Patents by Inventor Robert Beattie

Robert Beattie has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 12244593
    Abstract: A system can efficiently control access to an interactive computing environment. The system can receive authentication data of an authentication attempt associated with an entity. The system can determine, for the entity, a historical vector including features that include sub-features. The historical vector can be determined by generating synthetic data, generating weights, and determining probabilities. The synthetic data can be based on historical authentication attempts by entities other than the entity. The weights can correspond to sub-features of the historical vector. The probabilities can indicate a likelihood that a corresponding sub-feature is involved in the authentication attempt. The system can compare the historical vector to the authentication data. The system can generate a responsive message based on the comparison for controlling access to the interactive computing environment.
    Type: Grant
    Filed: March 29, 2022
    Date of Patent: March 4, 2025
    Assignee: Equifax Inc.
    Inventors: Dilip Singh, Gary Keller, Robert Beatty, Sriram Tirunellayi
  • Publication number: 20240171791
    Abstract: A system and method for content aware monitoring of an output of a media channel by a media system is provided herein. In at least one embodiment, the method comprises: receiving a media assertion schedule comprising a schedule of assertion checks which allow validating that the output of the media channel, by the media system, is synchronized with an expected media channel output; receiving, from a signature generating module, at least one observed signature file; determining that the timestamp data, in each of the at least one received observed signature file, aligns with at least one timecode included in an assertion check in the media assertion schedule; identifying an assertion condition included in the assertion check; and validating the assertion condition using the observed media frame signatures included in each of the at least one received observed signature file.
    Type: Application
    Filed: November 29, 2023
    Publication date: May 23, 2024
    Applicant: Evertz Microsystems Ltd.
    Inventors: Jeremy Blythe, Barnaby Dalton, Robert Beattie, Andrew Duncan
  • Patent number: 11871057
    Abstract: A system and method for content aware monitoring of an output of a media channel by a media system is provided herein. In at least one embodiment, the method comprises: receiving a media assertion schedule comprising a schedule of assertion checks which allow validating that the output of the media channel, by the media system, is synchronized with an expected media channel output; receiving, from a signature generating module, at least one observed signature file; determining that the timestamp data, in each of the at least one received observed signature file, aligns with at least one timecode included in an assertion check in the media assertion schedule; identifying an assertion condition included in the assertion check; and validating the assertion condition using the observed media frame signatures included in each of the at least one received observed signature file.
    Type: Grant
    Filed: June 14, 2022
    Date of Patent: January 9, 2024
    Assignee: Evertz Microsystems Ltd.
    Inventors: Jeremy Blythe, Barnaby Dalton, Robert Beattie, Andrew Duncan
  • Publication number: 20240002479
    Abstract: The disclosure is directed to binding agents, e.g., a single chain variable fragment (scFv) that specifically binds to a flavivirus NS1 protein, as well as compositions comprising the binding agent and a method of using such compositions to induce an immune response against a flavivirus (e.g., a dengue virus). The disclosure also provides a conjugate comprising the binding agent, and a recombinant NS1 antigen.
    Type: Application
    Filed: November 23, 2021
    Publication date: January 4, 2024
    Inventors: Janet L. Smith, David L. Akey, William Clay Brown, Eva Harris, Scott B. Biering, P. Robert Beatty
  • Publication number: 20220400300
    Abstract: A system and method for content aware monitoring of an output of a media channel by a media system is provided herein. In at least one embodiment, the method comprises: receiving a media assertion schedule comprising a schedule of assertion checks which allow validating that the output of the media channel, by the media system, is synchronized with an expected media channel output; receiving, from a signature generating module, at least one observed signature file; determining that the timestamp data, in each of the at least one received observed signature file, aligns with at least one timecode included in an assertion check in the media assertion schedule; identifying an assertion condition included in the assertion check; and validating the assertion condition using the observed media frame signatures included in each of the at least one received observed signature file.
    Type: Application
    Filed: June 14, 2022
    Publication date: December 15, 2022
    Applicant: Evertz Microsystems Ltd.
