Patents by Inventor Michael Eynon
Michael Eynon has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 9454677Abstract: Secure communication of user inputs is achieved by isolating part of an endpoint device such that certificates and encryption keys are protected from corruption by malware. Further, the communication is passed through a trusted data relay that is configured to decrypt and/or certify the user inputs encrypted by the isolated part of the endpoint device. The trusted data relay can determine that the user inputs were encrypted or certified by the protected certificates and encryption keys, thus authenticating their origin within the endpoint device. The trusted data relay then forwards the inputs to an intended destination. In some embodiments, the isolated part of the endpoint device is configured to detect input created by auto-completion logic and/or spell checking logic.Type: GrantFiled: November 14, 2014Date of Patent: September 27, 2016Assignee: Truedata Systems, Inc.Inventors: Peter Sinclair, James Lloyd, Michael Eynon
-
Patent number: 9356787Abstract: Secure communication of user inputs is achieved by isolating part of an endpoint device such that certificates and encryption keys are protected from corruption by malware. Further, the communication is passed through a trusted data relay that is configured to decrypt and/or certify the user inputs encrypted by the isolated part of the endpoint device. The trusted data relay can determine that the user inputs were encrypted or certified by the protected certificates and encryption keys, thus authenticating their origin within the endpoint device. The trusted data relay then forwards the inputs to an intended destination. In some embodiments, the isolated part of the endpoint device is configured to detect input created by auto-completion logic and/or spell checking logic.Type: GrantFiled: October 16, 2013Date of Patent: May 31, 2016Assignee: Truedata Systems, Inc.Inventors: Peter Sinclair, James Lloyd, Michael Eynon
-
Patent number: 9275257Abstract: Secure communication of user inputs is achieved by isolating part of an endpoint device such that certificates and encryption keys are protected from corruption by malware. Further, the communication is passed through a trusted data relay that is configured to decrypt and/or certify the user inputs encrypted by the isolated part of the endpoint device. The trusted data relay can determine that the user inputs were encrypted or certified by the protected certificates and encryption keys, thus authenticating their origin within the endpoint device. The trusted data relay then forwards the inputs to an intended destination. In some embodiments, the isolated part of the endpoint device is configured to detect input created by auto-completion logic and/or spell checking logic.Type: GrantFiled: October 16, 2013Date of Patent: March 1, 2016Assignee: TRUEDATA SYSTEMS, INC.Inventors: Michael Eynon, Peter Sinclair, James Lloyd
-
Patent number: 9235732Abstract: Secure communication of user inputs is achieved by isolating part of an endpoint device such that certificates and encryption keys are protected from corruption by malware. Further, the communication is passed through a trusted data relay that is configured to decrypt and/or certify the user inputs encrypted by the isolated part of the endpoint device. The trusted data relay can determine that the user inputs were encrypted or certified by the protected certificates and encryption keys, thus authenticating their origin within the endpoint device. The trusted data relay then forwards the inputs to an intended destination. In some embodiments, the isolated part of the endpoint device is configured to detect input created by auto-completion logic and/or spell checking logic.Type: GrantFiled: October 16, 2013Date of Patent: January 12, 2016Assignee: TRUEDATA SYSTEMS, INC.Inventors: Michael Eynon, Peter Sinclair, James Lloyd
-
Patent number: 9235731Abstract: Secure communication of user inputs is achieved by isolating part of an endpoint device such that certificates and encryption keys are protected from corruption by malware. Further, the communication is passed through a trusted data relay that is configured to decrypt and/or certify the user inputs encrypted by the isolated part of the endpoint device. The trusted data relay can determine that the user inputs were encrypted or certified by the protected certificates and encryption keys, thus authenticating their origin within the endpoint device. The trusted data relay then forwards the inputs to an intended destination. In some embodiments, the isolated part of the endpoint device is configured to detect input created by auto-completion logic and/or spell checking logic.Type: GrantFiled: October 16, 2013Date of Patent: January 12, 2016Assignee: TRUEDATA SYSTEMS, INC.Inventors: James Lloyd, Michael Eynon, Peter Sinclair
