Patents by Inventor Ruben Torres

Ruben Torres has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 11532002
    Abstract: A blockchain platform is provided for creating original non-fungible tokens (NFTs) and prints of the original NFTs. The platform creates a market for purchasing and selling prints of the original NFTs. The purchase price and the sale price for a print is determined based on a bonding curve and a total supply of the prints of the original NFT. The platform may also generate content (e.g., artwork and/or music) associated with the original NFTs. The content may be generated from logic that is stored on the blockchain.
    Type: Grant
    Filed: May 28, 2021
    Date of Patent: December 20, 2022
    Assignee: CONSENSYS SOFTWARE INC.
    Inventors: Kishore Atreya, Connor Keenan, Ricardo Stuven, Ruben Torres, Samir Mehta
  • Publication number: 20220383351
    Abstract: A blockchain platform is provided for creating original non-fungible tokens (NFTs) and prints of the original NFTs. The platform creates a market for purchasing and selling prints of the original NFTs. The purchase price and the sale price for a print is determined based on a bonding curve and a total supply of the prints of the original NFT. The platform may also generate content (e.g., artwork and/or music) associated with the original NFTs. The content may be generated from logic that is stored on the blockchain.
    Type: Application
    Filed: May 28, 2021
    Publication date: December 1, 2022
    Inventors: Kishore Atreya, Connor Keenan, Ricardo Stuven, Ruben Torres, Samir Mehta
  • Patent number: 11057289
    Abstract: A method for identifying a network application. The method includes analyzing metadata and source code of a network application to extract a set of application tokens, generating an index document of the network application based on the set of application code tokens, wherein the index document is included in a library of index documents corresponding to a number of network applications, extracting a set of packet header tokens from a packet header of a packet in a flow, comparing the set of packet header tokens to the set of index documents to generate a number of match scores, wherein each match score represents a similarity measure between the set of packet header tokens and one index document, and determining, based on a highest match score corresponding to a particular network application, that the flow is generated by the particular network application.
    Type: Grant
    Filed: December 26, 2017
    Date of Patent: July 6, 2021
    Assignee: The Boeing Company
    Inventors: Gyan Ranjan, Alok Tongaonkar, Ruben Torres
  • Publication number: 20180254968
    Abstract: A method for identifying a network application. The method includes analyzing metadata and source code of a network application to extract a set of application tokens, generating an index document of the network application based on the set of application code tokens, wherein the index document is included in a library of index documents corresponding to a number of network applications, extracting a set of packet header tokens from a packet header of a packet in a flow, comparing the set of packet header tokens to the set of index documents to generate a number of match scores, wherein each match score represents a similarity measure between the set of packet header tokens and one index document, and determining, based on a highest match score corresponding to a particular network application, that the flow is generated by the particular network application.
    Type: Application
    Filed: December 26, 2017
    Publication date: September 6, 2018
    Applicant: Narus, Inc.
    Inventors: Gyan Ranjan, Alok Tongaonkar, Ruben Torres
  • Patent number: 10050982
    Abstract: The disclosed computer-implemented method for reverse-engineering malware protocols may include (1) decrypting encrypted network traffic generated by a malware program, (2) identifying at least one message type field in the decrypted network traffic, (3) identifying at least one message in the decrypted network traffic with the identified message type, and (4) inferring at least a portion of a protocol used by the malware program by analyzing the identified message to identify a field type for at least one data field of the identified message of the identified message type. Various other methods, systems, and computer-readable media are also disclosed.
    Type: Grant
    Filed: May 19, 2016
    Date of Patent: August 14, 2018
    Assignee: Symantec Corporation
    Inventors: Ruben Torres Guerra, Gaspar Modelo-Howard, Alok Tongaonkar, Lorenzo De Carli, Somesh Jha
  • Patent number: 9912680
    Abstract: A method for detecting malicious HTTP redirections. The method includes obtaining, based on a single client IP address, HTTP flows triggered by visiting a website, extracting a sequence of URLs where a downstream URL is extracted from a child HTTP request that is triggered by a parent HTTP request containing an immediate upstream URL, analyzing the URL sequence to generate a statistical feature, and classifying, based on the statistical feature, the HTTP flows as containing at least one malicious HTTP redirection triggered by visiting the website.
