Patents by Inventor Robert A. Beatty
Robert A. Beatty has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Publication number: 20240002479Abstract: The disclosure is directed to binding agents, e.g., a single chain variable fragment (scFv) that specifically binds to a flavivirus NS1 protein, as well as compositions comprising the binding agent and a method of using such compositions to induce an immune response against a flavivirus (e.g., a dengue virus). The disclosure also provides a conjugate comprising the binding agent, and a recombinant NS1 antigen.Type: ApplicationFiled: November 23, 2021Publication date: January 4, 2024Inventors: Janet L. Smith, David L. Akey, William Clay Brown, Eva Harris, Scott B. Biering, P. Robert Beatty
-
Publication number: 20230319036Abstract: A system can efficiently control access to an interactive computing environment. The system can receive authentication data of an authentication attempt associated with an entity. The system can determine, for the entity, a historical vector including features that include sub-features. The historical vector can be determined by generating synthetic data, generating weights, and determining probabilities. The synthetic data can be based on historical authentication attempts by entities other than the entity. The weights can correspond to sub-features of the historical vector. The probabilities can indicate a likelihood that a corresponding sub-feature is involved in the authentication attempt. The system can compare the historical vector to the authentication data. The system can generate a responsive message based on the comparison for controlling access to the interactive computing environment.Type: ApplicationFiled: March 29, 2022Publication date: October 5, 2023Inventors: Dilip SINGH, Gary KELLER, Robert BEATTY, Sriram TIRUNELLAYI
-
Publication number: 20220152087Abstract: The present invention generally relates to cyclodextrin derivatives, including Dexolve®, sulfobutylether beta cyclodextrin interfering with the activity of the viral nonstructural protein NS1 produced by a flavivirus. More particularly, the present invention relates to method of treatment using cyclodextrin compounds for inhibiting or treating a condition resulting from a flavivirus infection, particularly vascular leakage condition and increased virus dissemination.Type: ApplicationFiled: November 13, 2020Publication date: May 19, 2022Applicant: CYCLOLAB CYCLODEXTRIN RESEARCH AND DEVELOPMENT LABORATORY LTD.Inventors: Tamas Sohajda, Istvan Puskas, Eva Harris, Francielle Tramontini Gomes de Sousa, Robert Beatty, Peter Laing
-
Patent number: 11176459Abstract: A network traffic hub extracts encryption metadata from messages establishing an encrypted connection between a smart appliance and a remote server and determines whether malicious behavior is present in the messages. For example, the network traffic hub can extract an encryption cipher suite, identified encryption algorithms, or a public certificate. The network traffic hub detects malicious behavior or security threats based on the encryption metadata. These security threats may include a man-in-the-middle attacker or a Padding Oracle On Downgraded Legacy Encryption attack. Upon detecting malicious behavior or security threats, the network traffic hub blocks the encrypted traffic or notifies a user.Type: GrantFiled: September 12, 2019Date of Patent: November 16, 2021Assignee: Cujo LLCInventors: Yuri Frayman, Robert Beatty, Leonid Kuperman, Gabor Takacs
-
Patent number: 11153336Abstract: A method and system for detecting malicious behavior from smart appliances within a network. Smart appliances have a certain level of intelligence that allows them to perform a specific role more effectively and conveniently. Network traffic data and identification data is collected about smart appliances within a network. The data is sent to a behavior analysis engine, which computes confidence levels for anomalies within the network traffic that may be caused by malicious behavior. If the behavior analysis engine determines that malicious behavior is present in the network, it sends an instruction to a network traffic hub to block network traffic relating to the anomaly. In some embodiments, network traffic is blocked based on source-destination pairs. In some embodiments, network traffic is blocked from a device outside the network that is determined to be malicious.Type: GrantFiled: February 20, 2020Date of Patent: October 19, 2021Assignee: Cujo LLCInventors: Robert Beatty, Yuri Frayman, Einaras von Gravrock
-
