Patents by Inventor Paul Giura
Paul Giura has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Publication number: 20210067545Abstract: A system for providing secure browsing via a transparent network proxy is disclosed. The system may receive, from a client, a request to access a resource. The request may include an identifier that may be utilized to locate the resource. Once the request is received, the system may determine if the resource is not trusted, such as if the identifier is determined to be unknown or suspicious. If the resource is determined to not be trusted by the system, the system may forward the request to a virtual machine manager that may select a browser virtual machine from a pool of browser virtual machines. After the browser virtual machine is selected, the browser virtual machine may stream a rendering of the resource to the client based on the request. The rendering of the resource may be provided in lieu of the actual resource.Type: ApplicationFiled: November 12, 2020Publication date: March 4, 2021Applicant: AT&T Intellectual Property I, L.P.Inventors: Paul Giura, Jeffrey E. Bickford, Donald E. Hendrix, Howard F. Shirokmann, Thomas A. Anschutz, Ching C. Shih
-
Patent number: 10868826Abstract: A system for providing secure browsing via a transparent network proxy is disclosed. The system may receive, from a client, a request to access a resource. The request may include an identifier that may be utilized to locate the resource. Once the request is received, the system may determine if the resource is not trusted, such as if the identifier is determined to be unknown or suspicious. If the resource is determined to not be trusted by the system, the system may forward the request to a virtual machine manager that may select a browser virtual machine from a pool of browser virtual machines. After the browser virtual machine is selected, the browser virtual machine may stream a rendering of the resource to the client based on the request. The rendering of the resource may be provided in lieu of the actual resource.Type: GrantFiled: January 29, 2019Date of Patent: December 15, 2020Assignee: AT&T Intellectual Property I, L.P.Inventors: Paul Giura, Jeffrey E. Bickford, Donald E. Hendrix, Howard F. Shirokmann, Thomas A. Anschutz, Ching C. Shih
-
Patent number: 10797974Abstract: Generation of behavior profiling reports is provided for enterprise server devices in a network of enterprise server devices, as well as generation and association of severity scores for behavior profiling reports generated for enterprise server devices included in the network of enterprise server devices. A method can comprise receiving historical security event data representing historical security events of a first device and owner data representing an owner of the first device, and, as a function of the historical security event data and the owner data, an anomalous contact established between the first device and the second device can be identified. Further, in response to identifying the existence of the anomalous contact, the second device can be depicted on a connected graph of anomalous contacts established by the first device.Type: GrantFiled: June 17, 2019Date of Patent: October 6, 2020Assignee: AT&T INTELLECTUAL PROPERTY I, L.P.Inventors: Paul Giura, Stanislav Nurilov, Makonnen Sankore, Chaim Spielman
-
Publication number: 20200036755Abstract: To verify compliance with a data access policy, a query result including data specified by a requesting entity and a representation of a data access policy is received from a database. Based on the representation of the data access policy included in the query result, it is verified whether the requesting entity is permitted to access the data included in the query result. Transmission of the data included in the query result to the requesting entity is controlled responsive to the verification. Related methods, systems, and computer program products are also discussed.Type: ApplicationFiled: October 3, 2019Publication date: January 30, 2020Applicant: AT&T Intellectual Property I, L.P.Inventors: Evgene Vahlis, Paul Giura
-
Publication number: 20200014720Abstract: Concepts and technologies disclosed herein are directed to security management of devices using blockchain technology. According to one aspect disclosed herein, a smart contract for a device can be created. The smart contract can identify a plurality of parties including a device customer, a device manufacturer, and a vulnerability assessor. The smart contract can include an expected action to be performed by the device manufacturer responsive to a trigger event. In response to the trigger event being detected, the smart contract can be executed to cause the expected action to be performed by the device manufacturer.Type: ApplicationFiled: July 9, 2018Publication date: January 9, 2020Applicant: AT&T Intellectual Property I, L.P.Inventor: Paul Giura
-
Patent number: 10530808Abstract: Electronic screen shots protect against cyber attacks. When any webpage is received, a screen shot of the webpage may be generated. Should the webpage be from an untrusted source, the screen shot protects downstream resources and clients from potential malware contained within the webpage.Type: GrantFiled: January 15, 2016Date of Patent: January 7, 2020Assignee: AT&T INTELLECTUAL PROPERTY I, L.P.Inventors: Paul Giura, Jeffrey E. Bickford, Gustavo de los Reyes
-
Patent number: 10476911Abstract: To verify compliance with a data access policy, a query result including data specified by a requesting entity and a representation of a data access policy is received from a database. Based on the representation of the data access policy included in the query result, it is verified whether the requesting entity is permitted to access the data included in the query result. Transmission of the data included in the query result to the requesting entity is controlled responsive to the verification. Related methods, systems, and computer program products are also discussed.Type: GrantFiled: July 14, 2017Date of Patent: November 12, 2019Assignee: AT&T INTELLECTUAL PROPERTY I, L.P.Inventors: Evgene Vahlis, Paul Giura
-