-
Patent number: 9021583Abstract: A method is performed in a network security system implemented in a computer or electronic device that is coupled to secured online resources for detecting unauthorized accesses of those secured online resources. The method includes monitoring a user activity session. It is determined whether the user activity session is indicative of a hidden session by an attacker, where the determination includes comparing the user activity session to an average user activity session.Type: GrantFiled: January 26, 2011Date of Patent: April 28, 2015Assignee: EMC CorporationInventors: Andreas Wittenstein, Michael Eynon, James Lioyd, Laura Mather
-
Publication number: 20140108790Abstract: Secure communication of user inputs is achieved by isolating part of an endpoint device such that certificates and encryption keys are protected from corruption by malware. Further, the communication is passed through a trusted data relay that is configured to decrypt and/or certify the user inputs encrypted by the isolated part of the endpoint device. The trusted data relay can determine that the user inputs were encrypted or certified by the protected certificates and encryption keys, thus authenticating their origin within the endpoint device. The trusted data relay then forwards the inputs to an intended destination. In some embodiments, the isolated part of the endpoint device is configured to detect input created by auto-completion logic and/or spell checking logic.Type: ApplicationFiled: October 16, 2013Publication date: April 17, 2014Inventors: Michael Eynon, Peter Sinclair, James Lloyd
-
Publication number: 20140108791Abstract: Secure communication of user inputs is achieved by isolating part of an endpoint device such that certificates and encryption keys are protected from corruption by malware. Further, the communication is passed through a trusted data relay that is configured to decrypt and/or certify the user inputs encrypted by the isolated part of the endpoint device. The trusted data relay can determine that the user inputs were encrypted or certified by the protected certificates and encryption keys, thus authenticating their origin within the endpoint device. The trusted data relay then forwards the inputs to an intended destination. In some embodiments, the isolated part of the endpoint device is configured to detect input created by auto-completion logic and/or spell checking logic.Type: ApplicationFiled: October 16, 2013Publication date: April 17, 2014Inventors: Peter Sinclair, James Lloyd, Michael Eynon
-
Publication number: 20140108821Abstract: Secure communication of user inputs is achieved by isolating part of an endpoint device such that certificates and encryption keys are protected from corruption by malware. Further, the communication is passed through a trusted data relay that is configured to decrypt and/or certify the user inputs encrypted by the isolated part of the endpoint device. The trusted data relay can determine that the user inputs were encrypted or certified by the protected certificates and encryption keys, thus authenticating their origin within the endpoint device. The trusted data relay then forwards the inputs to an intended destination. In some embodiments, the isolated part of the endpoint device is configured to detect input created by auto-completion logic and/or spell checking logic.Type: ApplicationFiled: October 16, 2013Publication date: April 17, 2014Inventors: James Lloyd, Michael Eynon, Peter Sinclair
-
Publication number: 20140108820Abstract: Secure communication of user inputs is achieved by isolating part of an endpoint device such that certificates and encryption keys are protected from corruption by malware. Further, the communication is passed through a trusted data relay that is configured to decrypt and/or certify the user inputs encrypted by the isolated part of the endpoint device. The trusted data relay can determine that the user inputs were encrypted or certified by the protected certificates and encryption keys, thus authenticating their origin within the endpoint device. The trusted data relay then forwards the inputs to an intended destination. In some embodiments, the isolated part of the endpoint device is configured to detect input created by auto-completion logic and/or spell checking logic.Type: ApplicationFiled: October 16, 2013Publication date: April 17, 2014Inventors: Michael Eynon, Peter Sinclair, James Lloyd
-
