Patents by Inventor Martin Quiroga
Martin Quiroga has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 10701027Abstract: A self-organizing distributed network architecture is described. An example method includes, by a network node, sending via a network gateway node a DNS lookup request to a DNS service. The DNS lookup request comprises a string that at least includes a MAC address of the network gateway node that is used by the DNS service to identify a network address for the network node to access the network service of interest. The method further includes receiving via the network gateway node a DNS lookup response from the DNS service. The DNS lookup response comprises the network address for the network node to access the network service of interest. The method further includes accessing the network service of interest from another network node in the network system that is addressable by the received network address.Type: GrantFiled: July 2, 2018Date of Patent: June 30, 2020Assignee: SecureSky, Inc.Inventors: John S. Flowers, Martin Quiroga
-
Publication number: 20190141007Abstract: A self-organizing distributed network architecture is described. An example method includes, by a network node, sending via a network gateway node a DNS lookup request to a DNS service. The DNS lookup request comprises a string that at least includes a MAC address of the network gateway node that is used by the DNS service to identify a network address for the network node to access the network service of interest. The method further includes receiving via the network gateway node a DNS lookup response from the DNS service. The DNS lookup response comprises the network address for the network node to access the network service of interest. The method further includes accessing the network service of interest from another network node in the network system that is addressable by the received network address.Type: ApplicationFiled: July 2, 2018Publication date: May 9, 2019Applicant: EVENGX, LLCInventors: John S. FLOWERS, Martin QUIROGA
-
Patent number: 10015239Abstract: A self-organizing distributed network architecture is described. An example method includes, by a network node, sending via a network gateway node a DNS lookup request to a DNS service. The DNS lookup request comprises a string that at least includes a MAC address of the network gateway node that is used by the DNS service to identify a network address for the network node to access the network service of interest. The method further includes receiving via the network gateway node a DNS lookup response from the DNS service. The DNS lookup response comprises the network address for the network node to access the network service of interest. The method further includes accessing the network service of interest from another network node in the network system that is addressable by the received network address.Type: GrantFiled: August 11, 2016Date of Patent: July 3, 2018Assignee: EVENGX, LLCInventors: John S. Flowers, Martin Quiroga
-
Publication number: 20170279821Abstract: An instruction sequence detection system is trained to detect instruction sequences of interest, such as threats by malicious computer data. Training includes distilling the characteristics of known instruction sequences of interest (e.g., intrusion by computer viruses, exploits, worms, or the like) into a set of meta-expressions. At run-time, the instruction sequence detection system combines the minimal set of meta-expressions with efficient computer algorithms for evaluating meta-expressions to detect known instruction sequences of interest, as well as their unknown variants, among an unknown set of instruction sequences. The instruction sequence detection system may provide an appropriate response upon the detection of instruction sequences of interest.Type: ApplicationFiled: March 21, 2017Publication date: September 28, 2017Applicant: TrustPipe LLCInventors: John S. FLOWERS, Martin QUIROGA
-
COMPLETING TASKS INVOLVING CONFIDENTIAL INFORMATION BY DISTRIBUTED PEOPLE IN AN UNSECURE ENVIRONMENT
Publication number: 20120265578Abstract: A system receives from a client a job comprising confidential information. The system then distorts the confidential information associated with the job. Next, the system divides the job into multiple discrete tasks such that the distorted confidential information is further divided and the confidential information cannot be deciphered from an individual task. The tasks are then delegated to respondents in different geographical locations with different social preferences. Because of these differences the respondents are unlikely to communicate information about their job with each other. The respondents receive the job securely through their electronic devices, perform the delegated tasks, and provide the system with responses to the tasks through the devices. The system receives the responses for individual tasks, deduces a unified job response from the received responses and transmits the unified response to the client.Type: ApplicationFiled: April 12, 2012Publication date: October 18, 2012Applicant: JANA MOBILE, INC.Inventors: Benjamin P. Olding, Nathan Norfleet Eagle, Martin A. Quiroga -
Patent number: 8176544Abstract: A system and method for providing distributed security of a network. Several device profilers are placed at different locations of a network to assess vulnerabilities from different perspectives. The device profiler identifies the hosts on the network, and characteristics such as operating system and applications running on the hosts. The device profiler traverses a vulnerability tree having nodes representative of characteristics of the hosts, each node having an associated set of potential vulnerabilities. Verification rules can verify the potential vulnerabilities. A centralized correlation server, at a centrally accessible location in the network, stores the determined vulnerabilities of the network and associates the determined vulnerabilities with attack signatures. Traffic monitors access the attack signatures and monitor network traffic for attacks against the determined vulnerabilities.Type: GrantFiled: February 3, 2011Date of Patent: May 8, 2012Assignee: nCircle Network Security, Inc.Inventors: Timothy D. Keanini, Martin A. Quiroga, Brian W. Buchanan, John S. Flowers
-
