Patents by Inventor Michael Franz Baukes
Michael Franz Baukes has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 12244633Abstract: An internal network can include a plurality of linked internal nodes, each internal node being configured to communicate with other internal nodes or with one or more external servers over an external network. The internal network can analyze the configuration of the internal nodes and the network traffic between internal nodes of the internal network and external servers. Based on the analysis, a network vulnerability score measuring the vulnerability of the internal network to attack can be determined. If the vulnerability score is below a threshold, the internal network can be isolated from the external network, for example by preventing internal nodes from communicating with or over the external network.Type: GrantFiled: March 12, 2024Date of Patent: March 4, 2025Assignee: UPGUARD, INC.Inventors: Michael Franz Baukes, Alan James Sharp-Paul
-
Publication number: 20240380662Abstract: An operator node is configured to generate a visualization of the configurations of nodes communicatively coupled to the operator node via a network. The operator node scans target nodes in a network and identifies a set of attributes describing various configuration properties of each node. The operator node compares corresponding attributes across nodes and determines for each attribute a measure of variance. The variance for each attribute is displayed in a grid view, allowing a user to observe the level of similarity or dissimilarity of each attribute across the target nodes of the network. The operator node also defines and implements a policy describing a set of configuration properties with which target nodes must comply. The operator node determines if one or more target nodes is in violation of the policy, displays a differential visualization associated with each policy failure event, and enables an operator to re-configure target nodes accordingly.Type: ApplicationFiled: July 25, 2024Publication date: November 14, 2024Inventors: Michael Franz Baukes, Paul McCarthy, Greg Pollock, Alan Sharp-Paul, Mark Sheahan, Taylor Stackpole, Cheyne Wallace
-
Patent number: 12088468Abstract: An operator node is configured to generate a visualization of the configurations of nodes communicatively coupled to the operator node via a network. The operator node scans target nodes in a network and identifies a set of attributes describing various configuration properties of each node. The operator node compares corresponding attributes across nodes and determines for each attribute a measure of variance. The variance for each attribute is displayed in a grid view, allowing a user to observe the level of similarity or dissimilarity of each attribute across the target nodes of the network. The operator node also defines and implements a policy describing a set of configuration properties with which target nodes must comply. The operator node determines if one or more target nodes is in violation of the policy, displays a differential visualization associated with each policy failure event, and enables an operator to re-configure target nodes accordingly.Type: GrantFiled: May 17, 2022Date of Patent: September 10, 2024Assignee: UPGUARD, INC.Inventors: Michael Franz Baukes, Paul McCarthy, Greg Pollock, Alan Sharp-Paul, Mark Sheahan, Taylor Stackpole, Cheyne Wallace
-
Publication number: 20240273228Abstract: A breach detection engine detects and mitigates the effects of breaches across one or more data sources. An index is generated based on one or more data sources and the index is queried using keywords indicative of potential breaches. A database of potential breaches is populated based on the query of the index. The potential breach database is queried using keywords associated with a system identity (e.g., a third party). A likelihood of a candidate breach is identified based on a set of breach criteria weights. A network node associated with a candidate breach determined to be an actual breach is identified for isolation or for the performance of one or more additional security actions.Type: ApplicationFiled: April 20, 2024Publication date: August 15, 2024Inventors: Alan James Sharp-Paul, Christopher Robert Vickery, Jonathan David Hendren, Gregory Ford Pollock, Daniel Bradbury, Christian Alan Kiely, Gavin Richard Turner, Michael Franz Baukes
-
Publication number: 20240267291Abstract: An operator node is configured to enable the management of nodes communicatively coupled to the operator node via a network. A selection of node objects is received by the operator node, the selected node objects including software components for inclusion within a node configuration. A configuration policy is generated based on the selected objects, the configuration policy including a set of tests (such as scripts or executables) that, when run, test for the presence of one or more of the selected node objects. A target node is scanned to determine the configuration of the target node, and the set of tests are applied to identify a set of objects identified by the policy but not installed at the target node. The target node is then re-configured to install the identified set of objects at the target node.Type: ApplicationFiled: April 17, 2024Publication date: August 8, 2024Inventors: Alan James Sharp-Paul, Michael Franz Baukes
