Reliaquest Holdings, LLC

United States of America

Back to Profile

1-92 of 92 for Reliaquest Holdings, LLC Sort by
Query
Patent
United States - USPTO
Aggregations Reset Report
Date
New (last 4 weeks) 1
2025 July (MTD) 1
2025 March 1
2025 (YTD) 4
2024 17
See more
IPC Class
G06F 21/55 - Detecting local intrusion or implementing counter-measures 46
G06F 21/56 - Computer malware detection or handling, e.g. anti-virus arrangements 46
H04L 9/40 - Network security protocols 44
G06F 21/57 - Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities 41
G06N 20/00 - Machine learning 39
See more
Status
Pending 21
Registered / In Force 71
Found results for  patents

1.

THREAT MITIGATION SYSTEM AND METHOD

      
Application Number 19088619
Status Pending
Filing Date 2025-03-24
First Publication Date 2025-07-10
Owner ReliaQuest Holdings, LLC (USA)
Inventor
  • Murphy, Brian P.
  • Partlow, Joe
  • O'Connor, Colin
  • Pfeiffer, Jason
  • Murphy, Brian Philip

Abstract

A computer-implemented method, computer program product and computing system for: a computer-implemented method is executed on a computing device and includes: obtaining object information concerning one or more initial objects within a computing platform in response to a security event; identifying an event type for the security event; and executing a response script based, at least in part, upon the event type.

IPC Classes  ?

  • G06F 21/55 - Detecting local intrusion or implementing counter-measures
  • G06F 21/56 - Computer malware detection or handling, e.g. anti-virus arrangements
  • H04L 9/40 - Network security protocols

2.

THREAT MITIGATION SYSTEM AND METHOD

      
Application Number 18956148
Status Pending
Filing Date 2024-11-22
First Publication Date 2025-03-13
Owner ReliaQuest Holdings, LLC (USA)
Inventor
  • Murphy, Brian P.
  • Partlow, Joe
  • O'Connor, Colin
  • Pfeiffer, Jason
  • Murphy, Brian Philip

Abstract

A computer-implemented method, computer program product and computing system for receiving a plurality of detection events concerning a plurality of security events occurring on multiple security-relevant subsystems within one or more computing platforms; storing the plurality of detection events to form an event repository; and processing the event repository using a machine learning model to identify attack patterns defined within the plurality of detection events stored within the event repository, thus defining one or more identified attack patterns.

IPC Classes  ?

  • G06F 21/56 - Computer malware detection or handling, e.g. anti-virus arrangements
  • H04L 9/40 - Network security protocols

3.

THREAT MITIGATION SYSTEM AND METHOD

      
Application Number 18928472
Status Pending
Filing Date 2024-10-28
First Publication Date 2025-02-13
Owner ReliaQuest Holdings, LLC (USA)
Inventor
  • Murphy, Brian P.
  • Partlow, Joe
  • O'Connor, Colin
  • Pfeiffer, Jason

Abstract

A computer-implemented method, computer program product and computing system for: obtaining one or more artifacts concerning a detected security event; obtaining artifact information concerning the one or more artifacts; and generating a conclusion concerning the detected security event based, at least in part, upon the detected security event, the one or more artifacts, and the artifact information.

IPC Classes  ?

  • G06F 21/57 - Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
  • G06F 8/65 - Updates
  • G06F 18/20 - Analysing
  • G06F 18/214 - Generating training patternsBootstrap methods, e.g. bagging or boosting
  • G06F 21/53 - Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity, buffer overflow or preventing unwanted data erasure by executing in a restricted environment, e.g. sandbox or secure virtual machine
  • G06F 21/55 - Detecting local intrusion or implementing counter-measures
  • G06F 21/56 - Computer malware detection or handling, e.g. anti-virus arrangements
  • G06F 30/20 - Design optimisation, verification or simulation
  • G06N 20/00 - Machine learning
  • H04L 9/40 - Network security protocols

4.

THREAT MITIGATION SYSTEM AND METHOD

      
Application Number 18891195
Status Pending
Filing Date 2024-09-20
First Publication Date 2025-01-09
Owner ReliaQuest Holdings, LLC (USA)
Inventor
  • Murphy, Brian P.
  • Partlow, Joe
  • O'Connor, Colin
  • Pfeiffer, Jason

Abstract

A computer-implemented method, computer program product and computing system for: obtaining hardware performance information concerning hardware deployed within a computing platform; obtaining platform performance information concerning the operation of the computing platform; obtaining application performance information concerning one or more applications deployed within the computing platform; and generating a holistic platform report concerning the computing platform based, at least in part, upon the hardware performance information, the platform performance information and the application performance information.

IPC Classes  ?

  • G06F 21/57 - Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
  • G06F 8/65 - Updates
  • G06F 18/20 - Analysing
  • G06F 18/214 - Generating training patternsBootstrap methods, e.g. bagging or boosting
  • G06F 21/53 - Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity, buffer overflow or preventing unwanted data erasure by executing in a restricted environment, e.g. sandbox or secure virtual machine
  • G06F 21/55 - Detecting local intrusion or implementing counter-measures
  • G06F 21/56 - Computer malware detection or handling, e.g. anti-virus arrangements
  • G06F 30/20 - Design optimisation, verification or simulation
  • G06N 20/00 - Machine learning
  • H04L 9/40 - Network security protocols

5.

Display screen or portion thereof with a graphical user interface

      
Application Number 29818482
Grant Number D1046878
Status In Force
Filing Date 2021-12-09
First Publication Date 2024-10-15
Grant Date 2024-10-15
Owner ReliaQuest Holdings, LLC (USA)
Inventor
  • Murphy, Brian P.
  • Partlow, Joe
  • O'Connor, Colin
  • Pfeiffer, Jason
  • Murphy, Brian Philip

6.

Display screen or portion thereof with a graphical user interface

      
Application Number 29818498
Grant Number D1046879
Status In Force
Filing Date 2021-12-09
First Publication Date 2024-10-15
Grant Date 2024-10-15
Owner ReliaQuest Holdings, LLC (USA)
Inventor
  • Murphy, Brian P.
  • Partlow, Joe
  • O'Connor, Colin
  • Pfeiffer, Jason
  • Murphy, Brian Philip

7.

Display screen or portion thereof with a graphical user interface

      
Application Number 29818501
Grant Number D1046880
Status In Force
Filing Date 2021-12-09
First Publication Date 2024-10-15
Grant Date 2024-10-15
Owner ReliaQuest Holdings, LLC (USA)
Inventor
  • Murphy, Brian P.
  • Partlow, Joe
  • O'Connor, Colin
  • Pfeiffer, Jason
  • Murphy, Brian Philip

8.

Threat mitigation system and method

      
Application Number 18584989
Grant Number 12348554
Status In Force
Filing Date 2024-02-22
First Publication Date 2024-09-12
Grant Date 2025-07-01
Owner RELIAQUEST HOLDINGS, LLC (USA)
Inventor
  • Murphy, Brian P.
  • Partlow, Joe
  • O'Connor, Colin
  • Pfeiffer, Jason
  • Murphy, Brian Philip
  • Echavarria, Jonathan R.

Abstract

A computer-implemented method, computer program product and computing system for establishing connectivity with a plurality of security-relevant subsystems within a computing platform; receiving an initial notification of a security event from one of the security-relevant subsystems, wherein the initial notification includes a computer-readable language portion that defines one or more specifics of the security event; and iteratively processing the initial notification using a generative AI model and a formatting script to produce a summarized human-readable report for the initial notification.

IPC Classes  ?

  • H04L 29/06 - Communication control; Communication processing characterised by a protocol
  • G06F 16/34 - BrowsingVisualisation therefor
  • G06F 21/55 - Detecting local intrusion or implementing counter-measures
  • G06F 21/56 - Computer malware detection or handling, e.g. anti-virus arrangements
  • G06F 40/103 - Formatting, i.e. changing of presentation of documents
  • G06F 40/154 - Tree transformation for tree-structured or markup documents, e.g. XSLT, XSL-FO or stylesheets
  • G06F 40/56 - Natural language generation
  • G06N 3/0475 - Generative networks
  • H04L 9/40 - Network security protocols
  • H04L 41/16 - Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks using machine learning or artificial intelligence

9.

THREAT MITIGATION SYSTEM AND METHOD

      
Application Number 18584996
Status Pending
Filing Date 2024-02-22
First Publication Date 2024-08-29
Owner ReliaQuest Holdings, LLC (USA)
Inventor
  • Murphy, Brian P.
  • Partlow, Joe
  • O'Connor, Colin
  • Pfeiffer, Jason
  • Murphy, Brian Philip
  • Echavarria, Jonathan R.

Abstract

A computer-implemented method, computer program product and computing system for defining a formatting script for use with a Generative AI Model; receiving a notification of a security event, wherein the notification includes a computer-readable language portion that defines one or more specifics of the security event; and processing at least a portion of the computer-readable language portion of the notification using the Generative AI Model and the formatting script to summarize the computer-readable language portion and generate a summarized human-readable report.

IPC Classes  ?

10.

THREAT MITIGATION SYSTEM AND METHOD

      
Application Number 18585120
Status Pending
Filing Date 2024-02-23
First Publication Date 2024-08-29
Owner ReliaQuest Holdings, LLC (USA)
Inventor
  • Murphy, Brian P.
  • Partlow, Joe
  • O'Connor, Colin
  • Pfeiffer, Jason
  • Murphy, Brian Philip
  • Echavarria, Jonathan R.

Abstract

A computer-implemented method, computer program product and computing system for establishing connectivity with a plurality of security-relevant subsystems within a computing platform; receiving an initial notification of a security event from one of the security-relevant subsystems, wherein the initial notification includes a computer-readable language portion that defines one or more specifics of the security event; processing the initial notification using a generative AI model and a formatting script to produce a summarized human-readable report for the initial notification, wherein the summarized human-readable report defines one or more recommended next steps; and automatically executing some or all of the recommended next steps to define one or more recommended actions.

IPC Classes  ?

11.

THREAT MITIGATION SYSTEM AND METHOD

      
Application Number 18585510
Status Pending
Filing Date 2024-02-23
First Publication Date 2024-08-29
Owner ReliaQuest Holdings, LLC (USA)
Inventor
  • Murphy, Brian P.
  • Partlow, Joe
  • O'Connor, Colin
  • Pfeiffer, Jason
  • Murphy, Brian Philip
  • Echavarria, Jonathan R.

Abstract

A computer-implemented method, computer program product and computing system for monitoring activity within a computing platform, thus defining monitored activity; associating the monitored activity with a user of the computing platform, thus defining an associated user; and assigning a risk level to the monitored activity to determine if such monitored activity is indicative of a security event, wherein the assigned risk level is based, at least in part, upon the associated user.

IPC Classes  ?

  • G06F 21/55 - Detecting local intrusion or implementing counter-measures

12.

THREAT MITIGATION SYSTEM AND METHOD

      
Application Number 18584994
Status Pending
Filing Date 2024-02-22
First Publication Date 2024-08-29
Owner ReliaQuest Holdings, LLC (USA)
Inventor
  • Murphy, Brian P.
  • Partlow, Joe
  • O'Connor, Colin
  • Pfeiffer, Jason
  • Murphy, Brian Philip
  • Echavarria, Jonathan R.

Abstract

A computer-implemented method, computer program product and computing system for deploying an agent to proactively monitor activity within a computing platform and generate an initial notification if a security event is detected; receiving the initial notification of the security event from the agent, wherein the initial notification includes a computer-readable language portion that defines one or more specifics of the security event; and iteratively processing the initial notification using a generative AI model and a formatting script to produce a summarized human-readable report for the initial notification.

IPC Classes  ?

13.

THREAT MITIGATION SYSTEM AND METHOD

      
Application Number 18585000
Status Pending
Filing Date 2024-02-22
First Publication Date 2024-08-29
Owner ReliaQuest Holdings, LLC (USA)
Inventor
  • Murphy, Brian P.
  • Partlow, Joe
  • O'Connor, Colin
  • Pfeiffer, Jason
  • Murphy, Brian Philip
  • Echavarria, Jonathan R.

