Patents by Inventor Robert Pike

Robert Pike has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 12293211
    Abstract: A verification operating system (VOS) is an intermediary operating system that verifies data of a primary operating system before the primary operating system controls of the computing device. When the computing device is initialized, initial boot processes load the VOS instead of the primary operating system. The VOS performs verification processes on data storing the primary operating system to verify that the primary operating system has not been manipulated or corrupted before passing control of the computing device to the primary operating system. A VOS also may be used to verify an operating system used by a virtual machine (VM). The VOS verifies data storing a VM operating system to be used for requested VMs. If the VOS verifies that the VM OS data is accurate, the VOS provides the VM OS data to a hypervisor for use in a VM.
    Type: Grant
    Filed: August 11, 2023
    Date of Patent: May 6, 2025
    Assignee: Cyemptive Technologies, Inc.
    Inventors: Robert Pike, Stewart P. MacLeod, Brian A. Jensen
  • Publication number: 20250122889
    Abstract: A portable fan includes an air generation assembly. The air generation assembly includes a motor assembly, a rear grill, a front grill connected to the rear grill, an internal space defined by the rear grill and the front grill, and an impeller located substantially within the internal space. The motor assembly includes a polymer housing including connecting features formed integral to the polymer housing and a shaft extending from the polymer housing. The impeller is connected to the shaft of the motor assembly and located substantially within the internal space. The rear grill has a central opening to interface with the connecting features of the polymer housing. Connection of the rear grill and the motor assembly is achieved absent the use of additional fasteners and/or additional components.
    Type: Application
    Filed: October 11, 2024
    Publication date: April 17, 2025
    Inventors: Thomas Hebling, Robert Pike, Neil Franciotti
  • Patent number: 12273375
    Abstract: A method for real-time detection of and protection from steganography in a kernel mode comprises detecting transmission of a file via a firewall, an operating system, or an e-mail system. A size of the file is determined. From a file system, a stored filesize of the file is retrieved. The determined size of the file is compared to the stored filesize of the file. Responsive to the determined size of the file being larger than the stored filesize of the file, steganography detection analytics are executed on the file. Responsive to the steganography detection analytics indicating presence of steganography in the file, a steganography remediation action is executed, and information is transmitted describing the steganography to a client device.
    Type: Grant
    Filed: December 28, 2022
    Date of Patent: April 8, 2025
    Assignee: Cyemptive Technologies, Inc.
    Inventors: Stewart P. MacLeod, Robert Pike
  • Publication number: 20240338440
    Abstract: A compliance monitor measures metrics regarding one or more managed devices in a network. The compliance monitor generates a log based on the information detected by the measurement trackers and to transmit a report based on the generated log to a recipient. The compliance monitor also initiates one or more security actions based on the one or more measurement trackers indicating that a measured metric exceeds an associated threshold measurement value.
    Type: Application
    Filed: June 17, 2024
    Publication date: October 10, 2024
    Inventors: Robert Pike, Gary Zelanko, Bryan Greene
  • Patent number: 12045345
    Abstract: A compliance monitor measures metrics regarding one or more managed devices in a network. The compliance monitor generates a log based on the information detected by the measurement trackers and to transmit a report based on the generated log to a recipient. The compliance monitor also initiates one or more security actions based on the one or more measurement trackers indicating that a measured metric exceeds an associated threshold measurement value.
    Type: Grant
    Filed: April 27, 2023
    Date of Patent: July 23, 2024
    Assignee: Cyemptive Technologies, Inc.
    Inventors: Robert Pike, Gary Zelanko, Bryan Greene
  • Patent number: 11985130
    Abstract: Intelligent methods of providing online security against hackers, which prevents the hackers from obtaining unauthorized access to secure resources. A first application session established between a first client and a first application of a first host device is detected. The first application is associated with a first plurality of security time limits. A duration of the first application session established between the first client and the first application is monitored. One or more first security actions are executed against the first application session responsive to the duration of the first application session reaching a security time limit of the first plurality of security time limits. One or more second security actions are executed against the first application session responsive to the duration of the first application session reaching another security time limit of the first plurality of security time limits.
    Type: Grant
    Filed: December 10, 2021
    Date of Patent: May 14, 2024
    Assignee: Cyemptive Technologies, Inc.
    Inventor: Robert Pike
  • Publication number: 20240054001
    Abstract: A verification operating system (VOS) is an intermediary operating system that verifies data of a primary operating system before the primary operating system controls of the computing device. When the computing device is initialized, initial boot processes load the VOS instead of the primary operating system. The VOS performs verification processes on data storing the primary operating system to verify that the primary operating system has not been manipulated or corrupted before passing control of the computing device to the primary operating system. A VOS also may be used to verify an operating system used by a virtual machine (VM). The VOS verifies data storing a VM operating system to be used for requested VMs. If the VOS verifies that the VM OS data is accurate, the VOS provides the VM OS data to a hypervisor for use in a VM.
