kyle Adams has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 10044754Abstract: A security device may receive, from a server device, a response to a request. The request may be provided by an attacker device and may include a plurality of input values. The security device may determine the plurality of input values, included in the request, based on receiving the response. The security device may modify the response to form a modified response. The response may be modified to include information associated with the plurality of input values. The response may be modified in an attempt to prevent the attacker device from identifying a vulnerability, associated with the server device, based on the plurality of input values being included in the response. The security device may provide the modified response to the attacker device.Type: GrantFiled: October 31, 2016Date of Patent: August 7, 2018Assignee: Juniper Networks, Inc.Inventor: Kyle Adams
-
Patent number: 10021132Abstract: A device may detect an attack. The device may receive, from a client device, a request for a resource. The device may determine, based on detecting the attack, a computationally expensive problem to be provided to the client device, where the computationally expensive problem requires a computation by the client device to solve the computationally expensive problem. The device may instruct the client device to provide a solution to the computationally expensive problem. The device may receive, from the client device, the solution to the computationally expensive problem. The device may selectively provide the client device with access to the resource based on the solution.Type: GrantFiled: July 3, 2017Date of Patent: July 10, 2018Assignee: Juniper Networks, Inc.Inventors: Kyle Adams, Daniel J. Quinlan
-
Patent number: 9990496Abstract: A device may receive a password-protected file to be accessed for analysis. The device may identify a contextual term, associated with the password-protected file, to be used as a password to attempt to access the password-protected file. The contextual term may be identified based on at least one of: metadata associated with the password-protected file, metadata associated with a source from which the password-protected file is received, or text associated with the source from which the password-protected file is received. The device may apply the contextual term as the password to attempt to access the password-protected file.Type: GrantFiled: March 3, 2017Date of Patent: June 5, 2018Assignee: Juniper Networks, Inc.Inventors: Kyle Adams, Jacob Asher Langton, Daniel J. Quinlan
-
Patent number: 9984233Abstract: A device may analyze a first file for malware. The device may determine that the first file causes a second file to be downloaded. The device may store linkage information that identifies a relationship between the first file and the second file based on determining that the first file causes the second file to be downloaded. The device may analyze the second file for malware. The device may determine a first malware score for the first file based on analyzing the second file for malware and based on the linkage information. The device may determine a second malware score for the second file based on analyzing the first file for malware and based on the linkage information.Type: GrantFiled: August 8, 2017Date of Patent: May 29, 2018Assignee: Juniper Networks, Inc.Inventors: Daniel J. Quinlan, Kyle Adams, Jacob Asher Langton
-
Patent number: 9954820Abstract: A security device may receive a response associated with a request. The response may include original session information. The request may be associated with a user device. The security device may modify the original session information to create modified session information. The security device may store information associated with the modified session information. The security device may provide the response, including the modified session information, to the user device. The security device may receive another request. The other request may include the modified session information. The security device may determine that the modified session information is not current session information based on the information associated with the modified session information. The security device may provide the other request without including the original session information.Type: GrantFiled: June 6, 2016Date of Patent: April 24, 2018Assignee: Juniper Networks, Inc.Inventor: Kyle Adams
-
Patent number: 9954887Abstract: A device may receive usage information, associated with a group of client networks, including particular usage information associated with a particular client network. The device may receive threat information, associated with the group of client networks, including particular threat information associated with the particular client network. The device may determine a baseline based on the usage information. The device may determine a normalization function, associated with the particular client network, based on the baseline and the particular usage information. The device may determine normalized threat information, associated with the particular client network, based on the normalization function and the particular threat information. The device may determine overall normalized threat information associated with the group of client networks. The device may compare the normalized threat information and the overall normalized threat information.Type: GrantFiled: December 30, 2016Date of Patent: April 24, 2018Assignee: Juniper Networks, Inc.Inventors: Kyle Adams, Declan Conlon
-
Patent number: 9953164Abstract: A device may receive a trigger to determine whether one or more client devices, of a set of client devices, are infected by a malicious file. The device may generate file identification information associated with the malicious file based on receiving the trigger to determine whether the one or more client devices are infected by the malicious file. The device may obtain remote access to the one or more client devices using a connection tool based on receiving the trigger to determine whether the one or more client devices are infected by the malicious file. The device may obtain information, associated with the one or more client devices, using the remote access. The device may provide information indicating whether the one or more client devices are infected by the malicious file based on the file identification information and the information associated with the one or more client devices.Type: GrantFiled: March 9, 2017Date of Patent: April 24, 2018Assignee: Juniper Networks, Inc.Inventors: Jacob Asher Langton, Daniel J. Quinlan, Kyle Adams