Abstract

A computer-implemented method, computer program product and computing system for defining a formatting script for use with a Generative AI Model; receiving a plurality of notifications of a security event, wherein each of the plurality of notifications includes a computer-readable language portion that defines one or more specifics of the security event, thus defining a plurality of computer-readable language portions; processing at least a portion of each of the plurality of computer-readable language portions using the Generative AI Model and the formatting script to summarize each of the computer-readable language portions and generate a plurality of event summaries; and’ processing at least a portion of each of the plurality of event summaries using the Generative AI Model and the formatting script to summarize the plurality of event summaries and generate a summarized human-readable report.

IPC Classes  ?

  • G06F 21/55 - Detecting local intrusion or implementing counter-measures
  • G06F 21/56 - Computer malware detection or handling, e.g. anti-virus arrangements

14.

Threat mitigation system and method

      
Application Number 18585125
Grant Number 12348555
Status In Force
Filing Date 2024-02-23
First Publication Date 2024-08-29
Grant Date 2025-07-01
Owner RELIAQUEST HOLDINGS, LLC (USA)
Inventor
  • Murphy, Brian P.
  • Partlow, Joe
  • O'Connor, Colin
  • Pfeiffer, Jason
  • Murphy, Brian Philip
  • Echavarria, Jonathan R.

Abstract

A computer-implemented method, computer program product and computing system for establishing connectivity with a plurality of security-relevant subsystems within a computing platform; receiving an initial notification of a security event from one of the security-relevant subsystems, wherein the initial notification includes a computer-readable language portion that defines one or more specifics of the security event; processing the initial notification using a generative AI model and a formatting script to produce a summarized human-readable report for the initial notification, wherein the summarized human-readable report defines one or more recommended actions; and automatically executing some or all of the recommended actions to address the security event.

IPC Classes  ?

  • H04L 9/40 - Network security protocols
  • G06F 16/34 - BrowsingVisualisation therefor
  • G06F 21/55 - Detecting local intrusion or implementing counter-measures
  • G06F 21/56 - Computer malware detection or handling, e.g. anti-virus arrangements
  • G06F 40/103 - Formatting, i.e. changing of presentation of documents
  • G06F 40/154 - Tree transformation for tree-structured or markup documents, e.g. XSLT, XSL-FO or stylesheets
  • G06F 40/56 - Natural language generation
  • G06N 3/0475 - Generative networks
  • H04L 41/16 - Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks using machine learning or artificial intelligence

15.

THREAT MITIGATION SYSTEM AND METHOD

      
Application Number 18585128
Status Pending
Filing Date 2024-02-23
First Publication Date 2024-08-29
Owner ReliaQuest Holdings, LLC (USA)
Inventor
  • Murphy, Brian P.
  • Partlow, Joe
  • O'Connor, Colin
  • Pfeiffer, Jason
  • Murphy, Brian Philip
  • Echavarria, Jonathan R.

Abstract

A computer-implemented method, computer program product and computing system for maintaining a model repository that defines a plurality of AI models; establishing connectivity with a plurality of security-relevant subsystems within a computing platform; receiving an initial notification of a security event from one of the security-relevant subsystems, wherein the initial notification includes a computer-readable language portion that defines one or more specifics of the security event; and selecting a generative AI model for processing the initial notification of the security event from the plurality of AI models defined within the model repository, thus defining a selected generative AI model.

IPC Classes  ?

  • G06F 21/56 - Computer malware detection or handling, e.g. anti-virus arrangements
  • G06N 3/0475 - Generative networks

16.

Threat mitigation system and method

      
Application Number 18585186
Grant Number 12355807
Status In Force
Filing Date 2024-02-23
First Publication Date 2024-08-29
Grant Date 2025-07-08
Owner RELIAQUEST HOLDINGS, LLC (USA)
Inventor
  • Murphy, Brian P.
  • Partlow, Joe
  • O'Connor, Colin
  • Pfeiffer, Jason
  • Murphy, Brian Philip
  • Echavarria, Jonathan R.

Abstract

A computer-implemented method, computer program product and computing system for establishing connectivity with a plurality of security-relevant subsystems within a computing platform; receiving an initial notification of a security event from one of the security-relevant subsystems, wherein the initial notification includes a computer-readable language portion that defines one or more specifics of the security event; processing the initial notification using a generative AI model and a formatting script to define one or more recommended actions; automatically generating a playbook to effectuate at least one of the recommended actions; and processing the playbook to address at least a portion of the security event.

IPC Classes  ?

  • H04L 9/40 - Network security protocols
  • G06F 16/34 - BrowsingVisualisation therefor
  • G06F 21/55 - Detecting local intrusion or implementing counter-measures
  • G06F 21/56 - Computer malware detection or handling, e.g. anti-virus arrangements
  • G06F 40/103 - Formatting, i.e. changing of presentation of documents
  • G06F 40/154 - Tree transformation for tree-structured or markup documents, e.g. XSLT, XSL-FO or stylesheets
  • G06F 40/56 - Natural language generation
  • G06N 3/0475 - Generative networks
  • H04L 41/16 - Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks using machine learning or artificial intelligence

17.

THREAT MITIGATION SYSTEM AND METHOD

      
Application Number 18585428
Status Pending
Filing Date 2024-02-23
First Publication Date 2024-08-29
Owner ReliaQuest Holdings, LLC (USA)
Inventor
  • Murphy, Brian P.
  • Partlow, Joe
  • O'Connor, Colin
  • Pfeiffer, Jason
  • Murphy, Brian Philip
  • Echavarria, Jonathan R.

Abstract

A computer-implemented method, computer program product and computing system for generating one or more detection rules that are indicative of a security event, wherein the one or more detection rules are based upon historical suspect activity and/or historical security events; monitoring activity within a computing platform, thus defining monitored activity; comparing such monitored activity to the one or more detection rules to determine if such monitored activity includes suspect activity indicative of a security event; generating an initial notification of the security event, wherein the initial notification includes a computer-readable language portion that defines one or more specifics of the security event; and iteratively processing the initial notification using a generative AI model and a formatting script to produce a summarized human-readable report for the initial notification.

IPC Classes  ?

  • G06F 16/34 - BrowsingVisualisation therefor
  • G06F 21/55 - Detecting local intrusion or implementing counter-measures

18.

THREAT MITIGATION SYSTEM AND METHOD

      
Application Number 18585687
Status Pending
Filing Date 2024-02-23
First Publication Date 2024-08-29
Owner ReliaQuest Holdings, LLC (USA)
Inventor
  • Murphy, Brian P.
  • Partlow, Joe
  • O'Connor, Colin
  • Pfeiffer, Jason
  • Murphy, Brian Philip
  • Echavarria, Jonathan R.

Abstract

A threat mitigation platform includes: an agent subsystem configured to generate an initial notification concerning a security event within a computing platform; a generative AI-based planner subsystem configured to receive the initial notification and generate a mitigation plan to address, in whole or in part, the security event within the computing platform; an executor subsystem configured to iteratively process the mitigation plan using a generative AI model to generate an output; and an output formatter subsystem configured to format the output and generate a summarized human-readable report for the initial notification.

IPC Classes  ?

19.

THREAT MITIGATION SYSTEM AND METHOD

      
Application Number 18635680
Status Pending
Filing Date 2024-04-15
First Publication Date 2024-08-01
Owner ReliaQuest Holdings, LLC (USA)
Inventor
  • Murphy, Brian P.
  • Partlow, Joe
  • O'Connor, Colin
  • Pfeiffer, Jason
  • Murphy, Brian Philip

Abstract

A computer-implemented method, computer program product and computing system for: establishing connectivity with a plurality of security-relevant subsystems within a computing platform; and mapping one or more data fields of a unified platform to one or more data fields of each of the plurality of security-relevant subsystems.

IPC Classes  ?

20.

Display screen or portion thereof with a graphical user interface

      
Application Number 29818485
Grant Number D1028002
Status In Force
Filing Date 2021-12-09
First Publication Date 2024-05-21
Grant Date 2024-05-21
Owner RELIAQUEST HOLDINGS, LLC (USA)
Inventor
  • Murphy, Brian P.
  • Partlow, Joe
  • O'Connor, Colin
  • Pfeiffer, Jason
  • Murphy, Brian Philip

21.

Threat mitigation system and method

      
Application Number 18390658
Grant Number 12259972
Status In Force
Filing Date 2023-12-20
First Publication Date 2024-04-11
Grant Date 2025-03-25
Owner ReliaQuest Holdings, LLC (USA)
Inventor
  • Murphy, Brian P.
  • Partlow, Joe
  • O'Connor, Colin
  • Pfeiffer, Jason
  • Murphy, Brian Philip

Abstract

A computer-implemented method, computer program product and computing system for: a computer-implemented method is executed on a computing device and includes: obtaining object information concerning one or more initial objects within a computing platform in response to a security event; identifying an event type for the security event; and executing a response script based, at least in part, upon the event type.

IPC Classes  ?

  • G06F 21/55 - Detecting local intrusion or implementing counter-measures
  • G06F 21/56 - Computer malware detection or handling, e.g. anti-virus arrangements
  • H04L 9/40 - Network security protocols

22.

Threat mitigation system and method

      
Application Number 18130167
Grant Number 12229263
Status In Force
Filing Date 2023-04-03
First Publication Date 2023-11-02
Grant Date 2025-02-18
Owner RELIAQUEST HOLDINGS, LLC (USA)
Inventor
  • Murphy, Brian P.
  • Partlow, Joe
  • O′connor, Colin
  • Pfeiffer, Jason
  • Murphy, Brian Philip

Abstract

A computer-implemented method, computer program product and computing system for receiving a plurality of detection events concerning a plurality of security events occurring on two or more security-relevant subsystems within a computing platform; identifying two or more associated detection events included within the plurality of detection events; and grouping the two or more associated detection events to define a security incident.

IPC Classes  ?

  • H04L 9/40 - Network security protocols
  • G06F 21/56 - Computer malware detection or handling, e.g. anti-virus arrangements

23.

Display screen or portion thereof with a graphical user interface

      
Application Number 29818493
Grant Number D1003312
Status In Force
Filing Date 2021-12-09
First Publication Date 2023-10-31
Grant Date 2023-10-31
Owner RELIAQUEST HOLDINGS, LLC (USA)
Inventor
  • Murphy, Brian P.
  • Partlow, Joe
  • O'Connor, Colin
  • Pfeiffer, Jason
  • Murphy, Brian Philip

24.

Display screen or portion thereof with a graphical user interface

      
Application Number 29818490
Grant Number D1002656
Status In Force
Filing Date 2021-12-09
First Publication Date 2023-10-24
Grant Date 2023-10-24
Owner RELIAQUEST HOLDINGS, LLC (USA)
Inventor
  • Murphy, Brian P.
  • Partlow, Joe
  • O'Connor, Colin
  • Pfeiffer, Jason
  • Murphy, Brian Philip

25.

Display screen or portion thereof with a graphical user interface

      
Application Number 29818496
Grant Number D1002657
Status In Force
Filing Date 2021-12-09
First Publication Date 2023-10-24
Grant Date 2023-10-24
Owner RELIAQUEST HOLDINGS, LLC (USA)
Inventor
  • Murphy, Brian P.
  • Partlow, Joe
  • O'Connor, Colin
  • Pfeiffer, Jason
  • Murphy, Brian Philip

26.

Threat mitigation system and method

      
Application Number 18130152
Grant Number 12182266
Status In Force
Filing Date 2023-04-03
First Publication Date 2023-10-05
Grant Date 2024-12-31
Owner RELIAQUEST HOLDINGS, LLC (USA)
Inventor
  • Murphy, Brian P.
  • Partlow, Joe
  • O'Connor, Colin
  • Pfeiffer, Jason
  • Murphy, Brian Philip

Abstract

A computer-implemented method, computer program product and computing system for receiving a plurality of detection events concerning a plurality of security events occurring on a security-relevant subsystem within a computing platform; identifying two or more associated detection events included within the plurality of detection events; and grouping the two or more associated detection events to define a security incident.

IPC Classes  ?

