Patents by Inventor Michael Ligh

Michael Ligh has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20240037235
    Abstract: Systems, methods, and processing devices for aiding with cyber intrusion investigations that includes capabilities for extracting data from a specified range of a volatile memory of a target processing device, reconstructing data structures and artifacts from the extracted data; and generating and presenting a visualization of the reconstructed data structures and the reconstructed artifacts.
    Type: Application
    Filed: July 6, 2023
    Publication date: February 1, 2024
    Inventors: Aaron Walters, Michael Ligh, Steven Adair
  • Patent number: 11734427
    Abstract: Systems, methods, and processing devices for aiding with cyber intrusion investigations that includes capabilities for extracting data from a specified range of a volatile memory of a target processing device, reconstructing data structures and artifacts from the extracted data; and generating and presenting a visualization of the reconstructed data structures and the reconstructed artifacts.
    Type: Grant
    Filed: July 13, 2021
    Date of Patent: August 22, 2023
    Assignee: Volexity, Inc.
    Inventors: Aaron Walters, Michael Ligh, Steven Adair
  • Publication number: 20220043912
    Abstract: Systems, methods, and processing devices for aiding with cyber intrusion investigations that includes capabilities for extracting data from a specified range of a volatile memory of a target processing device, reconstructing data structures and artifacts from the extracted data; and generating and presenting a visualization of the reconstructed data structures and the reconstructed artifacts.
    Type: Application
    Filed: July 13, 2021
    Publication date: February 10, 2022
    Inventors: Aaron Walters, Michael Ligh, Steven Adair
  • Patent number: 11093613
    Abstract: Systems, methods, and processing devices for aiding with cyber intrusion investigations that includes capabilities for extracting data from a specified range of a volatile memory of a target processing device, reconstructing data structures and artifacts from the extracted data; and generating and presenting a visualization of the reconstructed data structures and the reconstructed artifacts.
    Type: Grant
    Filed: August 18, 2016
    Date of Patent: August 17, 2021
    Assignee: Volexity, Inc.
    Inventors: Aaron Walters, Michael Ligh, Steven Adair
  • Patent number: 10530802
    Abstract: A method of detecting malicious software (malware) includes receiving a file and storing a memory baseline for a system. The method also includes copying the file to the system, executing the file on the system, terminating operation of the system, and storing a post-execution memory map. The method further includes analyzing the memory baseline and the post-execution memory map and determining that the file includes malware.
    Type: Grant
    Filed: January 21, 2016
    Date of Patent: January 7, 2020
    Assignee: VERISIGN, INC.
    Inventors: Ralph Thomas, Bruce Michael Ligh
  • Publication number: 20190251258
    Abstract: Systems, methods, and processing devices for aiding with cyber intrusion investigations that includes capabilities for extracting data from a specified range of a volatile memory of a target processing device, reconstructing data structures and artifacts from the extracted data; and generating and presenting a visualization of the reconstructed data structures and the reconstructed artifacts.
    Type: Application
    Filed: August 18, 2016
    Publication date: August 15, 2019
    Inventors: Aaron Walters, Michael Ligh, Steven Adair
  • Publication number: 20160156658
    Abstract: A method of detecting malicious software (malware) includes receiving a file and storing a memory baseline for a system. The method also includes copying the file to the system, executing the file on the system, terminating operation of the system, and storing a post-execution memory map. The method further includes analyzing the memory baseline and the post-execution memory map and determining that the file includes malware.
    Type: Application
    Filed: January 21, 2016
    Publication date: June 2, 2016
    Inventors: Ralph Thomas, Bruce Michael Ligh
  • Patent number: 9245114
    Abstract: A method of detecting malicious software (malware) includes receiving a file and storing a memory baseline for a system. The method also includes copying the file to the system, executing the file on the system, terminating operation of the system, and storing a post-execution memory map. The method further includes analyzing the memory baseline and the post-execution memory map and determining that the file includes malware.
    Type: Grant
    Filed: August 26, 2011
    Date of Patent: January 26, 2016
    Assignee: VERISIGN, INC.
    Inventors: Ralph Thomas, Michael Ligh
  • Publication number: 20120079596
    Abstract: A method of detecting malicious software (malware) includes receiving a file and storing a memory baseline for a system. The method also includes copying the file to the system, executing the file on the system, terminating operation of the system, and storing a post-execution memory map. The method further includes analyzing the memory baseline and the post-execution memory map and determining that the file includes malware.
    Type: Application
    Filed: August 26, 2011
    Publication date: March 29, 2012
    Inventors: Ralph Thomas, Michael Ligh