Patents by Inventor Sean Tiernan

Sean Tiernan has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 11902435
    Abstract: An access control server may store a private cryptographic key. The private cryptographic key corresponds to a public cryptographic key. The public cryptographic key is stored on a blockchain as part of an autonomous program protocol. The access control server may receive access control setting related to the autonomous program protocol. The access control server may receive a request for accessing the autonomous program protocol stored on the blockchain. The access control server may review the request. The access control server may determine the request is in compliance with the policies specified in the setting. The access control server may create, using the private cryptographic key, a digital signature for the request and generate a response including the digital signature. A successful verification of the digital signature using the public cryptographic key stored in the autonomous program protocol is required by the autonomous program protocol to process the request.
    Type: Grant
    Filed: November 9, 2022
    Date of Patent: February 13, 2024
    Assignee: CUBE Security Inc.
    Inventors: Attila Marosi-Bauer, Einaras von Gravrock, Sean Tiernan, Jonas Lekevicius
  • Publication number: 20240031146
    Abstract: An access control server may store a private cryptographic key. The private cryptographic key corresponds to a public cryptographic key. The public cryptographic key is stored on a blockchain as part of an autonomous program protocol. The access control server may receive access control setting related to the autonomous program protocol. The access control server may receive a request for accessing the autonomous program protocol stored on the blockchain. The access control server may review the request. The access control server may determine the request is in compliance with the policies specified in the setting. The access control server may create, using the private cryptographic key, a digital signature for the request and generate a response including the digital signature. A successful verification of the digital signature using the public cryptographic key stored in the autonomous program protocol is required by the autonomous program protocol to process the request.
    Type: Application
    Filed: November 9, 2022
    Publication date: January 25, 2024
    Inventors: Attila Marosi-Bauer, Einaras von Gravrock, Sean Tiernan, Jonas Lekevicius
  • Patent number: 11824891
    Abstract: A network apparatus maintains a data repository comprising network traffic data related to a plurality of user devices, the network traffic data being collected from a plurality of Network Service Providers (NSPs). A subset of the plurality of user devices are detected to be communicating with one or more same endpoint devices based on analysing the network traffic data. A number of historical connections between each user device of the subset of the plurality of user devices and the one or more endpoint devices is determined based on analysing historical connection data maintained in the data repository, and in response to detecting that the number of historical connections between the subset of the plurality of user devices and the one or more endpoint devices exceeds a predetermined threshold, the one or more endpoint devices are identified as a suspected botnet.
    Type: Grant
    Filed: February 15, 2021
    Date of Patent: November 21, 2023
    Assignee: Cujo LLC
    Inventors: Leonardas Marozas, Filip Savin, Matteo Cafasso, Santeri Kangas, Sean Tiernan
  • Publication number: 20220263861
    Abstract: A network apparatus maintains a data repository comprising network traffic data related to a plurality of user devices, the network traffic data being collected from a plurality of Network Service Providers (NSPs). A subset of the plurality of user devices are detected to be communicating with one or more same endpoint devices based on analysing the network traffic data. A number of historical connections between each user device of the subset of the plurality of user devices and the one or more endpoint devices is determined based on analysing historical connection data maintained in the data repository, and in response to detecting that the number of historical connections between the subset of the plurality of user devices and the one or more endpoint devices exceeds a predetermined threshold, the one or more endpoint devices are identified as a suspected botnet.
    Type: Application
    Filed: February 15, 2021
    Publication date: August 18, 2022
    Inventors: Leonardas Marozas, Filip Savin, Matteo Cafasso, Santeri Kangas, Sean Tiernan
  • Publication number: 20180007069
    Abstract: A cloud storage server-based approach allows detection of ransomware activity in cloud storage systems caused by ransomware infections on an endpoint device. A heuristic or rule-based technique is employed for recognizing sequences of file operations that may indicate ransomware activity. In some embodiments, users may be offered an opportunity to approve or disapprove of the possible ransomware activity. In others, cloud system file activity may be suspended or halted for the affected user upon recognition of possible ransomware actions. Enhanced recovery of files affected prior to recognition of the ransomware activity may be performed in some embodiments.
    Type: Application
    Filed: July 1, 2016
    Publication date: January 4, 2018
    Inventors: Simon Hunt, Sean Tiernan