Patents by Inventor Richard S. Teal

Richard S. Teal has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20240070297
    Abstract: A kernel driver on an endpoint uses a process cache to provide a stream of events associated with processes on the endpoint to a data recorder. The process cache can usefully provide related information about processes such as a name, type or path for the process to the data recorder through the kernel driver. Where a tamper protection cache or similarly secured repository is available, this secure information may also be provided to the data recorder for use in threat detection, forensic analysis and so forth.
    Type: Application
    Filed: April 3, 2023
    Publication date: February 29, 2024
    Inventor: Richard S. Teal
  • Publication number: 20230300112
    Abstract: A stream of events is received at a local security agent running on an endpoint at an enterprise network. The local security agent may detect an event of a first event type and may generate an aggregate event with subsequent events of the first event type in the stream. The local security agent may then transmit the aggregate event to a security resource for detecting security threats.
    Type: Application
    Filed: March 21, 2022
    Publication date: September 21, 2023
    Inventors: Michael David Wood, Anand Ajjan, Richard S. Teal
  • Patent number: 11620396
    Abstract: A kernel driver on an endpoint uses a process cache to provide a stream of events associated with processes on the endpoint to a data recorder. The process cache can usefully provide related information about processes such as a name, type or path for the process to the data recorder through the kernel driver. Where a tamper protection cache or similarly secured repository is available, this secure information may also be provided to the data recorder for use in threat detection, forensic analysis and so forth.
    Type: Grant
    Filed: July 13, 2021
    Date of Patent: April 4, 2023
    Assignee: Sophos Limited
    Inventor: Richard S. Teal
  • Publication number: 20210342461
    Abstract: A kernel driver on an endpoint uses a process cache to provide a stream of events associated with processes on the endpoint to a data recorder. The process cache can usefully provide related information about processes such as a name, type or path for the process to the data recorder through the kernel driver. Where a tamper protection cache or similarly secured repository is available, this secure information may also be provided to the data recorder for use in threat detection, forensic analysis and so forth.
    Type: Application
    Filed: July 13, 2021
    Publication date: November 4, 2021
    Inventor: Richard S. Teal
  • Patent number: 11093624
    Abstract: A kernel driver on an endpoint uses a process cache to provide a stream of events associated with processes on the endpoint to a data recorder. The process cache can usefully provide related information about processes such as a name, type or path for the process to the data recorder through the kernel driver. Where a tamper protection cache or similarly secured repository is available, this secure information may also be provided to the data recorder for use in threat detection, forensic analysis and so forth.
    Type: Grant
    Filed: October 27, 2017
    Date of Patent: August 17, 2021
    Assignee: Sophos Limited
    Inventor: Richard S. Teal
  • Patent number: 11017102
    Abstract: A kernel driver on an endpoint is configured to monitor processes executing on the endpoint that use network communications, and to transmit process information to a firewall for the endpoint. The firewall can, in turn, use process this stream of information from individual endpoints or groups of endpoints as context for observed network activity in order to control secure network communications and otherwise manage network activity.
    Type: Grant
    Filed: October 27, 2017
    Date of Patent: May 25, 2021
    Assignee: Sophos Limited
    Inventor: Richard S. Teal
  • Patent number: 10885213
    Abstract: The configuration of a firewall on an endpoint is secured to prevent changes by unauthorized processes, while permitting changes that are requested by authorized processes. Authorized processes can be stored in a tamper protection cache within a kernel of the operating system of the endpoint and secured with reference to a trust authority external to the operating system. When a process on the endpoint requests a change to the firewall configuration, the requesting process can be checked against the processes listed in the tamper protection cache, and any suitable rules can be applied to limit or prevent changes to firewall configuration.
    Type: Grant
    Filed: October 27, 2017
    Date of Patent: January 5, 2021
    Assignee: Sophos Limited
    Inventor: Richard S. Teal
  • Patent number: 10885212
    Abstract: An endpoint has a tamper protection cache that identifies protected computing objects, along with a process cache that stores information for processes executing on the endpoint. By securing the tamper protection cache with reference to a trust authority external to the endpoint, or the operating system for the endpoint, computing objects listed in the tamper protection cache can be protected against unauthorized modifications from malware or other malicious or otherwise potentially unsafe code.