Publication number: 20200195666Abstract: A method and system for detecting malicious behavior from smart appliances within a network. Smart appliances have a certain level of intelligence that allows them to perform a specific role more effectively and conveniently. Network traffic data and identification data is collected about smart appliances within a network. The data is sent to a behavior analysis engine, which computes confidence levels for anomalies within the network traffic that may be caused by malicious behavior. If the behavior analysis engine determines that malicious behavior is present in the network, it sends an instruction to a network traffic hub to block network traffic relating to the anomaly. In some embodiments, network traffic is blocked based on source-destination pairs. In some embodiments, network traffic is blocked from a device outside the network that is determined to be malicious.Type: ApplicationFiled: February 20, 2020Publication date: June 18, 2020Inventors: Robert Beatty, Yuri Frayman, Einaras von Gravrock
-
Patent number: 10609051Abstract: A method and system for detecting malicious behavior from smart appliances within a network. Smart appliances have a certain level of intelligence that allows them to perform a specific role more effectively and conveniently. Network traffic data and identification data is collected about smart appliances within a network. The data is sent to a behavior analysis engine, which computes confidence levels for anomalies within the network traffic that may be caused by malicious behavior. If the behavior analysis engine determines that malicious behavior is present in the network, it sends an instruction to a network traffic hub to block network traffic relating to the anomaly. In some embodiments, network traffic is blocked based on source-destination pairs. In some embodiments, network traffic is blocked from a device outside the network that is determined to be malicious.Type: GrantFiled: January 13, 2019Date of Patent: March 31, 2020Assignee: CUJO LLCInventors: Robert Beatty, Yuri Frayman, Einaras von Gravrock
-
Patent number: 10560280Abstract: A method and system for detecting malicious behavior from smart appliances within a network. Smart appliances have a certain level of intelligence that allows them to perform a specific role more effectively and conveniently. Network traffic data and appliance identification data is collected about smart appliances within a network. The data is sent to a behavior analysis engine, which computes confidence levels for anomalies within the network traffic that may be caused by malicious behavior. If the behavior analysis engine determines that malicious behavior is present in the network, it sends an instruction to a network traffic hub to block network traffic relating to the anomaly. In some embodiments, network traffic is blocked based on source-destination pairs. In some embodiments, network traffic is blocked from a device outside the network that is determined to be malicious.Type: GrantFiled: September 11, 2018Date of Patent: February 11, 2020Assignee: CUJO LLCInventors: Einaras von Gravrock, Yuri Frayman, Robert Beatty
-
Publication number: 20200007568Abstract: A network traffic hub extracts encryption metadata from messages establishing an encrypted connection between a smart appliance and a remote server and determines whether malicious behavior is present in the messages. For example, the network traffic hub can extract an encryption cipher suite, identified encryption algorithms, or a public certificate. The network traffic hub detects malicious behavior or security threats based on the encryption metadata. These security threats may include a man-in-the-middle attacker or a Padding Oracle On Downgraded Legacy Encryption attack. Upon detecting malicious behavior or security threats, the network traffic hub blocks the encrypted traffic or notifies a user.Type: ApplicationFiled: September 12, 2019Publication date: January 2, 2020Inventors: Yuri Frayman, Robert Beatty, Leonid Kuperman, Gabor Takacs
-
Patent number: 10454961Abstract: A network traffic hub extracts encryption metadata from messages establishing an encrypted connection between a smart appliance and a remote server and determines whether malicious behavior is present in the messages. For example, the network traffic hub can extract an encryption cipher suite, identified encryption algorithms, or a public certificate. The network traffic hub detects malicious behavior or security threats based on the encryption metadata. These security threats may include a man-in-the-middle attacker or a Padding Oracle On Downgraded Legacy Encryption attack. Upon detecting malicious behavior or security threats, the network traffic hub blocks the encrypted traffic or notifies a user.Type: GrantFiled: October 31, 2017Date of Patent: October 22, 2019Assignee: Cujo LLCInventors: Yuri Frayman, Robert Beatty, Leonid Kuperman, Gabor Takacs
-
