Patents by Inventor Robert A. Seger
Robert A. Seger has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Publication number: 20250023344Abstract: A method of power switching includes receiving a command from an external aircraft controller to power an aircraft load from an aircraft voltage bus. The method includes in response to the command from the external aircraft controller, controlling a relay to connect or disconnect an aircraft voltage bus from an aircraft load. Controlling the relay includes current monitoring the relay and voltage monitoring the relay power switching. The method can include receiving temperature feedback indicative of temperature of the relay, and using the temperature feedback for at least one of controlling the relay and/or prognostic and health monitoring. The method can include outputting feedback to the external aircraft controller relating to status, operation, and health of the relay.Type: ApplicationFiled: July 10, 2023Publication date: January 16, 2025Applicant: Hamilton Sundstrand CorporationInventors: Francis C. Belisle, Joshua C. Swenson, Robert C. Cooney, Nhia Yang, Matthew A. Barker, Darin R. Morman, Jeffrey T. Wavering, Mark Seger
-
Publication number: 20210336985Abstract: A network gateway interrogates a plurality of network devices to collect security state data and operational state data on a periodic basis. A vulnerability resolution module to automatically uploads a security report and downloads actions (e.g., updates to operating system, configurations or policies) from a cloud vulnerability server corresponding to resolution of the vulnerabilities. A security remediation module can remediate on the network device for protection against at least the specific vulnerability of the at least one the peripheral.Type: ApplicationFiled: June 30, 2021Publication date: October 28, 2021Inventors: Jordan Edward Thompson, Jerrod Robert Seger, Mark Derek Westerhof
-
Publication number: 20210288977Abstract: A network gateway interrogates a plurality of network devices to collect security state data and operational state data on a periodic basis. Contextual security recommendations are generated based on the security rating report. Security actions can be taken based on the contextual security recommendations.Type: ApplicationFiled: March 31, 2021Publication date: September 16, 2021Inventors: Jordan Edward Thompson, Jerrod Robert Seger, Mark Derek Westerhof
-
Publication number: 20210288994Abstract: A network gateway interrogates a plurality of network devices to collect security state data and operational state data on a periodic basis. A vulnerability resolution module to automatically uploads a security report and downloads actions (e.g., updates to operating system, configurations or policies) from a cloud vulnerability server corresponding to resolution of the vulnerabilities. A security remediation module can remediate on the network device for protection against at least the specific vulnerability of the at least one the peripheral.Type: ApplicationFiled: March 31, 2021Publication date: September 16, 2021Inventors: Jordan Edward Thompson, Jerrod Robert Seger, Mark Derek Westerhof
-
Patent number: 11036859Abstract: Generating a set of attempted external contacts associated with a malware sample is disclosed. A malware sample is executed in an accelerated computing environment. In the accelerated computing environment, a guest time is advanced more quickly than a time by which a host time is advanced. A set of one or more attempted external contacts generated by the executing malware sample is recorded. The set of attempted external contacts includes at least one generated domain name. A remedial action is taken with respect to the generated domain name.Type: GrantFiled: March 10, 2020Date of Patent: June 15, 2021Assignee: Palo Alto Networks, Inc.Inventors: Ryan C. Salsamendi, Robert A. Seger
-
Patent number: 10846404Abstract: Generating a set of attempted external contacts associated with a malware sample is disclosed. A malware sample is executed, in an accelerated computing environment. In the accelerated computing environment, a guest time is advanced more quickly than a time by which a host time is advanced. A set of one or more attempted external contacts generated by the executing malware sample is recorded. The set of attempted external contacts is provided as output.Type: GrantFiled: July 20, 2017Date of Patent: November 24, 2020Assignee: Palo Alto Networks, Inc.Inventors: Ryan C. Salsamendi, Robert A. Seger
-
