Patents by Inventor Lawrence Bruce
Lawrence Bruce has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 11902293Abstract: A system, method, and computer-readable medium are disclosed for performing a security operation. The security operation includes: monitoring an entity, the monitoring observing at least one electronically-observable data source; identifying a security related activity of the entity, the security related activity being of analytic utility; accessing an entity behavior catalog based upon the security related activity, the entity behavior catalog providing an inventory of entity behaviors; and performing a security operation via a distributed security analytics environment, the security operation using entity behavior catalog data stored within the entity behavior catalog based upon the security related activity.Type: GrantFiled: December 22, 2020Date of Patent: February 13, 2024Assignee: Forcepoint LLCInventors: Lawrence Bruce Huston, III, Nicolas Christian Fischbach, Raffael Marty
-
Patent number: 11895158Abstract: A system, method, and computer-readable medium are disclosed for implementing a cybersecurity system having security policy visualization. At least one embodiment is directed to a computer-implemented method for implementing security policies in a secured network, including: retrieving a set of rules of a security policy; analyzing the set of rules of the security policy using one or more Satisfiability Modulo Theory (SMT) operations to reduce a dimensionality of the security policy; and generating a visual presentation on a user interface using results of the SMT operations, where the visual presentation includes visual indicia representing one or more targeted policy dimensions with respect to one or more fixed policy dimensions. In at least one embodiment, two or more security policies are presented with visual indicia representing differences between the security policies, including representations of one or more targeted policy dimensions with respect to one or more fixed policy dimensions.Type: GrantFiled: May 19, 2020Date of Patent: February 6, 2024Assignee: Forcepoint LLCInventors: Lawrence Bruce Huston, III, David Coffey, Andrew Mortensen
-
Patent number: 11888863Abstract: A system, method, and computer-readable medium are disclosed for performing a security operation. The security operation includes: monitoring a plurality of actions of an entity, the plurality of actions of the entity corresponding to a plurality of events enacted by the entity; maintaining information relating to the monitoring within a user edge component; identifying an event of analytic utility; analyzing the event of analytic utility at the user edge component, the analyzing generating a security risk assessment; and, providing the security risk assessment to a network edge component.Type: GrantFiled: December 22, 2020Date of Patent: January 30, 2024Assignee: Forcepoint LLCInventors: Lawrence Bruce Huston, III, David Coffey
-
Patent number: 11888862Abstract: A system, method, and computer-readable medium are disclosed for performing a security operation. The security operation includes: monitoring an entity, the monitoring observing at least one electronically-observable data source; identifying an event of analytic utility; analyzing the event of analytic utility, the analyzing the event of analytic utility identifying an entity behavior associated with the event of analytic utility; and, performing the security operation in response to the analyzing the event of analytic utility, where the monitoring, identifying, analyzing and performing are performed via a distributed security analytics framework.Type: GrantFiled: December 22, 2020Date of Patent: January 30, 2024Assignee: Forcepoint LLCInventors: Lawrence Bruce Huston, III, David Coffey
-
Patent number: 11888864Abstract: A system, method, and computer-readable medium are disclosed for performing a security analytics mapping operation.Type: GrantFiled: December 22, 2020Date of Patent: January 30, 2024Assignee: Forcepoint LLCInventors: Lawrence Bruce Huston, III, David Coffey
-
Patent number: 11569641Abstract: An alpha ion emitter apparatus, including a circuit, a fluid duct including one or more apertures, and a rail electrically connected to the circuit and operatively arranged to hold an alpha ionization material that emits alpha particles, the alpha particles creating alpha ions, wherein the circuit is operatively arranged to apply an output signal to at least one of the fluid duct and the rail.Type: GrantFiled: November 16, 2020Date of Patent: January 31, 2023Assignee: NRD LLCInventors: Jeremy Paul Willden, Helaman David Pratt Ferguson, Martin Robert Johnson, Samuel Tremain Earl, Lawrence Bruce Levit, Jonathan Scott Jensen, John M. Glynn, II
-
Patent number: 11516206Abstract: A system, method, and computer-readable medium are disclosed for implementing a cybersecurity system having a digital certificate reputation system. At least one embodiment is directed to a computer-implemented method executing operations including receiving a communication having an internet protocol (IP) address and a digital certificate at a device within the secured network; determining whether the IP address is identified as having a high-security risk level; if the IP address has a high-security risk level, assigning a security risk level to the digital certificate based on the security risk level of the IP address; and using the security risk level for the digital certificate in executing the one or more security policies. Other embodiments include corresponding computer systems, apparatus, and computer programs recorded on one or more computer storage devices.Type: GrantFiled: May 1, 2020Date of Patent: November 29, 2022Assignee: Forcepoint LLCInventors: Lawrence Bruce Huston, III, David Coffey