    Type: Application
    Filed: August 11, 2023
    Publication date: February 15, 2024
    Inventors: Brian A. Jensen, Stewart P. MacLeod, Robert Pike
  • Publication number: 20240054224
    Abstract: A verification operating system (VOS) is an intermediary operating system that verifies data of a primary operating system before the primary operating system controls of the computing device. When the computing device is initialized, initial boot processes load the VOS instead of the primary operating system. The VOS performs verification processes on data storing the primary operating system to verify that the primary operating system has not been manipulated or corrupted before passing control of the computing device to the primary operating system. A VOS also may be used to verify an operating system used by a virtual machine (VM). The VOS verifies data storing a VM operating system to be used for requested VMs. If the VOS verifies that the VM OS data is accurate, the VOS provides the VM OS data to a hypervisor for use in a VM.
    Type: Application
    Filed: August 11, 2023
    Publication date: February 15, 2024
    Inventors: Brian A. Jensen, Stewart P. MacLeod, Robert Pike
  • Patent number: 11847212
    Abstract: A management system detects a change at the target device. The management system transmits a request message to authorization devices of the authorization users of the multi-user authorization pool to from the authorization users an indication of whether the detected change is approved. The management system receives a plurality of response messages from authorization devices of the multi-user authorization pool indicating whether the detected change is approved by the corresponding authorization user, and based on at least three of the plurality of response messages indicating a disapproval, that the detected change is disapproved. In response to the determination that the change is disapproved, an instruction message is sent to a target managed device to instruct the target managed device to rollback to an earlier state.
    Type: Grant
    Filed: June 16, 2022
    Date of Patent: December 19, 2023
    Assignee: Cyemptive Technologies, Inc.
    Inventors: Robert Pike, Gary Zelanko, Bryan Greene
  • Publication number: 20230351014
    Abstract: A management system detects a change at the target device. The management system transmits a request message to authorization devices of the authorization users of the multi-user authorization pool to from the authorization users an indication of whether the detected change is approved. The management system receives a plurality of response messages from authorization devices of the multi-user authorization pool indicating whether the detected change is approved by the corresponding authorization user, and based on at least three of the plurality of response messages indicating a disapproval, that the detected change is disapproved. In response to the determination that the change is disapproved, an instruction message is sent to a target managed device to instruct the target managed device to rollback to an earlier state.
    Type: Application
    Filed: July 11, 2023
    Publication date: November 2, 2023
    Inventors: Robert Pike, Gary Zelanko, Bryan Greene
  • Publication number: 20230267201
    Abstract: A compliance monitor measures metrics regarding one or more managed devices in a network. The compliance monitor generates a log based on the information detected by the measurement trackers and to transmit a report based on the generated log to a recipient. The compliance monitor also initiates one or more security actions based on the one or more measurement trackers indicating that a measured metric exceeds an associated threshold measurement value.
    Type: Application
    Filed: April 27, 2023
    Publication date: August 24, 2023
    Inventors: Robert Pike, Gary Zelanko, Bryan Greene
  • Publication number: 20230231872
    Abstract: A method for real-time detection of and protection from steganography in a kernel mode comprises detecting transmission of a file via a firewall, an operating system, or an e-mail system. A size of the file is determined. From a file system, a stored filesize of the file is retrieved. The determined size of the file is compared to the stored filesize of the file. Responsive to the determined size of the file being larger than the stored filesize of the file, steganography detection analytics are executed on the file. Responsive to the steganography detection analytics indicating presence of steganography in the file, a steganography remediation action is executed, and information is transmitted describing the steganography to a client device.
    Type: Application
    Filed: December 28, 2022
    Publication date: July 20, 2023
    Inventors: Stewart P. MacLeod, Robert Pike
  • Patent number: 11669616
    Abstract: A compliance monitor measures metrics regarding one or more managed devices in a network. The compliance monitor generates a log based on the information detected by the measurement trackers and to transmit a report based on the generated log to a recipient. The compliance monitor also initiates one or more security actions based on the one or more measurement trackers indicating that a measured metric exceeds an associated threshold measurement value.
    Type: Grant
    Filed: June 21, 2020
    Date of Patent: June 6, 2023
    Assignee: Cyemptive Technologies, Inc.
    Inventors: Robert Pike, Gary Zelanko, Bryan Greene
  • Publication number: 20230171256
    Abstract: A method of rolling security for a system that includes multiple server groups, such as a first server group of one or more servers and a second server group of one or more servers. The method includes repeatedly initiating rebuilding of the first server group of one or more servers. The method also includes repeatedly initiating rebuilding of the second server group of one or more servers. The rebuilding of the first server group of one or more servers is staggered in time from the rebuilding of the second server group of one or more servers. The servers may be physical servers or virtual machines. Rolling security may also be applied to software containers, computing devices within a data center, and computing devices outside of a datacenter.
