Patents by Inventor Robert Kurtz
Robert Kurtz has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Publication number: 20200285739Abstract: Deception-based techniques for responding to security attacks are described herein. The techniques include transitioning a security attack to a monitored computing device posing as a computing device impacted by the security attack and enabling the adversary to obtain deceptive information from the monitored computing device. Also, the adversary may obtain a document configured to report identifying information of an entity opening the document, thereby identifying the adversary associated with the attack. Further, the techniques include determining that a domain specified in a domain name request is associated with malicious activity and responding to the request with a network address of a monitored computing device to cause the requesting process to communicate with the monitored computing device in place of an adversary server. Additionally, a service may monitor dormant domains names associated with malicious activity and, in response to a change, respond with an alert or a configuration update.Type: ApplicationFiled: May 27, 2020Publication date: September 10, 2020Inventors: Adam S. Meyers, Dmitri Alperovitch, George Robert Kurtz, David F. Diehl, Sven Krasser
-
Publication number: 20200285740Abstract: Deception-based techniques for responding to security attacks are described herein. The techniques include transitioning a security attack to a monitored computing device posing as a computing device impacted by the security attack and enabling the adversary to obtain deceptive information from the monitored computing device. Also, the adversary may obtain a document configured to report identifying information of an entity opening the document, thereby identifying the adversary associated with the attack. Further, the techniques include determining that a domain specified in a domain name request is associated with malicious activity and responding to the request with a network address of a monitored computing device to cause the requesting process to communicate with the monitored computing device in place of an adversary server. Additionally, a service may monitor dormant domains names associated with malicious activity and, in response to a change, respond with an alert or a configuration update.Type: ApplicationFiled: May 27, 2020Publication date: September 10, 2020Inventors: Adam S. Meyers, Dmitri Alperovitch, George Robert Kurtz, David F. Diehl, Sven Krasser
-
Patent number: 10713356Abstract: Deception-based techniques for responding to security attacks are described herein. The techniques include transitioning a security attack to a monitored computing device posing as a computing device impacted by the security attack and enabling the adversary to obtain deceptive information from the monitored computing device. Also, the adversary may obtain a document configured to report identifying information of an entity opening the document, thereby identifying the adversary associated with the attack. Further, the techniques include determining that a domain specified in a domain name request is associated with malicious activity and responding to the request with a network address of a monitored computing device to cause the requesting process to communicate with the monitored computing device in place of an adversary server. Additionally, a service may monitor dormant domains names associated with malicious activity and, in response to a change, respond with an alert or a configuration update.Type: GrantFiled: March 4, 2013Date of Patent: July 14, 2020Assignee: CrowdStrike, Inc.Inventors: Adam S. Meyers, Dmitri Alperovitch, George Robert Kurtz, David F. Diehl, Sven Krasser
-
Publication number: 20200182032Abstract: A system for hydraulically fracturing an underground formation in an oil or gas well to extract oil or gas from the formation, the oil or gas well having a wellbore that permits passage of fluid from the wellbore into the formation. The system includes a plurality of electric pumps fluidly connected to the well, and configured to pump fluid into the wellbore at high pressure so that the fluid passes from the wellbore into the, and fractures the formation. The system can also include a plurality of natural gas powered generators electrically connected to the plurality of electric pumps to provide electrical power to the pumps.Type: ApplicationFiled: June 28, 2019Publication date: June 11, 2020Applicant: U.S. Well Services, Inc.Inventors: Joel N. BROUSSARD, Jeff McPHERSON, Robert KURTZ
-
