Patents by Inventor Thomas Jenkinson
Thomas Jenkinson has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Publication number: 20230080471Abstract: The endpoint agent detects a cyber threat on an end-point computing device. The endpoint agent on the computing device has a communications module that communicates with a cyber defense appliance. A collections module monitors and collects pattern of life data on processes executing on the end-point computing-device and users of the end-point computing-device. The communications module sends the pattern of life data to the cyber defense appliance installed on a network. The cyber defense appliance at least contains one or more machine-learning models to analyze the pattern of life data for each endpoint agent connected to that cyber defense appliance. The endpoint agent and the cyber defense appliance may trigger one or more actions to be autonomously taken to contain a detected cyber threat when a cyber-threat risk score is indicative of a likelihood of a cyber-threat is equal to or above an actionable threshold.Type: ApplicationFiled: October 14, 2022Publication date: March 16, 2023Applicant: Darktrace Holdings LimitedInventors: Thomas Jenkinson, David Sansom, Maximillian Heinemeyer, Jack Stockdale
-
Patent number: 11477219Abstract: The endpoint agent detects a cyber threat on an end-point computing device. The endpoint agent on the computing device has a communications module that communicates with a cyber defense appliance. A collections module monitors and collects pattern of life data on processes executing on the end-point computing-device and users of the end-point computing-device. The communications module sends the pattern of life data to the cyber defense appliance installed on a network. The cyber defense appliance at least contains one or more machine-learning models to analyze the pattern of life data for each endpoint agent connected to that cyber defense appliance. The endpoint agent and the cyber defense appliance may trigger one or more actions to be autonomously taken to contain a detected cyber threat when a cyber-threat risk score is indicative of a likelihood of a cyber-threat is equal to or above an actionable threshold.Type: GrantFiled: February 19, 2019Date of Patent: October 18, 2022Assignee: Darktrace Holdings LimitedInventors: Thomas Jenkinson, David Sansom, Maximilian Heinemeyer, Jack Stockdale
-
Patent number: 11150938Abstract: A non-repudiable transaction protocol system includes a memory, at least one processor in communication with the memory, an operating system executing on the at least one processor, a resource manager configured to manage a storage system, and a transaction manager. The transaction manager is configured to provide NRO-W evidence of a work request from a client to the resource manager and provide NRR-W evidence to the client that the resource manager has completed initial work for the work request. Additionally, the transaction manager is configured to provide NRO-C evidence to the resource manager that the client requested completion of the initial work and NRR-C evidence to the client that the resource manager promised to execute the completion. Each of the NRO-W evidence, the NRR-W evidence, the NRO-C evidence, and the NRR-C evidence are exchanged to prevent either one of the client and the resource manager from gaining an advantage.Type: GrantFiled: February 25, 2019Date of Patent: October 19, 2021Assignee: Red Hat, Inc.Inventors: Paul Robinson, Thomas Jenkinson
-
Patent number: 10417038Abstract: Various examples are directed to systems and methods for executing distributed transactions. A transaction manager may send to a resource manager a first prepare message that describes a first work item to be performed by the resource manager for a first transaction. The transaction manager may also send to the resource manager a second prepare message that describes a second work item to be performed by the resource manager for a second transaction. The transaction manager may detect a flush event and send to the resource manager a batch commit message instructing the resource manager to commit the first work item and the second work item.Type: GrantFiled: February 18, 2016Date of Patent: September 17, 2019Assignee: Red Hat, Inc.Inventors: Paul Robinson, Thomas Jenkinson
-
Publication number: 20190260785Abstract: The endpoint agent detects a cyber threat on an end-point computing device. The endpoint agent on the computing device has a communications module that communicates with a cyber defense appliance. A collections module monitors and collects pattern of life data on processes executing on the end-point computing-device and users of the end-point computing-device. The communications module sends the pattern of life data to the cyber defense appliance installed on a network. The cyber defense appliance at least contains one or more machine-learning models to analyze the pattern of life data for each endpoint agent connected to that cyber defense appliance. The endpoint agent and the cyber defense appliance may trigger one or more actions to be autonomously taken to contain a detected cyber threat when a cyber-threat risk score is indicative of a likelihood of a cyber-threat is equal to or above an actionable threshold.Type: ApplicationFiled: February 19, 2019Publication date: August 22, 2019Inventors: Thomas Jenkinson, David Sansom, Maximilian Heinemeyer, Jack Stockdale
-
Publication number: 20190188029Abstract: A non-repudiable transaction protocol system includes a memory, at least one processor in communication with the memory, an operating system executing on the at least one processor, a resource manager configured to manage a storage system, and a transaction manager. The transaction manager is configured to provide NRO-W evidence of a work request from a client to the resource manager and provide NRR-W evidence to the client that the resource manager has completed initial work for the work request. Additionally, the transaction manager is configured to provide NRO-C evidence to the resource manager that the client requested completion of the initial work and NRR-C evidence to the client that the resource manager promised to execute the completion. Each of the NRO-W evidence, the NRR-W evidence, the NRO-C evidence, and the NRR-C evidence are exchanged to prevent either one of the client and the resource manager from gaining an advantage.Type: ApplicationFiled: February 25, 2019Publication date: June 20, 2019Inventors: Paul Robinson, Thomas Jenkinson
-
Patent number: 10228967Abstract: A non-repudiable transaction protocol system includes a memory, at least one processor in communication with the memory, an operating system executing on the at least one processor, a resource manager configured to manage a storage system, and a transaction manager. The transaction manager is configured to provide NRO-W evidence of a work request from a client to the resource manager and provide NRR-W evidence to the client that the resource manager has completed initial work for the work request. Additionally, the transaction manager is configured to provide NRO-C evidence to the resource manager that the client requested completion of the initial work and NRR-C evidence to the client that the resource manager promised to execute the completion. Each of the NRO-W evidence, the NRR-W evidence, the NRO-C evidence, and the NRR-C evidence are exchanged to prevent either one of the client and the resource manager from gaining an advantage.Type: GrantFiled: June 1, 2016Date of Patent: March 12, 2019Assignee: Red Hat, Inc.Inventors: Paul Robinson, Thomas Jenkinson
-
Publication number: 20170351542Abstract: A non-repudiable transaction protocol system includes a memory, at least one processor in communication with the memory, an operating system executing on the at least one processor, a resource manager configured to manage a storage system, and a transaction manager. The transaction manager is configured to provide NRO-W evidence of a work request from a client to the resource manager and provide NRR-W evidence to the client that the resource manager has completed initial work for the work request. Additionally, the transaction manager is configured to provide NRO-C evidence to the resource manager that the client requested completion of the initial work and NRR-C evidence to the client that the resource manager promised to execute the completion. Each of the NRO-W evidence, the NRR-W evidence, the NRO-C evidence, and the NRR-C evidence are exchanged to prevent either one of the client and the resource manager from gaining an advantage.Type: ApplicationFiled: June 1, 2016Publication date: December 7, 2017Inventors: Paul Robinson, Thomas Jenkinson
-
Publication number: 20170242726Abstract: Various examples are directed to systems and methods for executing distributed transactions. A transaction manager may send to a resource manager a first prepare message that describes a first work item to be performed by the resource manager for a first transaction. The transaction manager may also send to the resource manager a second prepare message that describes a second work item to be performed by the resource manager for a second transaction. The transaction manager may detect a flush event and send to the resource manager a batch commit message instructing the resource manager to commit the first work item and the second work item.Type: ApplicationFiled: February 18, 2016Publication date: August 24, 2017Inventors: Paul Robinson, Thomas Jenkinson