Patents by Inventor Omar Santos

Omar Santos has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20230256282
    Abstract: A parallel bar stand assistance device is provided. The parallel bar stand assistance device includes a first bar and a second bar that are placed in a vertical configuration. The first bar and the second bar are in a parallel alignment with each other. A first arm support is placed on the top end of the first bar, while a second arm support is placed on the top end of the second bar. A first leg support is slidable and is placed on the inner face of the first bar. A second leg support is slidable and is placed on the inner face of the second bar.
    Type: Application
    Filed: February 16, 2022
    Publication date: August 17, 2023
    Inventor: Omar Santos
  • Patent number: 10291480
    Abstract: In one embodiment, a device in a network reserves first and second sets of local resources for an anomaly detection mechanism. The device reports the first set of local resources to a supervisory node in the network. The device applies one or more anomaly detection rules from the supervisory node using the first set of reserved resources. The device receives one or more anomaly detection rules from a peer node in the network. The device applies the one or more anomaly detection rules from the peer node using the second set of reserved resources.
    Type: Grant
    Filed: March 29, 2016
    Date of Patent: May 14, 2019
    Assignee: Cisco Technology, Inc.
    Inventors: Carlos M. Pignataro, Omar Santos, David C. White, Jr.
  • Patent number: 10135859
    Abstract: Creating security enclaves includes determining one or more parameters of one or more applications and one or more services operating in the network. An optimal number of clusters for grouping the one or more applications and the one or more services is determined based on the one or more parameters. Then, the one or more applications and the one or more services are grouped into the clusters and one or more security enclaves are applied to each of the clusters so as to maximize operational security of the network.
    Type: Grant
    Filed: May 3, 2016
    Date of Patent: November 20, 2018
    Assignee: Cisco Technology, Inc.
    Inventors: Mark-David McLaughlin, Rajidi P. Reddy, Omar Santos
  • Publication number: 20180027009
    Abstract: Systems, methods, and computer-readable storage media for determining threat mitigation policies and deploying tested security fixes. In some cases, the present technology involves gathering threat intelligence, identifying a security threat, identifying an application container that is affected by the security threat, determining a threat level for the security threat on the application container, applying a threat mitigation policy to the affected application container, spawning a clone of the affected application container, testing the clone with one or more security fixes, and deploying the clone of the affected container as a replacement for the affected container.
    Type: Application
    Filed: July 20, 2016
    Publication date: January 25, 2018
    Inventors: Omar Santos, Jazib Frahim
  • Publication number: 20170324765
    Abstract: Creating security enclaves includes determining one or more parameters of one or more applications and one or more services operating in the network. An optimal number of clusters for grouping the one or more applications and the one or more services is determined based on the one or more parameters. Then, the one or more applications and the one or more services are grouped into the clusters and one or more security enclaves are applied to each of the clusters so as to maximize operational security of the network.
    Type: Application
    Filed: May 3, 2016
    Publication date: November 9, 2017
    Inventors: Mark-David McLaughlin, Rajidi P. Reddy, Omar Santos
  • Publication number: 20170288988
    Abstract: In one embodiment, a device in a network reserves first and second sets of local resources for an anomaly detection mechanism. The device reports the first set of local resources to a supervisory node in the network. The device applies one or more anomaly detection rules from the supervisory node using the first set of reserved resources. The device receives one or more anomaly detection rules from a peer node in the network. The device applies the one or more anomaly detection rules from the peer node using the second set of reserved resources.
    Type: Application
    Filed: March 29, 2016
    Publication date: October 5, 2017
    Inventors: Carlos M. Pignataro, Omar Santos, David C. White, JR.
  • Publication number: 20170061131
    Abstract: Techniques are presented herein that validate integrity of a computing device. A command to a first processor of a security module of the computing device is received through an interface unit of the security module on a communication channel external to the computing device. A configuration of the security module cannot be changed by a second processor of the computing device which executes an operating system and at least one application on the computing device. In response to receiving the command, one or more memory devices of the computing device are directly accessed by the first processor independent from the second processor to validate integrity of the computing device.
    Type: Application
    Filed: August 31, 2015
    Publication date: March 2, 2017
    Inventors: Omar Santos, Christopher M. McCoy, Catherine M. Pearce, Carlos M. Pignataro, Jeff Apcar