Patents by Inventor Thomas Higgins

Thomas Higgins has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 11916771
    Abstract: Embodiments are directed monitoring network traffic using network monitoring computers. Metrics may be determined based on monitoring network traffic associated with entities in the network such that the metrics may be included in profiles associated each entity. The profiles may be compared with other profiles in a context database based on the metrics included in each profile and each other profile. In response to the profiles being unmatched by other profiles one or more active probes may be performed to collect other metrics that may be used to update profiles. In response to the one or more profiles being matched by the other profiles in the context database, a timestamp associated with the other profiles may be updated to a current time value. Reports that include information associated with the entities and the profiles or the updated profiles may be generated.
    Type: Grant
    Filed: April 4, 2022
    Date of Patent: February 27, 2024
    Assignee: ExtraHop Networks, Inc.
    Inventors: Jesse Abraham Rothstein, Benjamin Thomas Higgins, Michael Kerber Krause Montague, Kevin Michael Seguin
  • Patent number: 11706233
    Abstract: Embodiments are directed to monitoring network traffic using network monitoring computers (NMCs). NMCs may determine requests provided to a server based on a first portion of network traffic. NMCs may determine suspicious requests based on characteristics of the provided requests. NMCs may employ the characteristics of the suspicious requests to provide correlation information that is associated with the suspicious requests. NMCs may determine dependent actions associated with the server based on a second portion of the network traffic and the correlation information. And, in response to determining anomalous activity associated with the evaluation of the dependent actions, NMCs may provide reports associated with the anomalous activity.
    Type: Grant
    Filed: March 26, 2021
    Date of Patent: July 18, 2023
    Assignee: ExtraHop Networks, Inc.
    Inventors: Benjamin Thomas Higgins, Jesse Abraham Rothstein, Xue Jun Wu, Michael Kerber Krause Montague, Kevin Michael Seguin
  • Patent number: 11665207
    Abstract: Embodiments are directed to monitoring communication between computers using network monitoring computers (NMCs). NMCs identify a secure communication session established between two of the computers based on an exchange of handshake information associated with the secure communication session. Key information that corresponds to the secure communication session may be obtained from a key provider such that the key information may be encrypted by the key provider. NMCs may decrypt the key information. NMCs may derive the session key based on the decrypted key information and the handshake information. NMCs may decrypt network packets included in the secure communication session. NMCs may be employed to inspect the one or more decrypted network packets to execute one or more rule-based policies.
    Type: Grant
    Filed: November 1, 2021
    Date of Patent: May 30, 2023
    Assignee: ExtraHop Networks, Inc.
    Inventors: Benjamin Thomas Higgins, Jesse Abraham Rothstein
  • Publication number: 20230087451
    Abstract: Embodiments are directed monitoring network traffic using network monitoring computers. Metrics may be determined based on monitoring network traffic associated with entities in the network such that the metrics may be included in profiles associated each entity. The profiles may be compared with other profiles in a context database based on the metrics included in each profile and each other profile. In response to the profiles being unmatched by other profiles one or more active probes may be performed to collect other metrics that may be used to update profiles. In response to the one or more profiles being matched by the other profiles in the context database, a timestamp associated with the other profiles may be updated to a current time value. Reports that include information associated with the entities and the profiles or the updated profiles may be generated.
    Type: Application
    Filed: April 4, 2022
    Publication date: March 23, 2023
    Inventors: Jesse Abraham Rothstein, Benjamin Thomas Higgins, Michael Kerber Krause Montague, Kevin Michael Seguin
  • Patent number: 11558413
    Abstract: Embodiments are directed to monitoring network traffic using network monitoring computers (NMCs). Networks may be configured to protect servers using centralized security protocols. Centralized security protocols may depend on centralized control provided by authentication control servers. If a client intends to access protected servers it may communicate with the authentication control server to obtain keys that enable it to access the requested servers. NMCs may monitor network traffic the centralized security protocol to collect metrics associated with the control servers, clients, or resource servers.
    Type: Grant
    Filed: April 15, 2022
    Date of Patent: January 17, 2023
    Assignee: ExtraHop Networks, Inc.