-
Publication number: 20220158419Abstract: An alpha ion emitter apparatus, including a circuit, a fluid duct including one or more apertures, and a rail electrically connected to the circuit and operatively arranged to hold an alpha ionization material that emits alpha particles, the alpha particles creating alpha ions, wherein the circuit is operatively arranged to apply an output signal to at least one of the fluid duct and the rail.Type: ApplicationFiled: November 16, 2020Publication date: May 19, 2022Inventors: Jeremy Paul Willden, Helaman David Pratt Ferguson, Martin Robert Johnson, Samuel Tremain Earl, Lawrence Bruce Levit, Jonathan Scott Jensen, John M. Glynn, II
-
Publication number: 20210367979Abstract: A system, method, and computer-readable medium are disclosed for implementing a cybersecurity system having security policy visualization. At least one embodiment is directed to a computer-implemented method for implementing security policies in a secured network, including: retrieving a set of rules of a security policy; analyzing the set of rules of the security policy using one or more Satisfiability Modulo Theory (SMT) operations to reduce a dimensionality of the security policy; and generating a visual presentation on a user interface using results of the SMT operations, where the visual presentation includes visual indicia representing one or more targeted policy dimensions with respect to one or more fixed policy dimensions. In at least one embodiment, two or more security policies are presented with visual indicia representing differences between the security policies, including representations of one or more targeted policy dimensions with respect to one or more fixed policy dimensions.Type: ApplicationFiled: May 19, 2020Publication date: November 25, 2021Inventors: Lawrence Bruce Huston, III, David Coffey, Andrew Mortensen
-
Publication number: 20210344667Abstract: A system, method, and computer-readable medium are disclosed for implementing a cybersecurity system having a digital certificate reputation system. At least one embodiment is directed to a computer-implemented method executing operations including receiving a communication having an internet protocol (IP) address and a digital certificate at a device within the secured network; determining whether the IP address is identified as having a high-security risk level; if the IP address has a high-security risk level, assigning a security risk level to the digital certificate based on the security risk level of the IP address; and using the security risk level for the digital certificate in executing the one or more security policies. Other embodiments include corresponding computer systems, apparatus, and computer programs recorded on one or more computer storage devices.Type: ApplicationFiled: May 1, 2020Publication date: November 4, 2021Inventors: Lawrence Bruce Huston, III, David Coffey
-
Publication number: 20210297437Abstract: A system, method, and computer-readable medium are disclosed for implementing a security analytics system configured to instantiate user behavior baselines using historical data stored on an endpoint device. At least one embodiment is directed to a computer-implemented method including: accessing historical data stored on an endpoint device during an initialization of the endpoint device on the secured network, instantiating user behavior baselines for the endpoint device using the accessed historical data, and storing the instantiated user behavior baselines on a security system of the secured network for detecting instances of anomalous user behavior occurring at the endpoint device. Other embodiments of this aspect include corresponding computer systems, apparatus, and computer programs recorded on one or more computer storage devices, each configured to perform the actions of the methods.Type: ApplicationFiled: March 23, 2020Publication date: September 23, 2021Inventors: Lawrence Bruce Huston, III, David Coffey
-
Publication number: 20210152567Abstract: A system, method, and computer-readable medium are disclosed for performing a security operation. The security operation includes: monitoring an entity, the monitoring observing at least one electronically-observable data source; identifying a security related activity of the entity, the security related activity being of analytic utility; accessing an entity behavior catalog based upon the security related activity, the entity behavior catalog providing an inventory of entity behaviors; and performing a security operation via a distributed security analytics environment, the security operation using entity behavior catalog data stored within the entity behavior catalog based upon the security related activity.Type: ApplicationFiled: December 22, 2020Publication date: May 20, 2021Inventors: Lawrence Bruce Huston, III, Nicolas Christian Fischbach, Raffael Marty
-
Publication number: 20210112078Abstract: A system, method, and computer-readable medium are disclosed for performing a security analytics mapping operation.Type: ApplicationFiled: December 22, 2020Publication date: April 15, 2021Inventors: Lawrence Bruce Huston, III, David Coffey
-
