Patents by Inventor Paul Judge

Paul Judge has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20060251068
    Abstract: Computer-implemented systems and methods for identifying illegitimate messaging activity on a system using a network of sensors.
    Type: Application
    Filed: June 9, 2006
    Publication date: November 9, 2006
    Applicant: CIPHERTRUST, INC.
    Inventors: Paul Judge, Dmitri Alperovitch, Sven Krasser, Phyllis Schneck, Jonathan Zdziarski
  • Publication number: 20060253447
    Abstract: The present invention is directed to systems and methods for detecting unsolicited and threatening communications and communicating threat information related thereto. Threat information is received from one or more sources; such sources can include external security databases and threat information data from one or more application and/or network layer security systems. The received threat information is reduced into a canonical form. Features are extracted from the reduced threat information; these features in conjunction with configuration data such as goals are used to produce rules. In some embodiments, these rules are tested against one or more sets of test data and compared against the same or different goals; if one or more tests fail, the rules are refined until the tests succeed within an acceptable margin of error. The rules are then propagated to one or more application layer security systems.
    Type: Application
    Filed: July 12, 2006
    Publication date: November 9, 2006
    Applicant: CIPHERTRUST, INC.
    Inventor: Paul Judge
  • Publication number: 20060248156
    Abstract: The present invention is directed to systems and methods for enhancing electronic communication security. An electronic communication is received and stored. A plurality of risk assessments are made with respect to the received communication thereby generating a risk profile associated with the communication. The assessments are made in a sequential manner by assigning the stored communication and index and serially placing the index on queue associated with interrogation engines that perform the various assessments. The index is initially placed in a queue associated with an interrogation engine performing the first type of assessment on the communication. The index is placed in a subsequent queue only after the interrogation engine associated with the prior queue in which the index was placed has assessed the communication. This is repeated until all desired assessments have been performed.
    Type: Application
    Filed: July 11, 2006
    Publication date: November 2, 2006
    Applicant: CipherTrust, Inc.
    Inventors: Paul Judge, Guru Rajan
  • Patent number: 7124438
    Abstract: The present invention is directed to systems and methods for enhancing electronic communication security. A communication transmitted over a communications network is received and tested by a collection engine to generate data associated with the received communication. An analysis engine analyzes the data generated by the collection engine along with data associated with previously received communications to whether an anomaly exists. If an anomaly exists with respect to the received communication, an action engine initiates a predetermined response.
    Type: Grant
    Filed: March 8, 2002
    Date of Patent: October 17, 2006
    Assignee: CipherTrust, Inc.
    Inventors: Paul Judge, Guru Rajan
  • Patent number: 7096498
    Abstract: The present invention is directed to systems and methods for detecting unsolicited and threatening communications and communicating threat information related thereto. Threat information is received from one or more sources; such sources can include external security databases and threat information data from one or more application and/or network layer security systems. The received threat information is reduced into a canonical form. Features are extracted from the reduced threat information; these features in conjunction with configuration data such as goals are used to produce rules. In some embodiments, these rules are tested against one or more sets of test data and compared against the same or different goals; if one or more tests fail, the rules are refined until the tests succeed within an acceptable margin of error. The rules are then propagated to one or more application layer security systems.
    Type: Grant
    Filed: February 7, 2003
    Date of Patent: August 22, 2006
    Assignee: Cipher Trust, Inc.
    Inventor: Paul Judge
  • Patent number: 7089590
    Abstract: The present invention is directed to systems and methods for enhancing electronic communication security. An electronic communication is received and stored. A plurality of risk assessments are made with respect to the received communication thereby generating a risk profile associated with the communication. The assessments are made in a sequential manner by assigning the stored communication and index and serially placing the index on queue associated with interrogation engines that perform the various assessments. The index is initially placed in a queue associated with an interrogation engine performing the first type of assessment on the communication. The index is placed in a subsequent queue only after the interrogation engine associated with the prior queue in which the index was placed has assessed the communication. This is repeated until all desired assessments have been performed.
