Patents by Inventor Michael Eynon

Michael Eynon has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 9454677
    Abstract: Secure communication of user inputs is achieved by isolating part of an endpoint device such that certificates and encryption keys are protected from corruption by malware. Further, the communication is passed through a trusted data relay that is configured to decrypt and/or certify the user inputs encrypted by the isolated part of the endpoint device. The trusted data relay can determine that the user inputs were encrypted or certified by the protected certificates and encryption keys, thus authenticating their origin within the endpoint device. The trusted data relay then forwards the inputs to an intended destination. In some embodiments, the isolated part of the endpoint device is configured to detect input created by auto-completion logic and/or spell checking logic.
    Type: Grant
    Filed: November 14, 2014
    Date of Patent: September 27, 2016
    Assignee: Truedata Systems, Inc.
    Inventors: Peter Sinclair, James Lloyd, Michael Eynon
  • Patent number: 9356787
    Abstract: Secure communication of user inputs is achieved by isolating part of an endpoint device such that certificates and encryption keys are protected from corruption by malware. Further, the communication is passed through a trusted data relay that is configured to decrypt and/or certify the user inputs encrypted by the isolated part of the endpoint device. The trusted data relay can determine that the user inputs were encrypted or certified by the protected certificates and encryption keys, thus authenticating their origin within the endpoint device. The trusted data relay then forwards the inputs to an intended destination. In some embodiments, the isolated part of the endpoint device is configured to detect input created by auto-completion logic and/or spell checking logic.
    Type: Grant
    Filed: October 16, 2013
    Date of Patent: May 31, 2016
    Assignee: Truedata Systems, Inc.
    Inventors: Peter Sinclair, James Lloyd, Michael Eynon
  • Patent number: 9275257
    Abstract: Secure communication of user inputs is achieved by isolating part of an endpoint device such that certificates and encryption keys are protected from corruption by malware. Further, the communication is passed through a trusted data relay that is configured to decrypt and/or certify the user inputs encrypted by the isolated part of the endpoint device. The trusted data relay can determine that the user inputs were encrypted or certified by the protected certificates and encryption keys, thus authenticating their origin within the endpoint device. The trusted data relay then forwards the inputs to an intended destination. In some embodiments, the isolated part of the endpoint device is configured to detect input created by auto-completion logic and/or spell checking logic.
    Type: Grant
    Filed: October 16, 2013
    Date of Patent: March 1, 2016
    Assignee: TRUEDATA SYSTEMS, INC.
    Inventors: Michael Eynon, Peter Sinclair, James Lloyd
  • Patent number: 9235732
    Abstract: Secure communication of user inputs is achieved by isolating part of an endpoint device such that certificates and encryption keys are protected from corruption by malware. Further, the communication is passed through a trusted data relay that is configured to decrypt and/or certify the user inputs encrypted by the isolated part of the endpoint device. The trusted data relay can determine that the user inputs were encrypted or certified by the protected certificates and encryption keys, thus authenticating their origin within the endpoint device. The trusted data relay then forwards the inputs to an intended destination. In some embodiments, the isolated part of the endpoint device is configured to detect input created by auto-completion logic and/or spell checking logic.
    Type: Grant
    Filed: October 16, 2013
    Date of Patent: January 12, 2016
    Assignee: TRUEDATA SYSTEMS, INC.
    Inventors: Michael Eynon, Peter Sinclair, James Lloyd
  • Patent number: 9235731
    Abstract: Secure communication of user inputs is achieved by isolating part of an endpoint device such that certificates and encryption keys are protected from corruption by malware. Further, the communication is passed through a trusted data relay that is configured to decrypt and/or certify the user inputs encrypted by the isolated part of the endpoint device. The trusted data relay can determine that the user inputs were encrypted or certified by the protected certificates and encryption keys, thus authenticating their origin within the endpoint device. The trusted data relay then forwards the inputs to an intended destination. In some embodiments, the isolated part of the endpoint device is configured to detect input created by auto-completion logic and/or spell checking logic.