    Inventors: Jeremy Blythe, Barnaby Dalton, Robert Beattie, Andrew Duncan
  • Publication number: 20220152087
    Abstract: The present invention generally relates to cyclodextrin derivatives, including Dexolve®, sulfobutylether beta cyclodextrin interfering with the activity of the viral nonstructural protein NS1 produced by a flavivirus. More particularly, the present invention relates to method of treatment using cyclodextrin compounds for inhibiting or treating a condition resulting from a flavivirus infection, particularly vascular leakage condition and increased virus dissemination.
    Type: Application
    Filed: November 13, 2020
    Publication date: May 19, 2022
    Applicant: CYCLOLAB CYCLODEXTRIN RESEARCH AND DEVELOPMENT LABORATORY LTD.
    Inventors: Tamas Sohajda, Istvan Puskas, Eva Harris, Francielle Tramontini Gomes de Sousa, Robert Beatty, Peter Laing
  • Patent number: 11176459
    Abstract: A network traffic hub extracts encryption metadata from messages establishing an encrypted connection between a smart appliance and a remote server and determines whether malicious behavior is present in the messages. For example, the network traffic hub can extract an encryption cipher suite, identified encryption algorithms, or a public certificate. The network traffic hub detects malicious behavior or security threats based on the encryption metadata. These security threats may include a man-in-the-middle attacker or a Padding Oracle On Downgraded Legacy Encryption attack. Upon detecting malicious behavior or security threats, the network traffic hub blocks the encrypted traffic or notifies a user.
    Type: Grant
    Filed: September 12, 2019
    Date of Patent: November 16, 2021
    Assignee: Cujo LLC
    Inventors: Yuri Frayman, Robert Beatty, Leonid Kuperman, Gabor Takacs
  • Patent number: 11153336
    Abstract: A method and system for detecting malicious behavior from smart appliances within a network. Smart appliances have a certain level of intelligence that allows them to perform a specific role more effectively and conveniently. Network traffic data and identification data is collected about smart appliances within a network. The data is sent to a behavior analysis engine, which computes confidence levels for anomalies within the network traffic that may be caused by malicious behavior. If the behavior analysis engine determines that malicious behavior is present in the network, it sends an instruction to a network traffic hub to block network traffic relating to the anomaly. In some embodiments, network traffic is blocked based on source-destination pairs. In some embodiments, network traffic is blocked from a device outside the network that is determined to be malicious.
    Type: Grant
    Filed: February 20, 2020
    Date of Patent: October 19, 2021
    Assignee: Cujo LLC
    Inventors: Robert Beatty, Yuri Frayman, Einaras von Gravrock
  • Publication number: 20200195666
    Abstract: A method and system for detecting malicious behavior from smart appliances within a network. Smart appliances have a certain level of intelligence that allows them to perform a specific role more effectively and conveniently. Network traffic data and identification data is collected about smart appliances within a network. The data is sent to a behavior analysis engine, which computes confidence levels for anomalies within the network traffic that may be caused by malicious behavior. If the behavior analysis engine determines that malicious behavior is present in the network, it sends an instruction to a network traffic hub to block network traffic relating to the anomaly. In some embodiments, network traffic is blocked based on source-destination pairs. In some embodiments, network traffic is blocked from a device outside the network that is determined to be malicious.
    Type: Application
    Filed: February 20, 2020
    Publication date: June 18, 2020
    Inventors: Robert Beatty, Yuri Frayman, Einaras von Gravrock
  • Patent number: 10609051
    Abstract: A method and system for detecting malicious behavior from smart appliances within a network. Smart appliances have a certain level of intelligence that allows them to perform a specific role more effectively and conveniently. Network traffic data and identification data is collected about smart appliances within a network. The data is sent to a behavior analysis engine, which computes confidence levels for anomalies within the network traffic that may be caused by malicious behavior. If the behavior analysis engine determines that malicious behavior is present in the network, it sends an instruction to a network traffic hub to block network traffic relating to the anomaly. In some embodiments, network traffic is blocked based on source-destination pairs. In some embodiments, network traffic is blocked from a device outside the network that is determined to be malicious.
