Patents by Inventor Martin Quiroga

Martin Quiroga has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 10701027
    Abstract: A self-organizing distributed network architecture is described. An example method includes, by a network node, sending via a network gateway node a DNS lookup request to a DNS service. The DNS lookup request comprises a string that at least includes a MAC address of the network gateway node that is used by the DNS service to identify a network address for the network node to access the network service of interest. The method further includes receiving via the network gateway node a DNS lookup response from the DNS service. The DNS lookup response comprises the network address for the network node to access the network service of interest. The method further includes accessing the network service of interest from another network node in the network system that is addressable by the received network address.
    Type: Grant
    Filed: July 2, 2018
    Date of Patent: June 30, 2020
    Assignee: SecureSky, Inc.
    Inventors: John S. Flowers, Martin Quiroga
  • Publication number: 20190141007
    Abstract: A self-organizing distributed network architecture is described. An example method includes, by a network node, sending via a network gateway node a DNS lookup request to a DNS service. The DNS lookup request comprises a string that at least includes a MAC address of the network gateway node that is used by the DNS service to identify a network address for the network node to access the network service of interest. The method further includes receiving via the network gateway node a DNS lookup response from the DNS service. The DNS lookup response comprises the network address for the network node to access the network service of interest. The method further includes accessing the network service of interest from another network node in the network system that is addressable by the received network address.
    Type: Application
    Filed: July 2, 2018
    Publication date: May 9, 2019
    Applicant: EVENGX, LLC
    Inventors: John S. FLOWERS, Martin QUIROGA
  • Patent number: 10015239
    Abstract: A self-organizing distributed network architecture is described. An example method includes, by a network node, sending via a network gateway node a DNS lookup request to a DNS service. The DNS lookup request comprises a string that at least includes a MAC address of the network gateway node that is used by the DNS service to identify a network address for the network node to access the network service of interest. The method further includes receiving via the network gateway node a DNS lookup response from the DNS service. The DNS lookup response comprises the network address for the network node to access the network service of interest. The method further includes accessing the network service of interest from another network node in the network system that is addressable by the received network address.
    Type: Grant
    Filed: August 11, 2016
    Date of Patent: July 3, 2018
    Assignee: EVENGX, LLC
    Inventors: John S. Flowers, Martin Quiroga
  • Publication number: 20170279821
    Abstract: An instruction sequence detection system is trained to detect instruction sequences of interest, such as threats by malicious computer data. Training includes distilling the characteristics of known instruction sequences of interest (e.g., intrusion by computer viruses, exploits, worms, or the like) into a set of meta-expressions. At run-time, the instruction sequence detection system combines the minimal set of meta-expressions with efficient computer algorithms for evaluating meta-expressions to detect known instruction sequences of interest, as well as their unknown variants, among an unknown set of instruction sequences. The instruction sequence detection system may provide an appropriate response upon the detection of instruction sequences of interest.
    Type: Application
    Filed: March 21, 2017
    Publication date: September 28, 2017
    Applicant: TrustPipe LLC
    Inventors: John S. FLOWERS, Martin QUIROGA
  • Publication number: 20120265578
    Abstract: A system receives from a client a job comprising confidential information. The system then distorts the confidential information associated with the job. Next, the system divides the job into multiple discrete tasks such that the distorted confidential information is further divided and the confidential information cannot be deciphered from an individual task. The tasks are then delegated to respondents in different geographical locations with different social preferences. Because of these differences the respondents are unlikely to communicate information about their job with each other. The respondents receive the job securely through their electronic devices, perform the delegated tasks, and provide the system with responses to the tasks through the devices. The system receives the responses for individual tasks, deduces a unified job response from the received responses and transmits the unified response to the client.
    Type: Application
    Filed: April 12, 2012
    Publication date: October 18, 2012
    Applicant: JANA MOBILE, INC.
