Patents by Inventor Monty D. McDougal

Monty D. McDougal has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 10021128
    Abstract: Generally discussed herein are systems, devices, and methods for malware nullification. A system can include a detect module to identify a file type of an attachment of the email, compare the identified file type to a list of unsafe file types, and in response to determining the identified file type is on the list of unsafe file types, remove the attachment from the email and forward the attachment to a database, a file converter module to receive the attachment from the detect module and convert the file to a safe file type so as to nullify malware in the attachment, an insert module to receive the file with the safe file type and replace the attachment of the email with the file with the safe file type, and a mail transfer agent to forward the email with the file with the safe file type to the client.
    Type: Grant
    Filed: March 11, 2016
    Date of Patent: July 10, 2018
    Assignee: Forcepoint LLC
    Inventor: Monty D. McDougal
  • Patent number: 9882924
    Abstract: Generally discussed herein are systems, devices, and methods for malware analysis. In one or more embodiments, a method can include copying application layer data traffic to create copied application layer data traffic, forwarding at least a portion of the application layer data traffic to a destination client prior to a malware analysis of corresponding copied application layer data traffic, determining whether the copied application layer data traffic includes a specified property, and in response to a determination that the copied application layer data traffic includes the specified property, storing the copied application layer data traffic determined to include the specified property for subsequent malware analysis, the stored copied application layer data traffic including context data of the copied application layer data traffic.
    Type: Grant
    Filed: March 8, 2016
    Date of Patent: January 30, 2018
    Assignee: Forcepoint LLC
    Inventors: Monty D. McDougal, John S. Lear, Julian A. Zottl, Jesse J. Lee
  • Patent number: 9876810
    Abstract: Generally discussed herein are systems, devices, and methods for malware analysis lab isolation. A system can include a malware analysis zone LAN in which malware analysis is performed, a separation zone LAN communicatively connected to the malware analysis zone LAN, the separation zone LAN providing access control to manage communication of data between other LANs of the plurality of LANs, an analyst zone LAN communicatively connected to the separation zone LAN, and a remote access zone LAN communicatively connected to the separation zone LAN, the remote access zone LAN providing a user LAN with results from the malware analysis zone LAN and the analyst zone LAN and providing an item for malware analysis by the malware analysis zone LAN.
    Type: Grant
    Filed: December 4, 2015
    Date of Patent: January 23, 2018
    Assignee: Raytheon Company
    Inventors: Monty D. McDougal, Eric G. Dodge, Julian A. Zottl
  • Patent number: 9762595
    Abstract: Generally discussed herein are systems, apparatuses, and methods for secure transfer of content across a security boundary. A system can include a high side domain communicatively coupled to a transfer guard module, the high side domain comprising a high side data repository, a first review module executable by processing circuitry to determine whether a permission level of first content violates a permission level of the high side domain, a second review module executable by the processing circuitry to determine whether second content from the high side data repository includes a permission level that violates a permission level of a low side domain, a first data diode module communicatively coupled between the first review module and the high side data repository, and a second data diode module communicatively coupled between the second review module and the high side data repository.
    Type: Grant
    Filed: August 11, 2015
    Date of Patent: September 12, 2017
    Assignee: Raytheon Company
    Inventors: Eric Dodge, Daniel E. Abramson, Monty D. McDougal, Julian A. Zottl, Stephen R. Welke, Kevin L. Cariker
  • Patent number: 9749295
    Abstract: Generally discussed herein are systems, apparatuses, and methods for internet traffic analysis. In one or more embodiments, a system can include a web proxy server to receive, from a client, a request to download content from an internet, produce a request to the internet for the content, receive the content from the internet, and produce a malware analysis request in response to receiving the requested content and a malware server communicatively connected to the web proxy server, the malware server to receive the malware analysis request and the content from the web proxy server, and issue a response to the malware analysis request indicating whether to allow the content to be downloaded to the client.