-
Publication number: 20240223593Abstract: An internal network can include a plurality of linked internal nodes, each internal node being configured to communicate with other internal nodes or with one or more external servers over an external network. The internal network can analyze the configuration of the internal nodes and the network traffic between internal nodes of the internal network and external servers. Based on the analysis, a network vulnerability score measuring the vulnerability of the internal network to attack can be determined. If the vulnerability score is below a threshold, the internal network can be isolated from the external network, for example by preventing internal nodes from communicating with or over the external network.Type: ApplicationFiled: March 12, 2024Publication date: July 4, 2024Inventors: Michael Franz Baukes, Alan James Sharp-Paul
-
Patent number: 11995206Abstract: A breach detection engine detects and mitigates the effects of breaches across one or more data sources. An index is generated based on one or more data sources and the index is queried using keywords indicative of potential breaches. A database of potential breaches is populated based on the query of the index. The potential breach database is queried using keywords associated with a system identity (e.g., a third party). A likelihood of a candidate breach is identified based on a set of breach criteria weights. A network node associated with a candidate breach determined to be an actual breach is identified for isolation or for the performance of one or more additional security actions.Type: GrantFiled: March 7, 2023Date of Patent: May 28, 2024Assignee: UPGUARD, INC.Inventors: Alan James Sharp-Paul, Christopher Robert Vickery, Jonathan David Hendren, Gregory Ford Pollock, Daniel Bradbury, Christian Alan Kiely, Gavin Richard Turner, Michael Franz Baukes
-
Patent number: 11991043Abstract: An operator node is configured to enable the management of nodes communicatively coupled to the operator node via a network. A selection of node objects is received by the operator node, the selected node objects including software components for inclusion within a node configuration. A configuration policy is generated based on the selected objects, the configuration policy including a set of tests (such as scripts or executables) that, when run, test for the presence of one or more of the selected node objects. A target node is scanned to determine the configuration of the target node, and the set of tests are applied to identify a set of objects identified by the policy but not installed at the target node. The target node is then re-configured to install the identified set of objects at the target node.Type: GrantFiled: September 22, 2022Date of Patent: May 21, 2024Assignee: UPGUARD, INC.Inventors: Alan James Sharp-Paul, Michael Franz Baukes
-
Patent number: 11962613Abstract: An internal network can include a plurality of linked internal nodes, each internal node being configured to communicate with other internal nodes or with one or more external servers over an external network. The internal network can analyze the configuration of the internal nodes and the network traffic between internal nodes of the internal network and external servers. Based on the analysis, a network vulnerability score measuring the vulnerability of the internal network to attack can be determined. If the vulnerability score is below a threshold, the internal network can be isolated from the external network, for example by preventing internal nodes from communicating with or over the external network.Type: GrantFiled: June 28, 2023Date of Patent: April 16, 2024Assignee: UPGUARD, INC.Inventors: Michael Franz Baukes, Alan James Sharp-Paul
-
Publication number: 20230409727Abstract: A system and method are provided for assessing whether data files contain sensitive information associated with an entity. The system stores search keywords associated with the entity, generates search terms based on the search keywords, and searches one or more online public databases for data files associated with each search term. The system then generates risk scores for data files in the search results indicating a likelihood that the data files contain information from a data breach associated with the entity. The system identifies data files that contain information from the data breach from the generated risk scores, and transmits a notification to the entity describing the identified data files.Type: ApplicationFiled: May 17, 2023Publication date: December 21, 2023Inventors: Jacopo Sabbatini, Gregory Ford Pollock, Jonathan David Hendren, Daniel Bradbury, Michael Franz Baukes, Stephen Cossell, Justin Glenn Lloyd