    Type: Grant
    Filed: October 16, 2013
    Date of Patent: January 12, 2016
    Assignee: TRUEDATA SYSTEMS, INC.
    Inventors: James Lloyd, Michael Eynon, Peter Sinclair
  • Patent number: 9021583
    Abstract: A method is performed in a network security system implemented in a computer or electronic device that is coupled to secured online resources for detecting unauthorized accesses of those secured online resources. The method includes monitoring a user activity session. It is determined whether the user activity session is indicative of a hidden session by an attacker, where the determination includes comparing the user activity session to an average user activity session.
    Type: Grant
    Filed: January 26, 2011
    Date of Patent: April 28, 2015
    Assignee: EMC Corporation
    Inventors: Andreas Wittenstein, Michael Eynon, James Lioyd, Laura Mather
  • Publication number: 20140108790
    Abstract: Secure communication of user inputs is achieved by isolating part of an endpoint device such that certificates and encryption keys are protected from corruption by malware. Further, the communication is passed through a trusted data relay that is configured to decrypt and/or certify the user inputs encrypted by the isolated part of the endpoint device. The trusted data relay can determine that the user inputs were encrypted or certified by the protected certificates and encryption keys, thus authenticating their origin within the endpoint device. The trusted data relay then forwards the inputs to an intended destination. In some embodiments, the isolated part of the endpoint device is configured to detect input created by auto-completion logic and/or spell checking logic.
    Type: Application
    Filed: October 16, 2013
    Publication date: April 17, 2014
    Inventors: Michael Eynon, Peter Sinclair, James Lloyd
  • Publication number: 20140108791
    Abstract: Secure communication of user inputs is achieved by isolating part of an endpoint device such that certificates and encryption keys are protected from corruption by malware. Further, the communication is passed through a trusted data relay that is configured to decrypt and/or certify the user inputs encrypted by the isolated part of the endpoint device. The trusted data relay can determine that the user inputs were encrypted or certified by the protected certificates and encryption keys, thus authenticating their origin within the endpoint device. The trusted data relay then forwards the inputs to an intended destination. In some embodiments, the isolated part of the endpoint device is configured to detect input created by auto-completion logic and/or spell checking logic.
    Type: Application
    Filed: October 16, 2013
    Publication date: April 17, 2014
    Inventors: Peter Sinclair, James Lloyd, Michael Eynon
  • Publication number: 20140108821
    Abstract: Secure communication of user inputs is achieved by isolating part of an endpoint device such that certificates and encryption keys are protected from corruption by malware. Further, the communication is passed through a trusted data relay that is configured to decrypt and/or certify the user inputs encrypted by the isolated part of the endpoint device. The trusted data relay can determine that the user inputs were encrypted or certified by the protected certificates and encryption keys, thus authenticating their origin within the endpoint device. The trusted data relay then forwards the inputs to an intended destination. In some embodiments, the isolated part of the endpoint device is configured to detect input created by auto-completion logic and/or spell checking logic.
    Type: Application
    Filed: October 16, 2013
    Publication date: April 17, 2014
    Inventors: James Lloyd, Michael Eynon, Peter Sinclair
  • Publication number: 20140108820
    Abstract: Secure communication of user inputs is achieved by isolating part of an endpoint device such that certificates and encryption keys are protected from corruption by malware. Further, the communication is passed through a trusted data relay that is configured to decrypt and/or certify the user inputs encrypted by the isolated part of the endpoint device. The trusted data relay can determine that the user inputs were encrypted or certified by the protected certificates and encryption keys, thus authenticating their origin within the endpoint device. The trusted data relay then forwards the inputs to an intended destination. In some embodiments, the isolated part of the endpoint device is configured to detect input created by auto-completion logic and/or spell checking logic.
    Type: Application
    Filed: October 16, 2013
    Publication date: April 17, 2014
    Inventors: Michael Eynon, Peter Sinclair, James Lloyd
  • Patent number: 8621259
    Abstract: A method to detect potential problems within a heterogeneous and diverse application environment. Operations data is received from a plurality of application servers within the application environment. The operations data pertains to operations performed at the plurality of application servers over a predetermined time interval. The operations data is aggregated. The aggregated data is compared to reference data, and a potential problem within the application environment is detected if the aggregated data deviates from the reference data in a predetermined manner.