    Type: Grant
    Filed: January 13, 2019
    Date of Patent: March 31, 2020
    Assignee: CUJO LLC
    Inventors: Robert Beatty, Yuri Frayman, Einaras von Gravrock
  • Patent number: 10560280
    Abstract: A method and system for detecting malicious behavior from smart appliances within a network. Smart appliances have a certain level of intelligence that allows them to perform a specific role more effectively and conveniently. Network traffic data and appliance identification data is collected about smart appliances within a network. The data is sent to a behavior analysis engine, which computes confidence levels for anomalies within the network traffic that may be caused by malicious behavior. If the behavior analysis engine determines that malicious behavior is present in the network, it sends an instruction to a network traffic hub to block network traffic relating to the anomaly. In some embodiments, network traffic is blocked based on source-destination pairs. In some embodiments, network traffic is blocked from a device outside the network that is determined to be malicious.
    Type: Grant
    Filed: September 11, 2018
    Date of Patent: February 11, 2020
    Assignee: CUJO LLC
    Inventors: Einaras von Gravrock, Yuri Frayman, Robert Beatty
  • Publication number: 20200007568
    Abstract: A network traffic hub extracts encryption metadata from messages establishing an encrypted connection between a smart appliance and a remote server and determines whether malicious behavior is present in the messages. For example, the network traffic hub can extract an encryption cipher suite, identified encryption algorithms, or a public certificate. The network traffic hub detects malicious behavior or security threats based on the encryption metadata. These security threats may include a man-in-the-middle attacker or a Padding Oracle On Downgraded Legacy Encryption attack. Upon detecting malicious behavior or security threats, the network traffic hub blocks the encrypted traffic or notifies a user.
    Type: Application
    Filed: September 12, 2019
    Publication date: January 2, 2020
    Inventors: Yuri Frayman, Robert Beatty, Leonid Kuperman, Gabor Takacs
  • Patent number: 10454961
    Abstract: A network traffic hub extracts encryption metadata from messages establishing an encrypted connection between a smart appliance and a remote server and determines whether malicious behavior is present in the messages. For example, the network traffic hub can extract an encryption cipher suite, identified encryption algorithms, or a public certificate. The network traffic hub detects malicious behavior or security threats based on the encryption metadata. These security threats may include a man-in-the-middle attacker or a Padding Oracle On Downgraded Legacy Encryption attack. Upon detecting malicious behavior or security threats, the network traffic hub blocks the encrypted traffic or notifies a user.
    Type: Grant
    Filed: October 31, 2017
    Date of Patent: October 22, 2019
    Assignee: Cujo LLC
    Inventors: Yuri Frayman, Robert Beatty, Leonid Kuperman, Gabor Takacs
  • Publication number: 20190149563
    Abstract: A method and system for detecting malicious behavior from smart appliances within a network. Smart appliances have a certain level of intelligence that allows them to perform a specific role more effectively and conveniently. Network traffic data and identification data is collected about smart appliances within a network. The data is sent to a behavior analysis engine, which computes confidence levels for anomalies within the network traffic that may be caused by malicious behavior. If the behavior analysis engine determines that malicious behavior is present in the network, it sends an instruction to a network traffic hub to block network traffic relating to the anomaly. In some embodiments, network traffic is blocked based on source-destination pairs. In some embodiments, network traffic is blocked from a device outside the network that is determined to be malicious.
    Type: Application
    Filed: January 13, 2019
    Publication date: May 16, 2019
    Inventors: Robert Beatty, Yuri Frayman, Einaras von Gravrock
  • Patent number: 10230740
    Abstract: A method and system for detecting malicious behavior from smart appliances within a network. Smart appliances have a certain level of intelligence that allows them to perform a specific role more effectively and conveniently. Network traffic data and identification data is collected about smart appliances within a network. The data is sent to a behavior analysis engine, which computes confidence levels for anomalies within the network traffic that may be caused by malicious behavior. If the behavior analysis engine determines that malicious behavior is present in the network, it sends an instruction to a network traffic hub to block network traffic relating to the anomaly. In some embodiments, network traffic is blocked based on source-destination pairs. In some embodiments, network traffic is blocked from a device outside the network that is determined to be malicious.