Publication number: 20190333096Abstract: Aspects of the subject disclosure may include, for example, a device, that includes a processing system including a processor, and a memory that stores executable instructions that, when executed by the processing system, facilitate performance of operations, the operations including: creating an initial block in a blockchain, wherein the initial block includes first information describing an advertisement spot generated by a viewer device; adding second information to the initial block that identifies a purchaser of the advertisement spot; calculating a cryptographic hash for the initial block; and sending a copy of the cryptographic hash to a network element of a communications network, wherein the network element records the copy of the cryptographic hash in a hash ledger. Other embodiments are disclosed.Type: ApplicationFiled: April 25, 2018Publication date: October 31, 2019Applicant: AT&T Intellectual Property I, L.P.Inventors: Lars Johnson, Hans Fischmann, Cristina Serban, Jennifer Morovitz, Paul Giura
-
Publication number: 20190312796Abstract: Generation of behavior profiling reports is provided for enterprise server devices in a network of enterprise server devices, as well as generation and association of severity scores for behavior profiling reports generated for enterprise server devices included in the network of enterprise server devices. A method can comprise receiving historical security event data representing historical security events of a first device and owner data representing an owner of the first device, and, as a function of the historical security event data and the owner data, an anomalous contact established between the first device and the second device can be identified. Further, in response to identifying the existence of the anomalous contact, the second device can be depicted on a connected graph of anomalous contacts established by the first device.Type: ApplicationFiled: June 17, 2019Publication date: October 10, 2019Inventors: Paul Giura, Stanislav Nurilov, Makonnen Sankore, Chaim Spielman
-
Publication number: 20190281000Abstract: A method of generating a signature for a group of electronic messages that each include a plurality of characters comprises extracting a plurality of blocks of characters from each of the electronic messages, mathematically processing each of the blocks of characters from each electronic message, and generating a signature for the group of electronic messages based at least in part on the mathematically processed blocks of characters. In some embodiments a counting Bloom filter may be used to generate the signature. The signatures generated by these methods may be used to identify spam.Type: ApplicationFiled: May 17, 2019Publication date: September 12, 2019Applicant: AT&T Intellectual Property I, L.P.Inventors: Paul Giura, Baris Coskun
-
Patent number: 10367704Abstract: Generation of behavior profiling reports is provided for enterprise server devices in a network of enterprise server devices, as well as generation and association of severity scores for behavior profiling reports generated for enterprise server devices included in the network of enterprise server devices. A method can comprise receiving historical security event data representing historical security events of a first device and owner data representing an owner of the first device, and, as a function of the historical security event data and the owner data, an anomalous contact established between the first device and the second device can be identified. Further, in response to identifying the existence of the anomalous contact, the second device can be depicted on a connected graph of anomalous contacts established by the first device.Type: GrantFiled: July 12, 2016Date of Patent: July 30, 2019Assignee: AT&T INTELLECTUAL PROPERTY I, L.P.Inventors: Paul Giura, Stanislav Nurilov, Makonnen Sankore, Chaim Spielman
-
Patent number: 10333877Abstract: A method of generating a signature for a group of electronic messages that each include a plurality of characters comprises extracting a plurality of blocks of characters from each of the electronic messages, mathematically processing each of the blocks of characters from each electronic message, and generating a signature for the group of electronic messages based at least in part on the mathematically processed blocks of characters. In some embodiments a counting Bloom filter may be used to generate the signature. The signatures generated by these methods may be used to identify spam.Type: GrantFiled: April 29, 2014Date of Patent: June 25, 2019Assignee: AT&T INTELLECTUAL PROPERTY I, L.P.Inventors: Paul Giura, Baris Coskun
-
Publication number: 20190190949Abstract: A system for distributing virtual entity behavior profiling in cloud deployments is disclosed. In particular, the system may include conducting entity behavior profiling closer to where data and data logs are generated, such as at a hypervisor server, in a distributed fashion. By doing so, the system may reduce bandwidth consumption typically associated with transferring data to a central processing system, may be able to use more data collected closer to sources of data generation, and may provide faster reaction times because of the faster processing of data enabled by the system. Additionally, the system may assist with reducing false positives associated with malware detection and other compromises associated with entities by aggregating the results of distributed computations at different sites.Type: ApplicationFiled: February 26, 2019Publication date: June 20, 2019Applicant: AT&T Intellectual Property I, L.P.Inventors: Paul Giura, Gustavo de los Reyes
-
Publication number: 20190158531Abstract: A system for providing secure browsing via a transparent network proxy is disclosed. The system may receive, from a client, a request to access a resource. The request may include an identifier that may be utilized to locate the resource. Once the request is received, the system may determine if the resource is not trusted, such as if the identifier is determined to be unknown or suspicious. If the resource is determined to not be trusted by the system, the system may forward the request to a virtual machine manager that may select a browser virtual machine from a pool of browser virtual machines. After the browser virtual machine is selected, the browser virtual machine may stream a rendering of the resource to the client based on the request. The rendering of the resource may be provided in lieu of the actual resource.Type: ApplicationFiled: January 29, 2019Publication date: May 23, 2019Applicant: AT&T Intellectual Property I, L.P.Inventors: Paul Giura, Jeffrey E. Bickford, Donald E. Hendrix, Howard F. Shirokmann, Thomas A. Anschutz, Ching C. Shih