    Inventors: Benjamin P. Olding, Nathan Norfleet Eagle, Martin A. Quiroga
  • Patent number: 8176544
    Abstract: A system and method for providing distributed security of a network. Several device profilers are placed at different locations of a network to assess vulnerabilities from different perspectives. The device profiler identifies the hosts on the network, and characteristics such as operating system and applications running on the hosts. The device profiler traverses a vulnerability tree having nodes representative of characteristics of the hosts, each node having an associated set of potential vulnerabilities. Verification rules can verify the potential vulnerabilities. A centralized correlation server, at a centrally accessible location in the network, stores the determined vulnerabilities of the network and associates the determined vulnerabilities with attack signatures. Traffic monitors access the attack signatures and monitor network traffic for attacks against the determined vulnerabilities.
    Type: Grant
    Filed: February 3, 2011
    Date of Patent: May 8, 2012
    Assignee: nCircle Network Security, Inc.
    Inventors: Timothy D. Keanini, Martin A. Quiroga, Brian W. Buchanan, John S. Flowers
  • Patent number: 8020211
    Abstract: A system and method for providing distributed security of a network. Several device profilers are placed at different locations of a network to assess vulnerabilities from different perspectives. The device profiler identifies the hosts on the network, and characteristics such as operating system and applications running on the hosts. The device profiler traverses a vulnerability tree having nodes representative of characteristics of the hosts, each node having an associated set of potential vulnerabilities. Verification rules can verify the potential vulnerabilities. A centralized correlation server, at a centrally accessible location in the network, stores the determined vulnerabilities of the network and associates the determined vulnerabilities with attack signatures. Traffic monitors access the attack signatures and monitor network traffic for attacks against the determined vulnerabilities.
    Type: Grant
    Filed: September 1, 2009
    Date of Patent: September 13, 2011
    Assignee: nCircle Network Security, Inc.
    Inventors: Timothy D. Keanini, Martin A. Quiroga, Brian W. Buchanan, John S. Flowers
  • Publication number: 20110131644
    Abstract: A system and method for providing distributed security of a network. Several device profilers are placed at different locations of a network to assess vulnerabilities from different perspectives. The device profiler identifies the hosts on the network, and characteristics such as operating system and applications running on the hosts. The device profiler traverses a vulnerability tree having nodes representative of characteristics of the hosts, each node having an associated set of potential vulnerabilities. Verification rules can verify the potential vulnerabilities. A centralized correlation server, at a centrally accessible location in the network, stores the determined vulnerabilities of the network and associates the determined vulnerabilities with attack signatures. Traffic monitors access the attack signatures and monitor network traffic for attacks against the determined vulnerabilities.
    Type: Application
    Filed: February 3, 2011
    Publication date: June 2, 2011
    Inventors: Timothy D. Keanini, Martin A. Quiroga, Brian W. Buchanan, John S. Flowers
  • Publication number: 20100169352
    Abstract: The present invention is directed to systems and methods for encoding and retrieving information from a variety of sources using novel search techniques. The systems and methods of the invention are capable of extracting all types of structural and relational information from a query or a source data allowing for the recognition of subtle differences in meaning. The capability of discerning subtle differences in meaning that are beyond the search systems and methods presently available, the invention described herein is capable of repeatedly providing accurate and meaningful responses to a diverse set of queries.
    Type: Application
    Filed: December 31, 2008
    Publication date: July 1, 2010
    Inventors: John S. Flowers, Michael Farmer, Martin A. Quiroga, Gordon H. Fischer, John A. DeSanto
  • Publication number: 20090320138
    Abstract: A system and method for providing distributed security of a network. Several device profilers are placed at different locations of a network to assess vulnerabilities from different perspectives. The device profiler identifies the hosts on the network, and characteristics such as operating system and applications running on the hosts. The device profiler traverses a vulnerability tree having nodes representative of characteristics of the hosts, each node having an associated set of potential vulnerabilities. Verification rules can verify the potential vulnerabilities. A centralized correlation server, at a centrally accessible location in the network, stores the determined vulnerabilities of the network and associates the determined vulnerabilities with attack signatures. Traffic monitors access the attack signatures and monitor network traffic for attacks against the determined vulnerabilities.
