Patents by Inventor Robert J. Boback

Robert J. Boback has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20170034020
    Abstract: In one embodiment, one or more BitTorrent management pages, such as an index site or a Rich Site Summary (RSS) feed, may be scanned for indicia of a torrent file that is associated with one or more search terms. After the torrent file is located, information associated with the torrent file may be utilized to initiate the downloading of one or more portions of the content indicated by the torrent file over a network from swarm computers utilizing a BitTorrent Protocol. As the content is being downloaded from the swarm computers, identification information associated with each swarm computer may be obtained. Data associated with the torrent file and the identification information may be stored at a database. Thereafter, a client may search the database to locate one or more swarm computers that may be sharing, for example, unauthorized or illegal information.
    Type: Application
    Filed: July 25, 2016
    Publication date: February 2, 2017
    Inventors: Anju Chopra, Robert J. Boback
  • Patent number: 9432273
    Abstract: In one embodiment, one or more BitTorrent management pages, such as an index site or a Rich Site Summary (RSS) feed, may be scanned for indicia of a torrent file that is associated with one or more search terms. After the torrent file is located, information associated with the torrent file may be utilized to initiate the downloading of one or more portions of the content indicated by the torrent file over a network from swarm computers utilizing a BitTorrent Protocol. As the content is being downloaded from the swarm computers, identification information associated with each swarm computer may be obtained. Data associated with the torrent file and the identification information may be stored at a database. Thereafter, a client may search the database to locate one or more swarm computers that may be sharing, for example, unauthorized or illegal information.
    Type: Grant
    Filed: June 6, 2013
    Date of Patent: August 30, 2016
    Assignee: TIVERSA IP, INC.
    Inventors: Anju Chopra, Robert J. Boback
  • Publication number: 20150334180
    Abstract: A system and method for implementing a peer to peer (P2P) network that includes a plurality of nodes, wherein each of a majority of the nodes has less than a threshold number of P2P connections to other nodes in the network. A P2P network connection is established between a first node from the majority and an enhanced connection node in the network, wherein the enhanced connection node has more than the threshold number of P2P connections to other nodes in the network. A search request is issued from the first node by transmitting the search request from the first node to the enhanced connection node, and then forwarding the search request from the enhanced connection node to other nodes in the network. Responses to the search request are collected at the enhanced connection node, which filters, ranks or adds additional content to the responses prior to forwarding the responses back to the first node.
    Type: Application
    Filed: April 17, 2015
    Publication date: November 19, 2015
    Inventors: Samuel P. Hopkins, Robert J. Boback, Christopher L. Gormley
  • Patent number: 9135306
    Abstract: A “data breach” or loss of sensitive data can cause an organization to lose revenues or suffer other damages. Analyzing data to locate a breach and to identify its source, however, is difficult because the data can come from many sources in an unstructured format and, typically, there is a large amount of data to analyze. A forensic analysis system, according to one embodiment, collects unstructured data from disparate sources, like the Internet, and peer-to-per filesharing and social media networks, and generates structured representations of the data, called virtual profiles. The system forms relationships among the virtual profiles. The system uses the virtual profiles and relationships to reduce the amount of information to be analyzed while including additional information that is related for analysis. By analyzing a smaller amount of related information, a cyber forensic analyst is better able to identify a data breach or other suspicious or illegal activity.
    Type: Grant
    Filed: December 6, 2012
    Date of Patent: September 15, 2015
    Assignee: Tiversa IP, Inc.
    Inventors: Robert J. Boback, Anju Chopra
  • Patent number: 9088545
    Abstract: Techniques for matching information representing private files against files obtained from a public network.
    Type: Grant
    Filed: September 5, 2013
    Date of Patent: July 21, 2015
    Assignee: Tiversa IP, Inc.
    Inventors: Robert J. Boback, Anju Chopra
  • Patent number: 9021026
    Abstract: A system and method for implementing a peer to peer (P2P) network that includes a plurality of nodes, wherein each of a majority of the nodes has less than a threshold number of P2P connections to other nodes in the network. A P2P network connection is established between a first node from the majority and an enhanced connection node in the network, wherein the enhanced connection node has more than the threshold number of P2P connections to other nodes in the network. A search request is issued from the first node by transmitting the search request from the first node to the enhanced connection node, and then forwarding the search request from the enhanced connection node to other nodes in the network. Responses to the search request are collected at the enhanced connection node, which filters, ranks or adds additional content to the responses prior to forwarding the responses back to the first node.
