Patents by Inventor Marc A. Norton

Marc A. Norton has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 11939321
    Abstract: The invention provides a compound of formula (0): or a pharmaceutically acceptable salt, N-oxide or tautomer thereof; wherein: n is 1 or 2; X is CH or N; Y is selected from CH and C—F; Z is selected from C—Rz and N; R1 is selected from: -(Alk1)t-Cyc1; wherein t is 0 or 1; Optionally substituted C1-6 acyclic hydrocarbon groups R2 is selected from hydrogen; halogen; and C1-3 hydrocarbon groups optionally substituted with one or more fluorine atoms; R3 is hydrogen or a group L1-R7; R4 is selected from hydrogen; methoxy; and optionally substituted C1-3 alkyl; and R4a is selected from hydrogen and a C1-3 alkyl group; wherein Rz, Alk1, Cyc1, L1 and R7 are defined herein; provided that the compound is other than 6-benzyl-3-{2-[(2-methylpyrimidin-4-yl)amino]pyridin-4-yl}-7,8-dihydro-1,6-naphthyridin-5(6H)-one and 3-{2-[(2-methylpyrimidin-4-yl)amino]pyridin-4-yl}-7,8-dihydro-1,6-naphthyridin-5(6H)-one and salts and tautomers thereof.
    Type: Grant
    Filed: April 7, 2021
    Date of Patent: March 26, 2024
    Assignee: OTSUKA PHARMACEUTICAL CO., LTD.
    Inventors: Valerio Berdini, Ildiko Maria Buck, James Edward Harvey Day, Charlotte Mary Griffiths-Jones, Thomas Daniel Heightman, Steven Howard, Christopher William Murray, David Norton, Marc O'Reilly, Alison Jo-Anne Woolford, Michael Liam Cooke, David Cousin, Stuart Thomas Onions, Jonathan Martin Shannon, John Paul Watts
  • Patent number: 9705899
    Abstract: A digital filter correlation engine, wherein the correlation engine combines N arbitrary digital filter states based on the weights and along with a threshold generate a network incident. This network incident in turn can be feedback to another digital filter. This multi-layering capability allows the creation of higher level event detections that are time-based for a cyber security analyst to analyze, thereby reducing the amount of manual work the analyst has to do in inspecting behaviors within the network.
    Type: Grant
    Filed: March 8, 2010
    Date of Patent: July 11, 2017
    Assignee: BAE Systems Information and Electronic Systems Integration Inc.
    Inventors: Aaron Boteler, Marc Norton
  • Patent number: 8776226
    Abstract: A digital filter correlation engine, wherein the correlation engine combines N arbitrary digital filter states based on the weights and along with a threshold generate a network incident. This network incident in turn can be feedback to another digital filter. This multi-layering capability allows the creation of higher level event detections that are time-based for a cyber security analyst to analyze, thereby reducing the amount of manual work the analyst has to do in inspecting behaviors within the network.
    Type: Grant
    Filed: March 22, 2010
    Date of Patent: July 8, 2014
    Assignee: BAE Systems Information and Electronic Systems Integration Inc.
    Inventors: Aaron Boteler, Marc Norton
  • Patent number: 8474043
    Abstract: In an intrusion detection/prevention system, network traffic is received and checked for a matching pattern. Upon identifying the matching pattern, the network traffic with the matching pattern is evaluated against rules that are represented by a rule tree. References to rule options are represented in the rule tree and are stored separately from the rule tree. The rule tree represents unique rules by unique paths from a root of the tree to the leaf nodes, and represents rule options as non-leaf nodes of the rule tree. Evaluating the network traffic includes processing, against the network traffic, the rule options in the rule tree beginning at the root. Processing of the rules represented by subtrees of nodes with rule options that do not match is eliminated. The network traffic is evaluated against rules terminating in leaf nodes only for combinations of rule options that match the network traffic.
    Type: Grant
    Filed: August 28, 2008
    Date of Patent: June 25, 2013
    Assignee: Sourcefire, Inc.