    Inventors: Benjamin Thomas Higgins, Jeff James Costlow, John Gemignani, Jr., Michael Kerber Krause Montague, Eric James Rongo, Xue Jun Wu
  • Patent number: 11546153
    Abstract: Embodiments are direct to monitoring communication between computers may be using network monitoring computers (NMCs). Network packets that are communicated between the computers may be captured and stored in a data store. If the NMCs identify a secure communication session established between two computers, the NMCs may obtain key information that corresponds to the secure communication session that includes a session key that may be provided by a key provider. Correlation information associated with the secure communication session may be captured by the NMCs. The correlation information may include tuple information associated with the secure communication session. And, the key information and the correlation information may be stored in a key escrow. The key information may be indexed in the key escrow using the correlation information.
    Type: Grant
    Filed: November 8, 2019
    Date of Patent: January 3, 2023
    Assignee: ExtraHop Networks, Inc.
    Inventors: Benjamin Thomas Higgins, Charlotte Ching-Hsing Tan, Jesse Abraham Rothstein
  • Publication number: 20220407881
    Abstract: Embodiments are directed to monitoring network traffic using network monitoring computers (NMCs). Metrics may be determined based on monitoring network traffic associated with a plurality of entities each associated with a profile that includes the metrics for each entity. Beaconing metrics associated with beaconing activity may be determined based on the metrics. The profile of each entity may be compared with the beaconing metrics to determine the entities that may be engaged in beaconing activity. The entities may be characterized based on beaconing activity such that the beaconing activity includes communication with endpoints associated with the third parties, employing communication protocols associated with the third-parties, or exchanging payloads consistent with the beaconing activity. Reports that include information associated with the entities and its beaconing activity may be generated.
    Type: Application
    Filed: May 26, 2022
    Publication date: December 22, 2022
    Inventors: Jeff James Costlow, Michael Ryan Corder, Edmund Hope Driggs, Benjamin Thomas Higgins, Michael Kerber Krause Montague, Kenneth Perrault, Jesse Abraham Rothstein, Jonathan Jacob Scott, Marc Adam Winners, Xue Jun Wu
  • Patent number: 11496378
    Abstract: Embodiments are directed to monitoring network traffic using a monitoring engine that monitors network traffic in networks to provide metrics. An inference engine may provide activity profiles based on portions of the network traffic where each activity profile includes features associated with the portions of network traffic. The inference engine may determine other activity profiles correlated with the activity profiles based on correlation models such that the determination of the other activity profiles occurs prior to monitoring an occurrence of other portions of the network traffic. The inference engine may modify monitoring actions of the monitoring engine based on the other activity profiles. The inference engine may provide reports based on the portions of the network traffic, the activity profiles, the other portions of the network traffic, or the other activity profiles.
    Type: Grant
    Filed: May 12, 2021
    Date of Patent: November 8, 2022
    Assignee: ExtraHop Networks, Inc.
    Inventors: Eric Jacob Ball, Eric Joseph Hammerle, Benjamin Thomas Higgins, Bhushan Prasad Khanal, Michael Kerber Krause Montague, Xue Jun Wu
  • Patent number: 11463465
    Abstract: Embodiments are directed to monitoring network traffic to determine users and assets based on the network traffic. A user role model may assign a user role and provide a role confidence score for the users based on network traffic associated with the users. An asset model may assign an asset type and provide an asset confidence score the assets based on network traffic associated with the assets. The users may be associated with assets based on the network traffic. The role confidence scores provided for the users may be modified based on the asset type assigned to assets associated with the users. The asset confidence score provided for the assets may be modified based on the user role assigned to the users associated with the assets. A report that includes information about the user roles and the asset types may be provided.
    Type: Grant
    Filed: August 10, 2020
    Date of Patent: October 4, 2022
    Assignee: ExtraHop Networks, Inc.
    Inventors: Xue Jun Wu, Benjamin Thomas Higgins, Michael Kerber Krause Montague, Po-Shen Lee, Songqian Chen, Jade Alexi Tabony, Katherine Megan Porterfield
  • Patent number: 11463466
    Abstract: Embodiments are directed to monitoring network traffic using network monitoring computers (NMCs). Networks may be configured to protect servers using centralized security protocols. Centralized security protocols may depend on centralized control provided by authentication control servers. If a client intends to access protected servers it may communicate with the authentication control server to obtain keys that enable it to access the requested servers. NMCs may monitor network traffic the centralized security protocol to collect metrics associated with the control servers, clients, or resource servers.
    Type: Grant
    Filed: April 15, 2022
    Date of Patent: October 4, 2022
    Assignee: ExtraHop Networks, Inc.
    Inventors: Benjamin Thomas Higgins, Jeff James Costlow, John Gemignani, Jr., Michael Kerber Krause Montague, Eric James Rongo, Xue Jun Wu
  • Publication number: 20220247771
    Abstract: Embodiments are directed to monitoring network traffic using network monitoring computers (NMCs). Networks may be configured to protect servers using centralized security protocols. Centralized security protocols may depend on centralized control provided by authentication control servers. If a client intends to access protected servers it may communicate with the authentication control server to obtain keys that enable it to access the requested servers. NMCs may monitor network traffic the centralized security protocol to collect metrics associated with the control servers, clients, or resource servers.
    Type: Application
    Filed: April 15, 2022
    Publication date: August 4, 2022
    Inventors: Benjamin Thomas Higgins, Jeff James Costlow, John Gemignani, JR., Michael Kerber Krause Montague, Eric James Rongo, Xue Jun Wu
  • Publication number: 20220239685
    Abstract: Embodiments are directed to monitoring network traffic using network monitoring computers (NMCs). Networks may be configured to protect servers using centralized security protocols. Centralized security protocols may depend on centralized control provided by authentication control servers. If a client intends to access protected servers it may communicate with the authentication control server to obtain keys that enable it to access the requested servers. NMCs may monitor network traffic the centralized security protocol to collect metrics associated with the control servers, clients, or resource servers.
    Type: Application
    Filed: April 15, 2022
    Publication date: July 28, 2022
    Inventors: Benjamin Thomas Higgins, Jeff James Costlow, John Gemignani, JR., Michael Kerber Krause Montague, Eric James Rongo, Xue Jun Wu
  • Patent number: 11349861
    Abstract: Embodiments are directed to monitoring network traffic using network monitoring computers (NMCs). Metrics may be determined based on monitoring network traffic associated with a plurality of entities each associated with a profile that includes the metrics for each entity. Beaconing metrics associated with beaconing activity may be determined based on the metrics. The profile of each entity may be compared with the beaconing metrics to determine the entities that may be engaged in beaconing activity. The entities may be characterized based on beaconing activity such that the beaconing activity includes communication with endpoints associated with the third parties, employing communication protocols associated with the third-parties, or exchanging payloads consistent with the beaconing activity. Reports that include information associated with the entities and its beaconing activity may be generated.
    Type: Grant
    Filed: June 18, 2021
    Date of Patent: May 31, 2022
    Assignee: ExtraHop Networks, Inc.
    Inventors: Jeff James Costlow, Michael Ryan Corder, Edmund Hope Driggs, Benjamin Thomas Higgins, Michael Kerber Krause Montague, Kenneth Perrault, Jesse Abraham Rothstein, Jonathan Jacob Scott, Marc Adam Winners, Xue Jun Wu
  • Patent number: 11310256
    Abstract: Embodiments are directed to monitoring network traffic using network monitoring computers (NMCs). Networks may be configured to protect servers using centralized security protocols. Centralized security protocols may depend on centralized control provided by authentication control servers. If a client intends to access protected servers it may communicate with the authentication control server to obtain keys that enable it to access the requested servers. NMCs may monitor network traffic the centralized security protocol to collect metrics associated with the control servers, clients, or resource servers.
    Type: Grant
    Filed: September 23, 2021
    Date of Patent: April 19, 2022
    Assignee: ExtraHop Networks, Inc.
    Inventors: Benjamin Thomas Higgins, Jeff James Costlow, John Gemignani, Jr., Michael Kerber Krause Montague, Eric James Rongo, Xue Jun Wu
  • Patent number: 11296967
    Abstract: Embodiments are directed monitoring network traffic using network monitoring computers. Metrics may be determined based on monitoring network traffic associated with entities in the network such that the metrics may be included in profiles associated each entity. The profiles may be compared with other profiles in a context database based on the metrics included in each profile and each other profile. In response to the profiles being unmatched by other profiles one or more active probes may be performed to collect other metrics that may be used to update profiles. In response to the one or more profiles being matched by the other profiles in the context database, a timestamp associated with the other profiles may be updated to a current time value. Reports that include information associated with the entities and the profiles or the updated profiles may be generated.
    Type: Grant
    Filed: September 23, 2021
    Date of Patent: April 5, 2022
    Assignee: ExtraHop Networks, Inc.
    Inventors: Jesse Abraham Rothstein, Benjamin Thomas Higgins, Michael Kerber Krause Montague, Kevin Michael Seguin
  • Publication number: 20220094706
    Abstract: Embodiments are directed to monitoring network traffic using network monitoring computers (NMCs). Networks may be configured to protect servers using centralized security protocols. Centralized security protocols may depend on centralized control provided by authentication control servers. If a client intends to access protected servers it may communicate with the authentication control server to obtain keys that enable it to access the requested servers. NMCs may monitor network traffic the centralized security protocol to collect metrics associated with the control servers, clients, or resource servers.
    Type: Application
    Filed: September 23, 2021
    Publication date: March 24, 2022
    Inventors: Benjamin Thomas Higgins, Jeff James Costlow, John Gemignani, JR., Michael Kerber Krause Montague, Eric James Rongo, Xue Jun Wu
  • Publication number: 20220070073
    Abstract: Embodiments are directed to monitoring network traffic using a monitoring engine that monitors network traffic in networks to provide metrics. An inference engine may provide activity profiles based on portions of the network traffic where each activity profile includes features associated with the portions of network traffic. The inference engine may determine other activity profiles correlated with the activity profiles based on correlation models such that the determination of the other activity profiles occurs prior to monitoring an occurrence of other portions of the network traffic. The inference engine may modify monitoring actions of the monitoring engine based on the other activity profiles. The inference engine may provide reports based on the portions of the network traffic, the activity profiles, the other portions of the network traffic, or the other activity profiles.
    Type: Application
    Filed: May 12, 2021
    Publication date: March 3, 2022
    Inventors: Eric Jacob Ball, Eric Joseph Hammerle, Benjamin Thomas Higgins, Bhushan Prasad Khanal, Michael Kerber Krause Montague, Xue Jun Wu
  • Publication number: 20220060518
    Abstract: Embodiments are directed to monitoring communication between computers using network monitoring computers (NMCs). NMCs identify a secure communication session established between two of the computers based on an exchange of handshake information associated with the secure communication session. Key information that corresponds to the secure communication session may be obtained from a key provider such that the key information may be encrypted by the key provider. NMCs may decrypt the key information. NMCs may derive the session key based on the decrypted key information and the handshake information. NMCs may decrypt network packets included in the secure communication session. NMCs may be employed to inspect the one or more decrypted network packets to execute one or more rule-based policies.
    Type: Application
    Filed: November 1, 2021
    Publication date: February 24, 2022
    Inventors: Benjamin Thomas Higgins, Jesse Abraham Rothstein
  • Publication number: 20220021694
    Abstract: Embodiments are directed to monitoring network traffic using network monitoring computers (NMCs). NMCs may determine requests provided to a server based on a first portion of network traffic. NMCs may determine suspicious requests based on characteristics of the provided requests. NMCs may employ the characteristics of the suspicious requests to provide correlation information that is associated with the suspicious requests. NMCs may determine dependent actions associated with the server based on a second portion of the network traffic and the correlation information. And, in response to determining anomalous activity associated with the evaluation of the dependent actions, NMCs may provide reports associated with the anomalous activity.
    Type: Application
    Filed: March 26, 2021
    Publication date: January 20, 2022
    Inventors: Benjamin Thomas Higgins, Jesse Abraham Rothstein, Xue Jun Wu, Michael Kerber Krause Montague, Kevin Michael Seguin
  • Patent number: 11165831
    Abstract: Embodiments are directed to monitoring communication between computers using network monitoring computers (NMCs). NMCs identify a secure communication session established between two of the computers based on an exchange of handshake information associated with the secure communication session. Key information that corresponds to the secure communication session may be obtained from a key provider such that the key information may be encrypted by the key provider. NMCs may decrypt the key information. NMCs may derive the session key based on the decrypted key information and the handshake information. NMCs may decrypt network packets included in the secure communication session. NMCs may be employed to inspect the one or more decrypted network packets to execute one or more rule-based policies.
    Type: Grant
    Filed: May 4, 2018
    Date of Patent: November 2, 2021
    Assignee: ExtraHop Networks, Inc.
    Inventors: Benjamin Thomas Higgins, Jesse Abraham Rothstein