    Type: Grant
    Filed: December 2, 2016
    Date of Patent: March 6, 2018
    Assignee: Narus, Inc.
    Inventors: Ruben Torres, Hesham Mekky, Zhi-Li Zhang, Sabyasachi Saha, Antonio Nucci
  • Patent number: 9853876
    Abstract: A method for identifying a network application. The method includes analyzing metadata and source code of a network application to extract a set of application tokens, generating an index document of the network application based on the set of application code tokens, wherein the index document is included in a library of index documents corresponding to a number of network applications, extracting a set of packet header tokens from a packet header of a packet in a flow, comparing the set of packet header tokens to the set of index documents to generate a number of match scores, wherein each match score represents a similarity measure between the set of packet header tokens and one index document, and determining, based on a highest match score corresponding to a particular network application, that the flow is generated by the particular network application.
    Type: Grant
    Filed: June 13, 2014
    Date of Patent: December 26, 2017
    Assignee: Narus, Inc.
    Inventors: Gyan Ranjan, Alok Tongaonkar, Ruben Torres
  • Publication number: 20170085583
    Abstract: A method for detecting malicious HTTP redirections. The method includes obtaining, based on a single client IP address, HTTP flows triggered by visiting a website, extracting a sequence of URLs where a downstream URL is extracted from a child HTTP request that is triggered by a parent HTTP request containing an immediate upstream URL, analyzing the URL sequence to generate a statistical feature, and classifying, based on the statistical feature, the HTTP flows as containing at least one malicious HTTP redirection triggered by visiting the website.
    Type: Application
    Filed: December 2, 2016
    Publication date: March 23, 2017
    Applicant: Narus, Inc.
    Inventors: Ruben Torres, Hesham Mekky, Zhi-Li Zhang, Sabyasachi Saha, Antonio Nucci
  • Patent number: 9531736
    Abstract: A method for detecting malicious HTTP redirections. The method includes obtaining, based on a single client IP address, HTTP flows triggered by visiting a website, extracting a sequence of URLs where a downstream URL is extracted from a child HTTP request that is triggered by a parent HTTP request containing an immediate upstream URL, analyzing the URL sequence to generate a statistical feature, and classifying, based on the statistical feature, the HTTP flows as containing at least one malicious HTTP redirection triggered by visiting the website.
    Type: Grant
    Filed: December 24, 2012
    Date of Patent: December 27, 2016
    Assignee: Narus, Inc.
    Inventors: Ruben Torres, Hesham Mekky, Zhi-Li Zhang, Sabyasachi Saha, Antonio Nucci
  • Publication number: 20160173667
    Abstract: A mobile phone mounting kit. The mobile phone mounting kit may comprise: a case, magnetic mounting platform, vehicle mounting arm, and air vent clips. The magnetic mounting platform may attach to a first end of the vehicle mounting arm, and the second end of the vehicle mounting arm may comprises a suction cup for attaching onto a surface. The magnetic mounting platform may comprises a magnet. The case may be configured to house a mobile phone and comprises one or more metal plates for attaching and securing to the magnet of the magnetic mounting platform. The case may comprises: a charging port, wires, charging contacts; and metal plates. The charging contacts may electrically communicate with a battery of the mobile phone. The charging port may mate and engage a connector of a power cable for charging the mobile phone by transferring an electrical current from the charging port to the charging contacts via the wires.