    Type: Grant
    Filed: October 27, 2017
    Date of Patent: January 5, 2021
    Assignee: Sophos Limited
    Inventor: Richard S. Teal
  • Patent number: 10885211
    Abstract: Endpoint security is improved by monitoring and controlling interprocess communications through a kernel-based endpoint protection driver. A list of protected computing objects such as registry keys, files, processes and directories is stored in the kernel and secured with reference to a trust authority external to the kernel and the endpoint. Protected processes are further controlled from unauthorized access and use by monitoring all interprocess communications through the endpoint protection driver and preventing unprotected processes from passing (potentially unsafe) data to protected processes.
    Type: Grant
    Filed: October 27, 2017
    Date of Patent: January 5, 2021
    Assignee: Sophos Limited
    Inventor: Richard S. Teal
  • Publication number: 20190081928
    Abstract: A kernel driver on an endpoint is configured to monitor processes executing on the endpoint that use network communications, and to transmit process information to a firewall for the endpoint. The firewall can, in turn, use process this stream of information from individual endpoints or groups of endpoints as context for observed network activity in order to control secure network communications and otherwise manage network activity.
    Type: Application
    Filed: October 27, 2017
    Publication date: March 14, 2019
    Inventor: Richard S. Teal
  • Publication number: 20190081962
    Abstract: A kernel driver on an endpoint uses a process cache to provide a stream of events associated with processes on the endpoint to a data recorder. The process cache can usefully provide related information about processes such as a name, type or path for the process to the data recorder through the kernel driver. Where a tamper protection cache or similarly secured repository is available, this secure information may also be provided to the data recorder for use in threat detection, forensic analysis and so forth.
    Type: Application
    Filed: October 27, 2017
    Publication date: March 14, 2019
    Inventor: Richard S. Teal
  • Publication number: 20190080102
    Abstract: Endpoint security is improved by monitoring and controlling interprocess communications through a kernel-based endpoint protection driver. A list of protected computing objects such as registry keys, files, processes and directories is stored in the kernel and secured with reference to a trust authority external to the kernel and the endpoint. Protected processes are further controlled from unauthorized access and use by monitoring all interprocess communications through the endpoint protection driver and preventing unprotected processes from passing (potentially unsafe) data to protected processes.
    Type: Application
    Filed: October 27, 2017
    Publication date: March 14, 2019
    Inventor: Richard S. Teal
  • Publication number: 20190081983
    Abstract: The configuration of a firewall on an endpoint is secured to prevent changes by unauthorized processes, while permitting changes that are requested by authorized processes. Authorized processes can be stored in a tamper protection cache within a kernel of the operating system of the endpoint and secured with reference to a trust authority external to the operating system. When a process on the endpoint requests a change to the firewall configuration, the requesting process can be checked against the processes listed in the tamper protection cache, and any suitable rules can be applied to limit or prevent changes to firewall configuration.
    Type: Application
    Filed: October 27, 2017
    Publication date: March 14, 2019
    Inventor: Richard S. Teal
  • Publication number: 20190080078
    Abstract: An endpoint has a tamper protection cache that identifies protected computing objects, along with a process cache that stores information for processes executing on the endpoint. By securing the tamper protection cache with reference to a trust authority external to the endpoint, or the operating system for the endpoint, computing objects listed in the tamper protection cache can be protected against unauthorized modifications from malware or other malicious or otherwise potentially unsafe code.
    Type: Application
    Filed: October 27, 2017
    Publication date: March 14, 2019
    Inventor: Richard S. Teal
  • Patent number: 9374390
    Abstract: Techniques allow runtime extensions to a whitelist that locks down a computational system. For example, executable code is not only subject to whitelist checks that allow (or deny) its execution, but is also subject to checks that determine whether a whitelisted executable is itself trusted to introduce further executable code into the computational system in which it is allowed to run. In general, deletion and/or modification of instances of code that are already covered by the whitelist are also disallowed in accordance with a security policy. Accordingly, an executable that is trusted may be allowed to delete and/or modify code instances covered by the whitelist. In general, trust may be coded for a given code instance that seeks to introduce, remove or modify code.
