Patents by Inventor Russell L. Couturier

Russell L. Couturier has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 11100046
    Abstract: A method, apparatus and computer program product for selectively storing network traffic data are described. Network traffic is stored according to a first packet filtering policy in a first repository. The stored network traffic is scanned in the first repository according to a second packet filtering policy to identify a subset of network traffic for archiving. The identified subset of network traffic identified by the second packet filtering policy are forensically interesting packets concerning a security issue. The identified subset of network traffic from the first repository is then stored in a second repository.
    Type: Grant
    Filed: January 25, 2016
    Date of Patent: August 24, 2021
    Assignee: International Business Machines Corporation
    Inventors: Russell L Couturier, Vijay Dheap, Derek T Lohnes, Ben A Wuest
  • Patent number: 10819730
    Abstract: A method for analyzing past user sessions for malicious intent. A security incident is detected by a computer system. Responsive to detecting the security incident, a forensic investigation is triggered by the computer system using a set of security rules for detecting website vulnerability in which the set of security rules is applied to a set of past user sessions, wherein the set of security rules is for a dynamic analysis product.
    Type: Grant
    Filed: December 5, 2017
    Date of Patent: October 27, 2020
    Assignee: International Business Machines Corporation
    Inventors: Russell L. Couturier, Michael Hanner, Iosif V. Onut, Ronald B. Williams
  • Publication number: 20190173908
    Abstract: A method for analyzing past user sessions for malicious intent. A security incident is detected by a computer system. Responsive to detecting the security incident, a forensic investigation is triggered by the computer system using a set of security rules for detecting website vulnerability in which the set of security rules is applied to a set of past user sessions, wherein the set of security rules is for a dynamic analysis product.
    Type: Application
    Filed: December 5, 2017
    Publication date: June 6, 2019
    Inventors: Russell L. Couturier, Michael Hanner, Iosif V. Onut, Ronald B. Williams
  • Patent number: 8830840
    Abstract: Methods, systems, devices and computer program code products for enabling searches of digital communications network traffic to identify information transmitted by, received by, or exchanged with a given human or non-human entity, include, or include elements for, translating Pcap files or streams of IP network packets obtained from the network into a scalable form suitable for query by search engine functionality, thereby to enable scalable, text-based search of network information contained in the Pcap files, and providing scalable search engine functionality to enable a user to execute text-based searches on textual or human relationship-identifying information derived from the Pcap files or streams of IP network packets, thereby to identify information transmitted by, received by, or exchanged with the given human or non-human entity, wherein the scalable search engine functionality is capable of scaling to search massive quantities of Pcap file or IP network packet data.
    Type: Grant
    Filed: March 18, 2013
    Date of Patent: September 9, 2014
    Assignee: Gamba Acquisition Company
    Inventors: Russell L. Couturier, Patrick V. Johnstone, John H. Ricketson
  • Patent number: 8406141
    Abstract: Methods, systems, devices and computer program code products for enabling searches of digital communications network traffic to identify information transmitted by, received by, or exchanged with a given human or non-human entity, include, or include elements for, translating Pcap files or streams of IP network packets obtained from the network into a scalable form suitable for query by search engine functionality, thereby to enable scalable, text-based search of network information contained in the Pcap files, and providing scalable search engine functionality to enable a user to execute text-based searches on textual or human relationship-identifying information derived from the Pcap files or streams of IP network packets, thereby to identify information transmitted by, received by, or exchanged with the given human or non-human entity, wherein the scalable search engine functionality is capable of scaling to search massive quantities of Pcap file or IP network packet data.
    Type: Grant
    Filed: May 11, 2010
    Date of Patent: March 26, 2013
    Assignee: Cybertap, LLC
    Inventors: Russell L. Couturier, Patrick V. Johnstone, John H. Ricketson
  • Patent number: 7620989
    Abstract: Network vulnerability testing methods, systems, devices, appliances and software products generate stateful and stateless network representative of network threats. The traffic is applied to a network or device under test, thereby to test the vulnerability of the network or device to threats. A graphical user interface, which does not require a programming or scripting language can be used to generate an intermediate descriptive format that can in turn be used to generate stateful or stateless threat signatures. By using the intermediate descriptive form, threats can be generated under the control of the graphical user interface and in accordance with stored threat signatures, without the need for a programming or scripting language.
    Type: Grant
    Filed: February 18, 2005
    Date of Patent: November 17, 2009
    Assignee: Spirent Communications Inc.
    Inventors: Russell L. Couturier, Dinkar Chivaluri
  • Patent number: 7111204
    Abstract: A protocol sleuthing system according to the present invention for load testing a network server includes a computer configured to interconnect with the network server, a protocol engine stored in and implemented by the computer and operative to generate a plurality of synthetic users, to generate a synthetic transaction in accordance with a specified protocol, and to cause each of the plurality of synthetic users to sequentially implement a plurality of the synthetic transactions with the network sever for load testing thereof, a configuration file connected to the protocol engine that includes variables required to generate the synthetic transaction, information that defines the behavior of the plurality of synthetic users implementing the synthetic transaction, and information that defines the number of synthetic users to be created by the protocol engine, and a module that is operative to monitor each of the plurality of synthetic transactions implemented by each of the plurality of synthetic users with t
    Type: Grant
    Filed: August 1, 2002
    Date of Patent: September 19, 2006
    Assignee: Agilent Technologies, Inc.
    Inventors: Russell L. Couturier, Patrick V. Johnstone