    Type: Grant
    Filed: April 16, 2015
    Date of Patent: August 29, 2017
    Assignee: Raytheon Company
    Inventor: Monty D. McDougal
  • Publication number: 20170163665
    Abstract: Generally discussed herein are systems, devices, and methods for malware analysis lab isolation. A system can include a malware analysis zone LAN in which malware analysis is performed, a separation zone LAN communicatively connected to the malware analysis zone LAN, the separation zone LAN providing access control to manage communication of data between other LANs of the plurality of LANs, an analyst zone LAN communicatively connected to the separation zone LAN, and a remote access zone LAN communicatively connected to the separation zone LAN, the remote access zone LAN providing a user LAN with results from the malware analysis zone LAN and the analyst zone LAN and providing an item for malware analysis by the malware analysis zone LAN.
    Type: Application
    Filed: December 4, 2015
    Publication date: June 8, 2017
    Inventors: Monty D. McDougal, Eric G. Dodge, Julian A. Zottl
  • Publication number: 20170048259
    Abstract: Generally discussed herein are systems, apparatuses, and methods for secure transfer of content across a security boundary. A system can include a high side domain communicatively coupled to a transfer guard module, the high side domain comprising a high side data repository, a first review module executable by processing circuitry to determine whether a permission level of first content violates a permission level of the high side domain, a second review module executable by the processing circuitry to determine whether second content from the high side data repository includes a permission level that violates a permission level of a low side domain, a first data diode module communicatively coupled between the first review module and the high side data repository, and a second data diode module communicatively coupled between the second review module and the high side data repository.
    Type: Application
    Filed: August 11, 2015
    Publication date: February 16, 2017
    Inventors: Eric Dodge, Daniel E. Abramson, Monty D. McDougal, Julian A. Zottl, Stephen R. Welke, Kevin L. Cariker
  • Publication number: 20160308885
    Abstract: Generally discussed herein are systems, apparatuses, and methods for internet traffic analysis. In one or more embodiments, a system can include a web proxy server to receive, from a client, a request to download content from an internet, produce a request to the internet for the content, receive the content from the internet, and produce a malware analysis request in response to receiving the requested content and a malware server communicatively connected to the web proxy server, the malware server to receive the malware analysis request and the content from the web proxy server, and issue a response to the malware analysis request indicating whether to allow the content to be downloaded to the client.
    Type: Application
    Filed: April 16, 2015
    Publication date: October 20, 2016
    Inventor: Monty D. McDougal
  • Publication number: 20160269437
    Abstract: Generally discussed herein are systems, devices, and methods for malware analysis. In one or more embodiments, a method can include copying application layer data traffic to create copied application layer data traffic, forwarding at least a portion of the application layer data traffic to a destination client prior to a malware analysis of corresponding copied application layer data traffic, determining whether the copied application layer data traffic includes a specified property, and in response to a determination that the copied application layer data traffic includes the specified property, storing the copied application layer data traffic determined to include the specified property for subsequent malware analysis, the stored copied application layer data traffic including context data of the copied application layer data traffic.
    Type: Application
    Filed: March 8, 2016
    Publication date: September 15, 2016
    Inventors: Monty D. McDougal, John S. Lear, Julian A. Zottl, Jesse J. Lee
  • Publication number: 20160269422
    Abstract: Generally discussed herein are systems, devices, and methods for malware nullification. A system can include a detect module to identify a file type of an attachment of the email, compare the identified file type to a list of unsafe file types, and in response to determining the identified file type is on the list of unsafe file types, remove the attachment from the email and forward the attachment to a database, a file converter module to receive the attachment from the detect module and convert the file to a safe file type so as to nullify malware in the attachment, an insert module to receive the file with the safe file type and replace the attachment of the email with the file with the safe file type, and a mail transfer agent to forward the email with the file with the safe file type to the client.