    Type: Grant
    Filed: November 6, 2007
    Date of Patent: April 28, 2015
    Assignee: Tiversa IP, Inc.
    Inventors: Samuel P. Hopkins, Robert J. Boback, Christopher L. Gormley
  • Publication number: 20140075542
    Abstract: Techniques for matching information representing private files against files obtained from a public network.
    Type: Application
    Filed: September 5, 2013
    Publication date: March 13, 2014
    Applicant: Tiversa IP, Inc.
    Inventors: Robert J. Boback, Anju Chopra
  • Publication number: 20140025728
    Abstract: In one embodiment, one or more BitTorrent management pages, such as an index site or a Rich Site Summary (RSS) feed, may be scanned for indicia of a torrent file that is associated with one or more search terms. After the torrent file is located, information associated with the torrent file may be utilized to initiate the downloading of one or more portions of the content indicated by the torrent file over a network from swarm computers utilizing a BitTorrent Protocol. As the content is being downloaded from the swarm computers, identification information associated with each swarm computer may be obtained. Data associated with the torrent file and the identification information may be stored at a database. Thereafter, a client may search the database to locate one or more swarm computers that may be sharing, for example, unauthorized or illegal information.
    Type: Application
    Filed: June 6, 2013
    Publication date: January 23, 2014
    Applicant: Tiversa IP. Inc.
    Inventors: Anju Chopra, Robert J. Boback
  • Publication number: 20130185293
    Abstract: A “data breach” or loss of sensitive data can cause an organization to lose revenues or suffer other damages. Analyzing data to locate a breach and to identify its source, however, is difficult because the data can come from many sources in an unstructured format and, typically, there is a large amount of data to analyze. A forensic analysis system, according to one embodiment, collects unstructured data from disparate sources, like the Internet, and peer-to-per filesharing and social media networks, and generates structured representations of the data, called virtual profiles. The system forms relationships among the virtual profiles. The system uses the virtual profiles and relationships to reduce the amount of information to be analyzed while including additional information that is related for analysis. By analyzing a smaller amount of related information, a cyber forensic analyst is better able to identify a data breach or other suspicious or illegal activity.
    Type: Application
    Filed: December 6, 2012
    Publication date: July 18, 2013
    Inventors: Robert J. Boback, Anju Chopra
  • Publication number: 20080140780
    Abstract: A system and method for implementing a peer to peer (P2P) network that includes a plurality of nodes, wherein each of a majority of the nodes has less than a threshold number of P2P connections to other nodes in the network, A P2P network connection is established between a first node from the majority and an enhanced connection node in the network, wherein the enhanced connection node has more than the threshold number of P2P connections to other nodes in the network. A search request is issued from the first node by transmitting the search request from the first node to the enhanced connection node, and then forwarding the search request from the enhanced connection node to other nodes in the network.
    Type: Application
    Filed: November 6, 2007
    Publication date: June 12, 2008
    Applicant: TIVERSA, INC.
    Inventors: Samuel P. Hopkins, Robert J. Boback, Christopher L. Gormley
  • Publication number: 20080120416
    Abstract: A system and method for compensating content owners and users that share content on a peer to peer (P2P) network. An enrollment system is accessed over the P2P network for registering a plurality of users and content owners, and establishing a financial account for each user and content owner that registers using the enrollment system A compliance system, coupled to the P2P network, monitors transmission of items of shared content from nodes in the P2P network and receipt of items of shared content by nodes in the P2P network and, upon detection of the transmission of a shared item of content: (i) credits an account of a first user for transmission of the shared item of content; (ii) credits an account of a content owner for transmission of the shared item of content; and (iii) charges an account of a second enrolled user for receipt of the shared item of content.
    Type: Application
    Filed: November 6, 2007
    Publication date: May 22, 2008
    Applicant: TIVERSA, INC.
    Inventors: Samuel P. Hopkins, Robert J. Boback, Christopher L. Gormley