Patents by Inventor Robert J. Shanley

Robert J. Shanley has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 8898789
    Abstract: Systems, methods, devices, and machine readable media for detecting malicious software on a computing device with a mobile device are provided. One method includes causing a mobile device to mount a non-volatile memory of the computing device, scanning the non-volatile memory of the computing device with the mobile device using a low-level read operations scan, collecting data on the mobile device from the low-level read operations scan, and evaluating the data collected on the mobile device for malicious software on the computing device.
    Type: Grant
    Filed: June 14, 2011
    Date of Patent: November 25, 2014
    Assignee: Honeywell International Inc.
    Inventor: Robert J. Shanley
  • Patent number: 8763132
    Abstract: Systems, methods, and devices for open source security monitoring are described herein. For example, one or more embodiments include searching open source data for data posing a security vulnerability to an entity, associating a risk level with the data posing the security vulnerability to the entity, and determining whether to perform a remedial action based on the risk level.
    Type: Grant
    Filed: June 15, 2012
    Date of Patent: June 24, 2014
    Assignee: Honeywell International Inc.
    Inventor: Robert J. Shanley
  • Publication number: 20130340082
    Abstract: Systems, methods, and devices for open source security monitoring are described herein. For example, one or more embodiments include searching open source data for data posing a security vulnerability to an entity, associating a risk level with the data posing the security vulnerability to the entity, and determining whether to perform a remedial action based on the risk level.
    Type: Application
    Filed: June 15, 2012
    Publication date: December 19, 2013
    Applicant: HONEYWELL INTERNATIONAL INC.
    Inventor: Robert J. Shanley
  • Patent number: 8413237
    Abstract: Methods of simulating vulnerability are provided. In an example, multi-stage vulnerability across multiple systems may be simulated by first simulating a probing of at least one intermediate entity, the at least one intermediate entity connected to a target system, second simulating a probing of the target system if the first simulated probing is successful and generating an attack graph based on the results of the first and second simulating steps. In another example, multi-system vulnerability may be simulated by receiving a plurality of attributes associated with vulnerabilities of a plurality of systems within a network, the plurality of systems including at least one target system and generating an attack graph including one or more attack chains based at least in part on the received plurality of attributes. In another example, system (e.g.
    Type: Grant
    Filed: October 23, 2006
    Date of Patent: April 2, 2013
    Assignee: Alcatel Lucent
    Inventors: Paul F. O'Rourke, Robert J. Shanley
  • Publication number: 20120324577
    Abstract: Systems, methods, devices, and machine readable media for detecting malicious software on a computing device with a mobile device are provided. One method includes causing a mobile device to mount a non-volatile memory of the computing device, scanning the non-volatile memory of the computing device with the mobile device using a low-level read operations scan, collecting data on the mobile device from the low-level read operations scan, and evaluating the data collected on the mobile device for malicious software on the computing device.
    Type: Application
    Filed: June 14, 2011
    Publication date: December 20, 2012
    Applicant: HONEYWELL INTERNATIONAL INC.
    Inventor: Robert J. Shanley
  • Publication number: 20080098479
    Abstract: Methods of simulating vulnerability are provided. In an example, multi-stage vulnerability across multiple systems may be simulated by first simulating a probing of at least one intermediate entity, the at least one intermediate entity connected to a target system, second simulating a probing of the target system if the first simulated probing is successful and generating an attack graph based on the results of the first and second simulating steps. In another example, multi-system vulnerability may be simulated by receiving a plurality of attributes associated with vulnerabilities of a plurality of systems within a network, the plurality of systems including at least one target system and generating an attack graph including one or more attack chains based at least in part on the received plurality of attributes. In another example, system (e.g.
    Type: Application
    Filed: October 23, 2006
    Publication date: April 24, 2008
    Inventors: Paul F. O'Rourke, Robert J. Shanley