Patents by Inventor Robert Pike

Robert Pike has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20240338440
    Abstract: A compliance monitor measures metrics regarding one or more managed devices in a network. The compliance monitor generates a log based on the information detected by the measurement trackers and to transmit a report based on the generated log to a recipient. The compliance monitor also initiates one or more security actions based on the one or more measurement trackers indicating that a measured metric exceeds an associated threshold measurement value.
    Type: Application
    Filed: June 17, 2024
    Publication date: October 10, 2024
    Inventors: Robert Pike, Gary Zelanko, Bryan Greene
  • Patent number: 12045345
    Abstract: A compliance monitor measures metrics regarding one or more managed devices in a network. The compliance monitor generates a log based on the information detected by the measurement trackers and to transmit a report based on the generated log to a recipient. The compliance monitor also initiates one or more security actions based on the one or more measurement trackers indicating that a measured metric exceeds an associated threshold measurement value.
    Type: Grant
    Filed: April 27, 2023
    Date of Patent: July 23, 2024
    Assignee: Cyemptive Technologies, Inc.
    Inventors: Robert Pike, Gary Zelanko, Bryan Greene
  • Patent number: 11985130
    Abstract: Intelligent methods of providing online security against hackers, which prevents the hackers from obtaining unauthorized access to secure resources. A first application session established between a first client and a first application of a first host device is detected. The first application is associated with a first plurality of security time limits. A duration of the first application session established between the first client and the first application is monitored. One or more first security actions are executed against the first application session responsive to the duration of the first application session reaching a security time limit of the first plurality of security time limits. One or more second security actions are executed against the first application session responsive to the duration of the first application session reaching another security time limit of the first plurality of security time limits.
    Type: Grant
    Filed: December 10, 2021
    Date of Patent: May 14, 2024
    Assignee: Cyemptive Technologies, Inc.
    Inventor: Robert Pike
  • Publication number: 20240054224
    Abstract: A verification operating system (VOS) is an intermediary operating system that verifies data of a primary operating system before the primary operating system controls of the computing device. When the computing device is initialized, initial boot processes load the VOS instead of the primary operating system. The VOS performs verification processes on data storing the primary operating system to verify that the primary operating system has not been manipulated or corrupted before passing control of the computing device to the primary operating system. A VOS also may be used to verify an operating system used by a virtual machine (VM). The VOS verifies data storing a VM operating system to be used for requested VMs. If the VOS verifies that the VM OS data is accurate, the VOS provides the VM OS data to a hypervisor for use in a VM.
    Type: Application
    Filed: August 11, 2023
    Publication date: February 15, 2024
    Inventors: Brian A. Jensen, Stewart P. MacLeod, Robert Pike
  • Publication number: 20240054001
    Abstract: A verification operating system (VOS) is an intermediary operating system that verifies data of a primary operating system before the primary operating system controls of the computing device. When the computing device is initialized, initial boot processes load the VOS instead of the primary operating system. The VOS performs verification processes on data storing the primary operating system to verify that the primary operating system has not been manipulated or corrupted before passing control of the computing device to the primary operating system. A VOS also may be used to verify an operating system used by a virtual machine (VM). The VOS verifies data storing a VM operating system to be used for requested VMs. If the VOS verifies that the VM OS data is accurate, the VOS provides the VM OS data to a hypervisor for use in a VM.
    Type: Application
    Filed: August 11, 2023
    Publication date: February 15, 2024
    Inventors: Brian A. Jensen, Stewart P. MacLeod, Robert Pike
  • Patent number: 11847212
    Abstract: A management system detects a change at the target device. The management system transmits a request message to authorization devices of the authorization users of the multi-user authorization pool to from the authorization users an indication of whether the detected change is approved. The management system receives a plurality of response messages from authorization devices of the multi-user authorization pool indicating whether the detected change is approved by the corresponding authorization user, and based on at least three of the plurality of response messages indicating a disapproval, that the detected change is disapproved. In response to the determination that the change is disapproved, an instruction message is sent to a target managed device to instruct the target managed device to rollback to an earlier state.
    Type: Grant
    Filed: June 16, 2022
    Date of Patent: December 19, 2023
    Assignee: Cyemptive Technologies, Inc.
    Inventors: Robert Pike, Gary Zelanko, Bryan Greene
  • Publication number: 20230351014
    Abstract: A management system detects a change at the target device. The management system transmits a request message to authorization devices of the authorization users of the multi-user authorization pool to from the authorization users an indication of whether the detected change is approved. The management system receives a plurality of response messages from authorization devices of the multi-user authorization pool indicating whether the detected change is approved by the corresponding authorization user, and based on at least three of the plurality of response messages indicating a disapproval, that the detected change is disapproved. In response to the determination that the change is disapproved, an instruction message is sent to a target managed device to instruct the target managed device to rollback to an earlier state.