    Type: Application
    Filed: September 1, 2009
    Publication date: December 24, 2009
    Applicant: c/o nCircle Network Security, Inc.
    Inventors: Timothy D. Keanini, Martin A. Quiroga, Brian W. Buchanan, John S. Flowers
  • Patent number: 7594273
    Abstract: A system and method for providing distributed security of a network. Several device profilers are placed at different locations of a network to assess vulnerabilities from different perspectives. The device profiler identifies the hosts on the network, and characteristics such as operating system and applications running on the hosts. The device profiler traverses a vulnerability tree having nodes representative of characteristics of the hosts, each node having an associated set of potential vulnerabilities. Verification rules can verify the potential vulnerabilities. A centralized correlation server, at a centrally accessible location in the network, stores the determined vulnerabilities of the network and associates the determined vulnerabilities with attack signatures. Traffic monitors access the attack signatures and monitor network traffic for attacks against the determined vulnerabilities.
    Type: Grant
    Filed: February 16, 2007
    Date of Patent: September 22, 2009
    Assignee: nCircle Network Security, Inc.
    Inventors: Timothy D. Keanini, Martin A. Quiroga, Brian W. Buchanan, John S. Flowers
  • Patent number: 7555475
    Abstract: There is provided a sentence module that handles pronouns in sentences. Each pronoun is replaced by one or more nouns. These replaced nouns are used to form statements that populate the structured representation, in order to produce precise answers to queries, as part of a search engine application.
    Type: Grant
    Filed: September 9, 2005
    Date of Patent: June 30, 2009
    Assignee: Jiles, Inc.
    Inventors: Martin A. Quiroga, Gordon H. Fischer, John S. Flowers
  • Publication number: 20090077180
    Abstract: The present invention is directed to systems and methods for encoding and retrieving information from a variety of sources using novel search techniques. The systems and methods of the invention are capable of extracting all types of structural and relational information from a query or a source data allowing for the recognition of subtle differences in meaning. The capability of discerning subtle differences in meaning that are beyond the search systems and methods presently available, the invention described herein is capable of repeatedly providing accurate and meaningful responses to a diverse set of queries.
    Type: Application
    Filed: September 14, 2007
    Publication date: March 19, 2009
    Inventors: John S. Flowers, Michael Farmer, Martin A. Quiroga, Gordon H. Fischer, John A. DeSanto
  • Patent number: 7447683
    Abstract: There is provided a search engine or other electronic search application that receives an inputted query in natural language. The search engine then analyzes the query in accordance with the syntactic relationships of the natural language in which it was presented, weights the syntactic relationships, and generates a result to the query as output, corresponding to the syntactic relationship of the greatest weight. The outputted result is typically an answer, in the form of a sentence or a phrase, along with the document from which the sentence or phrase is taken, including a hypertext link for the document.
    Type: Grant
    Filed: April 28, 2005
    Date of Patent: November 4, 2008
    Assignee: Jiles, Inc.
    Inventors: Martin A. Quiroga, John A. DeSanto, John S. Flowers
  • Publication number: 20070208732
    Abstract: The present invention is directed to systems and methods for encoding and retrieving information from a variety of sources using novel search techniques. The systems and methods of the invention are capable of extracting all types of structural and relational information from a query or a source data allowing for the recognition of subtle differences in meaning. The capability of discerning subtle differences in meaning that are beyond the search systems and methods presently available, the invention described herein is capable of repeatedly providing accurate and meaningful responses to a diverse set of queries. Particular embodiments of the present invention include walkie-talkie-type telephone interfaces where the user may speak directly to the present invention and receive a spoken response relevant to any provided enquiry.
    Type: Application
    Filed: February 7, 2007
    Publication date: September 6, 2007
    Applicant: FUTURE VISTAS, INC.