-
Publication number: 20230336583Abstract: An internal network can include a plurality of linked internal nodes, each internal node being configured to communicate with other internal nodes or with one or more external servers over an external network. The internal network can analyze the configuration of the internal nodes and the network traffic between internal nodes of the internal network and external servers. Based on the analysis, a network vulnerability score measuring the vulnerability of the internal network to attack can be determined. If the vulnerability score is below a threshold, the internal network can be isolated from the external network, for example by preventing internal nodes from communicating with or over the external network.Type: ApplicationFiled: June 28, 2023Publication date: October 19, 2023Inventors: Michael Franz Baukes, Alan James Sharp-Paul
-
Patent number: 11729205Abstract: An internal network can include a plurality of linked internal nodes, each internal node being configured to communicate with other internal nodes or with one or more external servers over an external network. The internal network can analyze the configuration of the internal nodes and the network traffic between internal nodes of the internal network and external servers. Based on the analysis, a network vulnerability score measuring the vulnerability of the internal network to attack can be determined. If the vulnerability score is below a threshold, the internal network can be isolated from the external network, for example by preventing internal nodes from communicating with or over the external network.Type: GrantFiled: December 22, 2022Date of Patent: August 15, 2023Assignee: UPGUARD, INC.Inventors: Michael Franz Baukes, Alan James Sharp-Paul
-
Publication number: 20230205911Abstract: A breach detection engine detects and mitigates the effects of breaches across one or more data sources. An index is generated based on one or more data sources and the index is queried using keywords indicative of potential breaches. A database of potential breaches is populated based on the query of the index. The potential breach database is queried using keywords associated with a system identity (e.g., a third party). A likelihood of a candidate breach is identified based on a set of breach criteria weights. A network node associated with a candidate breach determined to be an actual breach is identified for isolation or for the performance of one or more additional security actions.Type: ApplicationFiled: March 7, 2023Publication date: June 29, 2023Inventors: Alan James Sharp-Paul, Christopher Robert Vickery, Jonathan David Hendren, Gregory Ford Pollock, Daniel Bradbury, Christian Alan Kiely, Gavin Richard Turner, Michael Franz Baukes
-
Publication number: 20230127628Abstract: An internal network can include a plurality of linked internal nodes, each internal node being configured to communicate with other internal nodes or with one or more external servers over an external network. The internal network can analyze the configuration of the internal nodes and the network traffic between internal nodes of the internal network and external servers. Based on the analysis, a network vulnerability score measuring the vulnerability of the internal network to attack can be determined. If the vulnerability score is below a threshold, the internal network can be isolated from the external network, for example by preventing internal nodes from communicating with or over the external network.Type: ApplicationFiled: December 22, 2022Publication date: April 27, 2023Inventors: Michael Franz Baukes, Alan James Sharp-Paul
-
Patent number: 11630911Abstract: A breach detection engine detects and mitigates the effects of breaches across one or more data sources. An index is generated based on one or more data sources and the index is queried using keywords indicative of potential breaches. A database of potential breaches is populated based on the query of the index. The potential breach database is queried using keywords associated with a system identity (e.g., a third party). A likelihood of a candidate breach is identified based on a set of breach criteria weights. A network node associated with a candidate breach determined to be an actual breach is identified for isolation or for the performance of one or more additional security actions.Type: GrantFiled: April 15, 2021Date of Patent: April 18, 2023Assignee: UPGUARD, INC.Inventors: Alan James Sharp-Paul, Christopher Robert Vickery, Jonathan David Hendren, Gregory Ford Pollock, Daniel Bradbury, Christian Alan Kiely, Gavin Richard Turner, Michael Franz Baukes
-