Publication number: 20200210581Abstract: Generating a set of attempted external contacts associated with a malware sample is disclosed. A malware sample is executed in an accelerated computing environment. In the accelerated computing environment, a guest time is advanced more quickly than a time by which a host time is advanced. A set of one or more attempted external contacts generated by the executing malware sample is recorded. The set of attempted external contacts includes at least one generated domain name. A remedial action is taken with respect to the generated domain name.Type: ApplicationFiled: March 10, 2020Publication date: July 2, 2020Inventors: Ryan C. Salsamendi, Robert A. Seger
-
Patent number: 10282554Abstract: A system and method configured for providing a cryptographic platform for exchanging information. One or more information transactions including encrypted information may be generated and/or provided to a distributed ledger. The one or more information transactions may include information intended for one or more parties. Information transactions intended for one or more parties may be identified. An information transaction may include one or more of a transaction identifier associated with one or more parties, an information payload, and/or other information. The information payload may include encrypted information. The encrypted information may be encrypted with one or more public keys associated with one or more parties. One or more information transactions may be retrieved from the distributed ledger. The encrypted information may be decrypted with one or more private keys that correspond to the public keys. Presentation of the encrypted information to one or more parties may be facilitated.Type: GrantFiled: June 15, 2016Date of Patent: May 7, 2019Assignee: MANIFOLD TECHNOLOGY, INC.Inventors: Robert A. Seger, II, Christopher T. Finan
-
Patent number: 10097418Abstract: Discovering nodes of a network is disclosed. A multicast group of the network is sent an Internet Protocol multicast packet that requires a receiver of the packet to provide a response packet. One or more Internet Control Message Protocol replies from one or more nodes that belong to the multicast group are received. A listing of nodes of the network is determined using the one or more received replies.Type: GrantFiled: October 12, 2016Date of Patent: October 9, 2018Assignee: Palo Alto Networks, Inc.Inventor: Robert Seger
-
Patent number: 10027709Abstract: Techniques for generating a honey network configuration to emulate a target network environment are disclosed. In some embodiments, techniques for generating a honey network configuration to emulate a target network include receiving a network scan survey of the target network; generating the honey network configuration to emulate the target network using the network scan survey of the target network; and executing a honey network using the honey network configuration.Type: GrantFiled: June 20, 2017Date of Patent: July 17, 2018Assignee: Palo Alto Networks, Inc.Inventors: Robert A. Seger, John Harrison
-
Patent number: 10015179Abstract: Identifying a behavior of a malware service is disclosed. An interrogation packet is sent to a network communication port of a receiver. The interrogation packet is one of a plurality of predetermined interrogation packets sent to the network communication port. The interrogation packet invites an expected action. The expected action is detected. It is determined that the malware service is potentially is operating.Type: GrantFiled: June 28, 2016Date of Patent: July 3, 2018Assignee: Palo Alto Networks, Inc.Inventors: Robert Seger, Vishaal Hariprasad
-
Publication number: 20170324776Abstract: Techniques for generating a honey network configuration to emulate a target network environment are disclosed. In some embodiments, techniques for generating a honey network configuration to emulate a target network include receiving a network scan survey of the target network; generating the honey network configuration to emulate the target network using the network scan survey of the target network; and executing a honey network using the honey network configuration.Type: ApplicationFiled: June 20, 2017Publication date: November 9, 2017Inventors: Robert A. Seger, John Harrison
-
Patent number: 9805193Abstract: Generating a set of attempted external contacts associated with a malware sample is disclosed. A malware sample is executed, in an accelerated computing environment. In the accelerated computing environment, a guest time is advanced more quickly than a time by which a host time is advanced. A set of one or more attempted external contacts generated by the executing malware sample is recorded. The set of attempted external contacts is provided as output.Type: GrantFiled: December 18, 2014Date of Patent: October 31, 2017Assignee: Palo Alto Networks, Inc.Inventors: Ryan C. Salsamendi, Robert A. Seger
-