    Type: Grant
    Filed: September 2, 2005
    Date of Patent: August 8, 2006
    Assignee: CipherTrust, Inc.
    Inventors: Paul Judge, Guru Rajan
  • Publication number: 20060174341
    Abstract: The present invention is directed to systems and methods for detecting unsolicited and threatening communications and communicating threat information related thereto. Threat information is received from one or more sources; such sources can include external security databases and threat information data from one or more application and/or network layer security systems. The received threat information is reduced into a canonical form. Features are extracted from the reduced threat information; these features in conjunction with configuration data such as goals are used to produce rules. In some embodiments, these rules are tested against one or more sets of test data and compared against the same or different goals; if one or more tests fail, the rules are refined until the tests succeed within an acceptable margin of error. The rules are then propagated to one or more application layer security systems.
    Type: Application
    Filed: March 24, 2006
    Publication date: August 3, 2006
    Inventor: Paul Judge
  • Publication number: 20060021055
    Abstract: The present invention is directed to systems and methods for enhancing electronic communication security. An electronic communication is received and stored. A plurality of risk assessments are made with respect to the received communication thereby generating a risk profile associated with the communication. The assessments are made in a sequential manner by assigning the stored communication and index and serially placing the index on queue associated with interrogation engines that perform the various assessments. The index is initially placed in a queue associated with an interrogation engine performing the first type of assessment on the communication. The index is placed in a subsequent queue only after the interrogation engine associated with the prior queue in which the index was placed has assessed the communication. This is repeated until all desired assessments have been performed.
    Type: Application
    Filed: September 2, 2005
    Publication date: January 26, 2006
    Inventors: Paul Judge, Guru Rajan
  • Publication number: 20060015563
    Abstract: Methods and systems for operation upon one or more data processors that classify communications from messaging entities. A method can include receiving a communication that was sent from a messaging entity. A plurality of message classification techniques is used to classify the communication. Each message classification technique is associated with a confidence value which is used in generating a message classification output from the message classification technique. The message classification outputs are combined in order to generate a message profile score. The message Profile score is used in deciding what action is to be taken with respect to the communication associated with the messaging entity.
    Type: Application
    Filed: July 1, 2005
    Publication date: January 19, 2006
    Inventors: Paul Judge, Guru Rajan, Dmitri Alperovitch, Matt Moyer
  • Publication number: 20060015942
    Abstract: Methods and systems for operation upon one or more data processors for assigning a reputation to a messaging entity. A method can include receiving data that identifies one or more characteristics related to a messaging entity's communication. A reputation score is determined based upon the received identification data. The determined reputation score is indicative of reputation of the messaging entity. The determined reputation score is used in deciding what action is to be taken with respect to a communication associated with the messaging entity.
    Type: Application
    Filed: June 2, 2005
    Publication date: January 19, 2006
    Inventors: Paul Judge, Dmitri Alperovitch, Matt Moyer
  • Patent number: 6941467
    Abstract: The present invention is directed to systems and methods for enhancing electronic communication security. An electronic communication is received and stored. A plurality of risk assessments are made with respect to the received communication thereby generating a risk profile associated with the communication. The assessments are made in a sequential manner by assigning the stored communication and index and serially placing the index on queue associated with interrogation engines that perform the various assessments. The index is initially placed in a queue associated with an interrogation engine performing the first type of assessment on the communication. The index is placed in a subsequent queue only after the interrogation engine associated with the prior queue in which the index was placed has assessed the communication. This is repeated until all desired assessments have been performed.
    Type: Grant
    Filed: March 8, 2002
    Date of Patent: September 6, 2005
    Assignee: CipherTrust, Inc.
    Inventors: Paul Judge, Guru Rajan
  • Publication number: 20030172291
    Abstract: The present invention is directed to systems and methods for detecting and preventing the delivery of unsolicited communications. A communication transmitted over a communications network is received and analyzed by a system processor. The system processor can extract attributes from the communication and compare extracted attributes to information stored in a system data store. In processing the communication, the system processor may assign a confidence level, a trust level, or other indicia of content. The results of that processing, analysis, and comparison can be used to direct the further handling of the communication. The system processor can dispose of communications by quarantining, deleting, or forwarding.