Patent number: 11575701Abstract: An internal network can include a plurality of linked internal nodes, each internal node being configured to communicate with other internal nodes or with one or more external servers over an external network. The internal network can analyze the configuration of the internal nodes and the network traffic between internal nodes of the internal network and external servers. Based on the analysis, a network vulnerability score measuring the vulnerability of the internal network to attack can be determined. If the vulnerability score is below a threshold, the internal network can be isolated from the external network, for example by preventing internal nodes from communicating with or over the external network.Type: GrantFiled: June 21, 2021Date of Patent: February 7, 2023Assignee: Upguard, Inc.Inventors: Michael Franz Baukes, Alan James Sharp-Paul
-
Publication number: 20230020098Abstract: An operator node is configured to enable the management of nodes communicatively coupled to the operator node via a network. A selection of node objects is received by the operator node, the selected node objects including software components for inclusion within a node configuration. A configuration policy is generated based on the selected objects, the configuration policy including a set of tests (such as scripts or executables) that, when run, test for the presence of one or more of the selected node objects. A target node is scanned to determine the configuration of the target node, and the set of tests are applied to identify a set of objects identified by the policy but not installed at the target node. The target node is then re-configured to install the identified set of objects at the target node.Type: ApplicationFiled: September 22, 2022Publication date: January 19, 2023Inventors: Alan James Sharp-Paul, Michael Franz Baukes
-
Patent number: 11489722Abstract: An operator node is configured to enable the management of nodes communicatively coupled to the operator node via a network. A selection of node objects is received by the operator node, the selected node objects including software components for inclusion within a node configuration. A configuration policy is generated based on the selected objects, the configuration policy including a set of tests (such as scripts or executables) that, when run, test for the presence of one or more of the selected node objects. A target node is scanned to determine the configuration of the target node, and the set of tests are applied to identify a set of objects identified by the policy but not installed at the target node. The target node is then re-configured to install the identified set of objects at the target node.Type: GrantFiled: December 23, 2020Date of Patent: November 1, 2022Assignee: Upguard, Inc.Inventors: Alan James Sharp-Paul, Michael Franz Baukes
-
Publication number: 20220278901Abstract: An operator node is configured to generate a visualization of the configurations of nodes communicatively coupled to the operator node via a network. The operator node scans target nodes in a network and identifies a set of attributes describing various configuration properties of each node. The operator node compares corresponding attributes across nodes and determines for each attribute a measure of variance. The variance for each attribute is displayed in a grid view, allowing a user to observe the level of similarity or dissimilarity of each attribute across the target nodes of the network. The operator node also defines and implements a policy describing a set of configuration properties with which target nodes must comply. The operator node determines if one or more target nodes is in violation of the policy, displays a differential visualization associated with each policy failure event, and enables an operator to re-configure target nodes accordingly.Type: ApplicationFiled: May 17, 2022Publication date: September 1, 2022Inventors: Michael Franz Baukes, Paul McCarthy, Greg Pollock, Alan Sharp-Paul, Mark Sheahan, Taylor Stackpole, Cheyne Wallace
-
Patent number: 11368367Abstract: An operator node is configured to generate a visualization of the configurations of nodes communicatively coupled to the operator node via a network. The operator node scans target nodes in a network and identifies a set of attributes describing various configuration properties of each node. The operator node compares corresponding attributes across nodes and determines for each attribute a measure of variance. The variance for each attribute is displayed in a grid view, allowing a user to observe the level of similarity or dissimilarity of each attribute across the target nodes of the network. The operator node also defines and implements a policy describing a set of configuration properties with which target nodes must comply. The operator node determines if one or more target nodes is in violation of the policy, displays a differential visualization associated with each policy failure event, and enables an operator to re-configure target nodes accordingly.Type: GrantFiled: July 2, 2020Date of Patent: June 21, 2022Assignee: UPGUARD, INC.Inventors: Michael Franz Baukes, Paul McCarthy, Greg Pollock, Alan Sharp-Paul, Mark Sheahan, Taylor Stackpole, Cheyne Wallace