Patent number: 10648270Abstract: An apparatus and associated method is disclosed for a riser hanging system. The apparatus includes a first elongated member with a provision for a first external mechanical coupling at a distal location on the first elongated member. A second elongated member is mechanically coupled to the first elongated member at proximal locations on the first elongated member and the second elongated member. A third member is mechanically coupled to a first portion of the first elongated member. The third member includes a fourth member to move through at least a second portion of a length of the second elongated member. Mechanical couplers associated with the second elongated member are provided for a second external mechanical coupling of the riser to the apparatus. The riser may be hoisted using the apparatus for better control during coupling to the wellhead.Type: GrantFiled: September 13, 2019Date of Patent: May 12, 2020Assignee: U.S. Well Services, LLCInventors: Jeremy Brunty, Randall Kimbler, Dominic Chero, Andrew Frame, Robert Kurtz
-
Publication number: 20200088005Abstract: An apparatus and associated method is disclosed for a riser hanging system. The apparatus includes a first elongated member with a provision for a first external mechanical coupling at a distal location on the first elongated member. A second elongated member is mechanically coupled to the first elongated member at proximal locations on the first elongated member and the second elongated member. A third member is mechanically coupled to a first portion of the first elongated member. The third member includes a fourth member to move through at least a second portion of a length of the second elongated member. Mechanical couplers associated with the second elongated member are provided for a second external mechanical coupling of the riser to the apparatus. The riser may be hoisted using the apparatus for better control during coupling to the wellhead.Type: ApplicationFiled: September 13, 2019Publication date: March 19, 2020Applicant: U.S. Well Services, LLCInventors: Jeremy Brunty, Randall Kimbler, Dominic Chero, Andrew Frame, Robert Kurtz
-
Patent number: 10337308Abstract: A system for hydraulically fracturing an underground formation in an oil or gas well to extract oil or gas from the formation, the oil or gas well having a wellbore that permits passage of fluid from the wellbore into the formation. The system includes a plurality of electric pumps fluidly connected to the well, and configured to pump fluid into the wellbore at high pressure so that the fluid passes from the wellbore into the, and fractures the formation. The system can also include a plurality of natural gas powered generators electrically connected to the plurality of electric pumps to provide electrical power to the pumps.Type: GrantFiled: July 5, 2016Date of Patent: July 2, 2019Assignee: U.S. Well Services, Inc.Inventors: Joel N. Broussard, Jeff McPherson, Robert Kurtz
-
Publication number: 20190138723Abstract: A security agent is described herein. The security agent is configured to observe events, filter the observed events using configurable filters, route the filtered events to one or more event consumers, and utilize the one or more event consumers to take action based at least on one of the filtered events. In some implementations, the security agent detects a first action associated with malicious code, gathers data about the malicious code, and in response to detecting subsequent action(s) of the malicious code, performs a preventative action. The security agent may also deceive an adversary associated with malicious code. Further, the security agent may utilize a model representing chains of execution activities and may take action based on those chains of execution activities.Type: ApplicationFiled: June 13, 2018Publication date: May 9, 2019Inventors: David F. Diehl, Dmitri Alperovitch, Ion-Alexandru Ionescu, George Robert Kurtz
-
Publication number: 20190040727Abstract: An electrically powered hydraulic fracturing system having pumps for pressurizing fracturing fluid, piping for carrying fracturing fluid, and vibration reducing equipment for use with the piping. The vibration reducing equipment includes helical coils that support the piping. The coils are made of a wire rope made of strands of steel cable twisted together. Grooved fittings are provided on some piping connections, and which allow pivoting between adjacent fluid conveyance members. Swivel joints are strategically located in the piping which allow rotational flexing between adjacent sections of the piping; thereby attenuating vibration in the piping but without stressing the piping.Type: ApplicationFiled: October 12, 2018Publication date: February 7, 2019Applicant: U.S. Well Services, LLCInventors: Jared Oehring, Robert Kurtz
-
Patent number: 10119381Abstract: An electrically powered hydraulic fracturing system having pumps for pressurizing fracturing fluid, piping for carrying fracturing fluid, and vibration reducing equipment for use with the piping. The vibration reducing equipment includes helical coils that support the piping. The coils are made of a wire rope made of strands of steel cable twisted together. Grooved fittings are provided on some piping connections, and which allow pivoting between adjacent fluid conveyance members. Swivel joints are strategically located in the piping which allow rotational flexing between adjacent sections of the piping; thereby attenuating vibration in the piping but without stressing the piping.Type: GrantFiled: May 3, 2016Date of Patent: November 6, 2018Assignee: U.S. WELL SERVICES, LLCInventors: Jared Oehring, Robert Kurtz