Patent number: 9716727Abstract: Techniques for generating a honey network configuration to emulate a target network environment are disclosed. In some embodiments, techniques for generating a honey network configuration to emulate a target network include receiving a network scan survey of the target network; generating the honey network configuration to emulate the target network using the network scan survey of the target network; and executing a honey network using the honey network configuration.Type: GrantFiled: July 21, 2015Date of Patent: July 25, 2017Assignee: Palo Alto Networks, Inc.Inventors: Robert A. Seger, John Harrison
-
Patent number: 9686311Abstract: Interdicting an undesired service is disclosed. For example, a malware service is interdicted. The undesired service is identified. A vulnerability of the undesired service is identified from among a hierarchy of vulnerabilities. The undesired service is interdicted according to the vulnerability. For example, a corresponding action of a vulnerability to interdict the undesired service is performed in the order of the hierarchy until the undesired service is interdicted.Type: GrantFiled: July 20, 2015Date of Patent: June 20, 2017Assignee: Palo Alto Networks, Inc.Inventor: Robert Seger
-
Publication number: 20170034004Abstract: Discovering nodes of a network is disclosed. A multicast group of the network is sent an Internet Protocol multicast packet that requires a receiver of the packet to provide a response packet. One or more Internet Control Message Protocol replies from one or more nodes that belong to the multicast group are received. A listing of nodes of the network is determined using the one or more received replies.Type: ApplicationFiled: October 12, 2016Publication date: February 2, 2017Inventor: Robert Seger
-
Patent number: 9497083Abstract: Discovering nodes of a network is disclosed. A multicast group of the network is sent an Internet Protocol version 6 multicast packet that requires a receiver of the packet to provide a response packet. One or more Internet Control Message Protocol version 6 replies from one or more nodes that belong to the multicast group are received. A listing of nodes of the network is determined using the one or more received replies.Type: GrantFiled: June 10, 2013Date of Patent: November 15, 2016Assignee: Palo Alto Networks, Inc.Inventor: Robert Seger
-
Publication number: 20160306982Abstract: A system and method configured for providing a cryptographic platform for exchanging information. One or more information transactions including encrypted information may be generated and/or provided to a distributed ledger. The one or more information transactions may include information intended for one or more parties. Information transactions intended for one or more parties may be identified. An information transaction may include one or more of a transaction identifier associated with one or more parties, an information payload, and/or other information. The information payload may include encrypted information. The encrypted information may be encrypted with one or more public keys associated with one or more parties. One or more information transactions may be retrieved from the distributed ledger. The encrypted information may be decrypted with one or more private keys that correspond to the public keys. Presentation of the encrypted information to one or more parties may be facilitated.Type: ApplicationFiled: June 15, 2016Publication date: October 20, 2016Inventors: Robert A. Seger, II, Christopher T. Finan
-
Publication number: 20160308893Abstract: Identifying a behavior of a malware service is disclosed. An interrogation packet is sent to a network communication port of a receiver. The interrogation packet is one of a plurality of predetermined interrogation packets sent to the network communication port. The interrogation packet invites an expected action. The expected action is detected. It is determined that the malware service is potentially is operating.Type: ApplicationFiled: June 28, 2016Publication date: October 20, 2016Inventors: Robert Seger, Vishaal Hariprasad
-
Patent number: 9419985Abstract: Identifying a behavior of a service is disclosed. A predetermined interrogation packet that corresponds to a hypothesis is sent to a network communication port of a receiver. The predetermined packet is one of a plurality of predetermined interrogation packets sent to the network communication port. The hypothesis is consistent with a behavior of a corresponding service. The predetermined interrogation packet invites an expected action. The expected action is detected. It is determined that the behavior of the service that corresponds to the hypothesis is operating.Type: GrantFiled: June 10, 2013Date of Patent: August 16, 2016Assignee: Morta Security IncInventors: Robert Seger, Vishaal Hariprasad