Patents by Inventor Obinna Igbe

Obinna Igbe has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 11729186
    Abstract: A computer security system comprises at least one authorized node constructed and arranged to execute a consensus protocol for validating and verifying a blockchain transaction and to extract at least one of a signature or feature of a detected cyberattack for the blockchain transaction and mining the transaction to a blockchain network; at least one unauthorized node prohibited from executing the consensus protocol and from validating and verifying a blockchain transaction but authorized to retrieve the at least one of the signature or feature from the blockchain network; and a special-purpose processor of the blockchain network that facilitates a distribution of the at least one of signature or feature for cooperative intrusion detection between the at least one authorized node and the at least one unauthorized node.
    Type: Grant
    Filed: October 3, 2019
    Date of Patent: August 15, 2023
    Assignee: Research Foundation of the City University of New York
    Inventors: Oluwaseyi Ajayi, Tarek Saadawi, Obinna Igbe
  • Publication number: 20220342982
    Abstract: A malicious process detection system comprises a Virtual Machine Introspection (VMI) module that performs an introspection operation on at least one virtual machine; and an Intrusion Detection System (IDS) that communicates with the VW module to generate data that is analyzed by the IDS using a negative selection algorithm (NSA) and that identifies suspicious processes at the VM based on the analyzed data.
    Type: Application
    Filed: April 19, 2022
    Publication date: October 27, 2022
    Inventors: Huseyn Huseynov, Kenichi Kourai, Tarek Saadawi, Obinna Igbe
  • Publication number: 20200112572
    Abstract: A computer security system comprises at least one authorized node constructed and arranged to execute a consensus protocol for validating and verifying a blockchain transaction and to extract at least one of a signature or feature of a detected cyberattack for the blockchain transaction and mining the transaction to a blockchain network; at least one unauthorized node prohibited from executing the consensus protocol and from validating and verifying a blockchain transaction but authorized to retrieve the at least one of the signature or feature from the blockchain network; and a special-purpose processor of the blockchain network that facilitates a distribution of the at least one of signature or feature for cooperative intrusion detection between the at least one authorized node and the at least one unauthorized node.
    Type: Application
    Filed: October 3, 2019
    Publication date: April 9, 2020
    Inventors: Oluwaseyi Ajayi, Tarek Saadawi, Obinna Igbe
  • Patent number: 10609057
    Abstract: A method for detecting intrusion is provided using a combination of two AIS algorithms: Negative Selection Algorithm (NSA) and Dendritic Cell Algorithm (DCA). The method includes the following steps, or some functional subset of these steps: periodic monitoring of a data processing system for anomalous behavior that may indicate the presence of an intruder or an undesirable software; using the NSA for the generation of a population of detectors that are used for detecting anomalies in the monitored system via a matching criterion; using the DCA (which runs in parallel to the NSA) to sample traffic and signals coming in or out of the data processing system; using an aggregation system to combine the individual decisions of the NSA and the DCA to form a single final decision.
    Type: Grant
    Filed: June 26, 2017
    Date of Patent: March 31, 2020
    Assignee: Research Foundation of the City University of New York
    Inventors: Obinna Igbe, Tarek Saadawi, Ihab Darwish
  • Publication number: 20170374091
    Abstract: A method for detecting intrusion is provided using a combination of two AIS algorithms: Negative Selection Algorithm (NSA) and Dendritic Cell Algorithm (DCA). The method includes the following steps, or some functional subset of these steps: periodic monitoring of a data processing system for anomalous behavior that may indicate the presence of an intruder or an undesirable software; using the NSA for the generation of a population of detectors that are used for detecting anomalies in the monitored system via a matching criterion; using the DCA (which runs in parallel to the NSA) to sample traffic and signals coming in or out of the data processing system; using an aggregation system to combine the individual decisions of the NSA and the DCA to form a single final decision.
    Type: Application
    Filed: June 26, 2017
    Publication date: December 28, 2017
    Inventors: Obinna Igbe, Tarek Saadawi, Ihab Darwish