-
Patent number: 9922193Abstract: A security device may receive actual behavior information associated with an object. The actual behavior information may identify a first set of behaviors associated with executing the object in a live environment. The security device may determine test behavior information associated with the object. The test behavior information may identify a second set of behaviors associated with testing the object in a test environment. The security device may compare the first set of behaviors and the second set of behaviors to determine a difference between the first set of behaviors and the second set of behaviors. The security device may identify whether the object is an evasive malicious object based on the difference between the first set of behaviors and the second set of behaviors. The security device may provide an indication of whether the object is an evasive malicious object.Type: GrantFiled: March 10, 2017Date of Patent: March 20, 2018Assignee: Juniper Networks, Inc.Inventors: Kyle Adams, Daniel J. Quinlan
-
Patent number: 9866583Abstract: A security device may receive a request, from a client device and intended for a server device, to provide a resource. The resource may be associated with information stored by the server device. The security device may identify the request as being associated with a malicious script. The malicious script may execute on the client device and may include a script that performs one or more undesirable tasks directed to the server device. The security device may receive, from the server device, a response to the request. The response may include information associated with the requested resource. The security device may modify the response to form a modified response. The response may be modified in an attempt to cause the malicious script to experience an error. The security device may provide the modified response to the client device.Type: GrantFiled: August 4, 2016Date of Patent: January 9, 2018Assignee: Juniper Networks, Inc.Inventor: Kyle Adams
-
Patent number: 9848016Abstract: This disclosure describes techniques for proactively identifying possible attackers based on a profile of a device. For example, a device includes one or more processors and network interface cards to receive, from a remote device, network traffic directed to one or more computing devices protected by the device, determine, based on content of the network traffic, a first set of data points for the device, send a response to the remote device to ascertain a second set of data points for the device, and receive, from the remote device, at least a portion of the second set of data points. The device also includes a security module operable by the processors to determine a maliciousness rating, and selectively manage, based on the maliciousness rating, additional network traffic directed to the one or more computing devices protected by the security device and received from the remote device.Type: GrantFiled: November 14, 2016Date of Patent: December 19, 2017Assignee: Juniper Networks, Inc.Inventors: Oskar Ibatullin, Kyle Adams, Daniel J. Quinlan
-
Patent number: 9843388Abstract: Technology for laser communications is provided. In one example, a method may include generating a communication for transmission from a first terrestrial computing device to a second terrestrial computing device and encoding the communication as an optical transmission from a first laser array in communication with the first terrestrial computing device. The optical transmission may be transmitted, using the first laser array, to a first satellite and relayed from the first satellite to a second satellite using a second laser array at the first satellite. The optical transmission may be further relayed from the second satellite to the second terrestrial computing device using a third laser array at the second satellite. The lasers in the first, second and third laser arrays may be low power laser diodes configured for a power level less than 1 kW.Type: GrantFiled: June 8, 2015Date of Patent: December 12, 2017Assignee: Amazon Technologies, Inc.Inventors: Vadim Astakhov, Mathew Wolfgang Walter Lehwess, Kyle Adam Lichtenberg, Thomas Charles Stickle
-
Publication number: 20170349868Abstract: Embodiments of the present disclosure are directed to extracting the liquid from a container (such as a bottle of wine) in varying amounts at a desired serving temperature while preserving the liquid for later consumption. Various embodiments may be built within an appliance so the consumer experience is fully automated. Embodiments may include a variety of wine preservation techniques including the use of inert gases that prevent the oxidation of wine.Type: ApplicationFiled: June 16, 2017Publication date: December 7, 2017Inventors: David Andrew Koretz, Donald G. Hubbard, Jr., Niculae Mustatea, Michael Dumont, Kyle Adams
-
Publication number: 20170334704Abstract: A liquid dispensing device includes a needle. The needle is adapted to penetrate a container without tearing out a portion of the container. The portion of the container is near a point of penetration on the container. The liquid dispensing device includes a motion control system. The motion control system is configured to rotate the needle while the needle penetrates the container.Type: ApplicationFiled: June 16, 2017Publication date: November 23, 2017Inventors: David Andrew Koretz, Donald G. Hubbard, JR., Niculae Mustatea, Michael Dumont, Kyle Adams, Raul Eugene Chinda, David Henry Caldwell Karl, Travis Ronald Coleman, Benjamin Jonas Hafen
-