Patent number: 8020211Abstract: A system and method for providing distributed security of a network. Several device profilers are placed at different locations of a network to assess vulnerabilities from different perspectives. The device profiler identifies the hosts on the network, and characteristics such as operating system and applications running on the hosts. The device profiler traverses a vulnerability tree having nodes representative of characteristics of the hosts, each node having an associated set of potential vulnerabilities. Verification rules can verify the potential vulnerabilities. A centralized correlation server, at a centrally accessible location in the network, stores the determined vulnerabilities of the network and associates the determined vulnerabilities with attack signatures. Traffic monitors access the attack signatures and monitor network traffic for attacks against the determined vulnerabilities.Type: GrantFiled: September 1, 2009Date of Patent: September 13, 2011Assignee: nCircle Network Security, Inc.Inventors: Timothy D. Keanini, Martin A. Quiroga, Brian W. Buchanan, John S. Flowers
-
Publication number: 20110131644Abstract: A system and method for providing distributed security of a network. Several device profilers are placed at different locations of a network to assess vulnerabilities from different perspectives. The device profiler identifies the hosts on the network, and characteristics such as operating system and applications running on the hosts. The device profiler traverses a vulnerability tree having nodes representative of characteristics of the hosts, each node having an associated set of potential vulnerabilities. Verification rules can verify the potential vulnerabilities. A centralized correlation server, at a centrally accessible location in the network, stores the determined vulnerabilities of the network and associates the determined vulnerabilities with attack signatures. Traffic monitors access the attack signatures and monitor network traffic for attacks against the determined vulnerabilities.Type: ApplicationFiled: February 3, 2011Publication date: June 2, 2011Inventors: Timothy D. Keanini, Martin A. Quiroga, Brian W. Buchanan, John S. Flowers
-
Publication number: 20100169352Abstract: The present invention is directed to systems and methods for encoding and retrieving information from a variety of sources using novel search techniques. The systems and methods of the invention are capable of extracting all types of structural and relational information from a query or a source data allowing for the recognition of subtle differences in meaning. The capability of discerning subtle differences in meaning that are beyond the search systems and methods presently available, the invention described herein is capable of repeatedly providing accurate and meaningful responses to a diverse set of queries.Type: ApplicationFiled: December 31, 2008Publication date: July 1, 2010Inventors: John S. Flowers, Michael Farmer, Martin A. Quiroga, Gordon H. Fischer, John A. DeSanto
-
Publication number: 20090320138Abstract: A system and method for providing distributed security of a network. Several device profilers are placed at different locations of a network to assess vulnerabilities from different perspectives. The device profiler identifies the hosts on the network, and characteristics such as operating system and applications running on the hosts. The device profiler traverses a vulnerability tree having nodes representative of characteristics of the hosts, each node having an associated set of potential vulnerabilities. Verification rules can verify the potential vulnerabilities. A centralized correlation server, at a centrally accessible location in the network, stores the determined vulnerabilities of the network and associates the determined vulnerabilities with attack signatures. Traffic monitors access the attack signatures and monitor network traffic for attacks against the determined vulnerabilities.Type: ApplicationFiled: September 1, 2009Publication date: December 24, 2009Applicant: c/o nCircle Network Security, Inc.Inventors: Timothy D. Keanini, Martin A. Quiroga, Brian W. Buchanan, John S. Flowers
-
Patent number: 7594273Abstract: A system and method for providing distributed security of a network. Several device profilers are placed at different locations of a network to assess vulnerabilities from different perspectives. The device profiler identifies the hosts on the network, and characteristics such as operating system and applications running on the hosts. The device profiler traverses a vulnerability tree having nodes representative of characteristics of the hosts, each node having an associated set of potential vulnerabilities. Verification rules can verify the potential vulnerabilities. A centralized correlation server, at a centrally accessible location in the network, stores the determined vulnerabilities of the network and associates the determined vulnerabilities with attack signatures. Traffic monitors access the attack signatures and monitor network traffic for attacks against the determined vulnerabilities.Type: GrantFiled: February 16, 2007Date of Patent: September 22, 2009Assignee: nCircle Network Security, Inc.Inventors: Timothy D. Keanini, Martin A. Quiroga, Brian W. Buchanan, John S. Flowers
-
Patent number: 7555475Abstract: There is provided a sentence module that handles pronouns in sentences. Each pronoun is replaced by one or more nouns. These replaced nouns are used to form statements that populate the structured representation, in order to produce precise answers to queries, as part of a search engine application.Type: GrantFiled: September 9, 2005Date of Patent: June 30, 2009Assignee: Jiles, Inc.Inventors: Martin A. Quiroga, Gordon H. Fischer, John S. Flowers
-
Publication number: 20090077180Abstract: The present invention is directed to systems and methods for encoding and retrieving information from a variety of sources using novel search techniques. The systems and methods of the invention are capable of extracting all types of structural and relational information from a query or a source data allowing for the recognition of subtle differences in meaning. The capability of discerning subtle differences in meaning that are beyond the search systems and methods presently available, the invention described herein is capable of repeatedly providing accurate and meaningful responses to a diverse set of queries.Type: ApplicationFiled: September 14, 2007Publication date: March 19, 2009Inventors: John S. Flowers, Michael Farmer, Martin A. Quiroga, Gordon H. Fischer, John A. DeSanto