    Type: Grant
    Filed: January 23, 2015
    Date of Patent: June 21, 2016
    Assignee: LUMENSION SECURITY, INC.
    Inventors: Daniel M. Teal, Wesley G. Miller, Charisse Castagnoli, Toney Jennings, Todd Schell, Richard S. Teal
  • Patent number: 8950007
    Abstract: Techniques have been developed to allow runtime extensions to a whitelist that locks down a computational system. For example, executable code (including e.g., objects such as a script or active content that may be treated as an executable) is not only subject to whitelist checks that allow (or deny) its execution, but is also subject to checks that determine whether a whitelisted executable is itself trusted to introduce further executable code into the computational system in which it is allowed to run. In general, deletion and/or modification of instances of code that are already covered by the whitelist are also disallowed in accordance with a security policy. Accordingly, an executable that is trusted may be allowed to delete and/or modify code instances covered by the whitelist. In general, trust may be coded for a given code instance that seeks to introduce, remove or modify code (e.g., in the whitelist itself).
    Type: Grant
    Filed: January 28, 2010
    Date of Patent: February 3, 2015
    Assignee: Lumension Security, Inc.
    Inventors: Daniel M. Teal, Wesley G. Miller, Charisse Castagnoli, Toney Jennings, Todd Schell, Richard S. Teal
  • Publication number: 20100318789
    Abstract: System and method are disclosed for securing and managing individual end-user platforms as part of an enterprise network. The method/system of the invention has three main components: a security module, a manager appliance, and a console appliance. The security module enforces the enterprise licenses and security policies for the end-user platforms while the manager appliance provides secure, centralized communication with, and oversight of, the security module. The console appliance allows an administrator to access the manager appliance for purposes of monitoring and changing the licenses. Security is established and maintained through an innovative use of data encryption and authentication procedures. The use of these procedures allows the appliances to be uniquely identified to one another, which in turn provides a way to dynamically create unique identifiers for the security modules.
    Type: Application
    Filed: March 19, 2010
    Publication date: December 16, 2010
    Inventors: Richard S. Teal, Todd A. Schell, Daniel M. Teal
  • Patent number: 7711952
    Abstract: System and method are disclosed for securing and managing individual end-user platforms as part of an enterprise network. The method/system of the invention has three main components: a security module, a manager appliance, and a console appliance. The security module enforces the enterprise licenses and security policies for the end-user platforms while the manager appliance provides secure, centralized communication with, and oversight of, the security module. The console appliance allows an administrator to access the manager appliance for purposes of monitoring and changing the licenses. Security is established and maintained through an innovative use of data encryption and authentication procedures. The use of these procedures allows the appliances to be uniquely identified to one another, which in turn provides a way to dynamically create unique identifiers for the security modules.
    Type: Grant
    Filed: September 13, 2005
    Date of Patent: May 4, 2010
    Assignee: Coretrace Corporation
    Inventors: Daniel M. Teal, Richard S. Teal, Todd A. Schell
  • Patent number: 7398389
    Abstract: A system and method for network security using a kernel based network security infrastructure is disclosed. The method comprises the installation of a computer code set into the operating system kernel of each computer on a network and use of the computer code set to detect and stop unwanted or malicious intrusions into the kernel. Because the security feature is kernel based, a broader range of security features, such as security of communication between user-space applications and the kernel, can be implemented.
    Type: Grant
    Filed: November 14, 2002
    Date of Patent: July 8, 2008
    Assignee: Coretrace Corporation
    Inventors: Daniel M. Teal, Richard S. Teal
  • Publication number: 20030120935
    Abstract: A system and method for network security using a kernel based network security infrastructure is disclosed. The method comprises the installation of a computer code set into the operating system kernel of each computer on a network and use of the computer code set to detect and stop unwanted or malicious intrusions into the kernel. Because the security feature is kernel based, a broader range of security features, such as security of communication between user-space applications and the kernel, can be implemented.
    Type: Application
    Filed: November 14, 2002
    Publication date: June 26, 2003
    Applicant: CORETRACE CORPORATION
    Inventors: Daniel M. Teal, Richard S. Teal