    Inventors: Steven Sturges, Marc Norton
  • Patent number: 7996424
    Abstract: Embodiments of the present invention relate to systems and methods for optimizing and reducing the memory requirements of state machine algorithms in pattern matching applications. Memory requirements of an Aho-Corasick algorithm are reduced in an intrusion detection system by representing the state table as three separate data structures. Memory requirements of an Aho-Corasick algorithm are also reduced by applying a banded-row sparse matrix technique to the state transition table of the state table. The pattern matching performance of the intrusion detection system is improved by performing a case insensitive search, where the characters of the test sequence are converted to uppercase as the characters are read. Testing reveals that state transition tables with sixteen bit elements outperform state transition tables with thirty-two bit elements and do not reduce the functionality of intrusion detection system using the Aho-Corasick algorithm.
    Type: Grant
    Filed: January 31, 2008
    Date of Patent: August 9, 2011
    Assignee: Sourcefire, Inc.
    Inventors: Marc A. Norton, Daniel J. Roelker
  • Publication number: 20110185419
    Abstract: A digital filter correlation engine, wherein the correlation engine combines N arbitrary digital filter states based on the weights and along with a threshold generate a network incident. This network incident in turn can be feedback to another digital filter. This multi-layering capability allows the creation of higher level event detections that are time-based for a cyber security analyst to analyze, thereby reducing the amount of manual work the analyst has to do in inspecting behaviors within the network.
    Type: Application
    Filed: March 22, 2010
    Publication date: July 28, 2011
    Applicant: BAE Systems Information and Electronic Systems Integration Inc.
    Inventors: Aaron Boteler, Marc Norton
  • Publication number: 20110185418
    Abstract: A digital filter correlation engine, wherein the correlation engine combines N arbitrary digital filter states based on the weights and along with a threshold generate a network incident. This network incident in turn can be feedback to another digital filter. This multi-layering capability allows the creation of higher level event detections that are time-based for a cyber security analyst to analyze, thereby reducing the amount of manual work the analyst has to do in inspecting behaviors within the network.
    Type: Application
    Filed: March 8, 2010
    Publication date: July 28, 2011
    Applicant: BAE Systems Information and Electronic Systems Integration Inc.
    Inventors: Aaron Boteler, Marc Norton
  • Patent number: 7756885
    Abstract: Embodiments of the present invention relate to systems and methods for optimizing and reducing the memory requirements of state machine algorithms in pattern matching applications. Memory requirements of an Aho-Corasick algorithm are reduced in an intrusion detection system by representing the state table as three separate data structures. Memory requirements of an Aho-Corasick algorithm are are also reduced by applying a banded-row sparse matrix technique to the state transition table of the state table. The pattern matching performance of the intrusion detection system is improved by performing a case insensitive search, where the characters of the test sequence are converted to uppercase as the characters are read. Testing reveals that state transition table with sixteen bit elements outperform state transition table with thirty-two bit elements and do not reduce the functionality of intrusion detection systems using the Aho-Corasick algorithm.
    Type: Grant
    Filed: April 19, 2007
    Date of Patent: July 13, 2010
    Assignee: Sourcefire, Inc.
    Inventors: Marc A. Norton, Daniel J. Roelker
  • Publication number: 20090262659
    Abstract: In an intrusion detection/prevention system, network traffic is received and checked for a matching pattern. Upon identifying the matching pattern, the network traffic with the matching pattern is evaluated against rules that are represented by a rule tree. References to rule options are represented in the rule tree and are stored separately from the rule tree. The rule tree represents unique rules by unique paths from a root of the tree to the leaf nodes, and represents rule options as non-leaf nodes of the rule tree. Evaluating the network traffic includes processing, against the network traffic, the rule options in the rule tree beginning at the root. Processing of the rules represented by subtrees of nodes with rule options that do not match is eliminated. The network traffic is evaluated against rules terminating in leaf nodes only for combinations of rule options that match the network traffic.
    Type: Application
    Filed: August 28, 2008
    Publication date: October 22, 2009
    Applicant: Sourcefire, Inc.
    Inventors: Steven Sturges, Marc Norton
  • Patent number: 7539681
    Abstract: Embodiments of the present invention relate to systems and methods for optimizing and reducing the memory requirements of state machine algorithms in pattern matching applications. Memory requirements of an Aho-Corasick algorithm are reduced in an intrusion detection system by representing the state table as three separate data structures. Memory requirements of an Aho-Corasick algorithm are also reduced by applying a banded-row sparse matrix technique to the state transition table of the state table. The pattern matching performance of the intrusion detection system is improved by performing a case insensitive search, where the characters of the test sequence are converted to uppercase as the characters are read. Testing reveals that state transition tables with sixteen bit elements outperform state transition tables with thirty-two bit elements and do not reduce the functionality of intrusion detection systems using the Aho-Corasick algorithm.