-
Publication number: 20180258746Abstract: A system and method are disclosed for centralized monitoring and control of a hydraulic fracturing operation. The system includes an electric powered fracturing fleet and a centralized control unit coupled to the electric powered fracturing fleet. The electric powered fracturing fleet can include a combination of one or more of: electric powered pumps, turbine generators, blenders, sand silos, chemical storage units, conveyor belts, manifold trailers, hydration units, variable frequency drives, switchgear, transformers, and compressors. The centralized control unit can be configured to monitor and/or control one or more operating characteristics of the electric powered fracturing fleet.Type: ApplicationFiled: May 14, 2018Publication date: September 13, 2018Applicant: U.S. Well Services, LLCInventors: Joel N. Broussard, Jeff McPherson, Robert Kurtz, Jared Oehring, Brandon Hinderliter
-
Patent number: 10002250Abstract: A security agent is described herein. The security agent is configured to observe events, filter the observed events using configurable filters, route the filtered events to one or more event consumers, and utilize the one or more event consumers to take action based at least on one of the filtered events. In some implementations, the security agent detects a first action associated with malicious code, gathers data about the malicious code, and in response to detecting subsequent action(s) of the malicious code, performs a preventative action. The security agent may also deceive an adversary associated with malicious code. Further, the security agent may utilize a model representing chains of execution activities and may take action based on those chains of execution activities.Type: GrantFiled: December 29, 2016Date of Patent: June 19, 2018Assignee: CrowdStrike, Inc.Inventors: David F. Diehl, Dmitri Alperovitch, Ion-Alexandru Ionescu, George Robert Kurtz
-
Patent number: 9970278Abstract: A system and method are disclosed for centralized monitoring and control of a hydraulic fracturing operation. The system includes an electric powered fracturing fleet and a centralized control unit coupled to the electric powered fracturing fleet. The electric powered fracturing fleet can include a combination of one or more of: electric powered pumps, turbine generators, blenders, sand silos, chemical storage units, conveyor belts, manifold trailers, hydration units, variable frequency drives, switchgear, transformers, and compressors. The centralized control unit can be configured to monitor and/or control one or more operating characteristics of the electric powered fracturing fleet.Type: GrantFiled: October 15, 2015Date of Patent: May 15, 2018Assignee: U.S. WELL SERVICES, LLCInventors: Joel N. Broussard, Jeff McPherson, Robert Kurtz, Jared Oehring, Brandon Hinderliter
-
Patent number: 9904784Abstract: A kernel-level security agent is described herein. The kernel-level security agent is configured to observe events, filter the observed events using configurable filters, route the filtered events to one or more event consumers, and utilize the one or more event consumers to take action based at least on one of the filtered events. In some implementations, the kernel-level security agent detects a first action associated with malicious code, gathers data about the malicious code, and in response to detecting subsequent action(s) of the malicious code, performs a preventative action. The kernel-level security agent may also deceive an adversary associated with malicious code. Further, the kernel-level security agent may utilize a model representing chains of execution activities and may take action based on those chains of execution activities.Type: GrantFiled: April 10, 2017Date of Patent: February 27, 2018Assignee: CrowdStrike, Inc.Inventors: David F. Diehl, Dmitri Alperovitch, Ion-Alexandru Ionescu, George Robert Kurtz
-
Patent number: 9858626Abstract: Techniques for social sharing security information between client entities forming a group are described herein. The group of client entities is formed as a result of a security server providing one or more secure mechanisms for forming a group among client entities, the client entities each belonging to a different organization. The security service then automatically shares security information of a client entity in the group with one or more other client entities in the group.Type: GrantFiled: July 6, 2015Date of Patent: January 2, 2018Assignee: CrowdStrike, Inc.Inventors: Dmitri Alperovitch, George Robert Kurtz, David Frederick Diehl, Sven Krasser, Adam S. Meyers
-