Patent number: 8621259Abstract: A method to detect potential problems within a heterogeneous and diverse application environment. Operations data is received from a plurality of application servers within the application environment. The operations data pertains to operations performed at the plurality of application servers over a predetermined time interval. The operations data is aggregated. The aggregated data is compared to reference data, and a potential problem within the application environment is detected if the aggregated data deviates from the reference data in a predetermined manner.Type: GrantFiled: January 7, 2011Date of Patent: December 31, 2013Assignee: eBay Inc.Inventors: James Lloyd, Faye Dai Hall, Michael Eynon, Abhinav Kumar
-
Publication number: 20110185421Abstract: A method is performed in a network security system implemented in a computer or electronic device that is coupled to secured online resources for detecting unauthorized accesses of those secured online resources. The method includes monitoring a user activity session. It is determined whether the user activity session is indicative of a hidden session by an attacker, where the determination includes comparing the user activity session to an average user activity session.Type: ApplicationFiled: January 26, 2011Publication date: July 28, 2011Applicant: SILVER TAIL SYSTEMS, INC.Inventors: Andreas Wittenstein, Michael Eynon, James Lloyd, Laura Mather
-
Publication number: 20110099430Abstract: A method to detect potential problems within a heterogeneous and diverse application environment. Operations data is received from a plurality of application servers within the application environment. The operations data pertains to operations performed at the plurality of application servers over a predetermined time interval. The operations data is aggregated. The aggregated data is compared to reference data, and a potential problem within the application environment is detected if the aggregated data deviates from the reference data in a predetermined manner.Type: ApplicationFiled: January 7, 2011Publication date: April 28, 2011Inventors: James Lloyd, Faye Dai Hall, Michael Eynon, Abhinav Kumar
-
Patent number: 7870420Abstract: A method to detect potential problems within a heterogeneous and diverse application environment. Operations data is received from a plurality of application servers within the application environment. The operations data pertains to operations performed at the plurality of application servers over a predetermined time interval. The operations data is aggregated. The aggregated data is compared to reference data, and a potential problem within the application environment is detected if the aggregated data deviates from the reference data in a predetermined manner.Type: GrantFiled: March 30, 2009Date of Patent: January 11, 2011Assignee: eBay Inc.Inventors: James Lloyd, Faye Dai Hall, Michael Eynon, Abhinav Kumar
-
Publication number: 20090228741Abstract: A method to detect potential problems within a heterogeneous and diverse application environment. Operations data is received from a plurality of application servers within the application environment. The operations data pertains to operations performed at the plurality of application servers over a predetermined time interval. The operations data is aggregated. The aggregated data is compared to reference data, and a potential problem within the application environment is detected if the aggregated data deviates from the reference data in a predetermined manner.Type: ApplicationFiled: March 30, 2009Publication date: September 10, 2009Inventors: James Lloyd, Faye Dai Hall, Michael Eynon, Abhunav Kumar
-
Patent number: 7526670Abstract: A method to detect potential problems within a heterogeneous and diverse application environment. Operations data is received from a plurality of application servers within the application environment. The operations data pertains to operations performed at the plurality of application servers over a predetermined time interval. The operations data is aggregated. The aggregated data is compared to reference data, and a potential problem within the application environment is detected if the aggregated data deviates from the reference data in a predetermined manner.Type: GrantFiled: February 14, 2005Date of Patent: April 28, 2009Assignee: eBay Inc.Inventors: James Lloyd, Faye Dai Hall, Michael Eynon, Abhinav Kumar
-
Publication number: 20050262136Abstract: A method to detect potential problems within a heterogeneous and diverse application environment. Operations data is received from a plurality of application servers within the application environment. The operations data pertains to operations performed at the plurality of application servers over a predetermined time interval. The operations data is aggregated. The aggregated data is compared to reference data, and a potential problem within the application environment is detected if the aggregated data deviates from the reference data in a predetermined manner.Type: ApplicationFiled: February 14, 2005Publication date: November 24, 2005Inventors: James Lloyd, Faye Hall, Michael Eynon, Abhinav Kumar