Patents by Inventor Patrick G. Traynor

Patrick G. Traynor has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20190228153
    Abstract: Techniques and systems are described for detecting malware's bulk transformation of a user's data before the malware is able to complete the data transformation. Included are methods and systems for enabling malware detection by monitoring the file operations of a computer application or process for particular kinds of suspicious data transformation indicators. Indicators include primary indicators, such as file-type signature changes, notable changes in file data entropy, and out-of-range similarity measurements between the read and write versions of file data, as well as secondary indicators, such as a large number of file deletions and a large reduction in the number of file-types written versus read by a process over time. When indicators are triggered by a process, an adjustment to the process' malware score is made; in the event that the process' malware score reaches a malware detection threshold, the process is marked as malware and appropriate actions are taken.
    Type: Application
    Filed: September 23, 2016
    Publication date: July 25, 2019
    Inventors: Walter N. Scaife, Patrick G. Traynor, Henry Carter, Kevin Butler
  • Publication number: 20190130240
    Abstract: Devices and methods for detecting credit card skimmers are provided herein. A device can include a printed circuit board having a pattern of electrical traces on its surface, and a computer readable medium comprising instructions that cause a processor to direct an electrical voltage to a trace and detect an electrical current between two points of the trace. A gap can be disposed between the two points across which a voltage is applied in order to detect a magnetic reader. A count of the detected magnetic readers within a credit card reading device may be indicative of the presence of a credit card skimmer.
    Type: Application
    Filed: October 29, 2018
    Publication date: May 2, 2019
    Inventors: Walter N. SCAIFE, Patrick G. TRAYNOR, Christian PEETERS
  • Publication number: 20180314862
    Abstract: Systems and methods for detecting counterfeit magnetic stripes are provided. A method can include detecting magnetic flux transitions encoded on a magnetic stripe and the variation in distances between clocking flux transitions. The distance between variations in clocking flux transitions is greater in counterfeit cards than in legitimate cards. The variations in distances can be compared with known values of legitimate cards to detect the presence of a counterfeit magnetic stripe.
    Type: Application
    Filed: April 24, 2018
    Publication date: November 1, 2018
    Inventors: Patrick G. Traynor, David P. Arnold, Walter N. Scaife, Christian Peeters, Camilo Velez Cuervo
  • Publication number: 20180294959
    Abstract: Systems and methods for call authentication are provided. A method can include an enrollment protocol that ensures users control the number they claim to own, a handshake protocol that mutually authenticates the calling parties, and a call integrity protocol that ensures the security of the voice channel and the content it carries. A server can act as either an endpoint or intermediary between user clients and client-server architecture can be employed. All protocols can include end-to-end cryptography and the enrollment protocol can issue a certificate that binds the identity of the client to a phone number.
    Type: Application
    Filed: March 30, 2018
    Publication date: October 11, 2018
    Inventors: Patrick G. Traynor, Bradley G. Reaves, Logan E. Blue, Luis Vargas, Hadi Abdullah, Thomas Shrimpton