Patents by Inventor Raymond J. Canzanese

Raymond J. Canzanese has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20240137390
    Abstract: The technology disclosed includes a system to reduce clutter when displaying a security analysis graph of nodes and edges. Simple chains of nodes do not have branches and are equivalent when they have the same length, connection types and endpoints. First, second and potentially more simple chains can be aggregated for display. A third and potentially more simple chains can be excluded from aggregation based on an accumulated risk analysis score. The excluded simple chain can readily be called to an analyst's attention.
    Type: Application
    Filed: December 22, 2023
    Publication date: April 25, 2024
    Applicant: Netskope, Inc.
    Inventors: Joshua D. Batson, Raymond J. Canzanese, JR., Nigel Brown
  • Patent number: 11856016
    Abstract: The technology disclosed includes a system to reduce clutter during graph presentation for security incident analysis. The system includes logic to score nodes potentially collapsed by equivalence, of indicated interest for security incident analysis, to prevent aggregation. The system includes logic to aggregate and hide equivalent nodes that have matching degrees, that are connected to matching nodes by matching edge types, and that have scores below a first selected threshold. The system does not collapse nodes that are interesting for security analysis and keeps them visible. The technology disclosed identifies chains of at least three nodes having degrees of 1 or 2, without branching from any node in the chain. The identified chains are collapsed into chain-collapsed single nodes. Two different cases of chains including whisker chains ending in a leaf node and chains connected at both ends to two other nodes are presented.
    Type: Grant
    Filed: November 1, 2021
    Date of Patent: December 26, 2023
    Assignee: Netskope, Inc.
    Inventors: Raymond J. Canzanese, Jr., Nigel Brown
  • Publication number: 20220060493
    Abstract: The technology disclosed includes a system to reduce clutter during graph presentation for security incident analysis. The system includes logic to score nodes potentially collapsed by equivalence, of indicated interest for security incident analysis, to prevent aggregation. The system includes logic to aggregate and hide equivalent nodes that have matching degrees, that are connected to matching nodes by matching edge types, and that have scores below a first selected threshold. The system does not collapse nodes that are interesting for security analysis and keeps them visible. The technology disclosed identifies chains of at least three nodes having degrees of 1 or 2, without branching from any node in the chain. The identified chains are collapsed into chain-collapsed single nodes. Two different cases of chains including whisker chains ending in a leaf node and chains connected at both ends to two other nodes are presented.
    Type: Application
    Filed: November 1, 2021
    Publication date: February 24, 2022
    Applicant: Netskope, Inc.
    Inventors: Raymond J. Canzanese, JR., Nigel Brown
  • Patent number: 8112636
    Abstract: A method for operating a binary executable in which some of the data or code is to be protected includes the step of pruning the binary executable of the code andor data to be protected. Nonfunctional code is substituted for the code pruned from the binary executable, to form a pruned executable which does not contain the code to be protected. The code pruned from the binary executable is loaded into a code injection service or program (CIS). The binary executable is placed in memory as with any application. Invoking the pruned executable alone results in crash. The CIS is made part of the operating system service, and is loaded into RAM when the computer starts. When the pruned executable is invoked, the CIS detects its presence, and as the pruned executable runs, the CIS substitutes the actual data or code into the pruned executable, whereby it operates normally.
    Type: Grant
    Filed: November 6, 2007
    Date of Patent: February 7, 2012
    Assignee: Lockheed Martin Corporation
    Inventors: Raymond J. Canzanese, John D. Halpin