About > Patents
About > Patents
To stay ahead of the next cyber threat we’re always creating new innovations and patenting new products. Many of our patents are listed below:
Patent Number: 12,131,230
A method includes, as part of establishing a feature merging threshold (α) for determining equivalence between two features, selecting a set of candidate α values, partitioning training data into a plurality of groups, establishing a model Wα for each α value of the set of candidate α values, iteratively performing: selecting a next group of training data of the plurality of groups of training data; adding the selected next group of training data to a training set; and for each α value in the set of candidate α values: training the Wα for the α value using the training set, and evaluating a size of Wα, the size comprising a number of features included in the model, and choosing the feature merging threshold α based on the iteratively performing.
Awarded: October 29, 2024
Inventors: Daniel Scofield and Craig Miles
Patent Number: 12,124,568
Malware prevention and remediation is provided by monitoring actions performed by processes and maintaining indications of which processes are trusted; selectively presenting canary files to these processes, which includes presenting the canary files to processes not indicated as being trusted and hiding the canary files from processes indicated as being trusted, and where the monitoring includes monitoring for access of canary files with change privileges; scoring each of the processes based on the actions performed, including any access of canary files with change privileges, which scoring produces a malice score for each process; and automatically terminating any process for which its malice score indicates at least a threshold level of malice in the execution of the process.
Awarded: October 22, 2024
Inventors: Sean LaPlante and Patrick McHarris
Patent Number: 11,899,122
Geolocating one or more emitters includes obtaining a set of lines of bearing (LOBs) indicative of location(s) of emitter (s), determining intersections of LOBs of the set and generating clusters informed by those intersections, assigning the LOBs of the set to cluster(s) based on proximity, identifying a cluster having the greatest number of assigned LOBs from the set; determining an emitter location area based on a best point estimate for the cluster, and indicating a location of an emitter as the emitter location area. Additional emitters can be located by removing from the set of LOBs those LOBs assigned to the identified cluster, and repeating aforementioned aspects. Initially, the set of LOBs can be selected from a larger collection as a representative subset thereof.
Awarded: February 16, 2024
Inventor: Jason Eric Smith
Patent Number: 11,645,101
Provision of a virtual secure cryptoprocessor (VSC) for a guest virtual machine (VM), part of a first guest, of a hypervisor of a computer system, includes (i) storing guest VM state and VSC state together in an encrypted virtual hard disk drive file, (ii) storing a decryption key in a sealed partition, of a second guest, sealed against a physical secure cryptoprocessor, (iii) based on verifying that a host computing environment of the computer system is in a trusted state and on booting the hypervisor thereon, unsealing the sealed partition of the second guest, the unsealing providing the decryption key, and decrypting the encrypted virtual hard disk drive file using the decryption key, where the decrypting decrypts the stored guest VM state for execution of the guest VM and decrypts the VSC state to provide the VSC for use by the guest VM.
Awarded: May 9, 2023
Inventor: Joel Upham and Richard Turner
Patent Number: 11,550,883
A method that includes receiving a request to execute bytecode that corresponds to secured program code, the secured program code including an encrypted version of the bytecode. Based on receiving the request to execute the bytecode, the method resolves the request, the resolving including identifying a location on disk of the secured program code. Based on resolving the request, a license file for decrypting the encrypted version of the bytecode for execution is assessed, the license file including an encrypted key-value. The encrypted key-value is used in decrypting the encrypted version of the bytecode to obtain decrypted bytecode, where the decrypting places the decrypted bytecode in working memory, and the decrypted bytecode is executed.
Awarded: January 10, 2023
Inventor: Adam Meily
Patent Number: 11,449,746
Description: Behavioral verification of user identity includes building a deep neural network for gait-based behavioral verification of user identity. The building includes receiving movement data describing movement, in multiple dimensions, of computer system(s) of user(s), the movement data including sensor data acquired from sensor(s) of the computer system(s). The building further includes performing pre-processing of the movement data to provide processed movement data for processing by a deep neural network to extract local patterns and training the deep neural network using the processed movement data. The method also includes providing the trained deep neural network for gait-based behavioral verification of user identity based on determinate vectors output from the trained deep neural network.
Awarded: September 20, 2022
Inventors: Jacob Baldwin, Ryan Burnham, Robert Dora, Andrew Meyer and Robert Wright
Patent Number: 11,397,587
Description: Process core isolation for execution of multiple operating systems on a multicore computer system includes booting first and second operating systems (OSs) on a computer system that includes a plurality of processor cores across physical central processing unit(s) (CPUs). Booting the first OS boots the first OS on a first subset of the processor cores. Booting the second OS, different from the first OS, boots the second OS on a second subset of the processor cores. The first and second subsets are mutually exclusive, where a first processor core of a physical CPU of the physical CPUs is included in the first subset and a second processor core of the physical CPU is included in the second subset, and where the first and second OSs execute concurrently on the computer system, and each of the first and second OS executes on only its respective subset of processor core(s).
Awarded: July 26, 2022
Inventors: Rian Quinn, Connor James Davis, Harlan Philip White, Erin Grace Riley Hensel
Patent Number: 10,938,784
Description: Dedicating Hardware Devices to Virtual Machines includes dedicating, by a hypervisor executing on a computer system, a set of hardware devices of the computer system to a first virtual machine of the hypervisor, the first virtual machine executing a guest operating system, and the set of hardware devices for use by the guest operating system in execution of the guest operating system, and dedicating network device hardware of the computer system to a second virtual machine of the hypervisor, the second virtual machine being a different virtual machine than the first virtual machine, wherein network communication between the guest operating system and a network to which the computer system is connected via the network device hardware occurs via the second virtual machine.
