Patents by Inventor Stephen C. Will

Stephen C. Will has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 12231467
    Abstract: A server system in communication with a plurality of machines that form a linear communication orbit establishes a direct duplex connection between the server system and a first endpoint machine. The server system enrolls the first endpoint machine as a satellite endpoint machine, which enables the satellite endpoint machine to execute one or more function modules. Typically, the server system authenticates, via the direct duplex connection, the first endpoint machine, and, after authenticating the first endpoint machine, sends, to the first endpoint machine, an instruction for executing a function module. The server system receives a report including information obtained by the first endpoint machine executing the function module. At least one of the establishing a direct duplex connection, sending the instruction, and receiving the report includes sending or receiving a communication between the first endpoint machine and the server system via the linear communication orbit.
    Type: Grant
    Filed: July 1, 2022
    Date of Patent: February 18, 2025
    Assignee: Tanium Inc.
    Inventors: Stephen C. Will, Casey J. Watson, Bryan J. Blanchard, Ryan C. Catherman, Yasmine Hal, Clifford J. Mather
  • Patent number: 11171982
    Abstract: Optimizing ingestion of security structured data into a graph database for security analytics is provided. A plurality of streams of information is received from a plurality of security information sources. Respective subsets of information are ingested from each of the plurality of security information sources to generate small subgraphs of security information. Each of the small subgraphs comply to a schema used by a master knowledge graph. A batch process is performed to ingest a plurality of small subgraphs into the master knowledge graph.
    Type: Grant
    Filed: June 22, 2018
    Date of Patent: November 9, 2021
    Assignee: International Business Machines Corporation
    Inventors: Sulakshan Vajipayajula, Stephen C. Will, Dhilung Hang Kirat, Kaushal K. Kapadia, Anne Tilstra
  • Patent number: 11050773
    Abstract: Prioritizing security incidents for analysis is provided. A set of security information and event management data corresponding to each of a set of security incidents is retrieved. A source weight of a security incident and a magnitude of the security incident are used to determine a priority of the security incident within the set of security incidents. A local analysis of the security incident is performed based on the retrieved set of security information and event management data corresponding to the security incident and the determined priority of the security incident.
    Type: Grant
    Filed: January 3, 2019
    Date of Patent: June 29, 2021
    Assignee: International Business Machines Corporation
    Inventors: Stephen C. Will, Kevin Tabb, Ilgen B. Yuceer, Sulakshan Vajipayajula, Kaushal K. Kapadia
  • Publication number: 20200220885
    Abstract: Prioritizing security incidents for analysis is provided. A set of security information and event management data corresponding to each of a set of security incidents is retrieved. A source weight of a security incident and a magnitude of the security incident are used to determine a priority of the security incident within the set of security incidents. A local analysis of the security incident is performed based on the retrieved set of security information and event management data corresponding to the security incident and the determined priority of the security incident.
    Type: Application
    Filed: January 3, 2019
    Publication date: July 9, 2020
    Inventors: Stephen C. Will, Kevin Tabb, Ilgen B. Yuceer, Sulakshan Vajipayajula, Kaushal K. Kapadia
  • Publication number: 20190394225
    Abstract: Optimizing ingestion of security structured data into a graph database for security analytics is provided. A plurality of streams of information is received from a plurality of security information sources. Respective subsets of information are ingested from each of the plurality of security information sources to generate small subgraphs of security information. Each of the small subgraphs comply to a schema used by a master knowledge graph. A batch process is performed to ingest a plurality of small subgraphs into the master knowledge graph.
    Type: Application
    Filed: June 22, 2018
    Publication date: December 26, 2019
    Inventors: Sulakshan Vajipayajula, Stephen C. Will, Dhilung Hang Kirat, Kaushal K. Kapadia, Anne Tilstra