    Type: Application
    Filed: February 7, 2003
    Publication date: September 11, 2003
    Inventors: Paul Judge, Guru Rajan
  • Publication number: 20030172294
    Abstract: The present invention is directed to systems and methods for detecting and preventing the delivery of unsolicited communications. A communication transmitted over a communications network is received and analyzed by a system processor. The system processor can extract attributes from the communication and compare extracted attributes to information stored in a system data store. In processing the communication, the system processor may assign a confidence level) a trust level, or other indicia of content. The results of that processing, analysis, and comparison can be propagated to one or more upstream computers in the path from the communication's origin to its destination. Such one or more upstream computers are identified from within the content of the communication, the header of the communication and/or the transfer protocol interactions in receiving the communication. The identified computers are authenticated to limit forgery.
    Type: Application
    Filed: February 24, 2003
    Publication date: September 11, 2003
    Inventor: Paul Judge
  • Publication number: 20030172302
    Abstract: The present invention is directed to systems and methods for enhancing electronic communication security. A communication transmitted over a communications network is received and tested by a collection engine to generate data associated with the received communication. An analysis engine analyzes the data generated by the collection engine along with data associated with previously received communications to whether an anomaly exists. If an anomaly exists with respect to the received communication, an action engine initiates a predetermined response.
    Type: Application
    Filed: March 8, 2002
    Publication date: September 11, 2003
    Inventors: Paul Judge, Guru Rajan
  • Publication number: 20030172301
    Abstract: The present invention is directed to systems and methods for enhancing electronic communication security. An electronic communication is received and stored. A plurality of risk assessments are made with respect to the received communication thereby generating a risk profile associated with the communication. The assessments are made in a sequential manner by assigning the stored communication and index and serially placing the index on queue associated with interrogation engines that perform the various assessments. The index is initially placed in a queue associated with an interrogation engine performing the first type of assessment on the communication. The index is placed in a subsequent queue only after the interrogation engine associated with the prior queue in which the index was placed has assessed the communication. This is repeated until all desired assessments have been performed.
    Type: Application
    Filed: March 8, 2002
    Publication date: September 11, 2003
    Inventors: Paul Judge, Guru Rajan
  • Publication number: 20030172292
    Abstract: The present invention is directed to systems and methods for detecting unsolicited and threatening communications and communicating threat information related thereto. Threat information is received from one or more sources; such sources can include external security databases and threat information data from one or more application and/or network layer security systems. The received threat information is reduced into a canonical form. Features are extracted from the reduced threat information; these features in conjunction with configuration data such as goals are used to produce rules. In some embodiments, these rules are tested against one or more sets of test data and compared against the same or different goals; if one or more tests fail, the rules are refined until the tests succeed within an acceptable margin of error. The rules are then propagated to one or more application layer security systems.
    Type: Application
    Filed: February 7, 2003
    Publication date: September 11, 2003
    Inventor: Paul Judge
  • Publication number: 20030172166
    Abstract: The present invention is directed to systems and methods for enhancing electronic communication security. An electronic communication related to an application is received and stored. One or more risk assessments are made with respect to the received communication thereby generating a risk profile associated with the communication. The risk profile is analyzed with respect to data associated with previously received communications to determine if the received communication is anomalous. If the received communication is determined to be anomalous, an anomaly indicator signal is output.
    Type: Application
    Filed: March 8, 2002
    Publication date: September 11, 2003
    Inventors: Paul Judge, Guru Rajan
  • Publication number: 20030172167
    Abstract: Systems and methods for secure delivery of electronic communications are provided. A communication transmitted over a communications network is received by a system processor. The system processor selects a secure delivery mechanism for delivering the communication. The system processor attempts to deliver the communication to the predetermined recipient via the selected secure delivery mechanism. Some systems can further provide for determining whether a particular received communication requires secure delivery.
    Type: Application
    Filed: March 6, 2003
    Publication date: September 11, 2003
    Inventors: Paul Judge, Guru Rajan