Patents by Inventor Michael Roy Stute
Michael Roy Stute has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 11165865Abstract: The disclosed embodiments include data storage systems and methods to store data. In one embodiment, the system includes a storage medium having a plurality of partitions for storing data values of a dataset. The system also includes a system manager operable to receive a data value connected to the system manager and assign a plurality of data subsets of the dataset to the plurality of partitions. The system also includes a key manager operable to assign a key of a key space to each data value of the dataset. The system also includes a top layer data manager and at least one bottom layer data manager, each bottom layer data manager assigned to a data subset. The top layer data manager passes data values to the at least one bottom layer data manager. The system also includes an allocation manager operable to dynamically readjust a storage space of the partition.Type: GrantFiled: June 6, 2019Date of Patent: November 2, 2021Assignee: MASERGY COMMUNICATIONS, INC.Inventor: Michael Roy Stute
-
Patent number: 11138172Abstract: The disclosed embodiments include data storage systems and methods to store data. In one embodiment, a computer-implemented method for storing data is disclosed. The method includes receiving a data value of a dataset. The method also includes assigning a plurality of keys of a key space to a plurality of data values of the dataset. The method further includes determining whether to readjust storage space of at least one partition of a plurality of partitions based on data values stored on the plurality of partitions. In response to a determination to readjust the at least one partition, the method further includes dynamically re-mapping the key space to readjust a number of keys of the plurality of keys that are assigned to data values stored on the plurality of partitions based on a number of data values that are stored on the plurality of partitions.Type: GrantFiled: December 21, 2018Date of Patent: October 5, 2021Assignee: MASERGY COMMUNICATIONS, INC.Inventor: Michael Roy Stute
-
Publication number: 20190289072Abstract: The disclosed embodiments include data storage systems and methods to store data. In one embodiment, the system includes a storage medium having a plurality of partitions for storing data values of a dataset. The system also includes a system manager operable to receive a data value connected to the system manager and assign a plurality of data subsets of the dataset to the plurality of partitions. The system also includes a key manager operable to assign a key of a key space to each data value of the dataset. The system also includes a top layer data manager and at least one bottom layer data manager, each bottom layer data manager assigned to a data subset. The top layer data manager passes data values to the at least one bottom layer data manager. The system also includes an allocation manager operable to dynamically readjust a storage space of the partition.Type: ApplicationFiled: June 6, 2019Publication date: September 19, 2019Inventor: Michael Roy Stute
-
Patent number: 10367844Abstract: The present disclosure generally provides systems and methods of network security and threat management. An exemplary system includes detection and prevention modules (DPM) designed specifically to collect and transmit suspicious binary network packet data. The collected network packets are sent to a behavioral correlation module to perform automatic behavioral correlation: (1) within each DPM, (2) across all DPMs installed on a network, and (3) across all DPMs installed on all networks. The results of the behavioral correlation are sent to a security dashboard module (SDM), which generally acts as a fully integrated Security Event Management system and collects, correlates, and prioritizes global network alerts, local network alerts, posted vendor alerts, and detected network vulnerabilities with enterprise assets. The SDM could display the results in a user-friendly graphical user interface and has the ability to perform geographic mapping of externally generated threats.Type: GrantFiled: July 17, 2018Date of Patent: July 30, 2019Assignee: MASERGY COMMUNICATIONS, INCInventors: Michael Roy Stute, Scott S. Paly
-
Patent number: 10356174Abstract: The disclosed embodiments include data storage systems and methods to store data. In one embodiment, the system includes a storage medium having a plurality of partitions for storing data values of a dataset. The system also includes a system manager operable to receive a data value connected to the system manager and assign a plurality of data subsets of the dataset to the plurality of partitions. The system also includes a key manager operable to assign a key of a key space to each data value of the dataset. The system also includes a top layer data manager and at least one bottom layer data manager, each bottom layer data manager assigned to a data subset. The top layer data manager passes data values to the at least one bottom layer data manager. The system also includes an allocation manager operable to dynamically readjust a storage space of the partition.Type: GrantFiled: May 6, 2016Date of Patent: July 16, 2019Assignee: MASERGY COMMUNICATIONS, INC.Inventor: Michael Roy Stute
