Qomplx, Inc.

United States of America

Back to Profile

1-18 of 18 for Qomplx, Inc. Sort by
Query
Aggregations
IP Type
        Patent 15
        Trademark 3
Jurisdiction
        World 16
        Europe 1
        United States 1
Date
2023 1
2022 5
2021 6
2020 6
IPC Class
G06F 16/2458 - Special types of queries, e.g. statistical queries, fuzzy queries or distributed queries 3
G06F 16/951 - IndexingWeb crawling techniques 3
G06F 21/00 - Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity 3
H04L 29/06 - Communication control; Communication processing characterised by a protocol 3
G06F 21/53 - Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity, buffer overflow or preventing unwanted data erasure by executing in a restricted environment, e.g. sandbox or secure virtual machine 2
See more

1.

Systems and methods to enhance segment during trick play

      
Application Number 17519137
Grant Number 11785314
Status In Force
Filing Date 2021-11-04
First Publication Date 2023-05-04
Grant Date 2023-10-10
Owner QOMPLX, INC. (USA)
Inventor
  • Panchaksharaiah, Vishwas Sharadanagar
  • Sreekanth, Harshith Kumar Gejjegondanahally
  • Nagdeve, Pawan
  • Makkar, Anjum
  • Harb, Reda

Abstract

Systems and methods are provided herein for including supplemental content with segments based on the complexity of the segment. This may be accomplished by a system receiving complexity information related to a media asset and user information related to a viewer to determine if one or more segments of the media asset is complex for the user. If the system receives a trick play command, from the user, during a segment categorized as complex, the system can use the complexity information and user information to generate supplemental content, facilitating better user understanding of the complex segment.

IPC Classes  ?

  • H04N 21/81 - Monomedia components thereof
  • G06V 20/40 - ScenesScene-specific elements in video content
  • H04N 21/472 - End-user interface for requesting content, additional data or servicesEnd-user interface for interacting with content, e.g. for content reservation or setting reminders, for requesting event notification or for manipulating displayed content
  • H04N 21/4725 - End-user interface for requesting content, additional data or servicesEnd-user interface for interacting with content, e.g. for content reservation or setting reminders, for requesting event notification or for manipulating displayed content for requesting additional data associated with the content using interactive regions of the image, e.g. hot spots
  • H04N 21/45 - Management operations performed by the client for facilitating the reception of or the interaction with the content or administrating data related to the end-user or to the client device itself, e.g. learning user preferences for recommending movies or resolving scheduling conflicts
  • H04N 21/442 - Monitoring of processes or resources, e.g. detecting the failure of a recording device, monitoring the downstream bandwidth, the number of times a movie has been viewed or the storage space available from the internal hard disk
  • H04N 21/435 - Processing of additional data, e.g. decrypting of additional data or reconstructing software from modules extracted from the transport stream

2.

ADVANCED DETECTION OF IDENTITY-BASED ATTACKS

      
Application Number US2021044234
Publication Number 2022/046365
Status In Force
Filing Date 2021-08-02
Publication Date 2022-03-03
Owner QOMPLX, INC. (USA)
Inventor
  • Crabtree, Jason
  • Sellers, Andrew

Abstract

A system and method for the detection and mitigation of Kerberos golden ticket, silver ticket, and related identity-based cyberattacks by passively monitoring and analyzing Kerberos and authentication operations within the network. The system and method provide real-time detections of identity attacks using time-series data and data pipelines, and by transforming the stateless Kerberos protocol into stateful protocol. A packet capturing agent is deployed on the network where captured time-series Kerberos and related event and log information is processed in distributed computational graph (DCG) stages where declarative rules determine if an attack is being carried out and what type of attack it is.

IPC Classes  ?

  • G06F 21/30 - Authentication, i.e. establishing the identity or authorisation of security principals
  • G06Q 20/30 - Payment architectures, schemes or protocols characterised by the use of specific devices

3.