Publication number: 20190149563Abstract: A method and system for detecting malicious behavior from smart appliances within a network. Smart appliances have a certain level of intelligence that allows them to perform a specific role more effectively and conveniently. Network traffic data and identification data is collected about smart appliances within a network. The data is sent to a behavior analysis engine, which computes confidence levels for anomalies within the network traffic that may be caused by malicious behavior. If the behavior analysis engine determines that malicious behavior is present in the network, it sends an instruction to a network traffic hub to block network traffic relating to the anomaly. In some embodiments, network traffic is blocked based on source-destination pairs. In some embodiments, network traffic is blocked from a device outside the network that is determined to be malicious.Type: ApplicationFiled: January 13, 2019Publication date: May 16, 2019Inventors: Robert Beatty, Yuri Frayman, Einaras von Gravrock
-
Patent number: 10230740Abstract: A method and system for detecting malicious behavior from smart appliances within a network. Smart appliances have a certain level of intelligence that allows them to perform a specific role more effectively and conveniently. Network traffic data and identification data is collected about smart appliances within a network. The data is sent to a behavior analysis engine, which computes confidence levels for anomalies within the network traffic that may be caused by malicious behavior. If the behavior analysis engine determines that malicious behavior is present in the network, it sends an instruction to a network traffic hub to block network traffic relating to the anomaly. In some embodiments, network traffic is blocked based on source-destination pairs. In some embodiments, network traffic is blocked from a device outside the network that is determined to be malicious.Type: GrantFiled: November 20, 2015Date of Patent: March 12, 2019Assignee: Cujo LLCInventors: Robert Beatty, Yuri Frayman, Einaras von Gravrock
-
Publication number: 20190013958Abstract: A method and system for detecting malicious behavior from smart appliances within a network. Smart appliances have a certain level of intelligence that allows them to perform a specific role more effectively and conveniently. Network traffic data and appliance identification data is collected about smart appliances within a network. The data is sent to a behavior analysis engine, which computes confidence levels for anomalies within the network traffic that may be caused by malicious behavior. If the behavior analysis engine determines that malicious behavior is present in the network, it sends an instruction to a network traffic hub to block network traffic relating to the anomaly. In some embodiments, network traffic is blocked based on source-destination pairs. In some embodiments, network traffic is blocked from a device outside the network that is determined to be malicious.Type: ApplicationFiled: September 11, 2018Publication date: January 10, 2019Inventors: Einaras von Gravrock, Yuri Frayman, Robert Beatty
-
Patent number: 10135633Abstract: A method and system for detecting malicious behavior from smart appliances within a network. Smart appliances have a certain level of intelligence that allows them to perform a specific role more effectively and conveniently. Network traffic data and appliance identification data is collected about smart appliances within a network. The data is sent to a behavior analysis engine, which computes confidence levels for anomalies within the network traffic that may be caused by malicious behavior. If the behavior analysis engine determines that malicious behavior is present in the network, it sends an instruction to a network traffic hub to block network traffic relating to the anomaly. In some embodiments, network traffic is blocked based on source-destination pairs. In some embodiments, network traffic is blocked from a device outside the network that is determined to be malicious.Type: GrantFiled: April 14, 2016Date of Patent: November 20, 2018Assignee: Cujo LLCInventors: Einaras von Gravrock, Yuri Frayman, Robert Beatty
-
Patent number: 10103900Abstract: A method and system for detecting malicious behavior from smart appliances within a network. Smart appliances have a certain level of intelligence that allows them to perform a specific role more effectively and conveniently. Network traffic data and appliance identification data is collected about smart appliances within a network. The data is sent to a behavior analysis engine, which computes confidence levels for anomalies within the network traffic that may be caused by malicious behavior. If the behavior analysis engine determines that malicious behavior is present in the network, it sends an instruction to a network traffic hub to block network traffic relating to the anomaly. In some embodiments, network traffic is blocked based on source-destination pairs. In some embodiments, network traffic is blocked from a device outside the network that is determined to be malicious.Type: GrantFiled: April 14, 2016Date of Patent: October 16, 2018Assignee: Cujo LLCInventors: Einaras von Gravrock, Yuri Frayman, Robert Beatty