-
Publication number: 20190121794Abstract: The disclosed embodiments include data storage systems and methods to store data. In one embodiment, a computer-implemented method for storing data is disclosed. The method includes receiving a data value of a dataset. The method also includes assigning a plurality of keys of a key space to a plurality of data values of the dataset. The method further includes determining whether to readjust storage space of at least one partition of a plurality of partitions based on data values stored on the plurality of partitions. In response to a determination to readjust the at least one partition, the method further includes dynamically re-mapping the key space to readjust a number of keys of the plurality of keys that are assigned to data values stored on the plurality of partitions based on a number of data values that are stored on the plurality of partitions.Type: ApplicationFiled: December 21, 2018Publication date: April 25, 2019Inventor: Michael Roy Stute
-
Patent number: 10198461Abstract: The disclosed embodiments include data storage systems and methods to store data. In one embodiment, the system includes a storage medium having a plurality of partitions for storing data values of a dataset. The system also includes a system manager operable to receive a data value from an external source and assign a plurality of data subsets of the dataset to the plurality of partitions. The system also includes a key manager operable to assign a key of a key space to each data value of the dataset. The system further includes at least one data manager, where each data manager is assigned a data subset. Further, each data manager is operable to provide an indication of whether the data value belongs to the data subset and operable to store the data value on the partition. The system also includes an allocation manager operable to dynamically readjust the partition.Type: GrantFiled: May 6, 2016Date of Patent: February 5, 2019Assignee: MASERGY COMMUNICATIONS, INC.Inventor: Michael Roy Stute
-
Publication number: 20180343279Abstract: The present disclosure generally provides systems and methods of network security and threat management. An exemplary system includes detection and prevention modules (DPM) designed specifically to collect and transmit suspicious binary network packet data. The collected network packets are sent to a behavioral correlation module to perform automatic behavioral correlation: (1) within each DPM, (2) across all DPMs installed on a network, and (3) across all DPMs installed on all networks. The results of the behavioral correlation are sent to a security dashboard module (SDM), which generally acts as a fully integrated Security Event Management system and collects, correlates, and prioritizes global network alerts, local network alerts, posted vendor alerts, and detected network vulnerabilities with enterprise assets. The SDM could display the results in a user-friendly graphical user interface and has the ability to perform geographic mapping of externally generated threats.Type: ApplicationFiled: July 17, 2018Publication date: November 29, 2018Inventors: Michael Roy Stute, Scott S. Paly
-
Patent number: 10091229Abstract: The present disclosure generally provides systems and methods of network security and threat management. An exemplary system includes detection and prevention modules (DPM) designed specifically to collect and transmit suspicious binary network packet data. The collected network packets are sent to a behavioral correlation module to perform automatic behavioral correlation: (1) within each DPM, (2) across all DPMs installed on a network, and (3) across all DPMs installed on all networks. The results of the behavioral correlation are sent to a security dashboard module (SDM), which generally acts as a fully integrated Security Event Management system and collects, correlates, and prioritizes global network alerts, local network alerts, posted vendor alerts, and detected network vulnerabilities with enterprise assets. The SDM could display the results in a user-friendly graphical user interface and has the ability to perform geographic mapping of externally generated threats.Type: GrantFiled: January 9, 2009Date of Patent: October 2, 2018Assignee: Masergy Communications, Inc.Inventors: Michael Roy Stute, Scott S. Paly
-
Publication number: 20170324812Abstract: The disclosed embodiments include data storage systems and methods to store data. In one embodiment, the system includes a storage medium having a plurality of partitions for storing data values of a dataset. The system also includes a system manager operable to receive a data value connected to the system manager and assign a plurality of data subsets of the dataset to the plurality of partitions. The system also includes a key manager operable to assign a key of a key space to each data value of the dataset. The system also includes a top layer data manager and at least one bottom layer data manager, each bottom layer data manager assigned to a data subset. The top layer data manager passes data values to the at least one bottom layer data manager. The system also includes an allocation manager operable to dynamically readjust a storage space of the partition.Type: ApplicationFiled: May 6, 2016Publication date: November 9, 2017Inventor: Michael Roy Stute