    Type: Application
    Filed: March 11, 2016
    Publication date: September 15, 2016
    Inventor: Monty D. McDougal
  • Patent number: 9213837
    Abstract: In one embodiment, a method includes identifying, using one or more processors, a plurality of characteristics of a Portable Document Format (PDF) file. The method also includes determining, using the one or more processors, for each of the plurality of characteristics, a score corresponding to the characteristic. In addition, the method includes comparing, using the one or more processors, the determined scores to a first threshold. Based at least on the comparison of the determined scores to the first threshold, the method includes determining, using the one or more processors, that the PDF file is potential malware.
    Type: Grant
    Filed: December 6, 2011
    Date of Patent: December 15, 2015
    Assignee: Raytheon Cyber Products, LLC
    Inventors: Matthew Richard, Jesse J. Lee, Monty D. McDougal, Randy S. Jennings, William E. Sterns
  • Patent number: 9009820
    Abstract: In certain embodiments, a method includes receiving, at a first malware detection node, from a malware detection system a request to apply a first malware detection technique to a file. The malware detection system is configured to determine whether the file is suspected malware by analyzing a plurality of predefined result states received in response to the first malware detection node applying the first malware detection technique to the file and a second malware detection node applying a second malware detection technique to the file. The method includes receiving at least one result from a malware detection engine of applying the first malware detection technique to the file and determining at least one predefined result state based on the received at least one result. The method includes reporting, by the first malware detection node, the at least one predefined result state to the malware detection system.
    Type: Grant
    Filed: February 14, 2011
    Date of Patent: April 14, 2015
    Assignee: Raytheon Company
    Inventors: Monty D. McDougal, William E. Sterns, Randy S. Jennings
  • Patent number: 9003532
    Abstract: In certain embodiments, a computer-implemented method comprises receiving, via a computer network and from a first computer system, a first malware analysis request. The first malware analysis request comprises a file to be analyzed for malware by a malware analysis system. The method includes initiating a malware analysis by the malware analysis system of the first file for malware. The method includes communicating to the first computer system a response for the first file determined by the malware analysis system to the first computer system. The response comprises an indication of whether the first file comprises malware.
    Type: Grant
    Filed: September 15, 2011
    Date of Patent: April 7, 2015
    Assignee: Raytheon Company
    Inventors: Monty D. McDougal, Bradley T. Ford, William E. Sterns
  • Patent number: 8914882
    Abstract: Intrusion prevention system (IPS) mode is provided for a malware detection system. At least one staging server is provided for intercepting an incoming electronic message, making a copy of the intercepted incoming electronic message, and holding the intercepted incoming electronic message until an analysis of the copy of the intercepted incoming electronic message has been completed or until a timeout threshold has been exceeded. A malware detection system is coupled to the at least one staging server. The at least one malware detection system includes at least one decomposition server for receiving the copy of the intercepted incoming electronic message and processing the copy of the intercepted incoming electronic message to detect malware. Multiple mail queues, e.g., incoming, timeout, jail, decomposition, and outgoing, are used to manage message flows and delay messages while malware analysis is performed.
    Type: Grant
    Filed: November 2, 2012
    Date of Patent: December 16, 2014
    Assignee: Raytheon Company
    Inventors: Monty D. McDougal, Jesse J. Lee, William L. Gilmore
  • Patent number: 8875293
    Abstract: In accordance with particular embodiments, a method includes intercepting a communication and extracting metadata associated with the communication. The extracted metadata comprises a plurality of different fields from communication metadata and file metadata. The method further includes determining a score, based on previous communications, for each field of the extracted metadata. The score is indicative of a likelihood that the communication is a malicious communication. The method additionally includes combining the scores to generate a combined score for the communication based on an algorithm developed from the previous communications. The method also includes generating, based on the combined score at a first time, a predicted classification as to whether the communication is a malicious communication.