SYSTEM AND METHOD FOR SECURE EVALUATION OF CYBER DETECTION PRODUCTS

      
Application Number US2021048518
Publication Number 2022/047415
Status In Force
Filing Date 2021-08-31
Publication Date 2022-03-03
Owner QOMPLX, INC. (USA)
Inventor
  • Crabtree, Jason
  • Sellers, Andrew
  • Kelley, Richard

Abstract

A system and method for the secure and private demonstration of cloud-based cyber-security tools. Using an advanced sandboxing design patterns, isolated instances of virtual networks allow a potential client to compare their existing cyber defense tools against a set of cloud-based tools. Capitalizing on non-persistent and secure sandboxes allow the invention to demonstrate felly functional and devastating cyber-attacks while guaranteeing strict privacy and security to both. existing customers and potential ones. Additionally, instantiating separate sandboxed observed systems in a single multi-tenant infrastructure provide each customer with the ability to rapidly create actual representations of their enterprise environment offering the most realistic and. accurate demonstration and comparison between products.

IPC Classes  ?

  • G06F 21/53 - Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity, buffer overflow or preventing unwanted data erasure by executing in a restricted environment, e.g. sandbox or secure virtual machine

4.

PRIVILEGE ASSURANCE OF ENTERPRISE COMPUTER NETWORK ENVIRONMENTS

      
Application Number US2021044235
Publication Number 2022/046366
Status In Force
Filing Date 2021-08-02
Publication Date 2022-03-03
Owner QOMPLX, INC. (USA)
Inventor
  • Crabtree, Jason
  • Sellers, Andrew

Abstract

A system and method for the prevention, mitigation, and detection of cyberattack attacks on computer networks by identifying weaknesses in directory access object allowances and providing professionals with centralized graph-centric tools to maintain and observe key security and performance insights into their security posture. The system uses an interrogation agent to collect Active Directory configuration parameters and activity information about a forest and the devices operating within. Cyber-physical graphs and histograms using persisted time-series data provides critical information, patterns, and alerts about configurations, attack vectors, and vulnerabilities which enable information technology and cybersecurity professionals greater leverage and control over their infrastructure.

IPC Classes  ?

  • G06F 21/70 - Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
  • G06F 3/048 - Interaction techniques based on graphical user interfaces [GUI]

5.

EVENT-DRIVEN MODEL REFINEMENT FOR INSURANCE AND RISK MANAGEMENT

      
Application Number US2021039281
Publication Number 2022/015488
Status In Force
Filing Date 2021-06-27
Publication Date 2022-01-20
Owner QOMPLX, INC. (USA)
Inventor
  • Crabtree, Jason
  • Sellers, Andrew

Abstract

A system and method for event-based modeling and model refinement, for natural catastrophe related risks, including but not limited to fires, floods, earthquakes, and hurricanes/tornados. The system and method feature simultaneous simulation of a plurality of industry models using a variety of risk information, including but not limited to real-time data, recent and historical event data, hypothetical data, and crowd-sourced data. Tire system and method use a variety of data sources in conjunction with machine learning to continuously and in real-time update and tune the simulated models performance and sensitivity to provide useful risk assessment, and risk management data. Based on these model assessments, the system can produce notifications that can be made to enable automated and human actions.

IPC Classes  ?

6.

APPLYING TELEMATICS TO GENERATE DYNAMIC INSURANCE PREMIUMS

      
Application Number US2021039498
Publication Number 2022/015496
Status In Force
Filing Date 2021-06-29
Publication Date 2022-01-20
Owner QOMPLX, INC. (USA)
Inventor
  • Crabtree, Jason
  • Sellers, Andrew

Abstract

A system, and method that utilizes telemetric data for the dynamic pricing of insurance premiums for arbitrary and optionally multiple perils which receives telemetric data from sensors and other sources of data, analyzes the data for changes in risk associated with a parameter of an insurance policy, and dynamically adjusts policy premiums to account for individual policy risks as well as accounting for risks within the insurer's complete portfolio.

IPC Classes  ?

7.

