Patents by Inventor Ridgely C. Evers
Ridgely C. Evers has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 10862923Abstract: A digital security threat management system is disclosed. The system detects the presence of a computing system, on a network, that has been compromised by an undetected and/or unknown digital security threat. The digital security threat management system recognizes characteristic emanations from a computer system that has been compromised. Because the characteristic emanations that result from a known threat can be the same as the characteristic emanations that result from an undetected and/or unknown threat, the digital security threat management system can learn to detect a computing system that has been compromised by an unknown threat if the security threat management system recognizes characteristic emanations from a previous attack, based on a known threat, of the computing system. In this way, the system can detect the presence of a compromised computing system, even if the cause of the compromise remains undetected and/or unknown. Appropriate remedial action may be taken upon detection.Type: GrantFiled: December 27, 2018Date of Patent: December 8, 2020Assignee: SecureSky, Inc.Inventors: John S. Flowers, Ridgely C. Evers
-
Patent number: 10182070Abstract: A digital security threat management system is disclosed. The system detects the presence of a computing system, on a network, that has been compromised by an undetected and/or unknown digital security threat. The digital security threat management system recognizes characteristic emanations from a computer system that has been compromised. Because the characteristic emanations that result from a known threat can be the same as the characteristic emanations that result from an undetected and/or unknown threat, the digital security threat management system can learn to detect a computing system that has been compromised by an unknown threat if the security threat management system recognizes characteristic emanations from a previous attack, based on a known threat, of the computing system. In this way, the system can detect the presence of a compromised computing system, even if the cause of the compromise remains undetected and/or unknown. Appropriate remedial action may be taken upon detection.Type: GrantFiled: October 9, 2017Date of Patent: January 15, 2019Assignee: EVENGX, LLCInventors: John S. Flowers, Ridgely C. Evers
-
Patent number: 9787713Abstract: A digital security threat management system is disclosed. The system detects the presence of a computing system, on a network, that has been compromised by an undetected and/or unknown digital security threat. The digital security threat management system recognizes characteristic emanations from a computer system that has been compromised. Because the characteristic emanations that result from a known threat can be the same as the characteristic emanations that result from an undetected and/or unknown threat, the digital security threat management system can learn to detect a computing system that has been compromised by an unknown threat if the security threat management system recognizes characteristic emanations from a previous attack, based on a known threat, of the computing system. In this way, the system can detect the presence of a compromised computing system, even if the cause of the compromise remains undetected and/or unknown. Appropriate remedial action may be taken upon detection.Type: GrantFiled: April 24, 2016Date of Patent: October 10, 2017Assignee: EVENGX, LLCInventors: John S. Flowers, Ridgely C. Evers
-
Patent number: 9350707Abstract: A digital security threat management system is disclosed. The system detects the presence of a computing system, on a network, that has been compromised by an undetected and/or unknown digital security threat. The digital security threat management system recognizes characteristic emanations from a computer system that has been compromised. Because the characteristic emanations that result from a known threat can be the same as the characteristic emanations that result from an undetected and/or unknown threat, the digital security threat management system can learn to detect a computing system that has been compromised by an unknown threat if the security threat management system recognizes characteristic emanations from a previous attack, based on a known threat, of the computing system. In this way, the system can detect the presence of a compromised computing system, even if the cause of the compromise remains undetected and/or unknown. Appropriate remedial action may be taken upon detection.Type: GrantFiled: September 18, 2014Date of Patent: May 24, 2016Assignee: TRUSTPIPE LLCInventors: John S. Flowers, Ridgely C. Evers
-
Patent number: 8856324Abstract: A digital security threat management system is disclosed. The system detects the presence of a computing system, on a network, that has been compromised by an undetected and/or unknown digital security threat. The digital security threat management system recognizes characteristic emanations from a computer system that has been compromised. Because the characteristic emanations that result from a known threat can be the same as the characteristic emanations that result from an undetected and/or unknown threat, the digital security threat management system can learn to detect a computing system that has been compromised by an unknown threat if the security threat management system recognizes characteristic emanations from a previous attack, based on a known threat, of the computing system. In this way, the system can detect the presence of a compromised computing system, even if the cause of the compromise remains undetected and/or unknown. Appropriate remedial action may be taken upon detection.Type: GrantFiled: January 28, 2013Date of Patent: October 7, 2014Assignee: TrustPipe LLCInventors: John S. Flowers, Ridgely C. Evers
-
Publication number: 20090112728Abstract: Provided is a system and method for straight-through processing and integration of disparate business process information. The system includes an order intake configured to receive an order from a customer, a fulfillment processor configured to automatically fulfill an order received, an inventory tracker configured to automatically account for the fulfilled order upon fulfillment, and an accounting processor configured to automatically invoice a customer for the fulfilled order.Type: ApplicationFiled: February 20, 2008Publication date: April 30, 2009Applicant: Netbooks, Inc.Inventors: Ridgely C. Evers, Robert C. Benedict
-
Patent number: 5628214Abstract: The invention relates to a bicycle lock which passes through the spokes of a bicycle wheel to prevent the bicycle from being ridden. A preferred embodiment of the invention includes a locking bracket positioned on a first frame member at one side of the wheel and a receiving bracket positioned on a second frame member on an opposite side of the wheel from the locking bracket. A lock pin is provided which extends from one bracket to the other through the spokes of the bicycle wheel. The lock pin is positioned in a through hole of the receiving bracket and in a blind hole in the locking bracket. The locking bracket has a locking mechanism for locking the lock pin in place.Type: GrantFiled: January 6, 1995Date of Patent: May 13, 1997Assignee: Bolt Security Products, Inc.Inventor: Ridgely C. Evers
-
Patent number: 5564297Abstract: The invention relates to a bicycle lock which passes through the spokes of a bicycle wheel to prevent the bicycle from being ridden. A preferred embodiment of the invention includes a locking bracket positioned on a first frame member at one side of the wheel and a receiving bracket positioned on a second frame member on an opposite side of the wheel from the locking bracket. A lock pin is provided which extends from one bracket to the other through the spokes of the bicycle wheel. The lock pin is positioned in a through hole of the locking bracket and in a blind hole in the receiving bracket. The locking bracket has a locking mechanism for locking the lock pin in place.Type: GrantFiled: September 16, 1994Date of Patent: October 15, 1996Assignee: Bolt Security Products, Inc.Inventor: Ridgely C. Evers