    Type: Grant
    Filed: July 26, 2004
    Date of Patent: May 26, 2009
    Assignee: Sourcefire, Inc.
    Inventors: Marc A. Norton, Daniel J. Roelker
  • Patent number: 7496962
    Abstract: A hypertext transport protocol (HTTP) inspection engine for an intrusion detection system (IDS) includes an HTTP policy selection component, a request universal resource identifier (URI) discovery component, and a URI normalization module. The HTTP policy selection component identifies an HTTP intrusion detection policy using a packet. The request URI discovery component locates a URI within the packet. The URI normalization module decodes an obfuscation within the URI. In another embodiment, a packet transmitted on the network is intercepted. The packet is parsed. An Internet protocol (IP) address of the packet is identified. An HTTP intrusion detection policy for a network device is determined. A URI is located in the packet. A pattern from an intrusion detection system rule is compared to the located URI. In another embodiment, an IDS includes a packet acquisition system, network and transport reassembly modules, an HTTP inspection engine, a detection engine, and a logging system.
    Type: Grant
    Filed: September 29, 2004
    Date of Patent: February 24, 2009
    Assignee: Sourcefire, Inc.
    Inventors: Daniel J. Roelker, Marc A. Norton
  • Publication number: 20080276316
    Abstract: A hypertext transport protocol (HTTP) inspection engine for an intrusion detection system (IDS) includes an HTTP policy selection component, a request universal resource identifier (URI) discovery component, and a URI normalization module. The HTTP policy selection component identifies an HTTP intrusion detection policy using a packet. The request URI discovery component locates a URI within the packet. The URI normalization module decodes an obfuscation within the URI. In another embodiment, a packet transmitted on the network is intercepted. The packet is parsed. An Internet protocol (IP) address of the packet is identified. An HTTP intrusion detection policy for a network device is determined. A URI is located in the packet. A pattern from an intrusion detection system rule is compared to the located URI. In another embodiment, an IDS includes a packet acquisition system, network and transport reassembly modules, an HTTP inspection engine, a detection engine, and a logging system.
    Type: Application
    Filed: September 29, 2004
    Publication date: November 6, 2008
    Inventors: Daniel J. Roelker, Marc A. Norton
  • Publication number: 20080133523
    Abstract: Embodiments of the present invention relate to systems and methods for optimizing and reducing the memory requirements of state machine algorithms in pattern matching applications. Memory requirements of an Aho-Corasick algorithm are reduced in an intrusion detection system by representing the state table as three separate data structures. Memory requirements of an Aho-Corasick algorithm are also reduced by applying a banded-row sparse matrix technique to the state transition table of the state table. The pattern matching performance of the intrusion detection system is improved by performing a case insensitive search, where the characters of the test sequence are converted to uppercase as the characters are read. Testing reveals that state transition tables with sixteen bit elements outperform state transition tables with thirty-two bit elements and do not reduce the functionality of intrusion detection system using the Aho-Corasick algorithm.
    Type: Application
    Filed: January 31, 2008
    Publication date: June 5, 2008
    Applicant: SOURCEFIRE, INC.
    Inventors: Marc A. Norton, Daniel J. Roelker
  • Patent number: 7313695
    Abstract: The threat probability of events generated by a security device on a computer network is assessed by comparing the threat probability to a global threat probability. An abstract data type is used to describe how the events are combined to form a threat. If an event matches an unpopulated member of an instance of an abstract data type, the event is added to the instance and the probability of the instance is computed. If the probability of the instance is greater than a global threat probability, a dynamic threat assessment event is generated. A system for dynamically assessing threats to computers and computer networks system includes at least one security device that generates events, an event collection database, policy configuration information, and a dynamic threat assessment engine.
    Type: Grant
    Filed: March 23, 2004
    Date of Patent: December 25, 2007
    Assignee: Sourcefire, Inc.
