Patents by Inventor Robert Kurtz

Robert Kurtz has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20200285739
    Abstract: Deception-based techniques for responding to security attacks are described herein. The techniques include transitioning a security attack to a monitored computing device posing as a computing device impacted by the security attack and enabling the adversary to obtain deceptive information from the monitored computing device. Also, the adversary may obtain a document configured to report identifying information of an entity opening the document, thereby identifying the adversary associated with the attack. Further, the techniques include determining that a domain specified in a domain name request is associated with malicious activity and responding to the request with a network address of a monitored computing device to cause the requesting process to communicate with the monitored computing device in place of an adversary server. Additionally, a service may monitor dormant domains names associated with malicious activity and, in response to a change, respond with an alert or a configuration update.
    Type: Application
    Filed: May 27, 2020
    Publication date: September 10, 2020
    Inventors: Adam S. Meyers, Dmitri Alperovitch, George Robert Kurtz, David F. Diehl, Sven Krasser
  • Publication number: 20200285740
    Abstract: Deception-based techniques for responding to security attacks are described herein. The techniques include transitioning a security attack to a monitored computing device posing as a computing device impacted by the security attack and enabling the adversary to obtain deceptive information from the monitored computing device. Also, the adversary may obtain a document configured to report identifying information of an entity opening the document, thereby identifying the adversary associated with the attack. Further, the techniques include determining that a domain specified in a domain name request is associated with malicious activity and responding to the request with a network address of a monitored computing device to cause the requesting process to communicate with the monitored computing device in place of an adversary server. Additionally, a service may monitor dormant domains names associated with malicious activity and, in response to a change, respond with an alert or a configuration update.
    Type: Application
    Filed: May 27, 2020
    Publication date: September 10, 2020
    Inventors: Adam S. Meyers, Dmitri Alperovitch, George Robert Kurtz, David F. Diehl, Sven Krasser
  • Patent number: 10713356
    Abstract: Deception-based techniques for responding to security attacks are described herein. The techniques include transitioning a security attack to a monitored computing device posing as a computing device impacted by the security attack and enabling the adversary to obtain deceptive information from the monitored computing device. Also, the adversary may obtain a document configured to report identifying information of an entity opening the document, thereby identifying the adversary associated with the attack. Further, the techniques include determining that a domain specified in a domain name request is associated with malicious activity and responding to the request with a network address of a monitored computing device to cause the requesting process to communicate with the monitored computing device in place of an adversary server. Additionally, a service may monitor dormant domains names associated with malicious activity and, in response to a change, respond with an alert or a configuration update.
    Type: Grant
    Filed: March 4, 2013
    Date of Patent: July 14, 2020
    Assignee: CrowdStrike, Inc.
    Inventors: Adam S. Meyers, Dmitri Alperovitch, George Robert Kurtz, David F. Diehl, Sven Krasser
  • Publication number: 20200182032
    Abstract: A system for hydraulically fracturing an underground formation in an oil or gas well to extract oil or gas from the formation, the oil or gas well having a wellbore that permits passage of fluid from the wellbore into the formation. The system includes a plurality of electric pumps fluidly connected to the well, and configured to pump fluid into the wellbore at high pressure so that the fluid passes from the wellbore into the, and fractures the formation. The system can also include a plurality of natural gas powered generators electrically connected to the plurality of electric pumps to provide electrical power to the pumps.
    Type: Application
    Filed: June 28, 2019
    Publication date: June 11, 2020
    Applicant: U.S. Well Services, Inc.
    Inventors: Joel N. BROUSSARD, Jeff McPHERSON, Robert KURTZ
  • Patent number: 10648270
    Abstract: An apparatus and associated method is disclosed for a riser hanging system. The apparatus includes a first elongated member with a provision for a first external mechanical coupling at a distal location on the first elongated member. A second elongated member is mechanically coupled to the first elongated member at proximal locations on the first elongated member and the second elongated member. A third member is mechanically coupled to a first portion of the first elongated member. The third member includes a fourth member to move through at least a second portion of a length of the second elongated member. Mechanical couplers associated with the second elongated member are provided for a second external mechanical coupling of the riser to the apparatus. The riser may be hoisted using the apparatus for better control during coupling to the wellhead.