    Type: Grant
    Filed: January 7, 2011
    Date of Patent: December 31, 2013
    Assignee: eBay Inc.
    Inventors: James Lloyd, Faye Dai Hall, Michael Eynon, Abhinav Kumar
  • Publication number: 20110185421
    Abstract: A method is performed in a network security system implemented in a computer or electronic device that is coupled to secured online resources for detecting unauthorized accesses of those secured online resources. The method includes monitoring a user activity session. It is determined whether the user activity session is indicative of a hidden session by an attacker, where the determination includes comparing the user activity session to an average user activity session.
    Type: Application
    Filed: January 26, 2011
    Publication date: July 28, 2011
    Applicant: SILVER TAIL SYSTEMS, INC.
    Inventors: Andreas Wittenstein, Michael Eynon, James Lloyd, Laura Mather
  • Publication number: 20110099430
    Abstract: A method to detect potential problems within a heterogeneous and diverse application environment. Operations data is received from a plurality of application servers within the application environment. The operations data pertains to operations performed at the plurality of application servers over a predetermined time interval. The operations data is aggregated. The aggregated data is compared to reference data, and a potential problem within the application environment is detected if the aggregated data deviates from the reference data in a predetermined manner.
    Type: Application
    Filed: January 7, 2011
    Publication date: April 28, 2011
    Inventors: James Lloyd, Faye Dai Hall, Michael Eynon, Abhinav Kumar
  • Patent number: 7870420
    Abstract: A method to detect potential problems within a heterogeneous and diverse application environment. Operations data is received from a plurality of application servers within the application environment. The operations data pertains to operations performed at the plurality of application servers over a predetermined time interval. The operations data is aggregated. The aggregated data is compared to reference data, and a potential problem within the application environment is detected if the aggregated data deviates from the reference data in a predetermined manner.
    Type: Grant
    Filed: March 30, 2009
    Date of Patent: January 11, 2011
    Assignee: eBay Inc.
    Inventors: James Lloyd, Faye Dai Hall, Michael Eynon, Abhinav Kumar
  • Publication number: 20090228741
    Abstract: A method to detect potential problems within a heterogeneous and diverse application environment. Operations data is received from a plurality of application servers within the application environment. The operations data pertains to operations performed at the plurality of application servers over a predetermined time interval. The operations data is aggregated. The aggregated data is compared to reference data, and a potential problem within the application environment is detected if the aggregated data deviates from the reference data in a predetermined manner.
    Type: Application
    Filed: March 30, 2009
    Publication date: September 10, 2009
    Inventors: James Lloyd, Faye Dai Hall, Michael Eynon, Abhunav Kumar
  • Patent number: 7526670
    Abstract: A method to detect potential problems within a heterogeneous and diverse application environment. Operations data is received from a plurality of application servers within the application environment. The operations data pertains to operations performed at the plurality of application servers over a predetermined time interval. The operations data is aggregated. The aggregated data is compared to reference data, and a potential problem within the application environment is detected if the aggregated data deviates from the reference data in a predetermined manner.
    Type: Grant
    Filed: February 14, 2005
    Date of Patent: April 28, 2009
    Assignee: eBay Inc.
    Inventors: James Lloyd, Faye Dai Hall, Michael Eynon, Abhinav Kumar
  • Publication number: 20050262136
    Abstract: A method to detect potential problems within a heterogeneous and diverse application environment. Operations data is received from a plurality of application servers within the application environment. The operations data pertains to operations performed at the plurality of application servers over a predetermined time interval. The operations data is aggregated. The aggregated data is compared to reference data, and a potential problem within the application environment is detected if the aggregated data deviates from the reference data in a predetermined manner.
    Type: Application
    Filed: February 14, 2005
    Publication date: November 24, 2005
    Inventors: James Lloyd, Faye Hall, Michael Eynon, Abhinav Kumar