-
Publication number: 20170322958Abstract: The disclosed embodiments include data storage systems and methods to store data. In one embodiment, the system includes a storage medium having a plurality of partitions for storing data values of a dataset. The system also includes a system manager operable to receive a data value from an external source and assign a plurality of data subsets of the dataset to the plurality of partitions. The system also includes a key manager operable to assign a key of a key space to each data value of the dataset. The system further includes at least one data manager, where each data manager is assigned a data subset. Further, each data manager is operable to provide an indication of whether the data value belongs to the data subset and operable to store the data value on the partition. The system also includes an allocation manager operable to dynamically readjust the partition.Type: ApplicationFiled: May 6, 2016Publication date: November 9, 2017Inventor: Michael Roy Stute
-
Patent number: 9509717Abstract: The disclosed embodiments include a method for receiving data packets at a host system. In one embodiment, the method includes the steps of: intercepting a data packet, at a data link layer, that is being sent to an input/output (I/O) port of the host system using a hardware device that is located between a hardware network interface and the input/output port of the host system; reading, using the hardware device, at least one parameter from the data packet; determining, by the hardware device using instructions written in memory of the hardware device, whether the at least one parameter meets an authentication criteria, wherein the host system is unable to write to the memory of the hardware device; and in response to determining that the at least one parameter meets an authentication criteria, forwarding, by the hardware device, the data packet to the input/output port of the host system.Type: GrantFiled: August 14, 2014Date of Patent: November 29, 2016Assignee: Masergy Communications, Inc.Inventor: Michael Roy Stute
-
Patent number: 9338176Abstract: The present disclosure generally provides systems and methods of providing identification and access management. The system could include a network security zone having access rules for a network resource object associated with the network. The system could also include a module to collect information related to an attempt to access the network resource object and to generate an alert if the collected information fails to meet certain requirements related to the access rules. The module could change the access rules to prevent possible future unauthorized access attempts based on the collected information.Type: GrantFiled: January 7, 2009Date of Patent: May 10, 2016Assignee: Global DataGuard, Inc.Inventors: Dean A. Trumbull, Michael Roy Stute
-
Patent number: 9313024Abstract: Systems and methods for keyed communication tokens. A method may include receiving a key and a seed at a computing device, calculating a pseudo-random value based, at least in part, upon the seed, creating a concatenated string using the key and the pseudo-random value, hashing the concatenated string into a token, and adding the token to a user agent issued by a web browser as part of a command transmitted by the computing device. A computer system may be configured to identify a key and a seed, generate a pseudo-random value using the seed, create a concatenated string using the key and the pseudo-random value, hash the concatenated string into a token, and allow a web command in response to the web command including a user agent having the token or block the web command in response to the web command not including a user agent having the token.Type: GrantFiled: June 13, 2013Date of Patent: April 12, 2016Assignee: Masergy Communications, Inc.Inventor: Michael Roy Stute
-
Publication number: 20160050189Abstract: The disclosed embodiments include a method for receiving data packets at a host system. In one embodiment, the method includes the steps of: intercepting a data packet, at a data link layer, that is being sent to an input/output (I/O) port of the host system using a hardware device that is located between a hardware network interface and the input/output port of the host system; reading, using the hardware device, at least one parameter from the data packet; determining, by the hardware device using instructions written in memory of the hardware device, whether the at least one parameter meets an authentication criteria, wherein the host system is unable to write to the memory of the hardware device; and in response to determining that the at least one parameter meets an authentication criteria, forwarding, by the hardware device, the data packet to the input/output port of the host system.Type: ApplicationFiled: August 14, 2014Publication date: February 18, 2016Inventor: Michael Roy Stute