    Type: Grant
    Filed: September 13, 2019
    Date of Patent: May 12, 2020
    Assignee: U.S. Well Services, LLC
    Inventors: Jeremy Brunty, Randall Kimbler, Dominic Chero, Andrew Frame, Robert Kurtz
  • Publication number: 20200088005
    Abstract: An apparatus and associated method is disclosed for a riser hanging system. The apparatus includes a first elongated member with a provision for a first external mechanical coupling at a distal location on the first elongated member. A second elongated member is mechanically coupled to the first elongated member at proximal locations on the first elongated member and the second elongated member. A third member is mechanically coupled to a first portion of the first elongated member. The third member includes a fourth member to move through at least a second portion of a length of the second elongated member. Mechanical couplers associated with the second elongated member are provided for a second external mechanical coupling of the riser to the apparatus. The riser may be hoisted using the apparatus for better control during coupling to the wellhead.
    Type: Application
    Filed: September 13, 2019
    Publication date: March 19, 2020
    Applicant: U.S. Well Services, LLC
    Inventors: Jeremy Brunty, Randall Kimbler, Dominic Chero, Andrew Frame, Robert Kurtz
  • Patent number: 10337308
    Abstract: A system for hydraulically fracturing an underground formation in an oil or gas well to extract oil or gas from the formation, the oil or gas well having a wellbore that permits passage of fluid from the wellbore into the formation. The system includes a plurality of electric pumps fluidly connected to the well, and configured to pump fluid into the wellbore at high pressure so that the fluid passes from the wellbore into the, and fractures the formation. The system can also include a plurality of natural gas powered generators electrically connected to the plurality of electric pumps to provide electrical power to the pumps.
    Type: Grant
    Filed: July 5, 2016
    Date of Patent: July 2, 2019
    Assignee: U.S. Well Services, Inc.
    Inventors: Joel N. Broussard, Jeff McPherson, Robert Kurtz
  • Publication number: 20190138723
    Abstract: A security agent is described herein. The security agent is configured to observe events, filter the observed events using configurable filters, route the filtered events to one or more event consumers, and utilize the one or more event consumers to take action based at least on one of the filtered events. In some implementations, the security agent detects a first action associated with malicious code, gathers data about the malicious code, and in response to detecting subsequent action(s) of the malicious code, performs a preventative action. The security agent may also deceive an adversary associated with malicious code. Further, the security agent may utilize a model representing chains of execution activities and may take action based on those chains of execution activities.
    Type: Application
    Filed: June 13, 2018
    Publication date: May 9, 2019
    Inventors: David F. Diehl, Dmitri Alperovitch, Ion-Alexandru Ionescu, George Robert Kurtz
  • Publication number: 20190040727
    Abstract: An electrically powered hydraulic fracturing system having pumps for pressurizing fracturing fluid, piping for carrying fracturing fluid, and vibration reducing equipment for use with the piping. The vibration reducing equipment includes helical coils that support the piping. The coils are made of a wire rope made of strands of steel cable twisted together. Grooved fittings are provided on some piping connections, and which allow pivoting between adjacent fluid conveyance members. Swivel joints are strategically located in the piping which allow rotational flexing between adjacent sections of the piping; thereby attenuating vibration in the piping but without stressing the piping.
    Type: Application
    Filed: October 12, 2018
    Publication date: February 7, 2019
    Applicant: U.S. Well Services, LLC
    Inventors: Jared Oehring, Robert Kurtz
  • Patent number: 10119381
    Abstract: An electrically powered hydraulic fracturing system having pumps for pressurizing fracturing fluid, piping for carrying fracturing fluid, and vibration reducing equipment for use with the piping. The vibration reducing equipment includes helical coils that support the piping. The coils are made of a wire rope made of strands of steel cable twisted together. Grooved fittings are provided on some piping connections, and which allow pivoting between adjacent fluid conveyance members. Swivel joints are strategically located in the piping which allow rotational flexing between adjacent sections of the piping; thereby attenuating vibration in the piping but without stressing the piping.