-
Patent number: 7447683Abstract: There is provided a search engine or other electronic search application that receives an inputted query in natural language. The search engine then analyzes the query in accordance with the syntactic relationships of the natural language in which it was presented, weights the syntactic relationships, and generates a result to the query as output, corresponding to the syntactic relationship of the greatest weight. The outputted result is typically an answer, in the form of a sentence or a phrase, along with the document from which the sentence or phrase is taken, including a hypertext link for the document.Type: GrantFiled: April 28, 2005Date of Patent: November 4, 2008Assignee: Jiles, Inc.Inventors: Martin A. Quiroga, John A. DeSanto, John S. Flowers
-
Publication number: 20070208732Abstract: The present invention is directed to systems and methods for encoding and retrieving information from a variety of sources using novel search techniques. The systems and methods of the invention are capable of extracting all types of structural and relational information from a query or a source data allowing for the recognition of subtle differences in meaning. The capability of discerning subtle differences in meaning that are beyond the search systems and methods presently available, the invention described herein is capable of repeatedly providing accurate and meaningful responses to a diverse set of queries. Particular embodiments of the present invention include walkie-talkie-type telephone interfaces where the user may speak directly to the present invention and receive a spoken response relevant to any provided enquiry.Type: ApplicationFiled: February 7, 2007Publication date: September 6, 2007Applicant: FUTURE VISTAS, INC.Inventors: John Flowers, Michael Farmer, Martin Quiroga, Gordon Fischer, John DeSanto
-
Publication number: 20070185859Abstract: The present invention is directed to systems and methods for encoding and retrieving information from a variety of sources using novel search techniques. The systems and methods of the invention are capable of extracting all types of structural and relational information from a query or a source data allowing for the recognition of subtle differences in meaning. The capability of discerning subtle differences in meaning that are beyond the search systems and methods presently available, the invention described herein is capable of repeatedly providing accurate and meaningful responses to a diverse set of queries.Type: ApplicationFiled: October 12, 2006Publication date: August 9, 2007Applicants: Kozoru, Inc.Inventors: John Flowers, Michael Farmer, Martin Quiroga, Gordon Fischer, John DeSanto
-
Publication number: 20070143852Abstract: A system and method for providing distributed security of a network. Several device profilers are placed at different locations of a network to assess vulnerabilities from different perspectives. The device profiler identifies the hosts on the network, and characteristics such as operating system and applications running on the hosts. The device profiler traverses a vulnerability tree having nodes representative of characteristics of the hosts, each node having an associated set of potential vulnerabilities. Verification rules can verify the potential vulnerabilities. A centralized correlation server, at a centrally accessible location in the network, stores the determined vulnerabilities of the network and associates the determined vulnerabilities with attack signatures. Traffic monitors access the attack signatures and monitor network traffic for attacks against the determined vulnerabilities.Type: ApplicationFiled: February 16, 2007Publication date: June 21, 2007Inventors: Timothy Keanini, Martin Quiroga, Brian Buchanan, John Flowers
-
Publication number: 20070078814Abstract: The present invention is directed to systems and methods for encoding and retrieving information from a variety of sources using novel search techniques. The systems and methods of the invention are capable of extracting all types of structural and relational information from a query or a source data allowing for the recognition of subtle differences in meaning. The capability of discerning subtle differences in meaning that are beyond the search systems and methods presently available, the invention described herein is capable of repeatedly providing accurate and meaningful responses to a diverse set of queries.Type: ApplicationFiled: October 4, 2005Publication date: April 5, 2007Applicant: Kozoru, Inc.Inventors: John Flowers, Michael Farmer, Martin Quiroga, Gordon Fischer, John DeSanto
-
Patent number: 7181769Abstract: A system and method for providing distributed security of a network. Several device profilers are placed at different locations of a network to assess vulnerabilities from different perspectives. The device profiler identifies the hosts on the network, and characteristics such as operating system and applications running on the hosts. The device profiler traverses a vulnerability tree having nodes representative of characteristics of the hosts, each node having an associated set of potential vulnerabilities. Verification rules can verify the potential vulnerabilities. A centralized correlation server, at a centrally accessible location in the network, stores the determined vulnerabilities of the network and associates the determined vulnerabilities with attach signatures. Traffic monitors access the attack signatures and monitor network traffic for attacks against the determined vulnerabilities.Type: GrantFiled: June 6, 2003Date of Patent: February 20, 2007Assignee: nCircle Network Security, Inc.Inventors: Timothy D. Keanini, Martin A. Quiroga, Brian W. Buchanan, John S. Flowers
-
Publication number: 20060224566Abstract: There is provided a search engine or other electronic search application that receives an inputted query in natural language. The search engine then analyzes the query in accordance with the syntactic relationships of the natural language in which it was presented, and generates a result to the query as output. The outputted result is typically an answer, in the form of a sentence or a phrase, along with the document from which the sentence or phrase is taken, including a hypertext link for the document.Type: ApplicationFiled: March 31, 2005Publication date: October 5, 2006Inventors: John Flowers, Martin Quiroga, Gordon Fischer, John DeSanto