  • H04L 9/40 - Network security protocols
  • G06F 21/56 - Computer malware detection or handling, e.g. anti-virus arrangements

27.

Threat mitigation system and method

      
Application Number 18130182
Grant Number 12223047
Status In Force
Filing Date 2023-04-03
First Publication Date 2023-10-05
Grant Date 2025-02-11
Owner ReliaQuest Holdings, LLC (USA)
Inventor
  • Murphy, Brian P.
  • Partlow, Joe
  • O'Connor, Colin
  • Pfeiffer, Jason
  • Murphy, Brian Philip

Abstract

A computer-implemented method, computer program product and computing system for defining a first query for a first security-relevant subsystem within a computing platform; processing the first query on the first security-relevant subsystem to generate a first data set concerning security events occurring on the first security-relevant subsystem; and receiving the first data set concerning the security events occurring on the first security-relevant subsystem.

IPC Classes  ?

  • G06F 21/56 - Computer malware detection or handling, e.g. anti-virus arrangements
  • H04L 9/40 - Network security protocols

28.

THREAT MITIGATION SYSTEM AND METHOD

      
Application Number 18130218
Status Pending
Filing Date 2023-04-03
First Publication Date 2023-10-05
Owner ReliaQuest Holdings, LLC (USA)
Inventor
  • Murphy, Brian P.
  • Partlow, Joe
  • O'Connor, Colin
  • Pfeiffer, Jason
  • Murphy, Brian Philip

Abstract

A computer-implemented method, computer program product and computing system for defining a universal detection rule for execution on a computing platform; processing the universal detection rule to generate a first detection rule that is executable on a first security-relevant subsystem within the computing platform; providing the first detection rule to the first security-relevant subsystem for execution on the first security-relevant subsystem; processing the universal detection rule to generate a second detection rule that is executable on a second security-relevant subsystem within the computing platform; and providing the second detection rule to the second security-relevant subsystem for execution on the first security-relevant subsystem.

IPC Classes  ?

29.

Threat mitigation system and method

      
Application Number 18130231
Grant Number 12223048
Status In Force
Filing Date 2023-04-03
First Publication Date 2023-10-05
Grant Date 2025-02-11
Owner RELIAQUEST HOLDINGS, LLC (USA)
Inventor
  • Murphy, Brian P.
  • Partlow, Joe
  • O'Connor, Colin
  • Pfeiffer, Jason
  • Murphy, Brian Philip

Abstract

A computer-implemented method, computer program product and computing system for receiving a plurality of detection events concerning a plurality of security events occurring on multiple security-relevant subsystems within one or more computing platforms; storing the plurality of detection events to form an event repository; and processing the event repository using a machine learning model to identify attack patterns defined within the plurality of detection events stored within the event repository, thus defining one or more identified attack patterns.

IPC Classes  ?

  • H04L 29/06 - Communication control; Communication processing characterised by a protocol
  • G06F 21/56 - Computer malware detection or handling, e.g. anti-virus arrangements
  • H04L 9/40 - Network security protocols

30.

THREAT MITIGATION SYSTEM AND METHOD

      
Application Number 18130271
Status Pending
Filing Date 2023-04-03
First Publication Date 2023-10-05
Owner ReliaQuest Holdings, LLC (USA)
Inventor
  • Murphy, Brian P.
  • Partlow, Joe
  • O'Connor, Colin
  • Pfeiffer, Jason
  • Murphy, Brian Philip

Abstract

A computer-implemented method, computer program product and computing system for receiving a plurality of detection events concerning a plurality of security events occurring on multiple security-relevant subsystems within one or more computing platforms; processing the plurality of detection events to make them compatible with a graph database, thus defining processed detection events; and storing the processed detection events within a graph content repository.

IPC Classes  ?

  • G06F 21/56 - Computer malware detection or handling, e.g. anti-virus arrangements

31.

Threat mitigation system and method

      
Application Number 18325230
Grant Number 12229276
Status In Force
Filing Date 2023-05-30
First Publication Date 2023-09-28
Grant Date 2025-02-18
Owner RELIAQUEST HOLDINGS, LLC (USA)
Inventor
  • Murphy, Brian P.
  • Partlow, Joe
  • O'Connor, Colin
  • Pfeiffer, Jason

Abstract

A computer-implemented method, computer program product and computing system for: obtaining hardware performance information concerning hardware deployed within a computing platform; obtaining platform performance information concerning the operation of the computing platform; obtaining application performance information concerning one or more applications deployed within the computing platform; and generating a holistic platform report concerning the computing platform based, at least in part, upon the hardware performance information, the platform performance information and the application performance information.

IPC Classes  ?

  • H04L 29/06 - Communication control; Communication processing characterised by a protocol
  • G06F 8/65 - Updates
  • G06F 18/20 - Analysing
  • G06F 18/214 - Generating training patternsBootstrap methods, e.g. bagging or boosting
  • G06F 21/53 - Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity, buffer overflow or preventing unwanted data erasure by executing in a restricted environment, e.g. sandbox or secure virtual machine
  • G06F 21/55 - Detecting local intrusion or implementing counter-measures
  • G06F 21/56 - Computer malware detection or handling, e.g. anti-virus arrangements
  • G06F 21/57 - Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
  • G06F 30/20 - Design optimisation, verification or simulation
  • G06N 20/00 - Machine learning
  • H04L 9/40 - Network security protocols

32.

Threat mitigation system and method

      
Application Number 18318338
Grant Number 12328342
Status In Force
Filing Date 2023-05-16
First Publication Date 2023-09-14
Grant Date 2025-06-10
Owner ReliaQuest Holdings, LLC (USA)
Inventor
  • Murphy, Brian P.
  • Partlow, Joe
  • O'Connor, Colin
  • Pfeiffer, Jason
  • Murphy, Brian Philip

Abstract

A computer-implemented method, computer program product and computing system for: establishing connectivity with a plurality of security-relevant subsystems within a computing platform; defining a plurality of subsystem-specific queries on a unified platform concerning the plurality of security-relevant subsystems, wherein one or more of the plurality of subsystem-specific queries has a defined execution schedule; and providing the plurality of subsystem-specific queries to the plurality of security-relevant subsystems.

IPC Classes  ?

33.

Threat mitigation system and method

      
Application Number 17951690
Grant Number 11921864
Status In Force
Filing Date 2022-09-23
First Publication Date 2023-01-19
Grant Date 2024-03-05
Owner RELIAQUEST HOLDINGS, LLC (USA)
Inventor
  • Murphy, Brian P.
  • Partlow, Joe
  • O'Connor, Colin
  • Pfeiffer, Jason

Abstract

A computer-implemented method, computer program product and computing system for: obtaining first system-defined platform information concerning a first security-relevant subsystem within a computing platform; obtaining at least a second system-defined platform information concerning at least a second security-relevant subsystem within the computing platform; combining the first system-defined platform information and the at least a second system-defined platform information to form system-defined consolidated platform information; and generating a security profile based, at least in part, upon the system-defined consolidated platform information.

IPC Classes  ?

  • G06F 21/00 - Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
  • G06F 8/65 - Updates
  • G06F 18/214 - Generating training patternsBootstrap methods, e.g. bagging or boosting
  • G06F 21/53 - Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity, buffer overflow or preventing unwanted data erasure by executing in a restricted environment, e.g. sandbox or secure virtual machine
  • G06F 21/55 - Detecting local intrusion or implementing counter-measures
  • G06F 21/56 - Computer malware detection or handling, e.g. anti-virus arrangements
  • G06F 21/57 - Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
  • G06F 30/20 - Design optimisation, verification or simulation
  • G06N 20/00 - Machine learning
  • H04L 9/40 - Network security protocols

34.

Display screen or portion thereof with a graphical user interface

      
Application Number 29705948
Grant Number D0969819
Status In Force
Filing Date 2019-09-17
First Publication Date 2022-11-15
Grant Date 2022-11-15
Owner Reliaquest Holdings, LLC (USA)
Inventor
  • Murphy, Brian P.
  • Partlow, Joe
  • O'Connor, Colin
  • Pfeiffer, Jason

35.

Threat mitigation system and method

      
Application Number 17857461
Grant Number 12355799
Status In Force
Filing Date 2022-07-05
First Publication Date 2022-11-03
Grant Date 2025-07-08
Owner ReliaQuest Holdings, LLC (USA)
Inventor
  • Murphy, Brian P.
  • Partlow, Joe
  • O'Connor, Colin
  • Pfeiffer, Jason
  • Murphy, Brian Philip

Abstract

A computer-implemented method, computer program product and computing system for: defining a threat mitigation platform for a client, wherein the threat mitigation platform includes a plurality of threat detection capability modules; defining a rollout schedule for at least a portion of the plurality of threat detection capability modules; and presenting the rollout schedule to the client.

IPC Classes  ?

  • G06F 9/445 - Program loading or initiating
  • G06F 11/34 - Recording or statistical evaluation of computer activity, e.g. of down time, of input/output operation
  • G06F 21/57 - Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
  • G06N 5/04 - Inference or reasoning models
  • G06N 20/00 - Machine learning
  • H04L 9/40 - Network security protocols
  • H04L 67/00 - Network arrangements or protocols for supporting network services or applications
  • H04L 67/60 - Scheduling or organising the servicing of application requests, e.g. requests for application data transmissions using the analysis and optimisation of the required network resources

36.

Threat intelligence system and method

      
Application Number 17863711
Grant Number 12120145
Status In Force
Filing Date 2022-07-13
First Publication Date 2022-11-03
Grant Date 2024-10-15
Owner RELIAQUEST HOLDINGS, LLC (USA)
Inventor
  • Murphy, Brian P.
  • Partlow, Joe

Abstract

A computer-implemented method, computer program product and computing system for importing threat data from a plurality of threat data sources, thus generating a plurality of raw threat data definitions. The plurality of raw threat data definitions are processed, thus generating a plurality of processed threat data definitions. The plurality of processed threat data definitions are processed to form a master threat data definition. The master threat data definition is provided to one or more client electronic devices.

IPC Classes  ?

  • H04L 9/40 - Network security protocols
  • H04L 67/02 - Protocols based on web technology, e.g. hypertext transfer protocol [HTTP]
  • H04L 67/563 - Data redirection of data network streams

37.

Threat mitigation system and method

      
Application Number 17735448
Grant Number 12204652
Status In Force
Filing Date 2022-05-03
First Publication Date 2022-10-27
Grant Date 2025-01-21
Owner RELIAQUEST HOLDINGS, LLC (USA)
Inventor
  • Murphy, Brian P.
  • Partlow, Joe
  • O'Connor, Colin
  • Pfeiffer, Jason

Abstract

A computer-implemented method, computer program product and computing system for: obtaining one or more artifacts concerning a detected security event; obtaining artifact information concerning the one or more artifacts; and generating a conclusion concerning the detected security event based, at least in part, upon the detected security event, the one or more artifacts, and the artifact information.

IPC Classes  ?

  • G06F 21/57 - Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
  • G06F 8/65 - Updates
  • G06F 18/20 - Analysing
  • G06F 18/214 - Generating training patternsBootstrap methods, e.g. bagging or boosting
  • G06F 21/53 - Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity, buffer overflow or preventing unwanted data erasure by executing in a restricted environment, e.g. sandbox or secure virtual machine
  • G06F 21/55 - Detecting local intrusion or implementing counter-measures
  • G06F 21/56 - Computer malware detection or handling, e.g. anti-virus arrangements
  • G06F 30/20 - Design optimisation, verification or simulation
  • G06N 20/00 - Machine learning
  • H04L 9/40 - Network security protocols

38.

Threat mitigation system and method

      
Application Number 17848986
Grant Number 11687659
Status In Force
Filing Date 2022-06-24
First Publication Date 2022-10-20
Grant Date 2023-06-27
Owner ReliaQuest Holdings, LLC (USA)
Inventor
  • Murphy, Brian P.
  • Partlow, Joe
  • O'Connor, Colin
  • Pfeiffer, Jason

Abstract

A computer-implemented method, computer program product and computing system for: obtaining hardware performance information concerning hardware deployed within a computing platform; obtaining platform performance information concerning the operation of the computing platform; obtaining application performance information concerning one or more applications deployed within the computing platform; and generating a holistic platform report concerning the computing platform based, at least in part, upon the hardware performance information, the platform performance information and the application performance information.

IPC Classes  ?

  • H04L 29/06 - Communication control; Communication processing characterised by a protocol
  • G06F 30/20 - Design optimisation, verification or simulation
  • G06F 21/57 - Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
  • H04L 9/40 - Network security protocols
  • G06N 20/00 - Machine learning
  • G06F 21/56 - Computer malware detection or handling, e.g. anti-virus arrangements
  • G06F 21/53 - Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity, buffer overflow or preventing unwanted data erasure by executing in a restricted environment, e.g. sandbox or secure virtual machine
  • G06F 21/55 - Detecting local intrusion or implementing counter-measures
  • G06F 8/65 - Updates
  • G06F 18/214 - Generating training patternsBootstrap methods, e.g. bagging or boosting

39.

Threat mitigation system and method

      
Application Number 17729221
Grant Number 11973797
Status In Force
Filing Date 2022-04-26
First Publication Date 2022-10-06
Grant Date 2024-04-30
Owner RELIAQUEST HOLDINGS, LLC (USA)
Inventor
  • Murphy, Brian P.
  • Partlow, Joe
  • O'Connor, Colin
  • Pfeiffer, Jason
  • Murphy, Brian Philip

Abstract

A computer-implemented method, computer program product and computing system for: establishing connectivity with a plurality of security-relevant subsystems within a computing platform; and mapping one or more data fields of a unified platform to one or more data fields of each of the plurality of security-relevant subsystems.

IPC Classes  ?

40.

THREAT MITIGATION SYSTEM AND METHOD

      
Application Number 17742007
Status Pending
Filing Date 2022-05-11
First Publication Date 2022-09-01
Owner ReliaQuest Holdings, LLC (USA)
Inventor
  • Murphy, Brian P.
  • Partlow, Joe
  • O'Connor, Colin
  • Pfeiffer, Jason

Abstract

A computer-implemented method, computer program product and computing system for: receiving platform information from a plurality of security-relevant subsystems; processing the platform information to generate processed platform information; identifying more threat-pertinent content included within the processed content; and routing the more threat-pertinent content to a threat analysis engine.

IPC Classes  ?

  • G06F 21/55 - Detecting local intrusion or implementing counter-measures

41.

THREAT MITIGATION SYSTEM AND METHOD

      
Application Number 17747086
Status Pending
Filing Date 2022-05-18
First Publication Date 2022-09-01
Owner ReliaQuest Holdings, LLC (USA)
Inventor
  • Murphy, Brian P.
  • Partlow, Joe
  • O'Connor, Colin
  • Pfeiffer, Jason

Abstract

A computer-implemented method, computer program product and computing system for: receiving platform information from a plurality of security-relevant subsystems; processing the platform information to generate processed platform information; identifying less threat-pertinent content included within the processed content; and routing the less threat-pertinent content to a long term storage system.

IPC Classes  ?

  • H04L 9/40 - Network security protocols
  • G06N 20/00 - Machine learning
  • G06F 21/56 - Computer malware detection or handling, e.g. anti-virus arrangements
  • G06F 21/53 - Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity, buffer overflow or preventing unwanted data erasure by executing in a restricted environment, e.g. sandbox or secure virtual machine
  • G06K 9/62 - Methods or arrangements for recognition using electronic means
  • G06F 21/55 - Detecting local intrusion or implementing counter-measures
  • G06F 21/57 - Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
  • G06F 8/65 - Updates
  • G06F 30/20 - Design optimisation, verification or simulation

42.

Threat mitigation system and method

      
Application Number 17688073
Grant Number 12346451
Status In Force
Filing Date 2022-03-07
First Publication Date 2022-06-23
Grant Date 2025-07-01
Owner RELIAQUEST HOLDINGS, LLC (USA)
Inventor
  • Murphy, Brian P.
  • Partlow, Joe
  • O'Connor, Colin
  • Pfeiffer, Jason

Abstract

A computer-implemented method, computer program product and computing system for: obtaining consolidated platform information for a computing platform to identify one or more deployed security-relevant subsystems; processing the consolidated platform information to identify one or more non-deployed security-relevant subsystems; generating a list of ranked & recommended security-relevant subsystems that ranks the one or more non-deployed security-relevant subsystems; and providing the list of ranked & recommended security-relevant subsystems to a third-party.

IPC Classes  ?

  • G06F 21/57 - Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
  • G06F 8/65 - Updates
  • G06F 18/20 - Analysing
  • G06F 18/214 - Generating training patternsBootstrap methods, e.g. bagging or boosting
  • G06F 21/53 - Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity, buffer overflow or preventing unwanted data erasure by executing in a restricted environment, e.g. sandbox or secure virtual machine
  • G06F 21/55 - Detecting local intrusion or implementing counter-measures
  • G06F 21/56 - Computer malware detection or handling, e.g. anti-virus arrangements
  • G06F 30/20 - Design optimisation, verification or simulation
  • G06N 20/00 - Machine learning
  • H04L 9/40 - Network security protocols

43.

Threat mitigation system and method

      
Application Number 17680985
Grant Number 11709946
Status In Force
Filing Date 2022-02-25
First Publication Date 2022-06-09
Grant Date 2023-07-25
Owner ReliaQuest Holdings, LLC (USA)
Inventor
  • Murphy, Brian P.
  • Partlow, Joe
  • O'Connor, Colin
  • Pfeiffer, Jason

Abstract

A computer-implemented method, computer program product and computing system for: defining a training routine for a specific attack of a computing platform; and generating a simulation of the specific attack by executing the training routine within a controlled test environment.

IPC Classes  ?

  • H04L 9/40 - Network security protocols
  • G06F 21/57 - Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
  • G06N 20/00 - Machine learning

44.

Threat mitigation system and method

      
Application Number 17532764
Grant Number 11659007
Status In Force
Filing Date 2021-11-22
First Publication Date 2022-05-26
Grant Date 2023-05-23
Owner ReliaQuest Holdings, LLC (USA)
Inventor
  • Murphy, Brian P.
  • Partlow, Joe
  • O'Connor, Colin
  • Pfeiffer, Jason
  • Murphy, Brian Philip

Abstract

A computer-implemented method, computer program product and computing system for: establishing connectivity with a plurality of security-relevant subsystems within a computing platform; defining a plurality of subsystem-specific queries on a unified platform concerning the plurality of security-relevant subsystems, wherein one or more of the plurality of subsystem-specific queries has a defined execution schedule; and providing the plurality of subsystem-specific queries to the plurality of security-relevant subsystems.

IPC Classes  ?

45.

Threat mitigation system and method

      
Application Number 17532783
Grant Number 11861001
Status In Force
Filing Date 2021-11-22
First Publication Date 2022-05-26
Grant Date 2024-01-02
Owner RELIAQUEST HOLDINGS, LLC (USA)
Inventor
  • Murphy, Brian P.
  • Partlow, Joe
  • O′connor, Colin
  • Pfeiffer, Jason
  • Murphy, Brian Philip

Abstract

A computer-implemented method, computer program product and computing system for: a computer-implemented method is executed on a computing device and includes: obtaining object information concerning one or more initial objects within a computing platform in response to a security event; identifying an event type for the security event; and executing a response script based, at least in part, upon the event type.

IPC Classes  ?

  • G06F 21/55 - Detecting local intrusion or implementing counter-measures
  • G06F 21/56 - Computer malware detection or handling, e.g. anti-virus arrangements
  • H04L 9/40 - Network security protocols

46.

System and method for identifying network security threats and assessing network security

      
Application Number 17503853
Grant Number 11709945
Status In Force
Filing Date 2021-10-18
First Publication Date 2022-02-03
Grant Date 2023-07-25
Owner RELIAQUEST HOLDINGS, LLC (USA)
Inventor
  • Carey, Marcus J.
  • Oyeniyi, Tolulope

Abstract

A system and method of security assessment of a network is described. The system may include one or more security assessment computers controlled by a security assessor, and connected to a network, and first executable program code for acting as an agent on a first end device on the network. The first executable program code is configured to be executed by a browser application of the first end device, and is configured to collect software information, hardware information, and/or vulnerability information of the first end device and transmit the same to a first security assessment computer of the one or more security assessment computers. The information may be transmitted as part of a domain name server (DNS) request. The DNS request may include information identifying the first end device to thus allow modification of the first end device in response to analysis of the collected information.

IPC Classes  ?

  • H04L 29/06 - Communication control; Communication processing characterised by a protocol
  • G06F 21/57 - Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
  • G06F 21/50 - Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
  • G06F 21/55 - Detecting local intrusion or implementing counter-measures
  • G06F 21/56 - Computer malware detection or handling, e.g. anti-virus arrangements
  • H04L 9/40 - Network security protocols
  • G06F 21/53 - Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity, buffer overflow or preventing unwanted data erasure by executing in a restricted environment, e.g. sandbox or secure virtual machine

47.

Threat Mitigation System and Method

      
Application Number 17333553
Status Pending
Filing Date 2021-05-28
First Publication Date 2021-12-02
Owner RELIAQUEST HOLDINGS, LLC (USA)
Inventor
  • Murphy, Brian P.
  • Partlow, Joe
  • O'Connor, Colin
  • Pfeiffer, Jason
  • Murphy, Brian Philip

Abstract

A computer-implemented method, computer program product and computing system for: establishing connectivity with a plurality of security-relevant subsystems within a computing platform; defining a specific task to be executed on one or more of the plurality of security-relevant subsystems, thus defining one or more target security-relevant subsystems; commissioning a container-based job within which the specific task will be executed; and executing the specific task within the container-based job.

IPC Classes  ?

  • H04L 29/06 - Communication control; Communication processing characterised by a protocol
  • G06F 9/455 - EmulationInterpretationSoftware simulation, e.g. virtualisation or emulation of application or operating system execution engines

48.

Threat mitigation system and method

      
Application Number 17337132
Grant Number 11637847
Status In Force
Filing Date 2021-06-02
First Publication Date 2021-09-16
Grant Date 2023-04-25
Owner ReliaQuest Holdings, LLC (USA)
Inventor
  • Murphy, Brian P.
  • Partlow, Joe
  • O'Connor, Colin
  • Pfeiffer, Jason

Abstract

A computer-implemented method, computer program product and computing system for: obtaining system-defined consolidated platform information for a computing platform from an independent information source; obtaining client-defined consolidated platform information for the computing platform from a client information source; and comparing the system-defined consolidated platform information to the client-defined consolidated platform information to define differential consolidated platform information for the computing platform.

IPC Classes  ?

  • H04L 9/40 - Network security protocols
  • G06N 20/00 - Machine learning
  • G06F 21/56 - Computer malware detection or handling, e.g. anti-virus arrangements
  • G06F 21/53 - Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity, buffer overflow or preventing unwanted data erasure by executing in a restricted environment, e.g. sandbox or secure virtual machine
  • G06K 9/62 - Methods or arrangements for recognition using electronic means
  • G06F 21/55 - Detecting local intrusion or implementing counter-measures
  • G06F 21/57 - Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
  • G06F 8/65 - Updates
  • G06F 30/20 - Design optimisation, verification or simulation

49.

Display screen or portion thereof with a graphical user interface

      
Application Number 29693794
Grant Number D0926809
Status In Force
Filing Date 2019-06-05
First Publication Date 2021-08-03
Grant Date 2021-08-03
Owner ReliaQuest Holdings, LLC (USA)
Inventor
  • Murphy, Brian P.
  • Partlow, Joe
  • O'Connor, Colin
  • Pfeiffer, Jason

50.

Display screen or portion thereof with a graphical user interface

      
Application Number 29693951
Grant Number D0926782
Status In Force
Filing Date 2019-06-06
First Publication Date 2021-08-03
Grant Date 2021-08-03
Owner ReliaQuest Holdings, LLC (USA)
Inventor
  • Murphy, Brian P.
  • Partlow, Joe
  • O'Connor, Colin
  • Pfeiffer, Jason

51.

Display screen or portion thereof with a graphical user interface

      
Application Number 29693796
Grant Number D0926810
Status In Force
Filing Date 2019-06-05
First Publication Date 2021-08-03
Grant Date 2021-08-03
Owner ReliaQuest Holdings, LLC (USA)
Inventor
  • Murphy, Brian P.
  • Partlow, Joe
  • O'Connor, Colin
  • Pfeiffer, Jason

52.

Display screen or portion thereof with a graphical user interface

      
Application Number 29693948
Grant Number D0926811
Status In Force
Filing Date 2019-06-06
First Publication Date 2021-08-03
Grant Date 2021-08-03
Owner ReliaQuest Holdings, LLC (USA)
Inventor
  • Murphy, Brian P.
  • Partlow, Joe
  • O'Connor, Colin
  • Pfeiffer, Jason

53.

Display screen or portion thereof with a graphical user interface

      
Application Number 29693957
Grant Number D0926200
Status In Force
Filing Date 2019-06-06
First Publication Date 2021-07-27
Grant Date 2021-07-27
Owner ReliaQuest Holdings, LLC (USA)
Inventor
  • Murphy, Brian P.
  • Partlow, Joe
  • O'Connor, Colin
  • Pfeiffer, Jason

54.

Threat mitigation system and method

      
Application Number 17105093
Grant Number 11483337
Status In Force
Filing Date 2020-11-25
First Publication Date 2021-05-27
Grant Date 2022-10-25
Owner RELIAQUEST HOLDINGS, LLC (USA)
Inventor
  • Murphy, Brian P.
  • Partlow, Joe
  • O'Connor, Colin
  • Pfeiffer, Jason
  • Murphy, Brian Philip

Abstract

A computer-implemented method, computer program product and computing system for: establishing connectivity with a plurality of security-relevant subsystems within a computing platform; defining a unified query on a unified platform concerning the plurality of security-relevant subsystems; denormalizing the unified query to define a subsystem-specific query for each of the plurality of security-relevant subsystems, thus defining a plurality of subsystem-specific queries; and providing the plurality of subsystem-specific queries to the plurality of security-relevant subsystems.

IPC Classes  ?

55.

Threat mitigation system and method

      
Application Number 17105125
Grant Number 11316887
Status In Force
Filing Date 2020-11-25
First Publication Date 2021-05-27
Grant Date 2022-04-26
Owner RELIAQUEST HOLDINGS, LLC (USA)
Inventor
  • Murphy, Brian P.
  • Partlow, Joe
  • O'Connor, Colin
  • Pfeiffer, Jason
  • Murphy, Brian Philip

Abstract

A computer-implemented method, computer program product and computing system for: establishing connectivity with a plurality of security-relevant subsystems within a computing platform; and mapping one or more data fields of a unified platform to one or more data fields of each of the plurality of security-relevant subsystems.

IPC Classes  ?

  • H04L 29/06 - Communication control; Communication processing characterised by a protocol
  • G06F 21/57 - Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
  • G06F 16/2452 - Query translation
  • G06F 16/2455 - Query execution

56.

Display screen or portion thereof with a graphical user interface

      
Application Number 29700977
Grant Number D0913310
Status In Force
Filing Date 2019-08-07
First Publication Date 2021-03-16
Grant Date 2021-03-16
Owner ReliaQuest Holdings, LLC (USA)
Inventor
  • Murphy, Brian P.
  • Partlow, Joe
  • O'Connor, Colin
  • Pfeiffer, Jason

57.

Threat mitigation system and method

      
Application Number 17016031
Grant Number 11297092
Status In Force
Filing Date 2020-09-09
First Publication Date 2021-03-11
Grant Date 2022-04-05
Owner RELIAQUEST HOLDINGS, LLC (USA)
Inventor
  • Murphy, Brian P.
  • Partlow, Joe
  • O'Connor, Colin
  • Pfeiffer, Jason
  • Murphy, Brian Philip

Abstract

A computer-implemented method, computer program product and computing system for: obtaining consolidated platform information to identify current security-relevant capabilities for a computing platform; determining possible security-relevant capabilities for the computing platform; and rendering graphical comparison information that illustrates a difference between the current security-relevant capabilities of the computing platform and the possible security-relevant capabilities of the computing platform.

IPC Classes  ?

  • H04L 29/06 - Communication control; Communication processing characterised by a protocol
  • G06F 21/57 - Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
  • G06N 20/00 - Machine learning
  • H04L 67/60 - Scheduling or organising the servicing of application requests, e.g. requests for application data transmissions using the analysis and optimisation of the required network resources
  • H04L 67/00 - Network arrangements or protocols for supporting network services or applications
  • G06F 11/34 - Recording or statistical evaluation of computer activity, e.g. of down time, of input/output operation
  • G06N 5/04 - Inference or reasoning models

58.

Threat mitigation system and method

      
Application Number 17016057
Grant Number 11102235
Status In Force
Filing Date 2020-09-09
First Publication Date 2021-03-11
Grant Date 2021-08-24
Owner ReliaQuest Holdings, LLC (USA)
Inventor
  • Murphy, Brian P.
  • Partlow, Joe
  • O'Connor, Colin
  • Pfeiffer, Jason
  • Murphy, Brian Philip

Abstract

A computer-implemented method, computer program product and computing system for: obtaining consolidated platform information to identify current security-relevant capabilities for a computing platform; identifying coverage gaps in the current security-relevant capabilities; and providing one or more recommendations concerning how to mitigate the coverage gaps.

IPC Classes  ?

  • H04L 9/00 - Arrangements for secret or secure communicationsNetwork security protocols
  • H04L 29/06 - Communication control; Communication processing characterised by a protocol
  • G06N 20/00 - Machine learning
  • H04L 29/08 - Transmission control procedure, e.g. data link level control procedure
  • G06F 11/34 - Recording or statistical evaluation of computer activity, e.g. of down time, of input/output operation
  • G06F 21/57 - Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
  • G06N 5/04 - Inference or reasoning models

59.

Threat mitigation system and method

      
Application Number 17016108
Grant Number 11057419
Status In Force
Filing Date 2020-09-09
First Publication Date 2021-03-11
Grant Date 2021-07-06
Owner ReliaQuest Holdings, LLC (USA)
Inventor
  • Murphy, Brian P.
  • Partlow, Joe
  • O'Connor, Colin
  • Pfeiffer, Jason
  • Murphy, Brian Philip

Abstract

A computer-implemented method, computer program product and computing system for: detecting one or more security events within a computing platform of a client; notifying the client of the one or more security events within the computing platform; determining how long it took the client to resolve the one or more security events within the computing platform; and providing a resolution report to the client that quantifies client resolution performance based, at least in part, upon how long it took the client to resolve the one or more security events within the computing platform.

IPC Classes  ?

  • H04L 29/00 - Arrangements, apparatus, circuits or systems, not covered by a single one of groups
  • H04L 29/06 - Communication control; Communication processing characterised by a protocol

60.

Threat mitigation system and method

      
Application Number 17016000
Grant Number 11411981
Status In Force
Filing Date 2020-09-09
First Publication Date 2021-03-11
Grant Date 2022-08-09
Owner RELIAQUEST HOLDINGS, LLC (USA)
Inventor
  • Murphy, Brian P.
  • Partlow, Joe
  • O'Connor, Colin
  • Pfeiffer, Jason
  • Murphy, Brian Philip

Abstract

A computer-implemented method, computer program product and computing system for: defining a threat mitigation platform for a client, wherein the threat mitigation platform includes a plurality of threat detection capability modules; defining a rollout schedule for at least a portion of the plurality of threat detection capability modules; and presenting the rollout schedule to the client.

IPC Classes  ?

  • G06F 9/445 - Program loading or initiating
  • H04L 9/40 - Network security protocols
  • G06N 20/00 - Machine learning
  • H04L 67/60 - Scheduling or organising the servicing of application requests, e.g. requests for application data transmissions using the analysis and optimisation of the required network resources
  • H04L 67/00 - Network arrangements or protocols for supporting network services or applications
  • G06F 11/34 - Recording or statistical evaluation of computer activity, e.g. of down time, of input/output operation
  • G06F 21/57 - Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
  • G06N 5/04 - Inference or reasoning models

61.

Threat mitigation system and method

      
Application Number 17016078
Grant Number 11552983
Status In Force
Filing Date 2020-09-09
First Publication Date 2021-03-11
Grant Date 2023-01-10
Owner Reliaquest Holdings, LLC (USA)
Inventor
  • Murphy, Brian P.
  • Partlow, Joe
  • O'Connor, Colin
  • Pfeiffer, Jason
  • Murphy, Brian Philip

Abstract

A computer-implemented method, computer program product and computing system for: detecting one or more security events within a computing platform of a client; notifying the client of the one or more security events within the computing platform; determining if the client responded to the one or more security events within the computing platform; and providing a response report to the client that quantifies client response performance based, at least in part, upon if the client responded to the one or more security events within the computing platform.

IPC Classes  ?

  • H04L 9/00 - Arrangements for secret or secure communicationsNetwork security protocols
  • H04L 9/40 - Network security protocols
  • G06N 20/00 - Machine learning
  • H04L 67/00 - Network arrangements or protocols for supporting network services or applications
  • G06F 11/34 - Recording or statistical evaluation of computer activity, e.g. of down time, of input/output operation
  • G06F 21/57 - Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
  • G06N 5/04 - Inference or reasoning models
  • H04L 67/60 - Scheduling or organising the servicing of application requests, e.g. requests for application data transmissions using the analysis and optimisation of the required network resources

62.

THREAT MITIGATION SYSTEM AND METHOD

      
Application Number 16939973
Status Pending
Filing Date 2020-07-27
First Publication Date 2021-01-28
Owner RELIAQUEST HOLDINGS, LLC (USA)
Inventor
  • Murphy, Brian P.
  • Partlow, Joe
  • O'Connor, Colin
  • Pfeiffer, Jason
  • Murphy, Brian Philip

Abstract

A computer-implemented method, computer program product and computing system for: a computer-implemented method is executed on a computing device and includes: rendering a threat mitigation user interface that identifies objects within a computing platform in response to a security event; enabling a third-party to select an object within the threat mitigation user interface, thus defining a selected object; and rendering an inspection window that defines object information concerning the selected object.

IPC Classes  ?

  • G06F 21/55 - Detecting local intrusion or implementing counter-measures
  • G06N 20/00 - Machine learning
  • G06N 7/00 - Computing arrangements based on specific mathematical models
  • G06F 3/0484 - Interaction techniques based on graphical user interfaces [GUI] for the control of specific functions or operations, e.g. selecting or manipulating an object, an image or a displayed text element, setting a parameter value or selecting a range

63.

Threat mitigation system and method

      
Application Number 16940020
Grant Number 12079331
Status In Force
Filing Date 2020-07-27
First Publication Date 2021-01-28
Grant Date 2024-09-03
Owner RELIAQUEST HOLDINGS, LLC (USA)
Inventor
  • Murphy, Brian P.
  • Partlow, Joe
  • O'Connor, Colin
  • Pfeiffer, Jason
  • Murphy, Brian Philip

Abstract

A computer-implemented method, computer program product and computing system for: a computer-implemented method is executed on a computing device and includes: rendering a threat mitigation user interface that identifies objects within a computing platform in response to a security event; and enabling a third-party to gather artifacts concerning an object within the threat mitigation user interface.

IPC Classes  ?

  • H04L 9/40 - Network security protocols
  • G06F 3/04842 - Selection of displayed objects or displayed text elements
  • G06F 21/55 - Detecting local intrusion or implementing counter-measures
  • G06N 7/01 - Probabilistic graphical models, e.g. probabilistic networks
  • G06N 20/00 - Machine learning

64.

Threat mitigation system and method

      
Application Number 16939993
Grant Number 12299116
Status In Force
Filing Date 2020-07-27
First Publication Date 2021-01-28
Grant Date 2025-05-13
Owner RELIAQUEST HOLDINGS, LLC (USA)
Inventor
  • Murphy, Brian P.
  • Partlow, Joe
  • O'Connor, Colin
  • Pfeiffer, Jason
  • Murphy, Brian Philip

Abstract

A computer-implemented method, computer program product and computing system for: a computer-implemented method is executed on a computing device and includes: rendering a threat mitigation user interface that identifies objects within a computing platform in response to a security event; rendering an inspection window that defines object information concerning a selected object within the threat mitigation user interface; and enabling a third-party to effectuate a specific targeted action that is based, at least in part, upon the object information defined within the inspection window.

IPC Classes  ?

  • G06F 21/55 - Detecting local intrusion or implementing counter-measures
  • G06F 3/04842 - Selection of displayed objects or displayed text elements
  • G06N 7/01 - Probabilistic graphical models, e.g. probabilistic networks
  • G06N 20/00 - Machine learning
  • H04L 9/40 - Network security protocols

65.

THREAT MITIGATION SYSTEM AND METHOD

      
Application Number 16940059
Status Pending
Filing Date 2020-07-27
First Publication Date 2021-01-28
Owner RELIAQUEST HOLDINGS, LLC (USA)
Inventor
  • Murphy, Brian P.
  • Partlow, Joe
  • O'Connor, Colin
  • Pfeiffer, Jason
  • Murphy, Brian Philip

Abstract

A computer-implemented method, computer program product and computing system for: a computer-implemented method is executed on a computing device and includes: rendering a threat mitigation user interface that identifies objects within a computing platform in response to a security event; monitoring actions taken by a third-party when investigating the security event; and providing suggestions to the third-party concerning additional actions to be taken by the third-party concerning the investigation of the security event.

IPC Classes  ?

  • G06F 21/55 - Detecting local intrusion or implementing counter-measures
  • G06F 3/0484 - Interaction techniques based on graphical user interfaces [GUI] for the control of specific functions or operations, e.g. selecting or manipulating an object, an image or a displayed text element, setting a parameter value or selecting a range

66.

Threat mitigation system and method

      
Application Number 16883562
Grant Number 11611577
Status In Force
Filing Date 2020-05-26
First Publication Date 2020-09-10
Grant Date 2023-03-21
Owner ReliaQuest Holdings, LLC (USA)
Inventor
  • Murphy, Brian P.
  • Partlow, Joe
  • O'Connor, Colin
  • Pfeiffer, Jason

Abstract

A computer-implemented method, computer program product and computing system for: obtaining consolidated platform information for a computing platform to identify one or more deployed security-relevant subsystems; processing the consolidated platform information to identify one or more non-deployed security-relevant subsystems; generating a list of ranked & recommended security-relevant subsystems that ranks the one or more non-deployed security-relevant subsystems; and providing the list of ranked & recommended security-relevant subsystems to a third-party.

IPC Classes  ?

  • H04L 9/40 - Network security protocols
  • G06N 20/00 - Machine learning
  • G06F 21/56 - Computer malware detection or handling, e.g. anti-virus arrangements
  • G06F 21/53 - Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity, buffer overflow or preventing unwanted data erasure by executing in a restricted environment, e.g. sandbox or secure virtual machine
  • G06K 9/62 - Methods or arrangements for recognition using electronic means
  • G06F 21/55 - Detecting local intrusion or implementing counter-measures
  • G06F 21/57 - Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
  • G06F 8/65 - Updates
  • G06F 30/20 - Design optimisation, verification or simulation

67.

Threat intelligence system and method

      
Application Number 16552693
Grant Number 11418536
Status In Force
Filing Date 2019-08-27
First Publication Date 2019-12-26
Grant Date 2022-08-16
Owner RELIAQUEST HOLDINGS, LLC (USA)
Inventor
  • Murphy, Brian P.
  • Partlow, Joe

Abstract

A computer-implemented method, computer program product and computing system for importing threat data from a plurality of threat data sources, thus generating a plurality of raw threat data definitions. The plurality of raw threat data definitions are processed, thus generating a plurality of processed threat data definitions. The plurality of processed threat data definitions are processed to form a master threat data definition. The master threat data definition is provided to one or more client electronic devices.

IPC Classes  ?

  • H04L 29/06 - Communication control; Communication processing characterised by a protocol
  • H04L 29/08 - Transmission control procedure, e.g. data link level control procedure
  • H04L 9/40 - Network security protocols
  • H04L 67/02 - Protocols based on web technology, e.g. hypertext transfer protocol [HTTP]
  • H04L 67/563 - Data redirection of data network streams

68.

System and method for identifying network security threats and assessing network security

      
Application Number 16550723
Grant Number 11151258
Status In Force
Filing Date 2019-08-26
First Publication Date 2019-12-19
Grant Date 2021-10-19
Owner Reliaquest Holdings, LLC (USA)
Inventor
  • Carey, Marcus J.
  • Oyeniyi, Tolulope

Abstract

A system and method of security assessment of a network is described. The system may include one or more security assessment computers controlled by a security assessor, and connected to a network, and first executable program code for acting as an agent on a first end device on the network. The first executable program code is configured to be executed by a browser application of the first end device, and is configured to collect software information, hardware information, and/or vulnerability information of the first end device and transmit the same to a first security assessment computer of the one or more security assessment computers. The information may be transmitted as part of a domain name server (DNS) request. The DNS request may include information identifying the first end device to thus allow modification of the first end device in response to analysis of the collected information.

IPC Classes  ?

  • H04L 29/06 - Communication control; Communication processing characterised by a protocol
  • G06F 21/57 - Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
  • G06F 21/50 - Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
  • G06F 21/55 - Detecting local intrusion or implementing counter-measures
  • G06F 21/56 - Computer malware detection or handling, e.g. anti-virus arrangements
  • G06F 21/53 - Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity, buffer overflow or preventing unwanted data erasure by executing in a restricted environment, e.g. sandbox or secure virtual machine

69.

Threat mitigation system and method

      
Application Number 16432488
Grant Number 11528287
Status In Force
Filing Date 2019-06-05
First Publication Date 2019-12-12
Grant Date 2022-12-13
Owner ReliaQuest Holdings, LLC (USA)
Inventor
  • Murphy, Brian P.
  • Partlow, Joe
  • O'Connor, Colin
  • Pfeiffer, Jason

Abstract

A computer-implemented method, computer program product and computing system for: obtaining first system-defined platform information concerning a first security-relevant subsystem within a computing platform; obtaining at least a second system-defined platform information concerning at least a second security-relevant subsystem within the computing platform; combining the first system-defined platform information and the at least a second system-defined platform information to form system-defined consolidated platform information; and generating a security profile based, at least in part, upon the system-defined consolidated platform information.

IPC Classes  ?

  • G06F 21/00 - Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
  • H04L 9/40 - Network security protocols
  • G06N 20/00 - Machine learning
  • G06F 21/56 - Computer malware detection or handling, e.g. anti-virus arrangements
  • G06F 21/53 - Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity, buffer overflow or preventing unwanted data erasure by executing in a restricted environment, e.g. sandbox or secure virtual machine
  • G06K 9/62 - Methods or arrangements for recognition using electronic means
  • G06F 21/55 - Detecting local intrusion or implementing counter-measures
  • G06F 21/57 - Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
  • G06F 8/65 - Updates
  • G06F 30/20 - Design optimisation, verification or simulation

70.

Threat mitigation system and method

      
Application Number 16432626
Grant Number 10951641
Status In Force
Filing Date 2019-06-05
First Publication Date 2019-12-12
Grant Date 2021-03-16
Owner ReliaQuest Holdings, LLC (USA)
Inventor
  • Murphy, Brian P.
  • Partlow, Joe
  • O'Connor, Colin
  • Pfeiffer, Jason

Abstract

A computer-implemented method, computer program product and computing system for: obtaining system-defined consolidated platform information for a computing platform from an independent information source; obtaining client-defined consolidated platform information for the computing platform from a client information source; and presenting differential consolidated platform information for the computing platform to the third-party.

IPC Classes  ?

  • H04L 29/08 - Transmission control procedure, e.g. data link level control procedure
  • H04L 29/06 - Communication control; Communication processing characterised by a protocol
  • G06N 20/00 - Machine learning
  • G06F 21/56 - Computer malware detection or handling, e.g. anti-virus arrangements
  • G06F 21/53 - Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity, buffer overflow or preventing unwanted data erasure by executing in a restricted environment, e.g. sandbox or secure virtual machine
  • G06K 9/62 - Methods or arrangements for recognition using electronic means
  • G06F 21/55 - Detecting local intrusion or implementing counter-measures
  • G06F 21/57 - Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
  • G06F 8/65 - Updates
  • G06F 30/20 - Design optimisation, verification or simulation

71.

Threat mitigation system and method

      
Application Number 16432671
Grant Number 10855711
Status In Force
Filing Date 2019-06-05
First Publication Date 2019-12-12
Grant Date 2020-12-01
Owner ReliaQuest Holdings, LLC (USA)
Inventor
  • Murphy, Brian P.
  • Partlow, Joe
  • O'Connor, Colin
  • Pfeiffer, Jason

Abstract

Concept 6) A computer-implemented method, computer program product and computing system for: obtaining consolidated platform information to identify current security-relevant capabilities for a computing platform; determining comparative platform information that identifies security-relevant capabilities for a comparative platform; and generating comparison information that compares the current security-relevant capabilities of the computing platform to the comparative platform information of the comparative platform to identify a threat context indicator.

IPC Classes  ?

  • H04L 29/06 - Communication control; Communication processing characterised by a protocol
  • G06N 20/00 - Machine learning
  • G06F 21/56 - Computer malware detection or handling, e.g. anti-virus arrangements
  • G06F 21/53 - Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity, buffer overflow or preventing unwanted data erasure by executing in a restricted environment, e.g. sandbox or secure virtual machine
  • G06K 9/62 - Methods or arrangements for recognition using electronic means
  • G06F 21/55 - Detecting local intrusion or implementing counter-measures
  • G06F 21/57 - Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
  • G06F 8/65 - Updates
  • G06F 30/20 - Design optimisation, verification or simulation

72.

Threat mitigation system and method

      
Application Number 16432711
Grant Number 10735444
Status In Force
Filing Date 2019-06-05
First Publication Date 2019-12-12
Grant Date 2020-08-04
Owner ReliaQuest Holdings, LLC (USA)
Inventor
  • Murphy, Brian P.
  • Partlow, Joe
  • O'Connor, Colin
  • Pfeiffer, Jason

Abstract

A computer-implemented method, computer program product and computing system for: detecting a security event within a computing platform based upon identified suspect activity; gathering artifacts concerning the security event; and assigning a threat level to the security event based, at least in part, upon the gathered artifacts.

IPC Classes  ?

  • H04L 29/06 - Communication control; Communication processing characterised by a protocol
  • G06F 21/56 - Computer malware detection or handling, e.g. anti-virus arrangements
  • G06K 9/62 - Methods or arrangements for recognition using electronic means
  • G06F 21/55 - Detecting local intrusion or implementing counter-measures
  • G06N 20/00 - Machine learning
  • G06F 21/53 - Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity, buffer overflow or preventing unwanted data erasure by executing in a restricted environment, e.g. sandbox or secure virtual machine
  • G06F 21/57 - Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
  • G06F 8/65 - Updates
  • G06F 30/20 - Design optimisation, verification or simulation

73.

Threat mitigation system and method

      
Application Number 16432780
Grant Number 10848506
Status In Force
Filing Date 2019-06-05
First Publication Date 2019-12-12
Grant Date 2020-11-24
Owner ReliaQuest Holdings, LLC (USA)
Inventor
  • Murphy, Brian P.
  • Partlow, Joe
  • O'Connor, Colin
  • Pfeiffer, Jason

Abstract

Concept 13) A computer-implemented method, computer program product and computing system for: receiving updated threat event information concerning a computing platform; enabling the updated threat event information for use with one or more security-relevant subsystems within the computing platform; and scheduling the application of the updated threat event information to previously-generated information associated with the one or more security-relevant subsystems.

IPC Classes  ?