-
Patent number: 9256735Abstract: Systems and methods of detecting emergent behaviors in communications networks are disclosed. In some embodiments, a method may include decomposing a plurality of data packets into a plurality of component data types associated with a candidate alert representing a potential security threat in a network. The method may also include retrieving, from a database, a count for each of a plurality of historical data types matching at least a subset of the component data types, each of the counts quantifying an amount of data of a corresponding historical data type previously detected in the network in a given time period. The method may further include calculating a score that indicates a discrepancy between an amount of data in each of the subset of the component data types and the counts for each corresponding historical data type in the same time period, and handling the candidate alert based upon the score.Type: GrantFiled: October 10, 2012Date of Patent: February 9, 2016Assignee: Masergy Communications, Inc.Inventor: Michael Roy Stute
-
Patent number: 9172595Abstract: The present disclosure generally provides systems and methods of packet object database management. The database management system includes a database server designed specifically to process binary network packet data. The database server is associated with a parser, query engine, retrieval engine, virtual machine, data manger, and file processor. The database management system uses a proprietary query language to support all accesses to the database. The parser identifies whether the query is a data management query or if it is a data retrieval instruction. If the query is a data management query, the data manager manages the query request and attempts to satisfy the query request. Otherwise, query engine could further analyze or parse the query into a particular query structure or sub-structures to attempt to satisfy the query request.Type: GrantFiled: January 7, 2009Date of Patent: October 27, 2015Assignee: Masergy Communications, Inc.Inventors: Michael Roy Stute, Ary Paul Turner
-
Publication number: 20090178139Abstract: The present disclosure generally provides systems and methods of network security and threat management. An exemplary system includes detection and prevention modules (DPM) designed specifically to collect and transmit suspicious binary network packet data. The collected network packets are sent to a behavioral correlation module to perform automatic behavioral correlation: (1) within each DPM, (2) across all DPMs installed on a network, and (3) across all DPMs installed on all networks. The results of the behavioral correlation are sent to a security dashboard module (SDM), which generally acts as a fully integrated Security Event Management system and collects, correlates, and prioritizes global network alerts, local network alerts, posted vendor alerts, and detected network vulnerabilities with enterprise assets. The SDM could display the results in a user-friendly graphical user interface and has the ability to perform geographic mapping of externally generated threats.Type: ApplicationFiled: January 9, 2009Publication date: July 9, 2009Inventors: Michael Roy Stute, Scott S. Paly
-
Publication number: 20090177675Abstract: The present disclosure generally provides systems and methods of providing identification and access management. The system could include a network security zone having access rules for a network resource object associated with the network. The system could also include a module to collect information related to an attempt to access the network resource object and to generate an alert if the collected information fails to meet certain requirements related to the access rules. The module could change the access rules to prevent possible future unauthorized access attempts based on the collected information.Type: ApplicationFiled: January 7, 2009Publication date: July 9, 2009Inventors: Dean A. Trumbull, Michael Roy Stute
-
Publication number: 20090177765Abstract: The present disclosure generally provides systems and methods of packet object database management. The database management system includes a database server designed specifically to process binary network packet data. The database server is associated with a parser, query engine, retrieval engine, virtual machine, data manger, and file processor. The database management system uses a proprietary query language to support all accesses to the database. The parser identifies whether the query is a data management query or if it is a data retrieval instruction. If the query is a data management query, the data manager manages the query request and attempts to satisfy the query request. Otherwise, query engine could further analyze or parse the query into a particular query structure or sub-structures to attempt to satisfy the query request.Type: ApplicationFiled: January 7, 2009Publication date: July 9, 2009Inventors: Michael Roy Stute, Ary Paul Turner