Patent number: 9743168Abstract: The flexible earphone cover has a flexible main body and a flexible ear cone that extends from the main body. The flexible main body is configured to substantially encase a portion of an earphone. The flexible main body defines an internal cavity for receiving the earphone. It also defines a first opening at a side of the cavity for receiving the earphone there-through. The flexible main body defines a second opening at a side of the cavity. The second opening is smaller than the first opening. Finally, the flexible main body defines a third opening at a side of the cavity. The third opening is smaller than the first opening and the second opening. The flexible ear cone defines a converging passageway from the second opening to an exit configured to direct sound into an ear canal of an ear of a user.Type: GrantFiled: March 7, 2016Date of Patent: August 22, 2017Inventors: Jon Robert Kurtz, Bruce C. Nemec, Jason R. Rohr
-
Patent number: 9736564Abstract: The flexible earphone cover has a flexible main body and a flexible ear cone that extends from the main body. The flexible main body is configured to substantially encase a portion of an earphone. The flexible main body defines an internal cavity for receiving the earphone. It also defines a first opening at a side of the cavity for receiving the earphone there-through. The flexible main body defines a second opening at a side of the cavity. The flexible main body defines a third opening at a side of the cavity. The flexible main body further defines a fourth opening next to the first opening and a fifth opening next to the third opening. The flexible ear cone defines a converging passageway from the second opening to an exit configured to direct sound into an ear canal of an ear of a user.Type: GrantFiled: February 22, 2017Date of Patent: August 15, 2017Inventor: Jon Robert Kurtz
-
Publication number: 20170226839Abstract: A system for hydraulically fracturing an underground formation in an oil or gas well, including a pump for pumping hydraulic fracturing fluid into the wellbore, the pump having a pump shaft, and an electric motor with a motor shaft mechanically attached to the pump to drive the pump. The system further includes a torsional coupling connecting the motor shaft to the pump shaft. The torsional coupling includes a motor component fixedly attached to the motor shaft and having motor coupling claws extending outwardly away from the motor shaft, and a pump component fixedly attached to the pump shaft of the pump and having pump coupling claws extending outwardly away from the pump shaft. The motor coupling claws engage with the pump coupling claws so that when the motor shaft and motor component rotate, such rotation causes the pump component and the pump shaft to rotate, thereby driving the pump.Type: ApplicationFiled: April 28, 2017Publication date: August 10, 2017Applicant: US Well Services LLCInventors: Joel N. Broussard, Jeff McPherson, Robert Kurtz, Jared Oehring
-
Publication number: 20170213031Abstract: A kernel-level security agent is described herein. The kernel-level security agent is configured to observe events, filter the observed events using configurable filters, route the filtered events to one or more event consumers, and utilize the one or more event consumers to take action based at least on one of the filtered events. In some implementations, the kernel-level security agent detects a first action associated with malicious code, gathers data about the malicious code, and in response to detecting subsequent action(s) of the malicious code, performs a preventative action. The kernel-level security agent may also deceive an adversary associated with malicious code. Further, the kernel-level security agent may utilize a model representing chains of execution activities and may take action based on those chains of execution activities.Type: ApplicationFiled: April 10, 2017Publication date: July 27, 2017Inventors: David F. Diehl, Dmitri Alperovitch, Ion-Alexandru Ionescu, George Robert Kurtz
-
Publication number: 20170164087Abstract: The flexible earphone cover has a flexible main body and a flexible ear cone that extends from the main body. The flexible main body is configured to substantially encase a portion of an earphone. The flexible main body defines an internal cavity for receiving the earphone. It also defines a first opening at a side of the cavity for receiving the earphone there-through. The flexible main body defines a second opening at a side of the cavity. The flexible main body defines a third opening at a side of the cavity. The flexible main body further defines a fourth opening next to the first opening and a fifth opening next to the third opening. The flexible ear cone defines a converging passageway from the second opening to an exit configured to direct sound into an ear canal of an ear of a user.Type: ApplicationFiled: February 22, 2017Publication date: June 8, 2017Inventor: Jon Robert Kurtz