    Type: Grant
    Filed: September 22, 2011
    Date of Patent: October 28, 2014
    Assignee: Raytheon Company
    Inventors: Monty D. McDougal, William E. Sterns, Randy S. Jennings
  • Patent number: 8875220
    Abstract: In certain embodiments, a method includes receiving, at a proxy, a request for access to a network from an application on an endpoint. The method also includes determining, by the proxy, information about the application on the endpoint by examining one or more headers of the request received at the proxy from the application. The method further includes determining, by the proxy, whether the one or more headers comprise expected information based on the determined information about the application. In response to determining that the one or more headers do not comprise the expected information, the method includes denying, by the proxy, the request for access to the network. In addition, in response to determining that the one or more headers comprise the expected information, the method includes forwarding, by the proxy, the request to the network on behalf of the application.
    Type: Grant
    Filed: July 1, 2010
    Date of Patent: October 28, 2014
    Assignee: Raytheom Company
    Inventor: Monty D. McDougal
  • Patent number: 8863279
    Abstract: According to one embodiment, a computer-implemented method for execution on one or more processors includes receiving a first file and determining a file type of the first file. The method also includes determining, according to a first policy, a plurality of malware detection schemes to apply to the first file based on the determined file type of the first file. In addition, the method includes scheduling the application of the determined plurality of malware detection schemes to the first file amongst a plurality of detection nodes according to a second policy. Further, the method includes determining, in response to determining the results of applying the plurality of malware detection schemes, that the first file is malware or determining that the first file is suspected malware according to a third policy.
    Type: Grant
    Filed: March 8, 2010
    Date of Patent: October 14, 2014
    Assignee: Raytheon Company
    Inventors: Monty D. McDougal, Randy S. Jennings, Jeffrey C. Brown, Jesse J. Lee, Brian N. Smith, Darin J. De Rita, Kevin L. Cariker, William E. Sterns, Michael K. Daly
  • Patent number: 8839434
    Abstract: A computer-implemented method includes accessing, by an analysis console, information related to a first file received at a first host of a plurality of hosts. Each host is capable of running a corresponding set of malware detection processes. The information includes: an identifier of the first file; and data indicating a first result of the first host applying the set of malware detection processes to the first file. The identifier is generated by the first host and is usable by each of the hosts to determine whether a second file comprises content substantially equivalent to content of the first file. The analysis console generates a first output including: the identifier of the first file; and a second result indicating whether the first file comprises malware. The second result is usable by each of the hosts to determine whether the second file comprises malware. The first output is propagated to the hosts.
    Type: Grant
    Filed: April 15, 2011
    Date of Patent: September 16, 2014
    Assignee: Raytheon Company
    Inventors: Monty D. McDougal, William E. Sterns, Randy S. Jennings, Jesse J. Lee, Darin J. DeRita
  • Patent number: 8787567
    Abstract: In accordance with particular embodiments, a computer-implemented method for execution by one or more processors includes intercepting a communication comprising a message. The method also includes identifying words from within the message. The method further includes storing in a dictionary words from within the message of the communication and one or more parameters of the communication for each of the words. The dictionary comprises a plurality of words from a plurality of intercepted text-based communications. The method also includes receiving an encrypted file that is configured to be decrypted using a password. The method additionally includes identifying words from the dictionary to be used to attempt to decrypt the encrypted file. The identified words are identified based on at least one parameter associated with the encrypted file and the one or more parameters stored in the dictionary.
    Type: Grant
    Filed: February 22, 2011
    Date of Patent: July 22, 2014
    Assignee: Raytheon Company
    Inventors: Monty D. McDougal, Randy S. Jennings, William E. Sterns
  • Patent number: 8776242
    Abstract: In certain embodiments, a computer-implemented system comprises a boundary controller and a first malware detection agent. The boundary controller is operable to implement a security boundary between a first computer network environment and a second computer network environment. The second computer network environment has a security classification level that is more restrictive than a security classification level of the first computer network environment. The boundary controller is operable to receive from the first computer network environment a file. The first malware detection agent is positioned in the second computer network environment and is operable to receive via the boundary controller the file and apply a first malware detection process on the file. The first malware detection process is subject to the security classification level of the second computer network environment.
    Type: Grant
    Filed: November 29, 2011
    Date of Patent: July 8, 2014
    Assignee: Raytheon Company
    Inventor: Monty D. McDougal