Ironwood Cyber Inc.

United States of America

Back to Profile

1-10 of 10 for Ironwood Cyber Inc. Sort by
Query
Aggregations
IP Type
        Patent 9
        Trademark 1
Jurisdiction
        United States 8
        Canada 1
        World 1
Date
2022 5
2021 1
2020 1
Before 2020 3
IPC Class
G06F 21/50 - Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems 2
G06F 21/53 - Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity, buffer overflow or preventing unwanted data erasure by executing in a restricted environment, e.g. sandbox or secure virtual machine 2
G06F 21/56 - Computer malware detection or handling, e.g. anti-virus arrangements 2
G06F 21/57 - Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities 2
G06N 20/00 - Machine learning 2
See more
Status
Pending 2
Registered / In Force 8

1.

CONTROL SYSTEM ANOMALY DETECTION USING NEURAL NETWORK CONSENSUS

      
Application Number US2022032934
Publication Number 2022/265923
Status In Force
Filing Date 2022-06-10
Publication Date 2022-12-22
Owner IRONWOOD CYBER INC. (USA)
Inventor
  • Thornton, Mitchell
  • Larson, Eric
  • Manikas, Theodore
  • Taylor, Michael
  • Sinha, Aviraj
  • Srirama, Nathan

Abstract

Described herein are methods, systems, and platforms comprising neural networks for control system anomaly detection.

IPC Classes  ?

  • H04L 41/0631 - Management of faults, events, alarms or notifications using root cause analysisManagement of faults, events, alarms or notifications using analysis of correlation between notifications, alarms or events based on decision criteria, e.g. hierarchy, tree or time analysis
  • G05B 23/00 - Testing or monitoring of control systems or parts thereof
  • G06N 20/10 - Machine learning using kernel methods, e.g. support vector machines [SVM]

2.

CONTROL SYSTEM ANOMALY DETECTION USING NEURAL NETWORK CONSENSUS

      
Document Number 03221679
Status Pending
Filing Date 2022-06-10
Open to Public Date 2022-12-22
Owner IRONWOOD CYBER INC. (USA)
Inventor
  • Thornton, Mitchell
  • Larson, Eric
  • Manikas, Theodore
  • Taylor, Michael
  • Sinha, Aviraj
  • Srirama, Nathan

Abstract

Described herein are methods, systems, and platforms comprising neural networks for control system anomaly detection.

IPC Classes  ?

  • H04L 41/0631 - Management of faults, events, alarms or notifications using root cause analysisManagement of faults, events, alarms or notifications using analysis of correlation between notifications, alarms or events based on decision criteria, e.g. hierarchy, tree or time analysis
  • G06N 20/10 - Machine learning using kernel methods, e.g. support vector machines [SVM]

3.

Control system anomaly detection using neural network consensus

      
Application Number 17837472
Grant Number 11546205
Status In Force
Filing Date 2022-06-10
First Publication Date 2022-12-22
Grant Date 2023-01-03
Owner Ironwood Cyber Inc. (USA)
Inventor
  • Thornton, Mitchell
  • Larson, Eric
  • Manikas, Theodore
  • Taylor, Michael
  • Sinha, Aviraj
  • Srirama, Nathan

Abstract

Described herein are methods, systems, and platforms comprising neural networks for control system anomaly detection.

IPC Classes  ?

  • H04L 41/0604 - Management of faults, events, alarms or notifications using filtering, e.g. reduction of information by using priority, element types, position or time
  • H04L 41/16 - Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks using machine learning or artificial intelligence

4.

IWC IRONWOOD CYBER

      
Serial Number 97569074
Status Pending
Filing Date 2022-08-29
Owner Ironwood Cyber Inc. ()
NICE Classes  ? 42 - Scientific, technological and industrial services, research and design

Goods & Services

Cybersecurity services in the nature of finding vulnerabilities to help restrict unauthorized access to computer systems; Online non-downloadable cybersecurity software

5.

Generating upsampled signal from gyroscope data

      
Application Number 16702116
Grant Number 11397083
Status In Force
Filing Date 2019-12-03
First Publication Date 2022-07-26
Grant Date 2022-07-26
Owner IRONWOOD CYBER INC. (USA)
Inventor
  • Larson, Eric C.
  • Thornton, Mitchell
  • Johnson, Ian
  • Siems, Travis
  • Gabrielsen, Erik

Abstract

Gyroscope data can be used to generate upsampled signal. Multiple mobile devices are spaced apart from each other in a spatial arrangement. Each mobile device includes a gyroscope sensor to detect mechanical vibrations caused by signals originating within a vicinity of a mobile device that includes the gyroscope sensor. Each mobile device includes one or more respective processors to receive representations of the mechanical vibrations sensed by the gyroscope sensor at a sampling frequency, and transmit the representations received at the sampling frequency as a respective vibration signal associated with sampling times. The signal processor is coupled to the multiple mobile devices. The signal processor generates a processed upsampled signal by interleaving the vibration signal received from each mobile device and processing the interleaved signal using one or more machine learning filters, and transmitting the processed upsampled signal.

IPC Classes  ?

  • G01C 19/5698 - Turn-sensitive devices using vibrating masses, e.g. vibratory angular rate sensors based on Coriolis forces using acoustic waves, e.g. surface acoustic wave gyros
  • G01C 19/5783 - Mountings or housings not specific to any of the devices covered by groups
  • G01C 19/5776 - Signal processing not specific to any of the devices covered by groups
  • G01C 19/50 - Erection devices for restoring rotor axis to a desired position operating by mechanical means

6.

