Patents by Inventor Timothy David Dodd

Timothy David Dodd has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20240073184
    Abstract: A method of configuring a filter to perform pattern matching against input data is provided. The method includes receiving one or more rules, each rule including one or more field specifiers, each field specifier including a value specifier that specifies a value to be matched and a location specifier that specifies a location in the input data. For each rule of the one or more rules an empty buffer is initialized. For each field specifier the value specified by the field specifier is appended to the buffer, and the buffer contents are inserted into contents of a probabilistic data structure representing all of the field specifiers of the rule. The probabilistic data structure is configured to receive a query that includes query buffer contents determined from the input data and respond with a match status of probably present based on a predetermined probability, or definitely not present.
    Type: Application
    Filed: August 30, 2022
    Publication date: February 29, 2024
    Applicant: NetScout Systems Texas, LLC
    Inventors: Brian St. Pierre, Timothy David Dodd, Steinthor Bjarnason
  • Patent number: 11431589
    Abstract: A logical expression engine and computer-implemented method for optimizing evaluation of a logical expression is provided. The method includes receiving an original logical expression to be applied by a computer program for processing input information, the original logical expression having at least one operator and a subexpression disposed on each side of a related operator of the at least one related operator. The method further includes receiving statistics accumulated about how the computer program applies the subexpressions of the original logical expression for processing the input information received by the computer program, using the accumulated statistics to optimize the order in which the subexpressions would be applied by the computer program, and outputting for application by the computer program an optimized logical expression having the subexpressions ordered in accordance with the optimized order.
    Type: Grant
    Filed: October 24, 2019
    Date of Patent: August 30, 2022
    Assignee: Arbor Networks, Inc.
    Inventors: Brian St. Pierre, Peter Allen Jensen, Timothy David Dodd
  • Publication number: 20210126841
    Abstract: A logical expression engine and computer-implemented method for optimizing evaluation of a logical expression is provided. The method includes receiving an original logical expression to be applied by a computer program for processing input information, the original logical expression having at least one operator and a subexpression disposed on each side of a related operator of the at least one related operator. The method further includes receiving statistics accumulated about how the computer program applies the subexpressions of the original logical expression for processing the input information received by the computer program, using the accumulated statistics to optimize the order in which the subexpressions would be applied by the computer program, and outputting for application by the computer program an optimized logical expression having the subexpressions ordered in accordance with the optimized order.
    Type: Application
    Filed: October 24, 2019
    Publication date: April 29, 2021
    Applicant: Arbor Networks, Inc.
    Inventors: Brian St. Pierre, Peter Allen Jensen, Timothy David Dodd
  • Patent number: 9015704
    Abstract: A computer implemented method, apparatus, and computer usable program code for executing a process within a virtual machine. A module is injected into an operating system for the virtual machine to form an injected module. The injected module is executed to load an agent process within an application space within the virtual machine. Execution of the agent process is initiated by the injected module.
    Type: Grant
    Filed: March 24, 2008
    Date of Patent: April 21, 2015
    Assignee: International Business Machines Corporation
    Inventors: Marshall Thomas Vandegrift, Kevin Michael Skapinetz, Timothy David Dodd
  • Patent number: 7712138
    Abstract: Managing the selection and scheduling of security audits run on a computing network. The computer network is surveyed by a security audit system to determine the function and relative importance of the elements in the network. Based on function and priority, a more thorough type of security audit is selected to run against each of the network elements by the security audit system. The security audit can also be automatically scheduled based on the information gathered from the survey. Once the system runs the security audit, a vulnerability assessment can be calculated for each element in the network. The vulnerability assessment can be presented in a format that facilitates interpretation and response by someone operating the system. The vulnerability assessment can also be used to configure and schedule future security audits.
    Type: Grant
    Filed: June 21, 2007
    Date of Patent: May 4, 2010
    Assignee: International Business Machines Corporation
    Inventors: Robert David Zobel, Timothy David Dodd, Sharon A. Millar, David Gerald Nesfeder, Jr., Christopher S. Singer
  • Publication number: 20090241109
    Abstract: A computer implemented method, apparatus, and computer usable program code for executing a process within a virtual machine. A module is injected into an operating system for the virtual machine to form an injected module. The injected module is executed to load an agent process within an application space within the virtual machine. Execution of the agent process is initiated by the injected module.
    Type: Application
    Filed: March 24, 2008
    Publication date: September 24, 2009
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Marshall Thomas Vandegrift, Kevin Michael Skapinetz, Timothy David Dodd
  • Patent number: 7340776
    Abstract: Managing the selection and scheduling of security audits run on a computing network. The computer network is surveyed by a security audit system to determine the function and relative importance of the elements in the network. Based on function and priority, a more thorough type of security audit is selected to run against each of the network elements by the security audit system. The security audit can also be automatically scheduled based on the information gathered from the survey. Once the system runs the security audit, a vulnerability assessment can be calculated for each element in the network. The vulnerability assessment can be presented in a format that facilitates interpretation and response by someone operating the system. The vulnerability assessment can also be used to configure and schedule future security audits.
    Type: Grant
    Filed: January 31, 2002
    Date of Patent: March 4, 2008
    Assignee: International Business Machines Corporation
    Inventors: Robert David Zobel, Timothy David Dodd, Sharon A. Millar, David Gerald Nesfeder, Jr., Christopher S. Singer
  • Publication number: 20020147803
    Abstract: Calculating risk based on information collected during a security audit of a computing network. The computer network is surveyed to determine the significance of elements in the network and to identify vulnerabilities associated with the elements. Using this information, the security audit system calculates a risk value for each vulnerability. The risk value is a function of the asset value, the probability that the vulnerability will be exploited, and the potential severity of damage to the network if the vulnerability is exploited. The risk value can be adjusted based on the ease with which the vulnerability can be fixed. A network element may have one or more risk values associated with it based on one or more vulnerabilities. The security audit system employs a band calculation method for summing risk values and computing a single security score for the element. The band calculation method can also be used to produce a security score for a group of elements.
    Type: Application
    Filed: January 31, 2002
    Publication date: October 10, 2002
    Inventors: Timothy David Dodd, Nicolas Heinrich
  • Publication number: 20020104014
    Abstract: Managing the selection and scheduling of security audits run on a computing network. The computer network is surveyed by a security audit system to determine the function and relative importance of the elements in the network. Based on function and priority, a more thorough type of security audit is selected to run against each of the network elements by the security audit system. The security audit can also be automatically scheduled based on the information gathered from the survey. Once the system runs the security audit, a vulnerability assessment can be calculated for each element in the network. The vulnerability assessment can be presented in a format that facilitates interpretation and response by someone operating the system. The vulnerability assessment can also be used to configure and schedule future security audits.
    Type: Application
    Filed: January 31, 2002
    Publication date: August 1, 2002
    Applicant: Internet Security Systems, Inc.
    Inventors: Robert David Zobel, Timothy David Dodd, Sharon A. Millar, David Gerald Nesfeder, Christopher S. Singer