-
Patent number: 10291648Abstract: A system for distributing virtual entity behavior profiling in cloud deployments is disclosed. In particular, the system may include conducting entity behavior profiling closer to where data and data logs are generated, such as at a hypervisor server, in a distributed fashion. By doing so, the system may reduce bandwidth consumption typically associated with transferring data to a central processing system, may be able to use more data collected closer to sources of data generation, and may provide faster reaction times because of the faster processing of data enabled by the system. Additionally, the system may assist with reducing false positives associated with malware detection and other compromises associated with entities by aggregating the results of distributed computations at different sites.Type: GrantFiled: December 22, 2015Date of Patent: May 14, 2019Assignee: AT&T INTELLECTUAL PROPERTY I, L.P.Inventors: Paul Giura, Gustavo de los Reyes
-
Patent number: 10200403Abstract: A system for providing secure browsing via a transparent network proxy is disclosed. The system may receive, from a client, a request to access a resource. The request may include an identifier that may be utilized to locate the resource. Once the request is received, the system may determine if the resource is not trusted, such as if the identifier is determined to be unknown or suspicious. If the resource is determined to not be trusted by the system, the system may forward the request to a virtual machine manager that may select a browser virtual machine from a pool of browser virtual machines. After the browser virtual machine is selected, the browser virtual machine may stream a rendering of the resource to the client based on the request. The rendering of the resource may be provided in lieu of the actual resource.Type: GrantFiled: November 9, 2017Date of Patent: February 5, 2019Assignee: AT&T Intellectual Property I, L.P.Inventors: Paul Giura, Jeffrey E. Bickford, Donald E. Hendrix, Howard F. Shirokmann, Thomas A. Anschutz, Ching C. Shih
-
Patent number: 10129212Abstract: Secure computation of enterprise data in a cloud is provided, by a third party, such that values and data manipulation processes are encrypted through use cryptographic processes that are secure. A method can comprise performing operations including receiving security data representing an attribute included in a log file, generating encoded attribute data as a function of the attribute, a hash function, or salt data representing an alphanumeric string, and sending the encoded attribute data to a second device.Type: GrantFiled: July 6, 2016Date of Patent: November 13, 2018Assignee: AT&T INTELLECTUAL PROPERTY I, L.P.Inventor: Paul Giura
-
Publication number: 20180069894Abstract: A system for providing secure browsing via a transparent network proxy is disclosed. The system may receive, from a client, a request to access a resource. The request may include an identifier that may be utilized to locate the resource. Once the request is received, the system may determine if the resource is not trusted, such as if the identifier is determined to be unknown or suspicious. If the resource is determined to not be trusted by the system, the system may forward the request to a virtual machine manager that may select a browser virtual machine from a pool of browser virtual machines. After the browser virtual machine is selected, the browser virtual machine may stream a rendering of the resource to the client based on the request. The rendering of the resource may be provided in lieu of the actual resource.Type: ApplicationFiled: November 9, 2017Publication date: March 8, 2018Applicant: AT&T Intellectual Property I, L.P.Inventors: Paul Giura, Jeffrey E. Bickford, Donald E. Hendrix, Howard F. Shirokmann, Thomas A. Anschutz, Ching C. Shih
-
Patent number: 9882928Abstract: A system for providing secure browsing via a transparent network proxy is disclosed. The system may receive, from a client, a request to access a resource. The request may include an identifier that may be utilized to locate the resource. Once the request is received, the system may determine if the resource is not trusted, such as if the identifier is determined to be unknown or suspicious. If the resource is determined to not be trusted by the system, the system may forward the request to a virtual machine manager that may select a browser virtual machine from a pool of browser virtual machines. After the browser virtual machine is selected, the browser virtual machine may stream a rendering of the resource to the client based on the request. The rendering of the resource may be provided in lieu of the actual resource.Type: GrantFiled: November 16, 2016Date of Patent: January 30, 2018Assignee: AT&T Intellectual Property I, L.P.Inventors: Paul Giura, Jeffrey E. Bickford, Donald E. Hendrix, Howard F. Shirokmann, Thomas A. Anschutz, Ching C. Shih
-
Publication number: 20180019932Abstract: Generation of behavior profiling reports is provided for enterprise server devices in a network of enterprise server devices, as well as generation and association of severity scores for behavior profiling reports generated for enterprise server devices included in the network of enterprise server devices. A method can comprise receiving historical security event data representing historical security events of a first device and owner data representing an owner of the first device, and, as a function of the historical security event data and the owner data, an anomalous contact established between the first device and the second device can be identified. Further, in response to identifying the existence of the anomalous contact, the second device can be depicted on a connected graph of anomalous contacts established by the first device.Type: ApplicationFiled: July 12, 2016Publication date: January 18, 2018Inventors: Paul Giura, Stanislav Nurilov, Makonnen Sankore, Chaim Spielman