    Type: Grant
    Filed: May 3, 2016
    Date of Patent: November 6, 2018
    Assignee: U.S. WELL SERVICES, LLC
    Inventors: Jared Oehring, Robert Kurtz
  • Publication number: 20180258746
    Abstract: A system and method are disclosed for centralized monitoring and control of a hydraulic fracturing operation. The system includes an electric powered fracturing fleet and a centralized control unit coupled to the electric powered fracturing fleet. The electric powered fracturing fleet can include a combination of one or more of: electric powered pumps, turbine generators, blenders, sand silos, chemical storage units, conveyor belts, manifold trailers, hydration units, variable frequency drives, switchgear, transformers, and compressors. The centralized control unit can be configured to monitor and/or control one or more operating characteristics of the electric powered fracturing fleet.
    Type: Application
    Filed: May 14, 2018
    Publication date: September 13, 2018
    Applicant: U.S. Well Services, LLC
    Inventors: Joel N. Broussard, Jeff McPherson, Robert Kurtz, Jared Oehring, Brandon Hinderliter
  • Patent number: 10002250
    Abstract: A security agent is described herein. The security agent is configured to observe events, filter the observed events using configurable filters, route the filtered events to one or more event consumers, and utilize the one or more event consumers to take action based at least on one of the filtered events. In some implementations, the security agent detects a first action associated with malicious code, gathers data about the malicious code, and in response to detecting subsequent action(s) of the malicious code, performs a preventative action. The security agent may also deceive an adversary associated with malicious code. Further, the security agent may utilize a model representing chains of execution activities and may take action based on those chains of execution activities.
    Type: Grant
    Filed: December 29, 2016
    Date of Patent: June 19, 2018
    Assignee: CrowdStrike, Inc.
    Inventors: David F. Diehl, Dmitri Alperovitch, Ion-Alexandru Ionescu, George Robert Kurtz
  • Patent number: 9970278
    Abstract: A system and method are disclosed for centralized monitoring and control of a hydraulic fracturing operation. The system includes an electric powered fracturing fleet and a centralized control unit coupled to the electric powered fracturing fleet. The electric powered fracturing fleet can include a combination of one or more of: electric powered pumps, turbine generators, blenders, sand silos, chemical storage units, conveyor belts, manifold trailers, hydration units, variable frequency drives, switchgear, transformers, and compressors. The centralized control unit can be configured to monitor and/or control one or more operating characteristics of the electric powered fracturing fleet.
    Type: Grant
    Filed: October 15, 2015
    Date of Patent: May 15, 2018
    Assignee: U.S. WELL SERVICES, LLC
    Inventors: Joel N. Broussard, Jeff McPherson, Robert Kurtz, Jared Oehring, Brandon Hinderliter
  • Patent number: 9904784
    Abstract: A kernel-level security agent is described herein. The kernel-level security agent is configured to observe events, filter the observed events using configurable filters, route the filtered events to one or more event consumers, and utilize the one or more event consumers to take action based at least on one of the filtered events. In some implementations, the kernel-level security agent detects a first action associated with malicious code, gathers data about the malicious code, and in response to detecting subsequent action(s) of the malicious code, performs a preventative action. The kernel-level security agent may also deceive an adversary associated with malicious code. Further, the kernel-level security agent may utilize a model representing chains of execution activities and may take action based on those chains of execution activities.
    Type: Grant
    Filed: April 10, 2017
    Date of Patent: February 27, 2018
    Assignee: CrowdStrike, Inc.
    Inventors: David F. Diehl, Dmitri Alperovitch, Ion-Alexandru Ionescu, George Robert Kurtz
  • Patent number: 9858626
    Abstract: Techniques for social sharing security information between client entities forming a group are described herein. The group of client entities is formed as a result of a security server providing one or more secure mechanisms for forming a group among client entities, the client entities each belonging to a different organization. The security service then automatically shares security information of a client entity in the group with one or more other client entities in the group.
    Type: Grant
    Filed: July 6, 2015
    Date of Patent: January 2, 2018
    Assignee: CrowdStrike, Inc.