    Type: Application
    Filed: July 11, 2023
    Publication date: November 2, 2023
    Inventors: Robert Pike, Gary Zelanko, Bryan Greene
  • Publication number: 20230267201
    Abstract: A compliance monitor measures metrics regarding one or more managed devices in a network. The compliance monitor generates a log based on the information detected by the measurement trackers and to transmit a report based on the generated log to a recipient. The compliance monitor also initiates one or more security actions based on the one or more measurement trackers indicating that a measured metric exceeds an associated threshold measurement value.
    Type: Application
    Filed: April 27, 2023
    Publication date: August 24, 2023
    Inventors: Robert Pike, Gary Zelanko, Bryan Greene
  • Publication number: 20230231872
    Abstract: A method for real-time detection of and protection from steganography in a kernel mode comprises detecting transmission of a file via a firewall, an operating system, or an e-mail system. A size of the file is determined. From a file system, a stored filesize of the file is retrieved. The determined size of the file is compared to the stored filesize of the file. Responsive to the determined size of the file being larger than the stored filesize of the file, steganography detection analytics are executed on the file. Responsive to the steganography detection analytics indicating presence of steganography in the file, a steganography remediation action is executed, and information is transmitted describing the steganography to a client device.
    Type: Application
    Filed: December 28, 2022
    Publication date: July 20, 2023
    Inventors: Stewart P. MacLeod, Robert Pike
  • Patent number: 11669616
    Abstract: A compliance monitor measures metrics regarding one or more managed devices in a network. The compliance monitor generates a log based on the information detected by the measurement trackers and to transmit a report based on the generated log to a recipient. The compliance monitor also initiates one or more security actions based on the one or more measurement trackers indicating that a measured metric exceeds an associated threshold measurement value.
    Type: Grant
    Filed: June 21, 2020
    Date of Patent: June 6, 2023
    Assignee: Cyemptive Technologies, Inc.
    Inventors: Robert Pike, Gary Zelanko, Bryan Greene
  • Publication number: 20230171256
    Abstract: A method of rolling security for a system that includes multiple server groups, such as a first server group of one or more servers and a second server group of one or more servers. The method includes repeatedly initiating rebuilding of the first server group of one or more servers. The method also includes repeatedly initiating rebuilding of the second server group of one or more servers. The rebuilding of the first server group of one or more servers is staggered in time from the rebuilding of the second server group of one or more servers. The servers may be physical servers or virtual machines. Rolling security may also be applied to software containers, computing devices within a data center, and computing devices outside of a datacenter.
    Type: Application
    Filed: January 12, 2023
    Publication date: June 1, 2023
    Inventor: Robert Pike
  • Patent number: 11601432
    Abstract: A method of rolling security for a system that includes multiple server groups, such as a first server group of one or more servers and a second server group of one or more servers. The method includes repeatedly initiating rebuilding of the first server group of one or more servers. The method also includes repeatedly initiating rebuilding of the second server group of one or more servers. The rebuilding of the first server group of one or more servers is staggered in time from the rebuilding of the second server group of one or more servers. The servers may be physical servers or virtual machines. Rolling security may also be applied to software containers, computing devices within a data center, and computing devices outside of a datacenter.
    Type: Grant
    Filed: March 5, 2021
    Date of Patent: March 7, 2023
    Assignee: Cyemptive Technologies, Inc.
    Inventor: Robert Pike
  • Patent number: 11599632
    Abstract: A management system detects a change at the target device. The management system transmits a request message to authorization devices of the authorization users of the multi-user authorization pool to from the authorization users an indication of whether the detected change is approved. The management system receives a plurality of response messages from authorization devices of the multi-user authorization pool indicating whether the detected change is approved by the corresponding authorization user, and based on at least three of the plurality of response messages indicating a disapproval, that the detected change is disapproved. In response to the determination that the change is disapproved, an instruction message is sent to a target managed device to instruct the target managed device to rollback to an earlier state.
    Type: Grant
    Filed: June 21, 2020
    Date of Patent: March 7, 2023
    Assignee: CYEMPTIVE TECHNOLOGIES, INC.
    Inventors: Robert Pike, Gary Zelanko, Bryan Greene
  • Patent number: 11575704
    Abstract: A method for real-time detection of and protection from steganography in a kernel mode comprises detecting transmission of a file via a firewall, an operating system, or an e-mail system. A size of the file is determined. From a file system, a stored filesize of the file is retrieved. The determined size of the file is compared to the stored filesize of the file. Responsive to the determined size of the file being larger than the stored filesize of the file, steganography detection analytics are executed on the file. Responsive to the steganography detection analytics indicating presence of steganography in the file, a steganography remediation action is executed, and information is transmitted describing the steganography to a client device.