    Type: Grant
    Filed: November 20, 2015
    Date of Patent: March 12, 2019
    Assignee: Cujo LLC
    Inventors: Robert Beatty, Yuri Frayman, Einaras von Gravrock
  • Publication number: 20190013958
    Abstract: A method and system for detecting malicious behavior from smart appliances within a network. Smart appliances have a certain level of intelligence that allows them to perform a specific role more effectively and conveniently. Network traffic data and appliance identification data is collected about smart appliances within a network. The data is sent to a behavior analysis engine, which computes confidence levels for anomalies within the network traffic that may be caused by malicious behavior. If the behavior analysis engine determines that malicious behavior is present in the network, it sends an instruction to a network traffic hub to block network traffic relating to the anomaly. In some embodiments, network traffic is blocked based on source-destination pairs. In some embodiments, network traffic is blocked from a device outside the network that is determined to be malicious.
    Type: Application
    Filed: September 11, 2018
    Publication date: January 10, 2019
    Inventors: Einaras von Gravrock, Yuri Frayman, Robert Beatty
  • Patent number: 10135633
    Abstract: A method and system for detecting malicious behavior from smart appliances within a network. Smart appliances have a certain level of intelligence that allows them to perform a specific role more effectively and conveniently. Network traffic data and appliance identification data is collected about smart appliances within a network. The data is sent to a behavior analysis engine, which computes confidence levels for anomalies within the network traffic that may be caused by malicious behavior. If the behavior analysis engine determines that malicious behavior is present in the network, it sends an instruction to a network traffic hub to block network traffic relating to the anomaly. In some embodiments, network traffic is blocked based on source-destination pairs. In some embodiments, network traffic is blocked from a device outside the network that is determined to be malicious.
    Type: Grant
    Filed: April 14, 2016
    Date of Patent: November 20, 2018
    Assignee: Cujo LLC
    Inventors: Einaras von Gravrock, Yuri Frayman, Robert Beatty
  • Patent number: 10103900
    Abstract: A method and system for detecting malicious behavior from smart appliances within a network. Smart appliances have a certain level of intelligence that allows them to perform a specific role more effectively and conveniently. Network traffic data and appliance identification data is collected about smart appliances within a network. The data is sent to a behavior analysis engine, which computes confidence levels for anomalies within the network traffic that may be caused by malicious behavior. If the behavior analysis engine determines that malicious behavior is present in the network, it sends an instruction to a network traffic hub to block network traffic relating to the anomaly. In some embodiments, network traffic is blocked based on source-destination pairs. In some embodiments, network traffic is blocked from a device outside the network that is determined to be malicious.
    Type: Grant
    Filed: April 14, 2016
    Date of Patent: October 16, 2018
    Assignee: Cujo LLC
    Inventors: Einaras von Gravrock, Yuri Frayman, Robert Beatty
  • Publication number: 20180124085
    Abstract: A network traffic hub extracts encryption metadata from messages establishing an encrypted connection between a smart appliance and a remote server and determines whether malicious behavior is present in the messages. For example, the network traffic hub can extract an encryption cipher suite, identified encryption algorithms, or a public certificate. The network traffic hub detects malicious behavior or security threats based on the encryption metadata. These security threats may include a man-in-the-middle attacker or a Padding Oracle On Downgraded Legacy Encryption attack. Upon detecting malicious behavior or security threats, the network traffic hub blocks the encrypted traffic or notifies a user.
    Type: Application
    Filed: October 31, 2017
    Publication date: May 3, 2018
    Inventors: Yuri Frayman, Robert Beatty, Leon Kuperman, Gabor Takacs
  • Publication number: 20160315955
    Abstract: A method and system for detecting malicious behavior from smart appliances within a network. Smart appliances have a certain level of intelligence that allows them to perform a specific role more effectively and conveniently. Network traffic data and identification data is collected about smart appliances within a network. The data is sent to a behavior analysis engine, which computes confidence levels for anomalies within the network traffic that may be caused by malicious behavior. If the behavior analysis engine determines that malicious behavior is present in the network, it sends an instruction to a network traffic hub to block network traffic relating to the anomaly. In some embodiments, network traffic is blocked based on source-destination pairs. In some embodiments, network traffic is blocked from a device outside the network that is determined to be malicious.
    Type: Application
    Filed: November 20, 2015
    Publication date: October 27, 2016
    Inventors: Robert Beatty, Yuri Frayman, Einaras von Gravrock..