    Inventors: Dmitri Alperovitch, George Robert Kurtz, David Frederick Diehl, Sven Krasser, Adam S. Meyers
  • Patent number: 9743168
    Abstract: The flexible earphone cover has a flexible main body and a flexible ear cone that extends from the main body. The flexible main body is configured to substantially encase a portion of an earphone. The flexible main body defines an internal cavity for receiving the earphone. It also defines a first opening at a side of the cavity for receiving the earphone there-through. The flexible main body defines a second opening at a side of the cavity. The second opening is smaller than the first opening. Finally, the flexible main body defines a third opening at a side of the cavity. The third opening is smaller than the first opening and the second opening. The flexible ear cone defines a converging passageway from the second opening to an exit configured to direct sound into an ear canal of an ear of a user.
    Type: Grant
    Filed: March 7, 2016
    Date of Patent: August 22, 2017
    Inventors: Jon Robert Kurtz, Bruce C. Nemec, Jason R. Rohr
  • Patent number: 9736564
    Abstract: The flexible earphone cover has a flexible main body and a flexible ear cone that extends from the main body. The flexible main body is configured to substantially encase a portion of an earphone. The flexible main body defines an internal cavity for receiving the earphone. It also defines a first opening at a side of the cavity for receiving the earphone there-through. The flexible main body defines a second opening at a side of the cavity. The flexible main body defines a third opening at a side of the cavity. The flexible main body further defines a fourth opening next to the first opening and a fifth opening next to the third opening. The flexible ear cone defines a converging passageway from the second opening to an exit configured to direct sound into an ear canal of an ear of a user.
    Type: Grant
    Filed: February 22, 2017
    Date of Patent: August 15, 2017
    Inventor: Jon Robert Kurtz
  • Publication number: 20170226839
    Abstract: A system for hydraulically fracturing an underground formation in an oil or gas well, including a pump for pumping hydraulic fracturing fluid into the wellbore, the pump having a pump shaft, and an electric motor with a motor shaft mechanically attached to the pump to drive the pump. The system further includes a torsional coupling connecting the motor shaft to the pump shaft. The torsional coupling includes a motor component fixedly attached to the motor shaft and having motor coupling claws extending outwardly away from the motor shaft, and a pump component fixedly attached to the pump shaft of the pump and having pump coupling claws extending outwardly away from the pump shaft. The motor coupling claws engage with the pump coupling claws so that when the motor shaft and motor component rotate, such rotation causes the pump component and the pump shaft to rotate, thereby driving the pump.
    Type: Application
    Filed: April 28, 2017
    Publication date: August 10, 2017
    Applicant: US Well Services LLC
    Inventors: Joel N. Broussard, Jeff McPherson, Robert Kurtz, Jared Oehring
  • Publication number: 20170213031
    Abstract: A kernel-level security agent is described herein. The kernel-level security agent is configured to observe events, filter the observed events using configurable filters, route the filtered events to one or more event consumers, and utilize the one or more event consumers to take action based at least on one of the filtered events. In some implementations, the kernel-level security agent detects a first action associated with malicious code, gathers data about the malicious code, and in response to detecting subsequent action(s) of the malicious code, performs a preventative action. The kernel-level security agent may also deceive an adversary associated with malicious code. Further, the kernel-level security agent may utilize a model representing chains of execution activities and may take action based on those chains of execution activities.
    Type: Application
    Filed: April 10, 2017
    Publication date: July 27, 2017
    Inventors: David F. Diehl, Dmitri Alperovitch, Ion-Alexandru Ionescu, George Robert Kurtz
  • Publication number: 20170164087
    Abstract: The flexible earphone cover has a flexible main body and a flexible ear cone that extends from the main body. The flexible main body is configured to substantially encase a portion of an earphone. The flexible main body defines an internal cavity for receiving the earphone. It also defines a first opening at a side of the cavity for receiving the earphone there-through. The flexible main body defines a second opening at a side of the cavity. The flexible main body defines a third opening at a side of the cavity. The flexible main body further defines a fourth opening next to the first opening and a fifth opening next to the third opening. The flexible ear cone defines a converging passageway from the second opening to an exit configured to direct sound into an ear canal of an ear of a user.
    Type: Application
    Filed: February 22, 2017
    Publication date: June 8, 2017
    Inventor: Jon Robert Kurtz