    Type: Grant
    Filed: May 30, 2018
    Date of Patent: February 7, 2023
    Assignee: CYEMPTIVE TECHNOLOGIES, INC.
    Inventors: Stewart P. MacLeod, Robert Pike
  • Patent number: 11537711
    Abstract: A management system detects a change at the target device. The management system transmits a request message to authorization devices of the authorization users of the multi-user authorization pool to from the authorization users an indication of whether the detected change is approved. The management system receives a plurality of response messages from authorization devices of the multi-user authorization pool indicating whether the detected change is approved by the corresponding authorization user, and based on at least three of the plurality of response messages indicating a disapproval, that the detected change is disapproved. In response to the determination that the change is disapproved, an instruction message is sent to a target managed device to instruct the target managed device to rollback to an earlier state.
    Type: Grant
    Filed: June 21, 2020
    Date of Patent: December 27, 2022
    Assignee: CYEMPTIVE TECHNOLOGIES, INC.
    Inventors: Robert Pike, Gary Zelanko, Bryan Greene
  • Publication number: 20220309158
    Abstract: A management system detects a change at the target device. The management system transmits a request message to authorization devices of the authorization users of the multi-user authorization pool to from the authorization users an indication of whether the detected change is approved. The management system receives a plurality of response messages from authorization devices of the multi-user authorization pool indicating whether the detected change is approved by the corresponding authorization user, and based on at least three of the plurality of response messages indicating a disapproval, that the detected change is disapproved. In response to the determination that the change is disapproved, an instruction message is sent to a target managed device to instruct the target managed device to rollback to an earlier state.
    Type: Application
    Filed: June 16, 2022
    Publication date: September 29, 2022
    Inventors: Robert Pike, Gary Zelanko, Bryan Greene
  • Publication number: 20220103558
    Abstract: Intelligent methods of providing online security against hackers, which prevents the hackers from obtaining unauthorized access to secure resources. A first application session established between a first client and a first application of a first host device is detected. The first application is associated with a first plurality of security time limits. A duration of the first application session established between the first client and the first application is monitored. One or more first security actions are executed against the first application session responsive to the duration of the first application session reaching a security time limit of the first plurality of security time limits. One or more second security actions are executed against the first application session responsive to the duration of the first application session reaching another security time limit of the first plurality of security time limits.
    Type: Application
    Filed: December 10, 2021
    Publication date: March 31, 2022
    Inventor: Robert Pike
  • Patent number: 11228593
    Abstract: Intelligent methods of providing online security against hackers, which prevents the hackers from obtaining unauthorized access to secure resources. A first application session established between a first client and a first application of a first host device is detected. The first application is associated with a first plurality of security time limits. A duration of the first application session established between the first client and the first application is monitored. One or more first security actions are executed against the first application session responsive to the duration of the first application session reaching a security time limit of the first plurality of security time limits. One or more second security actions are executed against the first application session responsive to the duration of the first application session reaching another security time limit of the first plurality of security time limits.
    Type: Grant
    Filed: May 20, 2019
    Date of Patent: January 18, 2022
    Assignee: CYEMPTIVE TECHNOLOGIES, INC.
    Inventor: Robert Pike
  • Patent number: 11082444
    Abstract: A method for real-time detection of malware in a Kernel mode includes detecting a file operation request initiated by a process running in user mode. Malware detection analytics is performed on a file buffer associated with the detected file operation request to detect behavior indicating presence of malware. Responsive to detecting the behavior indicating the presence of the malware, the process responsible for initiating the detected file operation request is identified. A search for the identified process is performed on one or more of a blacklist of programs and a whitelist of programs to determine whether the identified process is a trusted process. Responsive to determining that the identified process is not a trusted process, a malware remediation action is executed against the identified process. Information describing the malware is transmitted to a client device.
    Type: Grant
    Filed: May 30, 2018
    Date of Patent: August 3, 2021
    Assignee: CYEMPTIVE TECHNOLOGIES, INC.
    Inventors: Stewart P. MacLeod, Robert Pike
  • Publication number: 20210194880
    Abstract: A method of rolling security for a system that includes multiple server groups, such as a first server group of one or more servers and a second server group of one or more servers. The method includes repeatedly initiating rebuilding of the first server group of one or more servers. The method also includes repeatedly initiating rebuilding of the second server group of one or more servers. The rebuilding of the first server group of one or more servers is staggered in time from the rebuilding of the second server group of one or more servers. The servers may be physical servers or virtual machines. Rolling security may also be applied to software containers, computing devices within a data center, and computing devices outside of a datacenter.
    Type: Application
    Filed: March 5, 2021
    Publication date: June 24, 2021
    Inventor: Robert Pike