Publication number: 20210112077Abstract: A system, method, and computer-readable medium are disclosed for performing a security operation. The security operation includes: monitoring a plurality of actions of an entity, the plurality of actions of the entity corresponding to a plurality of events enacted by the entity; maintaining information relating to the monitoring within a user edge component; identifying an event of analytic utility; analyzing the event of analytic utility at the user edge component, the analyzing generating a security risk assessment; and, providing the security risk assessment to a network edge component.Type: ApplicationFiled: December 22, 2020Publication date: April 15, 2021Inventors: Lawrence Bruce Huston, III, David Coffey
-
Publication number: 20210112076Abstract: A system, method, and computer-readable medium are disclosed for performing a security operation. The security operation includes: monitoring an entity, the monitoring observing at least one electronically-observable data source; identifying an event of analytic utility; analyzing the event of analytic utility, the analyzing the event of analytic utility identifying an entity behavior associated with the event of analytic utility; and, performing the security operation in response to the analyzing the event of analytic utility, where the monitoring, identifying, analyzing and performing are performed via a distributed security analytics framework.Type: ApplicationFiled: December 22, 2020Publication date: April 15, 2021Inventors: Lawrence Bruce Huston, III, David Coffey
-
Patent number: 10965553Abstract: A method for optimizing performance analysis of a plurality of network hosts associated with a communications network includes aggregating captured network performance data including a plurality of captured network performance metrics for a plurality of network flows. Each one of the plurality of network flows is associated with a plurality of network hosts. The aggregated captured network performance data is encoded by employing at least one data modification function. Dimensionality of the encoded captured network performance data is reduced using a neural network model. One or more reduced-dimensional clusters of the encoded captured network performance data are generated. Each of the one or more reduced-dimensional clusters is grouping one or more hosts of the plurality of network hosts based on the captured network performance metrics.Type: GrantFiled: August 20, 2018Date of Patent: March 30, 2021Assignee: Arbor Networks, Inc.Inventors: Mathew Ralph Richardson, Lawrence Bruce Huston, III, R. Grant Reed
-
Patent number: 10914550Abstract: A holster accessory apparatus that is configures to modify existing holsters to allow for more comfortable carrying of a gun with an exposed grip. The accessory comprises two elements, a flexible material larger than the perimeter of a combination of a gun holster and an attaching element configures to affix the holster to the flexible material. In one embodiment, method is designed for conceal and carry situations.Type: GrantFiled: May 9, 2019Date of Patent: February 9, 2021Inventor: Lawrence Bruce Dirlam
-
Publication number: 20200099597Abstract: A method for optimizing performance analysis of a plurality of network hosts associated with a communications network includes aggregating captured network performance data including a plurality of captured network performance metrics for a plurality of network flows. Each one of the plurality of network flows is associated with a plurality of network hosts. The aggregated captured network performance data is encoded by employing at least one data modification function. Dimensionality of the encoded captured network performance data is reduced using a neural network model. One or more reduced-dimensional clusters of the encoded captured network performance data are generated. Each of the one or more reduced-dimensional clusters is grouping one or more hosts of the plurality of network hosts based on the captured network performance metrics.Type: ApplicationFiled: August 20, 2018Publication date: March 26, 2020Applicant: Arbor Networks. Inc.Inventors: Mathew Ralph Richardson, Lawrence Bruce Huston, III, R. Grant Reed
-
Publication number: 20170027741Abstract: An apparatus to artificially induce micturition is presented. The apparatus includes a urination stimulation element in communication with a user, the urination simulation element providing a trigger to the user, said trigger for completing a parasympathetic feedback loop for initiation, reinitiation or continued flow of urine from the user. The apparatus further includes a receptacle, a handle in mechanical communication with the receptacle, an opening in the receptacle for receiving urination from a user, and a valve having a first side in fluid communication with the reservoir and having a second side in fluid communication with the receptacle.Type: ApplicationFiled: June 10, 2016Publication date: February 2, 2017Inventor: Lawrence Bruce
-
Patent number: 9432385Abstract: A method to mitigate attack by an upstream service provider using cloud mitigation services. An edge detection device, which located at the subscriber's network edge, is able to communicate information via status messages about attacks to an upstream service provider. The service provider is then able to mitigate attacks based on the status messages. There is a feedback loop whereby the amount of dropped traffic by the service provider is added to the network traffic to keep the mitigation request open and prevent flapping. Likewise, the detection device includes time-to-engage and time-to-disengage timers to further prevent flapping.Type: GrantFiled: December 16, 2011Date of Patent: August 30, 2016Assignee: Arbor Networks, Inc.Inventors: Chester Kustarz, Lawrence Bruce Huston, III, James A. Simpson, James Edward Winquist, Olan Patrick Barnes, Eric Jackson