A SYSTEM AND METHODS FOR SCORE CYBERSECURITY

      
Application Number US2021035071
Publication Number 2021/243321
Status In Force
Filing Date 2021-05-31
Publication Date 2021-12-02
Owner QOMPLX, INC. (USA)
Inventor
  • Crabtree, Jason
  • Gray, Joe
  • James, Michael
  • Kelly, Richard
  • Sellers, Andrew
  • Shaikh, Farooq

Abstract

A system and method for cybersecurity reconnaissance, analysis, and scoring that uses distributed, cloud-based computing services to provide sufficient scalability for analysis of enterprise IT networks using only publicly available characterizations. The system and method comprise an in-memory associative array which manages a queue of vulnerability search tasks through a public-facing proxy network. The public-facing proxy network has search nodes configurable to present the network to search tools in a desired manner to control certain aspects of the search to obtain the desired results. A distributed data processing engine and cloud-based storage are used to provide scalable computing power and storage. Each of the cloud-based computing services is containerized and orchestrated for management and efficient scaling purposes.

IPC Classes  ?

  • H04L 29/06 - Communication control; Communication processing characterised by a protocol
  • G06F 16/951 - IndexingWeb crawling techniques
  • G06F 16/2458 - Special types of queries, e.g. statistical queries, fuzzy queries or distributed queries

8.

AI-DRIVEN DEFENSIVE CYBERSECURITY STRATEGY ANALYSIS AND RECOMMENDATION SYSTEM

      
Application Number US2021016099
Publication Number 2021/216163
Status In Force
Filing Date 2021-02-01
Publication Date 2021-10-28
Owner QOMPLX, INC. (USA)
Inventor
  • Crabtree, Jason
  • Sellers, Andrew

Abstract

A system and method for automated cybersecurity defensive strategy analysis that predicts the evolution of new cybersecurity attack strategies and makes recommendations for cybersecurity improvements to networked systems based on a cost/benefit analysis. The system and method use machine learning algorithms to run simulated attack and defense strategies against a model of the networked system created using a directed graph. Recommendations are generated based on an analysis of the simulation results against a variety of cost/benefit indicators.

IPC Classes  ?

  • G06F 21/53 - Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity, buffer overflow or preventing unwanted data erasure by executing in a restricted environment, e.g. sandbox or secure virtual machine
  • G06F 16/2458 - Special types of queries, e.g. statistical queries, fuzzy queries or distributed queries

9.

A SYSTEM AND METHOD FOR SELF-ADJUSTING CYBERSECURITY ANALYSIS AND SCORE GENERATION

      
Application Number US2021025312
Publication Number 2021/202833
Status In Force
Filing Date 2021-04-01
Publication Date 2021-10-07
Owner QOMPLX, INC. (USA)
Inventor
  • Crabtree, Jason
  • Sellers, Andrew

Abstract

A system and method for self-adjusting cybersecurity analysis and score generation, wherein a reconnaissance engine gathers data about a client's computer network from the client, from devices and systems on the client's network, and from the Internet regarding various aspects of cybersecurity. Each of these aspects is evaluated independently, weighted, and cross-referenced to generate a cybersecurity score by aggregating individual vulnerability and risk factors together to provide a comprehensive characterization of cybersecurity risk using a transparent and traceable methodology. The scoring system itself can be used as a state machine with the cybersecurity score acting as a feedback mechanism, in which a cybersecurity score can be set at a level appropriate for a given organization, and data from clients or groups of clients with more extensive reporting can be used to supplement data for clients or groups of clients with less extensive reporting to enhance cybersecurity analysis and scoring.

IPC Classes  ?

  • G06F 21/00 - Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity

10.