Detecting malicious software using sensors

      
Application Number 17350824
Grant Number 11586737
Status In Force
Filing Date 2021-06-17
First Publication Date 2021-10-07
Grant Date 2023-02-21
Owner IRONWOOD CYBER INC. (USA)
Inventor
  • Thornton, Mitchell
  • Taylor, Michael
  • Smith, Kaitlin

Abstract

In some implementations, a method includes retrieving data from multiple sensors in a computing device, and the multiple sensors comprise different types of sensors. The sensor data is analyzed based on a predictive model, and the predictive model is trained to detect malware. Initiation of malware is determined based on the analysis. In response to the determination, the malware is terminated.

IPC Classes  ?

  • G06F 21/56 - Computer malware detection or handling, e.g. anti-virus arrangements
  • G06F 21/53 - Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity, buffer overflow or preventing unwanted data erasure by executing in a restricted environment, e.g. sandbox or secure virtual machine
  • G06N 5/022 - Knowledge engineeringKnowledge acquisition
  • G06F 21/57 - Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
  • G06N 20/00 - Machine learning
  • G06F 21/50 - Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems

7.

Detecting malicious software using sensors

      
Application Number 15812663
Grant Number 11042638
Status In Force
Filing Date 2017-11-14
First Publication Date 2020-09-03
Grant Date 2021-06-22
Owner IRONWOOD CYBER INC. (USA)
Inventor
  • Thornton, Mitchell
  • Taylor, Michael
  • Smith, Kaitlin

Abstract

In some implementations, a method includes retrieving data from multiple sensors in a computing device, and the multiple sensors comprise different types of sensors. The sensor data is analyzed based on a predictive model, and the predictive model is trained to detect malware. Initiation of malware is determined based on the analysis. In response to the determination, the malware is terminated.

IPC Classes  ?

  • G06F 21/56 - Computer malware detection or handling, e.g. anti-virus arrangements
  • G06F 21/50 - Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
  • G06F 21/53 - Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity, buffer overflow or preventing unwanted data erasure by executing in a restricted environment, e.g. sandbox or secure virtual machine
  • G06N 5/02 - Knowledge representationSymbolic representation
  • G06F 21/57 - Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
  • G06N 20/00 - Machine learning

8.

Squaring circuit

      
Application Number 13601709
Grant Number 09684489
Status In Force
Filing Date 2012-08-31
First Publication Date 2014-03-06
Grant Date 2017-06-20
Owner IRONWOOD CYBER INC. (USA)
Inventor
  • Thornton, Mitchell A.
  • Gupta, Saurabh

Abstract

Methods, apparatuses, and computer program products for squaring an operand include identifying a fixed-point value with a fixed word size and a substring size for substrings of the fixed-point value, wherein the fixed-point value comprises a binary bit string. A square of the fixed-point value can be determined using the fixed point value, the substring size, and least significant bits of the fixed-point value equal to the substring size.

IPC Classes  ?

  • G06F 7/544 - Methods or arrangements for performing computations using exclusively denominational number representation, e.g. using binary, ternary, decimal representation using non-contact-making devices, e.g. tube, solid state deviceMethods or arrangements for performing computations using exclusively denominational number representation, e.g. using binary, ternary, decimal representation using unspecified devices for evaluating functions by calculation
  • G06F 7/552 - Powers or roots

9.

Single clock distribution network for multi-phase clock integrated circuits

      
Application Number 13769313
Grant Number 08847625
Status In Force
Filing Date 2013-02-16
First Publication Date 2013-08-22
Grant Date 2014-09-30
Owner IRONWOOD CYBER INC. (USA)
Inventor
  • Thornton, Mitchell Aaron
  • Menon, Rohit

Abstract

A multi-valued logic (MVL) circuit includes a MVL clock generator that generates a MVL clock signal having three or more ith MVL levels, a single MVL clock signal distribution network connected to the MVL clock generator, and three or more ith MVL selection circuits connected to the single MVL clock signal distribution network where i=0 to N and N>=3. Each ith MVL selection circuit corresponds to a specified ith MVL level. The ith MVL selection circuit outputs an ith binary clock signal having: (a) a first logic level whenever the MVL clock signal is equal to the ith MVL level and the ith data input receives the first logic level, (b) a second logic level whenever the MVL clock signal is equal to the ith MVL level and the ith data input receives the second logic level, and (c) a previous logic level of the ith binary clock signal whenever the MVL clock signal is not equal to the ith MVL level.

IPC Classes  ?

  • H03K 19/00 - Logic circuits, i.e. having at least two inputs acting on one outputInverting circuits
  • H03L 7/00 - Automatic control of frequency or phaseSynchronisation
  • G06F 1/04 - Generating or distributing clock signals or signals derived directly therefrom
  • G06F 1/10 - Distribution of clock signals
  • H03K 19/096 - Synchronous circuits, i.e. using clock signals

10.

Method for subject classification using a pattern recognition input device

      
Application Number 13279279
Grant Number 09329699
Status In Force
Filing Date 2011-10-22
First Publication Date 2012-04-26
Grant Date 2016-05-03
Owner IRONWOOD CYBER INC. (USA)
Inventor
  • Allen, Jeffrey David
  • Howard, John Joseph
  • Thornton, Mitchell Aaron

Abstract

The present invention provides a device and method for classifying a user using pattern recognition of an input device. A series of the keystroke objects are received via the user input interface. A typing signature is determined for the series of keystroke objects using the processor by analyzing the key attributes of the series of keystroke objects using a pattern recognition algorithm. The typing signature is compared to one or more user typing signatures stored in the memory using the processor. The user is classified based on whether or not the typing signature is statistically similar to one of the stored typing signatures.

IPC Classes  ?

  • G06F 3/023 - Arrangements for converting discrete items of information into a coded form, e.g. arrangements for interpreting keyboard generated codes as alphanumeric codes, operand codes or instruction codes
  • G06F 21/31 - User authentication
  • G06F 21/32 - User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints