Patents by Inventor Thomas Jenkinson

Thomas Jenkinson has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20230080471
    Abstract: The endpoint agent detects a cyber threat on an end-point computing device. The endpoint agent on the computing device has a communications module that communicates with a cyber defense appliance. A collections module monitors and collects pattern of life data on processes executing on the end-point computing-device and users of the end-point computing-device. The communications module sends the pattern of life data to the cyber defense appliance installed on a network. The cyber defense appliance at least contains one or more machine-learning models to analyze the pattern of life data for each endpoint agent connected to that cyber defense appliance. The endpoint agent and the cyber defense appliance may trigger one or more actions to be autonomously taken to contain a detected cyber threat when a cyber-threat risk score is indicative of a likelihood of a cyber-threat is equal to or above an actionable threshold.
    Type: Application
    Filed: October 14, 2022
    Publication date: March 16, 2023
    Applicant: Darktrace Holdings Limited
    Inventors: Thomas Jenkinson, David Sansom, Maximillian Heinemeyer, Jack Stockdale
  • Patent number: 11477219
    Abstract: The endpoint agent detects a cyber threat on an end-point computing device. The endpoint agent on the computing device has a communications module that communicates with a cyber defense appliance. A collections module monitors and collects pattern of life data on processes executing on the end-point computing-device and users of the end-point computing-device. The communications module sends the pattern of life data to the cyber defense appliance installed on a network. The cyber defense appliance at least contains one or more machine-learning models to analyze the pattern of life data for each endpoint agent connected to that cyber defense appliance. The endpoint agent and the cyber defense appliance may trigger one or more actions to be autonomously taken to contain a detected cyber threat when a cyber-threat risk score is indicative of a likelihood of a cyber-threat is equal to or above an actionable threshold.
    Type: Grant
    Filed: February 19, 2019
    Date of Patent: October 18, 2022
    Assignee: Darktrace Holdings Limited
    Inventors: Thomas Jenkinson, David Sansom, Maximilian Heinemeyer, Jack Stockdale
  • Patent number: 11150938
    Abstract: A non-repudiable transaction protocol system includes a memory, at least one processor in communication with the memory, an operating system executing on the at least one processor, a resource manager configured to manage a storage system, and a transaction manager. The transaction manager is configured to provide NRO-W evidence of a work request from a client to the resource manager and provide NRR-W evidence to the client that the resource manager has completed initial work for the work request. Additionally, the transaction manager is configured to provide NRO-C evidence to the resource manager that the client requested completion of the initial work and NRR-C evidence to the client that the resource manager promised to execute the completion. Each of the NRO-W evidence, the NRR-W evidence, the NRO-C evidence, and the NRR-C evidence are exchanged to prevent either one of the client and the resource manager from gaining an advantage.
    Type: Grant
    Filed: February 25, 2019
    Date of Patent: October 19, 2021
    Assignee: Red Hat, Inc.
    Inventors: Paul Robinson, Thomas Jenkinson
  • Patent number: 10417038
    Abstract: Various examples are directed to systems and methods for executing distributed transactions. A transaction manager may send to a resource manager a first prepare message that describes a first work item to be performed by the resource manager for a first transaction. The transaction manager may also send to the resource manager a second prepare message that describes a second work item to be performed by the resource manager for a second transaction. The transaction manager may detect a flush event and send to the resource manager a batch commit message instructing the resource manager to commit the first work item and the second work item.
    Type: Grant
    Filed: February 18, 2016
    Date of Patent: September 17, 2019
    Assignee: Red Hat, Inc.
    Inventors: Paul Robinson, Thomas Jenkinson
  • Publication number: 20190260785
    Abstract: The endpoint agent detects a cyber threat on an end-point computing device. The endpoint agent on the computing device has a communications module that communicates with a cyber defense appliance. A collections module monitors and collects pattern of life data on processes executing on the end-point computing-device and users of the end-point computing-device. The communications module sends the pattern of life data to the cyber defense appliance installed on a network. The cyber defense appliance at least contains one or more machine-learning models to analyze the pattern of life data for each endpoint agent connected to that cyber defense appliance. The endpoint agent and the cyber defense appliance may trigger one or more actions to be autonomously taken to contain a detected cyber threat when a cyber-threat risk score is indicative of a likelihood of a cyber-threat is equal to or above an actionable threshold.
    Type: Application
    Filed: February 19, 2019
    Publication date: August 22, 2019
    Inventors: Thomas Jenkinson, David Sansom, Maximilian Heinemeyer, Jack Stockdale
  • Publication number: 20190188029
    Abstract: A non-repudiable transaction protocol system includes a memory, at least one processor in communication with the memory, an operating system executing on the at least one processor, a resource manager configured to manage a storage system, and a transaction manager. The transaction manager is configured to provide NRO-W evidence of a work request from a client to the resource manager and provide NRR-W evidence to the client that the resource manager has completed initial work for the work request. Additionally, the transaction manager is configured to provide NRO-C evidence to the resource manager that the client requested completion of the initial work and NRR-C evidence to the client that the resource manager promised to execute the completion. Each of the NRO-W evidence, the NRR-W evidence, the NRO-C evidence, and the NRR-C evidence are exchanged to prevent either one of the client and the resource manager from gaining an advantage.
    Type: Application
    Filed: February 25, 2019
    Publication date: June 20, 2019
    Inventors: Paul Robinson, Thomas Jenkinson
  • Patent number: 10228967
    Abstract: A non-repudiable transaction protocol system includes a memory, at least one processor in communication with the memory, an operating system executing on the at least one processor, a resource manager configured to manage a storage system, and a transaction manager. The transaction manager is configured to provide NRO-W evidence of a work request from a client to the resource manager and provide NRR-W evidence to the client that the resource manager has completed initial work for the work request. Additionally, the transaction manager is configured to provide NRO-C evidence to the resource manager that the client requested completion of the initial work and NRR-C evidence to the client that the resource manager promised to execute the completion. Each of the NRO-W evidence, the NRR-W evidence, the NRO-C evidence, and the NRR-C evidence are exchanged to prevent either one of the client and the resource manager from gaining an advantage.
    Type: Grant
    Filed: June 1, 2016
    Date of Patent: March 12, 2019
    Assignee: Red Hat, Inc.
    Inventors: Paul Robinson, Thomas Jenkinson
  • Publication number: 20170351542
    Abstract: A non-repudiable transaction protocol system includes a memory, at least one processor in communication with the memory, an operating system executing on the at least one processor, a resource manager configured to manage a storage system, and a transaction manager. The transaction manager is configured to provide NRO-W evidence of a work request from a client to the resource manager and provide NRR-W evidence to the client that the resource manager has completed initial work for the work request. Additionally, the transaction manager is configured to provide NRO-C evidence to the resource manager that the client requested completion of the initial work and NRR-C evidence to the client that the resource manager promised to execute the completion. Each of the NRO-W evidence, the NRR-W evidence, the NRO-C evidence, and the NRR-C evidence are exchanged to prevent either one of the client and the resource manager from gaining an advantage.
    Type: Application
    Filed: June 1, 2016
    Publication date: December 7, 2017
    Inventors: Paul Robinson, Thomas Jenkinson
  • Publication number: 20170242726
    Abstract: Various examples are directed to systems and methods for executing distributed transactions. A transaction manager may send to a resource manager a first prepare message that describes a first work item to be performed by the resource manager for a first transaction. The transaction manager may also send to the resource manager a second prepare message that describes a second work item to be performed by the resource manager for a second transaction. The transaction manager may detect a flush event and send to the resource manager a batch commit message instructing the resource manager to commit the first work item and the second work item.
    Type: Application
    Filed: February 18, 2016
    Publication date: August 24, 2017
    Inventors: Paul Robinson, Thomas Jenkinson