CYBERSECURITY PROFILING AND RATING USING ACTIVE AND PASSIVE EXTERNAL RECONNAISSANCE

      
Application Number US2021012101
Publication Number 2021/154460
Status In Force
Filing Date 2021-01-04
Publication Date 2021-08-05
Owner QOMPLX, INC. (USA)
Inventor
  • Crabtree, Jason
  • Sellers, Andrew
  • Kelley, Richard

Abstract

A system and method for generating comprehensive security profiles and ratings for organizations that takes into account the organization's infrastructure and operations in generating the profile, and the context and purpose of the rating to be generated related to the profile. The system and method may further comprise gathering data about the totality of the organization's infrastructure and operations, generating a cybersecurity profile using active and passive internal and external reconnaissance of the organization to determine cybersecurity vulnerabilities and potential impacts to the business in light of the information gathered about the organization's infrastructure and operations, and generating cybersecurity scores and ratings that take into account all of the above information, plus the context and purpose of the score or rating to be generated based on the cybersecurity profile.

IPC Classes  ?

  • H04L 29/06 - Communication control; Communication processing characterised by a protocol
  • G06F 16/951 - IndexingWeb crawling techniques
  • G06F 16/2458 - Special types of queries, e.g. statistical queries, fuzzy queries or distributed queries

11.

SYSTEM AND METHOD FOR CROWD-SOURCED REFINEMENT OF NATURAL PHENOMENON FOR RISK MANAGEMENT AND CONTRACT VALIDATION

      
Application Number US2020051840
Publication Number 2021/055964
Status In Force
Filing Date 2020-09-21
Publication Date 2021-03-25
Owner QOMPLX, INC. (USA)
Inventor
  • Crabtree, Jason
  • Sellers, Andrew

Abstract

A system and method for crowd-sourced refinement of natural phenomenon for risk management and contract validation, comprising at least a heterogeneous mixture of sensors and data-gathering techniques, a sensor fusion suite, and a business operating system, which ingests, transforms if necessary, and analyzes received data and develops and applies models of prediction of consequences of the sensor data and future events based on such data for purposes such as insurance liability and risk assessment, emergency services planning, and financial market predictions, and comparing historical models and data with current data and models to attempt to refine and utilize a more precise predictive model for these purposes.

IPC Classes  ?

12.

QOMPLX:

      
Application Number 1570255
Status Registered
Filing Date 2020-10-31
Registration Date 2020-10-31
Owner QOMPLX, INC. (USA)
NICE Classes  ? 42 - Scientific, technological and industrial services, research and design

Goods & Services

Providing temporary use of on-line non-downloadable cloud computing software-as-a-service for cybersecurity monitoring and control of network activities on a computer, antivirus scanning, computer virus characterization, remediation, and elimination, malware incident forensics incident remediation, insurance risk quantification and mitigation, real-time financial analysis for quantitative trading, and real-time market monitoring and market event identification for quantitative trading.

13.

QOMPLX:

      
Application Number 1565558
Status Registered
Filing Date 2020-10-31
Registration Date 2020-10-31
Owner QOMPLX, Inc. (USA)
NICE Classes  ? 42 - Scientific, technological and industrial services, research and design

Goods & Services

Software-as-a-service (SAAS) services featuring software for business analytics, operational risk quantification, mitigation, and management for business optimization, large-scale graph-based database management, cybersecurity monitoring and control of network activities on a computer, antivirus scanning, computer virus characterization, remediation, and elimination, malware incident forensics, malware incident remediation, financial analysis, real-time financial market monitoring, financial market event identification, and financial analysis for quantitative trading, insurance risk quantification and mitigation, insurance pricing, and insurance claims management.

14.

METHOD FOR MIDSERVER FACILITATION OF LONG-HAUL TRANSPORT OF TELEMETRY FOR CLOUD-BASED SERVICES

      
Application Number US2020032795
Publication Number 2020/232195
Status In Force
Filing Date 2020-05-14
Publication Date 2020-11-19
Owner QOMPLX, INC. (USA)
Inventor
  • Chasman, Mike
  • Chung, Jeffrey
  • Crabtree, Jason
  • Jurukovski, Luka
  • Kelley, Richard
  • Ludwig, Andre
  • Panasenkov, Artem
  • Sellers, Andrew

Abstract

A system and method that uses midservers located between the business enterprise computer infrastructure and the cloud-based infrastructure to collect, aggregate, analyze, transform, and securely transmit data from a multitude of computing devices and peripherals at an external network to a cloud-based service.