-
Publication number: 20180124085Abstract: A network traffic hub extracts encryption metadata from messages establishing an encrypted connection between a smart appliance and a remote server and determines whether malicious behavior is present in the messages. For example, the network traffic hub can extract an encryption cipher suite, identified encryption algorithms, or a public certificate. The network traffic hub detects malicious behavior or security threats based on the encryption metadata. These security threats may include a man-in-the-middle attacker or a Padding Oracle On Downgraded Legacy Encryption attack. Upon detecting malicious behavior or security threats, the network traffic hub blocks the encrypted traffic or notifies a user.Type: ApplicationFiled: October 31, 2017Publication date: May 3, 2018Inventors: Yuri Frayman, Robert Beatty, Leon Kuperman, Gabor Takacs
-
Publication number: 20160315955Abstract: A method and system for detecting malicious behavior from smart appliances within a network. Smart appliances have a certain level of intelligence that allows them to perform a specific role more effectively and conveniently. Network traffic data and identification data is collected about smart appliances within a network. The data is sent to a behavior analysis engine, which computes confidence levels for anomalies within the network traffic that may be caused by malicious behavior. If the behavior analysis engine determines that malicious behavior is present in the network, it sends an instruction to a network traffic hub to block network traffic relating to the anomaly. In some embodiments, network traffic is blocked based on source-destination pairs. In some embodiments, network traffic is blocked from a device outside the network that is determined to be malicious.Type: ApplicationFiled: November 20, 2015Publication date: October 27, 2016Inventors: Robert Beatty, Yuri Frayman, Einaras von Gravrock..
-
Publication number: 20160315909Abstract: A method and system for detecting malicious behavior from smart appliances within a network. Smart appliances have a certain level of intelligence that allows them to perform a specific role more effectively and conveniently. Network traffic data and appliance identification data is collected about smart appliances within a network. The data is sent to a behavior analysis engine, which computes confidence levels for anomalies within the network traffic that may be caused by malicious behavior. If the behavior analysis engine determines that malicious behavior is present in the network, it sends an instruction to a network traffic hub to block network traffic relating to the anomaly. In some embodiments, network traffic is blocked based on source-destination pairs. In some embodiments, network traffic is blocked from a device outside the network that is determined to be malicious.Type: ApplicationFiled: April 14, 2016Publication date: October 27, 2016Inventors: Einaras von Gravrock, Yuri Frayman, Robert Beatty
-
Publication number: 20110082750Abstract: A method and system for providing highly targeted advertising to remotely located viewers. The viewers are matched to an identifiable receiver on the system and, based on user preferences for products and services developed and stored on each user, targeted advertising for products and services each said user is likely to want, is substituted for the broadcaster advertising and communicated to the individual receivers matched with the user.Type: ApplicationFiled: October 1, 2010Publication date: April 7, 2011Inventors: Michael Robert Beatty, Robin Ross Cooper
-
Publication number: 20070212223Abstract: A main rotor blade incorporating a rotor blade tip region having a tip chord and a tip taper such that the ratio of the main rotor blade chord to the tip chord is approximately 0.30. The tip taper ratio preferably providing an approximately 28% area of reduction in said outer 10% of said blade span. The tip region preferably further including a hover optimized high lift airfoil and a tip sweep that reaches a constant value of approximately 30 degrees along the quarter chord line.Type: ApplicationFiled: March 8, 2006Publication date: September 13, 2007Inventors: Robert Moffitt, Thomas Egolf, Robert Beatty, John Karpowich, Ashish Bagai