    Inventors: John Flowers, Michael Farmer, Martin Quiroga, Gordon Fischer, John DeSanto
  • Publication number: 20070185859
    Abstract: The present invention is directed to systems and methods for encoding and retrieving information from a variety of sources using novel search techniques. The systems and methods of the invention are capable of extracting all types of structural and relational information from a query or a source data allowing for the recognition of subtle differences in meaning. The capability of discerning subtle differences in meaning that are beyond the search systems and methods presently available, the invention described herein is capable of repeatedly providing accurate and meaningful responses to a diverse set of queries.
    Type: Application
    Filed: October 12, 2006
    Publication date: August 9, 2007
    Applicants: Kozoru, Inc.
    Inventors: John Flowers, Michael Farmer, Martin Quiroga, Gordon Fischer, John DeSanto
  • Publication number: 20070143852
    Abstract: A system and method for providing distributed security of a network. Several device profilers are placed at different locations of a network to assess vulnerabilities from different perspectives. The device profiler identifies the hosts on the network, and characteristics such as operating system and applications running on the hosts. The device profiler traverses a vulnerability tree having nodes representative of characteristics of the hosts, each node having an associated set of potential vulnerabilities. Verification rules can verify the potential vulnerabilities. A centralized correlation server, at a centrally accessible location in the network, stores the determined vulnerabilities of the network and associates the determined vulnerabilities with attack signatures. Traffic monitors access the attack signatures and monitor network traffic for attacks against the determined vulnerabilities.
    Type: Application
    Filed: February 16, 2007
    Publication date: June 21, 2007
    Inventors: Timothy Keanini, Martin Quiroga, Brian Buchanan, John Flowers
  • Publication number: 20070078814
    Abstract: The present invention is directed to systems and methods for encoding and retrieving information from a variety of sources using novel search techniques. The systems and methods of the invention are capable of extracting all types of structural and relational information from a query or a source data allowing for the recognition of subtle differences in meaning. The capability of discerning subtle differences in meaning that are beyond the search systems and methods presently available, the invention described herein is capable of repeatedly providing accurate and meaningful responses to a diverse set of queries.
    Type: Application
    Filed: October 4, 2005
    Publication date: April 5, 2007
    Applicant: Kozoru, Inc.
    Inventors: John Flowers, Michael Farmer, Martin Quiroga, Gordon Fischer, John DeSanto
  • Patent number: 7181769
    Abstract: A system and method for providing distributed security of a network. Several device profilers are placed at different locations of a network to assess vulnerabilities from different perspectives. The device profiler identifies the hosts on the network, and characteristics such as operating system and applications running on the hosts. The device profiler traverses a vulnerability tree having nodes representative of characteristics of the hosts, each node having an associated set of potential vulnerabilities. Verification rules can verify the potential vulnerabilities. A centralized correlation server, at a centrally accessible location in the network, stores the determined vulnerabilities of the network and associates the determined vulnerabilities with attach signatures. Traffic monitors access the attack signatures and monitor network traffic for attacks against the determined vulnerabilities.
    Type: Grant
    Filed: June 6, 2003
    Date of Patent: February 20, 2007
    Assignee: nCircle Network Security, Inc.
    Inventors: Timothy D. Keanini, Martin A. Quiroga, Brian W. Buchanan, John S. Flowers
  • Publication number: 20060224566
    Abstract: There is provided a search engine or other electronic search application that receives an inputted query in natural language. The search engine then analyzes the query in accordance with the syntactic relationships of the natural language in which it was presented, and generates a result to the query as output. The outputted result is typically an answer, in the form of a sentence or a phrase, along with the document from which the sentence or phrase is taken, including a hypertext link for the document.
    Type: Application
    Filed: March 31, 2005
    Publication date: October 5, 2006
    Inventors: John Flowers, Martin Quiroga, Gordon Fischer, John DeSanto