    Type: Application
    Filed: January 12, 2023
    Publication date: June 1, 2023
    Inventor: Robert Pike
  • Patent number: 11599632
    Abstract: A management system detects a change at the target device. The management system transmits a request message to authorization devices of the authorization users of the multi-user authorization pool to from the authorization users an indication of whether the detected change is approved. The management system receives a plurality of response messages from authorization devices of the multi-user authorization pool indicating whether the detected change is approved by the corresponding authorization user, and based on at least three of the plurality of response messages indicating a disapproval, that the detected change is disapproved. In response to the determination that the change is disapproved, an instruction message is sent to a target managed device to instruct the target managed device to rollback to an earlier state.
    Type: Grant
    Filed: June 21, 2020
    Date of Patent: March 7, 2023
    Assignee: CYEMPTIVE TECHNOLOGIES, INC.
    Inventors: Robert Pike, Gary Zelanko, Bryan Greene
  • Patent number: 11601432
    Abstract: A method of rolling security for a system that includes multiple server groups, such as a first server group of one or more servers and a second server group of one or more servers. The method includes repeatedly initiating rebuilding of the first server group of one or more servers. The method also includes repeatedly initiating rebuilding of the second server group of one or more servers. The rebuilding of the first server group of one or more servers is staggered in time from the rebuilding of the second server group of one or more servers. The servers may be physical servers or virtual machines. Rolling security may also be applied to software containers, computing devices within a data center, and computing devices outside of a datacenter.
    Type: Grant
    Filed: March 5, 2021
    Date of Patent: March 7, 2023
    Assignee: Cyemptive Technologies, Inc.
    Inventor: Robert Pike
  • Patent number: 11575704
    Abstract: A method for real-time detection of and protection from steganography in a kernel mode comprises detecting transmission of a file via a firewall, an operating system, or an e-mail system. A size of the file is determined. From a file system, a stored filesize of the file is retrieved. The determined size of the file is compared to the stored filesize of the file. Responsive to the determined size of the file being larger than the stored filesize of the file, steganography detection analytics are executed on the file. Responsive to the steganography detection analytics indicating presence of steganography in the file, a steganography remediation action is executed, and information is transmitted describing the steganography to a client device.
    Type: Grant
    Filed: May 30, 2018
    Date of Patent: February 7, 2023
    Assignee: CYEMPTIVE TECHNOLOGIES, INC.
    Inventors: Stewart P. MacLeod, Robert Pike
  • Patent number: 11537711
    Abstract: A management system detects a change at the target device. The management system transmits a request message to authorization devices of the authorization users of the multi-user authorization pool to from the authorization users an indication of whether the detected change is approved. The management system receives a plurality of response messages from authorization devices of the multi-user authorization pool indicating whether the detected change is approved by the corresponding authorization user, and based on at least three of the plurality of response messages indicating a disapproval, that the detected change is disapproved. In response to the determination that the change is disapproved, an instruction message is sent to a target managed device to instruct the target managed device to rollback to an earlier state.
    Type: Grant
    Filed: June 21, 2020
    Date of Patent: December 27, 2022
    Assignee: CYEMPTIVE TECHNOLOGIES, INC.
    Inventors: Robert Pike, Gary Zelanko, Bryan Greene
  • Publication number: 20220309158
    Abstract: A management system detects a change at the target device. The management system transmits a request message to authorization devices of the authorization users of the multi-user authorization pool to from the authorization users an indication of whether the detected change is approved. The management system receives a plurality of response messages from authorization devices of the multi-user authorization pool indicating whether the detected change is approved by the corresponding authorization user, and based on at least three of the plurality of response messages indicating a disapproval, that the detected change is disapproved. In response to the determination that the change is disapproved, an instruction message is sent to a target managed device to instruct the target managed device to rollback to an earlier state.
    Type: Application
    Filed: June 16, 2022
    Publication date: September 29, 2022
    Inventors: Robert Pike, Gary Zelanko, Bryan Greene
  • Publication number: 20220103558
    Abstract: Intelligent methods of providing online security against hackers, which prevents the hackers from obtaining unauthorized access to secure resources. A first application session established between a first client and a first application of a first host device is detected. The first application is associated with a first plurality of security time limits. A duration of the first application session established between the first client and the first application is monitored. One or more first security actions are executed against the first application session responsive to the duration of the first application session reaching a security time limit of the first plurality of security time limits. One or more second security actions are executed against the first application session responsive to the duration of the first application session reaching another security time limit of the first plurality of security time limits.
    Type: Application
    Filed: December 10, 2021
    Publication date: March 31, 2022
    Inventor: Robert Pike