Awarded: March 2, 2021
Inventors: Christopher Patterson, Rian Quinn, Katherine Temkin, Harlan White
On-GPU Compositioning of Graphical Data From Multiple Domains
Patent Number: 10,572,207
Description: On-GPU Compositioning of Graphical Data From Multiple Domains is a technique for combining application windows from different VMs onto a single graphics card, and doing that combination on the graphics card itself. Previously the combination occurred on the CPU itself before being transmitted to the graphics card, incurring a significant performance penalty.
Awarded: February 25, 2020
Inventors: Jonathan Farrell, Rodney Forbes, Maurice Gale, Brendan Kerrigan, Rian Quinn, Sandy Stutsman
Entity Resolution-Based Malicious File Detection
Patent Number: 10,754,950
Description: Entity Resolution-Based Malicious File Detection uses advanced machine learning and artificial intelligence techniques to automatically model normal behavior of document viewers to quickly identify suspect documents before they compromise a network. TAFFI is a user-friendly endpoint defense solution that the Department of Defense and other transition partners can use to protect their systems against malware-laden documents.
Awarded: August 25, 2020
Inventors: Craig Miles and Daniel Scofield
Behavioral Biometric Feature Extraction and Verification (Keystroke)
Patent number: 10,769,259
Description: Behavioral Biometric Feature Extraction and Verification is a robust framework for keystroke user verification. Originating from Deep Vectors work, this framework automatically extracts features from datasets that differentiate between individuals through keystroke patterns.
Awarded: September 8, 2020
Inventors: Jacob Baldwin, Ryan Burnham, Robert Dora, Andrew Meyer, Robert Wright
Behavioral Biometric Feature Extraction and Verification (Gait)
Patent number: 10,769,260
Description: Behavioral Biometric Feature Extraction and Verification is a robust framework for user verification through gait using smartphones. Originating from Deep Vectors work, this framework automatically extracts features from datasets that differentiate between individuals through gait.
Awarded: September 8, 2020
Inventors: Jacob Baldwin, Ryan Burnham, Robert Dora, Andrew Meyer, Robert Wright
Patent Number: 10,523,635
Description: Obtaining, in association with origination of outbound network traffic to be sent by a system, user account information of a user account on behalf of which the outbound network traffic is generated, and performing filtering of the outbound network traffic based on the obtained user account information of the user account on behalf of which the outbound network traffic is generated, where the filtering is further based on one or more rules, and the filtering includes determining whether to block or allow sending of the outbound network traffic from the system.
Awarded: December 31, 2019
Inventors: Jared Wright and Jacob Torrey
Patent Number: 9,996,374
Description: An update is deployed to a guest virtual machine of a hypervisor during runtime of the guest virtual machine. An executing thread of the guest virtual machine is identified and execution of the thread is redirected to a function to open a handle to a file, of the guest virtual machine, to which data of the update is to be written. The data is provided to a component of the guest virtual machine, and then execution of the thread is redirected to a function to write the data provided to the component to the file.
Awarded: June 12, 2018
Inventors: Michael Sieffert, J. Einstoss, Stephen Pape, Adam Meily.
Product Name: SED-Tools Multi-Drive Protection
Patent No.: US 9,871,787 B2
Description: Authentication Processing for a Plurality of Self-Encrypting Storage Devices
Date of Patent: January 16, 2018
Inventor: Maurice Gale
Product Name: WiFi Investigator® (Canada)
Patent No.: CA 2,761,818
Description: System and Method for Locating a Target Wireless Device
Issued: July 4, 2017
Inventors: Richard Michael Gloo, Jacob Michael Baker, Alexander James Williams, Jason S. LaShure, Robert James Durham, Nicholas Lawrence Owens
Product Name: LastDefense
Patent No.: US 9,654,498 B2
Description: Detecting Deviation From a Data Packet Send-Protocol in a Computer System
Date of Patent: May 16, 2017
Inventors: Robert Durham, Kyle Patton, Levi Arthur
Product Name: FUSS
Patent No.: US 9,639,671 B2
Description: Secure Execution of Encrypted Program Instructions
Date of Patent: May 2, 2017
Inventor: Jacob Torrey
Product Name: IntroVirt®
Patent No.: US 9,619,346 B2
Description: Virtual Machine Introspection Facilities
Date of Patent: April 11, 2017
Inventor: Stephen Raymond Pape
Product Name: MultiView®
Patent No.: US 9,335,886 B2
Description: Facilitating User Interaction with Multiple Domains While Preventing Cross-Domain Transfer of Data
Date of Patent: May 10, 2016
Inventors: Rian Patrick Quinn, Brendan Timothy Kerrigan
Product Name: TED OS
Patent No. – US 8,996,642 B2
Description: Trust Verification of a Computing Platform Using a Peripheral Device
Date of Patent: February 24, 2015
Inventors: Rian Quinn, Jacob Torrey
Product Name: MoRE
Patent No. – US 8,856,789 B2
Description: Facilitating Execution of a Self-Modifying Executable
Date of Patent: October 7, 2014
Inventor: Jacob Torrey
Product Name: Secure Boot
Patent No. – US 8,478,974 B2
Description: Method and System for Reducing Impact of Malware during a Booting Sequence
Date of Patent: July 2, 2013
Inventors: Ryan Matthew Wilson, Joseph James Sharkey, Michael Joseph Sieffert
Product Name: WiFi Investigator®
Patent No. – US 8,098,155 B2
Description: System and Method for Locating a Target Wireless Device
Date of Patent: January 17, 2012
Inventors: Richard Michael Gloo, Jacob Michael Baker, Alexander James Williams, Jason S. LaShure, Robert James Durham, Nicholas Lawrence Owens
We are always looking for next-level team members. Try our challenges to find out if you’re one of us.
Reach out to talk to one of our experts and we will create a custom testing plan for your needs.