    Type: Application
    Filed: December 11, 2014
    Publication date: June 16, 2016
    Inventors: Bernardino Ruben Torres Gutierrez, Juan Carlos Morales Lopez
  • Patent number: 9245121
    Abstract: A method for detecting a malicious node in a network. The method includes obtaining a plurality of failed domain name service (DNS) queries from the network, wherein each of the plurality of failed DNS queries is initiated from a client node of the network and comprises an effective second-level domain (eSLD) name, generating, by a computer processor and using a pre-determined clustering algorithm, a cluster from a plurality of eSLD names comprising the eSLD name of each of the plurality of failed DNS queries, wherein the cluster comprises a portion of the plurality of eSLD names that is selected based on the pre-determined clustering algorithm, determining, by the computer processor and using a pre-determined formula, a score representing statistical characteristics of the cluster, and assigning, in response to the score meeting a pre-determined criterion, a malicious status to the client node.
    Type: Grant
    Filed: August 9, 2013
    Date of Patent: January 26, 2016
    Assignee: Narus, Inc.
    Inventors: Pengkui Luo, Ruben Torres, Zhi-Li Zhang, Sabyasachi Saha, Sung-Ju Lee, Antonio Nucci
  • Patent number: 8959643
    Abstract: A method for detecting a malicious activity in a network. The method includes obtaining file download flows from the network, analyzing, the file download flows to generate malicious indications using a pre-determined malicious behavior detection algorithm, extracting a file download attribute from a suspicious file download flow of a malicious indication, wherein the file download attribute represents one or more of the URL, the FQDN, the top-level domain name, the URL path, the URL file name, and the payload of the suspicious file download flow, determining the file download attribute as being shared by at least two suspicious file download flows, identifying related suspicious file download flows and determining a level of association between based at least on the file download attribute, computing a malicious score of the suspicious file download flow based on the level of association, and presenting the malicious score to an analyst user of the network.
    Type: Grant
    Filed: August 9, 2013
    Date of Patent: February 17, 2015
    Assignee: Narus, Inc.
    Inventors: Luca Invernizzi, Stanislav Miskovic, Ruben Torres, Sabyasachi Saha, Christopher Kruegel, Antonio Nucci, Sung-Ju Lee, Giovanni Vigna
  • Patent number: 8813236
    Abstract: A method for detecting hidden malicious network nodes. Starting from a pool of seed nodes that have previously been identified as malicious, a two-phase score propagation algorithm is employed to propagate threat scores from the seeded nodes to other nodes in an IP-address connectivity graph. Nodes with high threat score after propagation are declared to be malicious.
    Type: Grant
    Filed: January 7, 2013
    Date of Patent: August 19, 2014
    Assignee: Narus, Inc.
    Inventors: Sabyasachi Saha, Lei Liu, Ruben Torres, Jianpeng Xu, Antonio Nucci
  • Patent number: 8578024
    Abstract: A method for profiling network traffic of a network, including defining a set of features each corresponding to a set of pre-determined bit positions for selecting a pre-determined number of data bits from each flow in a flow set generated by a network application to form a feature value assigned to the feature for the each flow, identifying the feature as a deterministic feature based on a frequency of occurrence of the feature value, extracting a set of paths from the flow set based on a number of deterministic features, generating a state machine based on the set of paths, and analyzing a new flow associated with a server in the network to determine the server as executing the network application.
    Type: Grant
    Filed: January 5, 2012
    Date of Patent: November 5, 2013
    Assignee: Narus, Inc.
    Inventors: Ram Keralapura, Ruben Torres, Marios Iliofotou, Alok Tongaonkar, Antonio Nucci
  • Patent number: 5308040
    Abstract: A fluid flow regulating valve adapted to prevent the operation of the valve from violent pressure change, namely the hydraulic ram effect, in the fluid, particularly during closing and opening of the valve, the valve comprising a casing that houses a regulating plate slidably mounted within the casing. The plate has a regulating orifice having a variable fluid pass section which decreases from an end to another end of the orifice. The orifice is adapted to be aligned, through its different sections, with inlet and outlet ports provided in the casing, whereby the inlet and outlet ports communicate to each other through the orifice and the fluid flow can be regulated by those different sections of the orifice.
    Type: Grant
    Filed: November 6, 1992
    Date of Patent: May 3, 1994
    Inventor: Nestor/Ruben Torres