IPC Classes  ?

  • H04L 12/28 - Data switching networks characterised by path configuration, e.g. LAN [Local Area Networks] or WAN [Wide Area Networks]
  • H04L 9/32 - Arrangements for secret or secure communicationsNetwork security protocols including means for verifying the identity or authority of a user of the system
  • G06F 8/60 - Software deployment
  • G06F 21/13 -

15.

QOMPLX:

      
Application Number 018329074
Status Registered
Filing Date 2020-10-30
Registration Date 2021-11-18
Owner QOMPLX, Inc. (USA)
NICE Classes  ? 42 - Scientific, technological and industrial services, research and design

Goods & Services

Providing Software-As-A-Service (SAAS) services for business analytics; Providing Software-As-A-Servce (SAAS) Services for business optimization; Providing SAAS services relating to operational risk quantification, mitigation, and management for businesses; Providing SAAS services for large-scale graph-based database management; Providing SAAS services for cybersecurity monitoring and control of network activities on a computer; Providing SAAS services for antivirus scanning and computer virus characterization, remediation, and elimination; Providing SAAS services for malware incident forensics and malware incident remediation; Providing SAAS services for financial analysis, real-time financial market monitoring and financial market event identification; Providing SAAS services for financial analysis for quantitative trading, insurance risk quantification and mitigation; Providing SAAS services for insurance pricing, and insurance claims management.

16.

SYSTEM AND METHOD FOR COMPLEX IT PROCESS ANNOTATION, TRACING, ANALYSIS, AND SIMULATION

      
Application Number US2020016712
Publication Number 2020/167539
Status In Force
Filing Date 2020-02-05
Publication Date 2020-08-20
Owner QOMPLX, INC. (USA)
Inventor
  • Crabtree, Jason
  • Sellers, Andrew

Abstract

A system and method for complex IT process annotation and tracing, analysis, and simulation, comprising at least a generative simulation platform, optimization engine, and metric engine, which is able to simulate a variety of simulations and develop adaptive models for simulation, and can be used more specifically for IT infrastructure simulation to identify vulnerable systems and vertices in an IT infrastructure, perform load-testing and quality control tests, and determine the overall health to known attacks and interruptions as a system or network topography change and update.

IPC Classes  ?

  • G06F 21/00 - Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity

17.

MULTI-MODEL GENERATIVE SIMULATION MODELING OF COMPLEX ADAPTIVE SYSTEMS

      
Application Number US2020013444
Publication Number 2020/150194
Status In Force
Filing Date 2020-01-14
Publication Date 2020-07-23
Owner QOMPLX, INC. (USA)
Inventor
  • Crabtree, Jason
  • Sellers, Andrew

Abstract

A system and method for multi-model generative simulation modeling of complex adaptive systems, comprising a generative simulation platform, a multidimension time series datastore, and a directed computational graph, capable of running a multitude of simulations with complex and shifting model data, and an optimization engine which can introduce changes into a simulation to represent unforeseen or random changes and events to introduce changes and shifts in the simulation that might not otherwise occur.

IPC Classes  ?

  • G06F 30/20 - Design optimisation, verification or simulation

18.

COMPREHENSIVE DATA LOSS PREVENTION AND COMPLIANCE MANAGEMENT

      
Application Number US2019061564
Publication Number 2020/102601
Status In Force
Filing Date 2019-11-14
Publication Date 2020-05-22
Owner QOMPLX, INC. (USA)
Inventor
  • Crabtree, Jason
  • Sellers, Andrew

Abstract

A system and method to identify and prevent cybersecurity attacks on modern, highly-interconnected networks, to identify attacks before data loss occurs, using a combination of human level, device level, system level, and organizational level monitoring.

IPC Classes  ?

  • H04L 29/06 - Communication control; Communication processing characterised by a protocol
  • H04L 12/26 - Monitoring arrangements; Testing arrangements
  • G06F 21/00 - Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity