Patents by Inventor Robert J. Boback
Robert J. Boback has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Publication number: 20170034020Abstract: In one embodiment, one or more BitTorrent management pages, such as an index site or a Rich Site Summary (RSS) feed, may be scanned for indicia of a torrent file that is associated with one or more search terms. After the torrent file is located, information associated with the torrent file may be utilized to initiate the downloading of one or more portions of the content indicated by the torrent file over a network from swarm computers utilizing a BitTorrent Protocol. As the content is being downloaded from the swarm computers, identification information associated with each swarm computer may be obtained. Data associated with the torrent file and the identification information may be stored at a database. Thereafter, a client may search the database to locate one or more swarm computers that may be sharing, for example, unauthorized or illegal information.Type: ApplicationFiled: July 25, 2016Publication date: February 2, 2017Inventors: Anju Chopra, Robert J. Boback
-
Patent number: 9432273Abstract: In one embodiment, one or more BitTorrent management pages, such as an index site or a Rich Site Summary (RSS) feed, may be scanned for indicia of a torrent file that is associated with one or more search terms. After the torrent file is located, information associated with the torrent file may be utilized to initiate the downloading of one or more portions of the content indicated by the torrent file over a network from swarm computers utilizing a BitTorrent Protocol. As the content is being downloaded from the swarm computers, identification information associated with each swarm computer may be obtained. Data associated with the torrent file and the identification information may be stored at a database. Thereafter, a client may search the database to locate one or more swarm computers that may be sharing, for example, unauthorized or illegal information.Type: GrantFiled: June 6, 2013Date of Patent: August 30, 2016Assignee: TIVERSA IP, INC.Inventors: Anju Chopra, Robert J. Boback
-
Publication number: 20150334180Abstract: A system and method for implementing a peer to peer (P2P) network that includes a plurality of nodes, wherein each of a majority of the nodes has less than a threshold number of P2P connections to other nodes in the network. A P2P network connection is established between a first node from the majority and an enhanced connection node in the network, wherein the enhanced connection node has more than the threshold number of P2P connections to other nodes in the network. A search request is issued from the first node by transmitting the search request from the first node to the enhanced connection node, and then forwarding the search request from the enhanced connection node to other nodes in the network. Responses to the search request are collected at the enhanced connection node, which filters, ranks or adds additional content to the responses prior to forwarding the responses back to the first node.Type: ApplicationFiled: April 17, 2015Publication date: November 19, 2015Inventors: Samuel P. Hopkins, Robert J. Boback, Christopher L. Gormley
-
Patent number: 9135306Abstract: A “data breach” or loss of sensitive data can cause an organization to lose revenues or suffer other damages. Analyzing data to locate a breach and to identify its source, however, is difficult because the data can come from many sources in an unstructured format and, typically, there is a large amount of data to analyze. A forensic analysis system, according to one embodiment, collects unstructured data from disparate sources, like the Internet, and peer-to-per filesharing and social media networks, and generates structured representations of the data, called virtual profiles. The system forms relationships among the virtual profiles. The system uses the virtual profiles and relationships to reduce the amount of information to be analyzed while including additional information that is related for analysis. By analyzing a smaller amount of related information, a cyber forensic analyst is better able to identify a data breach or other suspicious or illegal activity.Type: GrantFiled: December 6, 2012Date of Patent: September 15, 2015Assignee: Tiversa IP, Inc.Inventors: Robert J. Boback, Anju Chopra
-
Patent number: 9088545Abstract: Techniques for matching information representing private files against files obtained from a public network.Type: GrantFiled: September 5, 2013Date of Patent: July 21, 2015Assignee: Tiversa IP, Inc.Inventors: Robert J. Boback, Anju Chopra
-
Patent number: 9021026Abstract: A system and method for implementing a peer to peer (P2P) network that includes a plurality of nodes, wherein each of a majority of the nodes has less than a threshold number of P2P connections to other nodes in the network. A P2P network connection is established between a first node from the majority and an enhanced connection node in the network, wherein the enhanced connection node has more than the threshold number of P2P connections to other nodes in the network. A search request is issued from the first node by transmitting the search request from the first node to the enhanced connection node, and then forwarding the search request from the enhanced connection node to other nodes in the network. Responses to the search request are collected at the enhanced connection node, which filters, ranks or adds additional content to the responses prior to forwarding the responses back to the first node.Type: GrantFiled: November 6, 2007Date of Patent: April 28, 2015Assignee: Tiversa IP, Inc.Inventors: Samuel P. Hopkins, Robert J. Boback, Christopher L. Gormley
-
Publication number: 20140075542Abstract: Techniques for matching information representing private files against files obtained from a public network.Type: ApplicationFiled: September 5, 2013Publication date: March 13, 2014Applicant: Tiversa IP, Inc.Inventors: Robert J. Boback, Anju Chopra
-
Publication number: 20140025728Abstract: In one embodiment, one or more BitTorrent management pages, such as an index site or a Rich Site Summary (RSS) feed, may be scanned for indicia of a torrent file that is associated with one or more search terms. After the torrent file is located, information associated with the torrent file may be utilized to initiate the downloading of one or more portions of the content indicated by the torrent file over a network from swarm computers utilizing a BitTorrent Protocol. As the content is being downloaded from the swarm computers, identification information associated with each swarm computer may be obtained. Data associated with the torrent file and the identification information may be stored at a database. Thereafter, a client may search the database to locate one or more swarm computers that may be sharing, for example, unauthorized or illegal information.Type: ApplicationFiled: June 6, 2013Publication date: January 23, 2014Applicant: Tiversa IP. Inc.Inventors: Anju Chopra, Robert J. Boback
-
Publication number: 20130185293Abstract: A “data breach” or loss of sensitive data can cause an organization to lose revenues or suffer other damages. Analyzing data to locate a breach and to identify its source, however, is difficult because the data can come from many sources in an unstructured format and, typically, there is a large amount of data to analyze. A forensic analysis system, according to one embodiment, collects unstructured data from disparate sources, like the Internet, and peer-to-per filesharing and social media networks, and generates structured representations of the data, called virtual profiles. The system forms relationships among the virtual profiles. The system uses the virtual profiles and relationships to reduce the amount of information to be analyzed while including additional information that is related for analysis. By analyzing a smaller amount of related information, a cyber forensic analyst is better able to identify a data breach or other suspicious or illegal activity.Type: ApplicationFiled: December 6, 2012Publication date: July 18, 2013Inventors: Robert J. Boback, Anju Chopra
-
Publication number: 20080140780Abstract: A system and method for implementing a peer to peer (P2P) network that includes a plurality of nodes, wherein each of a majority of the nodes has less than a threshold number of P2P connections to other nodes in the network, A P2P network connection is established between a first node from the majority and an enhanced connection node in the network, wherein the enhanced connection node has more than the threshold number of P2P connections to other nodes in the network. A search request is issued from the first node by transmitting the search request from the first node to the enhanced connection node, and then forwarding the search request from the enhanced connection node to other nodes in the network.Type: ApplicationFiled: November 6, 2007Publication date: June 12, 2008Applicant: TIVERSA, INC.Inventors: Samuel P. Hopkins, Robert J. Boback, Christopher L. Gormley
-
Publication number: 20080120416Abstract: A system and method for compensating content owners and users that share content on a peer to peer (P2P) network. An enrollment system is accessed over the P2P network for registering a plurality of users and content owners, and establishing a financial account for each user and content owner that registers using the enrollment system A compliance system, coupled to the P2P network, monitors transmission of items of shared content from nodes in the P2P network and receipt of items of shared content by nodes in the P2P network and, upon detection of the transmission of a shared item of content: (i) credits an account of a first user for transmission of the shared item of content; (ii) credits an account of a content owner for transmission of the shared item of content; and (iii) charges an account of a second enrolled user for receipt of the shared item of content.Type: ApplicationFiled: November 6, 2007Publication date: May 22, 2008Applicant: TIVERSA, INC.Inventors: Samuel P. Hopkins, Robert J. Boback, Christopher L. Gormley