  • G06F 21/57 - Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
  • H04L 29/06 - Communication control; Communication processing characterised by a protocol
  • G06N 20/00 - Machine learning
  • G06F 21/56 - Computer malware detection or handling, e.g. anti-virus arrangements
  • G06F 21/53 - Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity, buffer overflow or preventing unwanted data erasure by executing in a restricted environment, e.g. sandbox or secure virtual machine
  • G06K 9/62 - Methods or arrangements for recognition using electronic means
  • G06F 21/55 - Detecting local intrusion or implementing counter-measures
  • G06F 8/65 - Updates
  • G06F 30/20 - Design optimisation, verification or simulation

74.

Threat mitigation system and method

      
Application Number 16432791
Grant Number 10855702
Status In Force
Filing Date 2019-06-05
First Publication Date 2019-12-12
Grant Date 2020-12-01
Owner ReliaQuest Holdings, LLC (USA)
Inventor
  • Murphy, Brian P.
  • Partlow, Joe
  • O'Connor, Colin
  • Pfeiffer, Jason

Abstract

A computer-implemented method, computer program product and computing system is provided that may be utilized in a threat mitigation system. The method may include displaying initial security-relevant information that includes analytical information. The method may also include allowing a third-party to manipulate the initial security-relevant information with automation information. The method may further include generating revised security-relevant information that includes the automation information.

IPC Classes  ?

  • H04L 29/06 - Communication control; Communication processing characterised by a protocol
  • G06N 20/00 - Machine learning
  • G06F 21/56 - Computer malware detection or handling, e.g. anti-virus arrangements
  • G06F 21/53 - Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity, buffer overflow or preventing unwanted data erasure by executing in a restricted environment, e.g. sandbox or secure virtual machine
  • G06K 9/62 - Methods or arrangements for recognition using electronic means
  • G06F 21/55 - Detecting local intrusion or implementing counter-measures
  • G06F 21/57 - Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
  • G06F 8/65 - Updates
  • G06F 30/20 - Design optimisation, verification or simulation

75.

Threat mitigation system and method

      
Application Number 16432818
Grant Number 10965703
Status In Force
Filing Date 2019-06-05
First Publication Date 2019-12-12
Grant Date 2021-03-30
Owner ReliaQuest Holdings, LLC (USA)
Inventor
  • Murphy, Brian P.
  • Partlow, Joe
  • O'Connor, Colin
  • Pfeiffer, Jason

Abstract

A computer-implemented method, computer program product and computing system for: utilizing artificial intelligence/machine learning to define a training routine for a specific attack of a computing platform; and generating a simulation of the specific attack by executing the training routine within a controlled test environment.

IPC Classes  ?

  • H04L 29/06 - Communication control; Communication processing characterised by a protocol
  • G06N 20/00 - Machine learning
  • G06F 21/56 - Computer malware detection or handling, e.g. anti-virus arrangements
  • G06F 21/53 - Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity, buffer overflow or preventing unwanted data erasure by executing in a restricted environment, e.g. sandbox or secure virtual machine
  • G06K 9/62 - Methods or arrangements for recognition using electronic means
  • G06F 21/55 - Detecting local intrusion or implementing counter-measures
  • G06F 21/57 - Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
  • G06F 8/65 - Updates
  • G06F 30/20 - Design optimisation, verification or simulation

76.

Threat mitigation system and method

      
Application Number 16433006
Grant Number 11374951
Status In Force
Filing Date 2019-06-06
First Publication Date 2019-12-12
Grant Date 2022-06-28
Owner RELIAQUEST HOLDINGS, LLC (USA)
Inventor
  • Murphy, Brian P.
  • Partlow, Joe
  • O'Connor, Colin
  • Pfeiffer, Jason

Abstract

A computer-implemented method, computer program product and computing system for: receiving platform information from a plurality of security-relevant subsystems; processing the platform information to generate processed platform information; identifying less threat-pertinent content included within the processed content; and routing the less threat-pertinent content to a long term storage system.

IPC Classes  ?

  • H04L 29/06 - Communication control; Communication processing characterised by a protocol
  • H04L 9/40 - Network security protocols
  • G06N 20/00 - Machine learning
  • G06F 21/56 - Computer malware detection or handling, e.g. anti-virus arrangements
  • G06F 21/53 - Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity, buffer overflow or preventing unwanted data erasure by executing in a restricted environment, e.g. sandbox or secure virtual machine
  • G06K 9/62 - Methods or arrangements for recognition using electronic means
  • G06F 21/55 - Detecting local intrusion or implementing counter-measures
  • G06F 21/57 - Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
  • G06F 8/65 - Updates
  • G06F 30/20 - Design optimisation, verification or simulation

77.

Threat mitigation system and method

      
Application Number 16433022
Grant Number 11323462
Status In Force
Filing Date 2019-06-06
First Publication Date 2019-12-12
Grant Date 2022-05-03
Owner RELIAQUEST HOLDINGS, LLC (USA)
Inventor
  • Murphy, Brian P.
  • Partlow, Joe
  • O'Connor, Colin
  • Pfeiffer, Jason

Abstract

A computer-implemented method, computer program product and computing system for: obtaining one or more artifacts concerning a detected security event; obtaining artifact information concerning the one or more artifacts; and generating a conclusion concerning the detected security event based, at least in part, upon the detected security event, the one or more artifacts, and the artifact information.

IPC Classes  ?

  • H04L 29/06 - Communication control; Communication processing characterised by a protocol
  • G06N 20/00 - Machine learning
  • G06F 21/56 - Computer malware detection or handling, e.g. anti-virus arrangements
  • G06F 21/53 - Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity, buffer overflow or preventing unwanted data erasure by executing in a restricted environment, e.g. sandbox or secure virtual machine
  • G06K 9/62 - Methods or arrangements for recognition using electronic means
  • G06F 21/55 - Detecting local intrusion or implementing counter-measures
  • G06F 21/57 - Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
  • G06F 8/65 - Updates
  • G06F 30/20 - Design optimisation, verification or simulation

78.

Threat mitigation system and method

      
Application Number 16432556
Grant Number 11095673
Status In Force
Filing Date 2019-06-05
First Publication Date 2019-12-12
Grant Date 2021-08-17
Owner ReliaQuest Holdings, LLC (USA)
Inventor
  • Murphy, Brian P.
  • Partlow, Joe
  • O'Connor, Colin
  • Pfeiffer, Jason

Abstract

A computer-implemented method, computer program product and computing system for: obtaining system-defined consolidated platform information for a computing platform from an independent information source; obtaining client-defined consolidated platform information for the computing platform from a client information source; and comparing the system-defined consolidated platform information to the client-defined consolidated platform information to define differential consolidated platform information for the computing platform.

IPC Classes  ?

  • H04L 29/06 - Communication control; Communication processing characterised by a protocol
  • G06N 20/00 - Machine learning
  • G06F 21/56 - Computer malware detection or handling, e.g. anti-virus arrangements
  • G06F 21/53 - Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity, buffer overflow or preventing unwanted data erasure by executing in a restricted environment, e.g. sandbox or secure virtual machine
  • G06K 9/62 - Methods or arrangements for recognition using electronic means
  • G06F 21/55 - Detecting local intrusion or implementing counter-measures
  • G06F 21/57 - Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
  • G06F 8/65 - Updates
  • G06F 30/20 - Design optimisation, verification or simulation

79.

Threat mitigation system and method

      
Application Number 16432614
Grant Number 10721252
Status In Force
Filing Date 2019-06-05
First Publication Date 2019-12-12
Grant Date 2020-07-21
Owner ReliaQuest Holdings, LLC (USA)
Inventor
  • Murphy, Brian P.
  • Partlow, Joe
  • O'Connor, Colin
  • Pfeiffer, Jason

Abstract

A computer-implemented method, computer program product and computing system for: obtaining consolidated platform information for a computing platform to identify one or more deployed security-relevant subsystems; processing the consolidated platform information to identify one or more non-deployed security-relevant subsystems; generating a list of ranked & recommended security-relevant subsystems that ranks the one or more non-deployed security-relevant subsystems; and providing the list of ranked & recommended security-relevant subsystems to a third-party.

IPC Classes  ?

  • H04L 29/06 - Communication control; Communication processing characterised by a protocol
  • G06N 20/00 - Machine learning
  • G06F 17/50 - Computer-aided design
  • G06F 21/56 - Computer malware detection or handling, e.g. anti-virus arrangements
  • G06F 21/53 - Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity, buffer overflow or preventing unwanted data erasure by executing in a restricted environment, e.g. sandbox or secure virtual machine
  • G06K 9/62 - Methods or arrangements for recognition using electronic means
  • G06F 21/55 - Detecting local intrusion or implementing counter-measures
  • G06F 21/57 - Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
  • G06F 8/65 - Updates

80.

Threat mitigation system and method

      
Application Number 16432649
Grant Number 10735443
Status In Force
Filing Date 2019-06-05
First Publication Date 2019-12-12
Grant Date 2020-08-04
Owner ReliaQuest Holdings, LLC (USA)
Inventor
  • Murphy, Brian P.
  • Partlow, Joe
  • O'Connor, Colin
  • Pfeiffer, Jason

Abstract

A computer-implemented method, computer program product and computing system for: obtaining consolidated platform information to identify current security-relevant capabilities for a computing platform; determining possible security-relevant capabilities for the computing platform; and generating comparison information that compares the current security-relevant capabilities of the computing platform to the possible security-relevant capabilities of the computing platform to identify security-relevant deficiencies.

IPC Classes  ?

  • H04L 29/06 - Communication control; Communication processing characterised by a protocol
  • G06N 20/00 - Machine learning
  • G06F 21/56 - Computer malware detection or handling, e.g. anti-virus arrangements
  • G06F 21/53 - Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity, buffer overflow or preventing unwanted data erasure by executing in a restricted environment, e.g. sandbox or secure virtual machine
  • G06K 9/62 - Methods or arrangements for recognition using electronic means
  • G06F 21/55 - Detecting local intrusion or implementing counter-measures
  • G06F 21/57 - Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
  • G06F 8/65 - Updates
  • G06F 30/20 - Design optimisation, verification or simulation

81.

Threat mitigation system and method

      
Application Number 16432689
Grant Number 11588838
Status In Force
Filing Date 2019-06-05
First Publication Date 2019-12-12
Grant Date 2023-02-21
Owner ReliaQuest Holdings, LLC (USA)
Inventor
  • Murphy, Brian P.
  • Partlow, Joe
  • O'Connor, Colin
  • Pfeiffer, Jason

Abstract

A computer-implemented method, computer program product and computing system for: obtaining hardware performance information concerning hardware deployed within a computing platform; obtaining platform performance information concerning the operation of the computing platform; obtaining application performance information concerning one or more applications deployed within the computing platform; and generating a holistic platform report concerning the computing platform based, at least in part, upon the hardware performance information, the platform performance information and the application performance information.

IPC Classes  ?

  • H04L 29/06 - Communication control; Communication processing characterised by a protocol
  • G06F 30/20 - Design optimisation, verification or simulation
  • H04L 9/40 - Network security protocols
  • G06N 20/00 - Machine learning
  • G06F 8/65 - Updates
  • G06F 21/53 - Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity, buffer overflow or preventing unwanted data erasure by executing in a restricted environment, e.g. sandbox or secure virtual machine
  • G06F 21/55 - Detecting local intrusion or implementing counter-measures
  • G06F 21/56 - Computer malware detection or handling, e.g. anti-virus arrangements
  • G06F 21/57 - Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
  • G06F 18/214 - Generating training patternsBootstrap methods, e.g. bagging or boosting

82.

Threat mitigation system and method

      
Application Number 16432733
Grant Number 11297080
Status In Force
Filing Date 2019-06-05
First Publication Date 2019-12-12
Grant Date 2022-04-05
Owner RELIAQUEST HOLDINGS, LLC (USA)
Inventor
  • Murphy, Brian P.
  • Partlow, Joe
  • O'Connor, Colin
  • Pfeiffer, Jason

Abstract

A computer-implemented method, computer program product and computing system for: establishing connectivity with a plurality of security-relevant subsystems within a computing platform; obtaining at least one security-relevant information set from each of the plurality of security-relevant subsystems, thus defining a plurality of security-relevant information sets; and combining the plurality of security-relevant information sets to form an aggregated security-relevant information set for the computing platform.