Patent number: 9813441Abstract: A security device may receive a request from a client device and intended for a server device. The security device may identify the request as being associated with a malicious activity. The malicious activity may include one or more undesirable tasks directed to the server device. The security device may generate a challenge-response test based on identifying the request as being associated with the malicious activity. The challenge-response test may be generated using one or more construction techniques. The security device may provide the challenge-response test to the client device. The security device may receive, from the client device, a proposed solution to the challenge-response test. The security device may identify the proposed solution as being generated using an optical character recognition (OCR) program. The security device may protect the server device from the client device based on identifying the solution as being generated using an OCR program.Type: GrantFiled: December 17, 2015Date of Patent: November 7, 2017Assignee: Juniper Networks, Inc.Inventor: Kyle Adams
-
Patent number: 9787711Abstract: A security device may receive information identifying a set of conditions for providing countermeasure code to a client device. The security device may receive information identifying an action to be performed when the countermeasure code is executed by the client device, and may determine the countermeasure code to be provided to the client device when the set of conditions is satisfied. The security device may receive a request from the client device, and may determine a response to the request. The response may include response code for serving content of a web page to the client device. The security device may determine that the set of conditions has been satisfied, and may insert the countermeasure code into the response code. The security device may provide the response code and the countermeasure code to the client device, and the countermeasure code may cause the client device to perform the action.Type: GrantFiled: October 30, 2015Date of Patent: October 10, 2017Assignee: Juniper Networks, Inc.Inventor: Kyle Adams
-
Patent number: 9787638Abstract: A device may receive data from a first endpoint device. The device may identify a network protocol. The network protocol may be associated with receiving the data. The device may identify a format. The format may be associated with encoding textual information in the data. The device may determine, based on the format and the network protocol, text in the data. The device may determine whether the text includes a reference from a plurality of references. The plurality of references may identify addresses associated with malicious devices. The device may selectively forward the data to a second endpoint device based on determining whether the text includes the reference.Type: GrantFiled: December 30, 2014Date of Patent: October 10, 2017Assignee: Juniper Networks, Inc.Inventor: Kyle Adams
-
Patent number: 9785787Abstract: A device may identify an image to be encrypted, and may convert the image to a first string in a first format. The first string may represent the image. The device may receive information that identifies a key for encrypting the first string, and may generate a first encrypted string by encrypting the first string using the key. The device may convert the first encrypted string, in the first format, to a second encrypted string in a second format. The device may provide the second encrypted string to a storage device without providing the key or the image to the storage device. The storage device may be unable to recover the image using the second encrypted string.Type: GrantFiled: September 30, 2013Date of Patent: October 10, 2017Assignee: Juniper Networks, Inc.Inventor: Kyle Adams
-
Patent number: 9769197Abstract: A system may determine to perform an external malware detection operation to detect malware executing on a client device. The system may perform the external malware detection operation. The external malware detection operation may be performed by a particular device by communicating with another device. The system may perform a communication based on performing the external malware detection operation. The system may monitor a result of performing the communication for a particular behavior indicative of a malware infection. The system may detect that the particular behavior has occurred. The system may provide a notification that the client device is infected with malware based on detecting that the particular behavior has occurred. The notification may cause one or more network devices to block network traffic to or from the client device.Type: GrantFiled: January 27, 2015Date of Patent: September 19, 2017Assignee: Juniper Networks, Inc.Inventors: Kyle Adams, Daniel J. Quinlan
-
Patent number: 9769198Abstract: A system may determine to perform an internal and an external malware detection operation to detect a malware infection associated with a client device. The system may perform the internal operation by modifying an environment, executing on a particular device, to form a modified environment. The system may perform the external operation by performing a communication from the particular device. The system may monitor the modified environment for a first behavior indicative of the malware infection, and may monitor a result of performing the communication for a second behavior indicative of the malware infection. The system may detect that the first or second behavior has occurred. The system may provide a notification that the client device is infected with malware based on detecting that the first or second behavior has occurred. The notification may cause one or more network devices to block network traffic to or from the client device.Type: GrantFiled: January 27, 2015Date of Patent: September 19, 2017Assignee: Juniper Networks, Inc.Inventors: Kyle Adams, Daniel J. Quinlan
-
Publication number: 20170250995Abstract: A device may detect a suspicious activity. The device may automatically obtain a suspect object from a client device that is associated with the suspicious activity and based on detecting the suspicious activity. The suspect object may be an object that is possibly associated with the suspicious activity. The device may determine that the suspect object is malicious. The device may perform an action based on determining that the suspect object is malicious.Type: ApplicationFiled: May 15, 2017Publication date: August 31, 2017Inventors: Jacob Asher Langton, Daniel J. Quinlan, Kyle Adams, Zhenxin Zhan