    Inventors: Marc A. Norton, Daniel J. Roelker
  • Patent number: 7305708
    Abstract: Performance of an intrusion detection system is enhanced with the addition of rule optimization, set-based rule inspection, and protocol flow analysis. During rule optimization, rule sets are created and selected in such a way that for every incoming packet only a single rule set has to be searched. Set-based rule inspection divides rules into content and non-content type rules. Only search patterns of content type rules are initially compared to a packet. Rules containing matched search patterns are validated with a parameterized search against the packet. Matches are recorded as events. Non-content rules are searched against a packet using a parameterized search. These matches are also recorded as an event. At least one event is selected per packet for logging. Protocol flow analysis determines the direction of flow of network traffic. Based on the direction of flow and the protocol, portions of packets can be eliminated from rule inspection.
    Type: Grant
    Filed: March 8, 2004
    Date of Patent: December 4, 2007
    Assignee: Sourcefire, Inc.
    Inventors: Marc A. Norton, Daniel J. Roelker
  • Publication number: 20070192286
    Abstract: Embodiments of the present invention relate to systems and methods for optimizing and reducing the memory requirements of state machine algorithms in pattern matching applications. Memory requirements of an Aho-Corasick algorithm are reduced in an intrusion detection system by representing the state table as three separate data structures. Memory requirements of an Aho-Corasick algorithm are are also reduced by applying a banded-row sparse matrix technique to the state transition table of the state table. The pattern matching performance of the intrusion detection system is improved by performing a case insensitive search, where the characters of the test sequence are converted to uppercase as the characters are read. Testing reveals that state transition table with sixteen bit elements outperform state transition table with thirty-two bit elements and do not reduce the functionality of intrusion detection systems using the Aho-Corasick algorithm.
    Type: Application
    Filed: April 19, 2007
    Publication date: August 16, 2007
    Applicant: SOURCEFIRE, INC.
    Inventors: Marc Norton, Daniel Roelker
  • Publication number: 20060020595
    Abstract: Embodiments of the present invention relate to systems and methods for optimizing and reducing the memory requirements of state machine algorithms in pattern matching applications. Memory requirements of an Aho-Corasick algorithm are reduced in an intrusion detection system by representing the state table as three separate data structures. Memory requirements of an Aho-Corasick algorithm are also reduced by applying a banded-row sparse matrix technique to the state transition table of the state table. The pattern matching performance of the intrusion detection system is improved by performing a case insensitive search, where the characters of the test sequence are converted to uppercase as the characters are read. Testing reveals that state transition tables with sixteen bit elements outperform state transition tables with thirty-two bit elements and do not reduce the functionality of intrusion detection systems using the Aho-Corasick algorithm.
    Type: Application
    Filed: July 26, 2004
    Publication date: January 26, 2006
    Inventors: Marc Norton, Daniel Roelker
  • Publication number: 20050216764
    Abstract: The threat probability of events generated by a security device on a computer network is assessed by comparing the threat probability to a global threat probability. An abstract data type is used to describe how the events are combined to form a threat. If an event matches an unpopulated member of an instance of an abstract data type, the event is added to the instance and the probability of the instance is computed. If the probability of the instance is greater than a global threat probability, a dynamic threat assessment event is generated. A system for dynamically assessing threats to computers and computer networks system includes at least one security device that generates events, an event collection database, policy configuration information, and a dynamic threat assessment engine.
    Type: Application
    Filed: March 23, 2004
    Publication date: September 29, 2005
    Inventors: Marc Norton, Daniel Roelker
  • Publication number: 20040205360
    Abstract: Performance of an intrusion detection system is enhanced with the addition of rule optimization, set-based rule inspection, and protocol flow analysis. During rule optimization, rule sets are created and selected in such a way that for every incoming packet only a single rule set has to be searched. Set-based rule inspection divides rules into content and non-content type rules. Only search patterns of content type rules are initially compared to a packet. Rules containing matched search patterns are validated with a parameterized search against the packet. Matches are recorded as events. Non-content rules are searched against a packet using a parameterized search. These matches are also recorded as an event. At least one event is selected per packet for logging. Protocol flow analysis determines the direction of flow of network traffic. Based on the direction of flow and the protocol, portions of packets can be eliminated from rule inspection.
    Type: Application
    Filed: March 8, 2004
    Publication date: October 14, 2004
    Inventors: Marc A. Norton, Daniel J. Roelker