IPC Classes  ?

  • H04L 29/06 - Communication control; Communication processing characterised by a protocol
  • G06N 20/00 - Machine learning
  • G06F 21/56 - Computer malware detection or handling, e.g. anti-virus arrangements
  • G06F 21/53 - Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity, buffer overflow or preventing unwanted data erasure by executing in a restricted environment, e.g. sandbox or secure virtual machine
  • G06K 9/62 - Methods or arrangements for recognition using electronic means
  • G06F 21/55 - Detecting local intrusion or implementing counter-measures
  • G06F 21/57 - Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
  • G06F 8/65 - Updates
  • G06F 30/20 - Design optimisation, verification or simulation

83.

THREAT MITIGATION SYSTEM AND METHOD

      
Application Number 16432751
Status Pending
Filing Date 2019-06-05
First Publication Date 2019-12-12
Owner ReliaQuest Holdings, LLC (USA)
Inventor
  • Murphy, Brian P.
  • Partlow, Joe
  • O'Connor, Colin
  • Pfeiffer, Jason

Abstract

A computer-implemented method, computer program product and computing system for: establishing connectivity with a plurality of security-relevant subsystems within a computing platform; receiving a unified query from a third-party concerning the plurality of security-relevant subsystems; distributing at least a portion of the unified query to the plurality of security-relevant subsystems; and effectuating the at least a portion of the unified query on each of the plurality of security-relevant subsystems to generate a plurality of result sets.

IPC Classes  ?

  • G06F 21/57 - Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
  • G06N 20/00 - Machine learning

84.

Threat mitigation system and method

      
Application Number 16432762
Grant Number 11108798
Status In Force
Filing Date 2019-06-05
First Publication Date 2019-12-12
Grant Date 2021-08-31
Owner ReliaQuest Holdings, LLC (USA)
Inventor
  • Murphy, Brian P.
  • Partlow, Joe
  • O'Connor, Colin
  • Pfeiffer, Jason

Abstract

A computer-implemented method, computer program product and computing system for: establishing connectivity with a plurality of security-relevant subsystems within a computing platform; obtaining at least one security-relevant information set from each of the plurality of security-relevant subsystems, thus defining a plurality of security-relevant information sets; and processing the plurality of security-relevant information sets using artificial learning/machine learning to identify one or more commonalities amongst the plurality of security-relevant information sets.

IPC Classes  ?

  • H04L 29/06 - Communication control; Communication processing characterised by a protocol
  • G06N 20/00 - Machine learning
  • G06F 21/56 - Computer malware detection or handling, e.g. anti-virus arrangements
  • G06F 21/53 - Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity, buffer overflow or preventing unwanted data erasure by executing in a restricted environment, e.g. sandbox or secure virtual machine
  • G06K 9/62 - Methods or arrangements for recognition using electronic means
  • G06F 21/55 - Detecting local intrusion or implementing counter-measures
  • G06F 21/57 - Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
  • G06F 8/65 - Updates
  • G06F 30/20 - Design optimisation, verification or simulation

85.

Threat mitigation system and method

      
Application Number 16432772
Grant Number 10848512
Status In Force
Filing Date 2019-06-05
First Publication Date 2019-12-12
Grant Date 2020-11-24
Owner ReliaQuest Holdings, LLC (USA)
Inventor
  • Murphy, Brian P.
  • Partlow, Joe
  • O'Connor, Colin
  • Pfeiffer, Jason

Abstract

A computer-implemented method, computer program product and computing system for: receiving updated threat event information concerning a computing platform; enabling the updated threat event information for use with one or more security-relevant subsystems within the computing platform; and retroactively applying the updated threat event information to previously-generated information associated with the one or more security-relevant subsystems.

IPC Classes  ?

  • H04L 29/06 - Communication control; Communication processing characterised by a protocol
  • G06N 20/00 - Machine learning
  • G06F 21/56 - Computer malware detection or handling, e.g. anti-virus arrangements
  • G06F 21/53 - Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity, buffer overflow or preventing unwanted data erasure by executing in a restricted environment, e.g. sandbox or secure virtual machine
  • G06K 9/62 - Methods or arrangements for recognition using electronic means
  • G06F 21/55 - Detecting local intrusion or implementing counter-measures
  • G06F 21/57 - Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
  • G06F 8/65 - Updates

86.

Threat mitigation system and method

      
Application Number 16432801
Grant Number 11265338
Status In Force
Filing Date 2019-06-05
First Publication Date 2019-12-12
Grant Date 2022-03-01
Owner RELIAQUEST HOLDINGS, LLC (USA)
Inventor
  • Murphy, Brian P.
  • Partlow, Joe
  • O'Connor, Colin
  • Pfeiffer, Jason

Abstract

A computer-implemented method, computer program product and computing system including defining a training routine for a specific attack of a computing platform. A simulation of the specific attack may be generated by executing the training routine within a controlled test environment. A trainee may be allowed to view the simulation of the specific attack, wherein the trainee is an individual.

IPC Classes  ?

  • H04L 29/06 - Communication control; Communication processing characterised by a protocol
  • G06N 20/00 - Machine learning
  • G06F 21/56 - Computer malware detection or handling, e.g. anti-virus arrangements
  • G06F 21/53 - Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity, buffer overflow or preventing unwanted data erasure by executing in a restricted environment, e.g. sandbox or secure virtual machine
  • G06K 9/62 - Methods or arrangements for recognition using electronic means
  • G06F 21/55 - Detecting local intrusion or implementing counter-measures
  • G06F 21/57 - Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
  • G06F 8/65 - Updates
  • G06F 30/20 - Design optimisation, verification or simulation

87.

Threat mitigation system and method

      
Application Number 16433032
Grant Number 10848513
Status In Force
Filing Date 2019-06-06
First Publication Date 2019-12-12
Grant Date 2020-11-24
Owner ReliaQuest Holdings, LLC (USA)
Inventor
  • Murphy, Brian P.
  • Partlow, Joe
  • O'Connor, Colin
  • Pfeiffer, Jason

Abstract

A computer-implemented method, computer program product and computing system for: allowing a third-party to select a training routine for a specific attack of a computing platform, thus defining a selected training routine; analyzing the requirements of the selected training routine to determine a quantity of entities required to effectuate the selected training routine, thus defining one or more required entities; generating one or more virtual machines to emulate the one or more required entities; and generating a simulation of the specific attack by executing the selected training routine.

IPC Classes  ?

  • H04L 29/06 - Communication control; Communication processing characterised by a protocol
  • G06N 20/00 - Machine learning
  • G06F 21/56 - Computer malware detection or handling, e.g. anti-virus arrangements
  • G06F 21/53 - Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity, buffer overflow or preventing unwanted data erasure by executing in a restricted environment, e.g. sandbox or secure virtual machine
  • G06K 9/62 - Methods or arrangements for recognition using electronic means
  • G06F 21/55 - Detecting local intrusion or implementing counter-measures
  • G06F 21/57 - Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
  • G06F 8/65 - Updates

88.

Threat mitigation system and method

      
Application Number 16433053
Grant Number 11363043
Status In Force
Filing Date 2019-06-06
First Publication Date 2019-12-12
Grant Date 2022-06-14
Owner RELIAQUEST HOLDINGS, LLC (USA)
Inventor
  • Murphy, Brian P.
  • Partlow, Joe
  • O'Connor, Colin
  • Pfeiffer, Jason

Abstract

A computer-implemented method, computer program product and computing system for: receiving platform information from a plurality of security-relevant subsystems; processing the platform information to generate processed platform information; identifying more threat-pertinent content included within the processed content; and routing the more threat-pertinent content to a threat analysis engine.

IPC Classes  ?

  • H04L 29/06 - Communication control; Communication processing characterised by a protocol
  • H04L 9/40 - Network security protocols
  • G06N 20/00 - Machine learning
  • G06F 21/56 - Computer malware detection or handling, e.g. anti-virus arrangements
  • G06F 21/53 - Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity, buffer overflow or preventing unwanted data erasure by executing in a restricted environment, e.g. sandbox or secure virtual machine
  • G06K 9/62 - Methods or arrangements for recognition using electronic means
  • G06F 21/55 - Detecting local intrusion or implementing counter-measures
  • G06F 21/57 - Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
  • G06F 8/65 - Updates
  • G06F 30/20 - Design optimisation, verification or simulation

89.

System and method for identifying network security threats and assessing network security

      
Application Number 15653293
Grant Number 10395040
Status In Force
Filing Date 2017-07-18
First Publication Date 2018-01-18
Grant Date 2019-08-27
Owner RELIAQUEST HOLDINGS, LLC (USA)
Inventor
  • Carey, Marcus J.
  • Oyeniyi, Tolulope

Abstract

A system and method of security assessment of a network is described. The system may include one or more security assessment computers controlled by a security assessor, and connected to a network, and first executable program code for acting as an agent on a first end device on the network. The first executable program code is configured to be executed by a browser application of the first end device, and is configured to collect software information, hardware information, and/or vulnerability information of the first end device and transmit the same to a first security assessment computer of the one or more security assessment computers. The information may be transmitted as part of a domain name server (DNS) request. The DNS request may include information identifying the first end device to thus allow modification of the first end device in response to analysis of the collected information.

IPC Classes  ?

  • H04L 29/06 - Communication control; Communication processing characterised by a protocol
  • G06F 21/57 - Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
  • G06F 21/50 - Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
  • G06F 21/55 - Detecting local intrusion or implementing counter-measures
  • G06F 21/56 - Computer malware detection or handling, e.g. anti-virus arrangements
  • G06F 21/53 - Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity, buffer overflow or preventing unwanted data erasure by executing in a restricted environment, e.g. sandbox or secure virtual machine

90.

System and method for simulating network security threats and assessing network security

      
Application Number 14837033
Grant Number 10826928
Status In Force
Filing Date 2015-08-27
First Publication Date 2017-01-12
Grant Date 2020-11-03
Owner ReliaQuest Holdings, LLC (USA)
Inventor
  • Carey, Marcus J.
  • Paulsen, Gaige B.

Abstract

A system and method of security assessment of a network is described. The system may include one or more security assessment computers controlled by a security assessor, and connected to a network, and first executable program code for acting as an agent on a first end device on the network. The first executable program code is configured to be executed by a browser application of the first end device, and is configured to initiate a simulation by requesting information from at least a first security assessment computer of the one or more security assessment computers.

IPC Classes  ?

  • H04L 29/06 - Communication control; Communication processing characterised by a protocol
  • G06F 21/57 - Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities

91.

Threat intelligence system and method

      
Application Number 15202213
Grant Number 10397267
Status In Force
Filing Date 2016-07-05
First Publication Date 2017-01-05
Grant Date 2019-08-27
Owner ReliaQuest Holdings, LLC (USA)
Inventor
  • Murphy, Brian P.
  • Partlow, Joe

Abstract

A computer-implemented method, computer program product and computing system for importing threat data from a plurality of threat data sources, thus generating a plurality of raw threat data definitions. The plurality of raw threat data definitions are processed, thus generating a plurality of processed threat data definitions. The plurality of processed threat data definitions are processed to form a master threat data definition. The master threat data definition is provided to one or more client electronic devices.

IPC Classes  ?

  • H04L 29/06 - Communication control; Communication processing characterised by a protocol
  • H04L 29/08 - Transmission control procedure, e.g. data link level control procedure

92.

Threat intelligence system and method

      
Application Number 15202259
Grant Number 11252181
Status In Force
Filing Date 2016-07-05
First Publication Date 2017-01-05
Grant Date 2022-02-15
Owner RELIAQUEST HOLDINGS, LLC (USA)
Inventor
  • Murphy, Brian P.
  • Partlow, Joe

Abstract

A computer-implemented method, computer program product and computing system for associating a unique identifier with an entity. Network traffic directed toward the unique identifier is intercepted and routed to a computing device.

IPC Classes  ?

  • H04L 29/06 - Communication control; Communication processing characterised by a protocol
  • H04L 29/08 - Transmission control procedure, e.g. data link level control procedure