IronNet Cybersecurity, Inc.

États‑Unis d’Amérique

Retour au propriétaire

1-44 de 44 pour IronNet Cybersecurity, Inc. Trier par
Recheche Texte
Affiner par
Type PI
        Brevet 31
        Marque 13
Juridiction
        États-Unis 24
        International 15
        Canada 5
Date
2025 3
2024 2
2023 9
2022 5
2021 10
Voir plus
Classe IPC
H04L 9/40 - Protocoles réseaux de sécurité 16
H04L 29/06 - Commande de la communication; Traitement de la communication caractérisés par un protocole 8
G06F 21/56 - Détection ou gestion de programmes malveillants, p. ex. dispositions anti-virus 6
G06N 20/00 - Apprentissage automatique 5
G06F 17/18 - Opérations mathématiques complexes pour l'évaluation de données statistiques 3
Voir plus
Classe NICE
45 - Services juridiques; services de sécurité; services personnels pour individus 12
09 - Appareils et instruments scientifiques et électriques 10
42 - Services scientifiques, technologiques et industriels, recherche et conception 9
41 - Éducation, divertissements, activités sportives et culturelles 8
Statut
En Instance 7
Enregistré / En vigueur 37

1.

SYSTEMS AND METHODS OF MALWARE DETECTION

      
Numéro d'application 19061822
Statut En instance
Date de dépôt 2025-02-24
Date de la première publication 2025-06-12
Propriétaire IronNet Cybersecurity, Inc. (USA)
Inventeur(s)
  • Webster, Jordan S.
  • Stinson, Christopher S.

Abrégé

Systems and methods for detecting suspicious malware by analyzing data such as transfer protocol data or logs from a host within an enterprise is provided. The systems and methods include a database for storing current data and historical data obtained from the network and a detection module and an optional display. The embodiments herein extract information from non-encrypted transfer protocol metadata, determine a plurality of features, utilize an outlier detection model that is based on historical behaviors, calculate a suspiciousness score, and create alerts for analysis by users when the score exceeds a threshold. In doing so, the systems and methods of the present invention improve the ability to identify suspicious outliers or potential malware on an iterative basis over time.

Classes IPC  ?

  • H04L 9/40 - Protocoles réseaux de sécurité
  • G06F 17/18 - Opérations mathématiques complexes pour l'évaluation de données statistiques
  • G06F 21/56 - Détection ou gestion de programmes malveillants, p. ex. dispositions anti-virus
  • G06N 20/00 - Apprentissage automatique
  • H04L 43/022 - Capture des données de surveillance par échantillonnage
  • H04L 43/16 - Surveillance de seuil
  • H04L 69/322 - Protocoles de communication intra-couche entre entités paires ou définitions d'unité de données de protocole [PDU]

2.

AUTOMATIC IDENTIFICATION OF ALGORITHMICALLY GENERATED DOMAIN FAMILIES

      
Numéro d'application 19011333
Statut En instance
Date de dépôt 2025-01-06
Date de la première publication 2025-05-01
Propriétaire IronNet Cybersecurity, Inc. (USA)
Inventeur(s)
  • Smith, Nicholas Todd
  • Adelman, Peter

Abrégé

According to the present disclosure, network security systems (e.g., network security algorithms) may uniquely identify an underlying algorithm and configuration used to produce domain names. For instance, network security techniques described herein may consider a collection of fully-qualified domain names (FQDNs) (e.g., taken from related network traffic data) and produce a value that can serve to uniquely identify the underlying generating algorithm and configuration used to produce the collection of FQDNs. In some examples, such may include implementation of statistical techniques to capture characteristic information about the amount of randomness, length, and distribution of characters in the collection of FQDNs. In some aspects, values of the characteristic information are adjusted based on a determined set of precision parameters. In some aspects, a single value may be produced, which can then be stored for later use in comparing with other values produced from some subsequent collection of FQDNs.

Classes IPC  ?

  • H04L 9/40 - Protocoles réseaux de sécurité

3.

ACTIVE COMMAND AND CONTROL SERVER DETECTION VIA DISTRIBUTED NETWORK SCANNING

      
Numéro d'application 18797332
Statut En instance
Date de dépôt 2024-08-07
Date de la première publication 2025-02-13
Propriétaire IronNet Cybersecurity, Inc. (USA)
Inventeur(s)
  • Fitzpatrick, Brett
  • Cahill, Daniel
  • Monaco, Stephen
  • Lane, William

Abrégé

Methods and systems for a network of computing devices are described. Embodiments of the present disclosure include a pipeline system that may be configured to identify a plurality of leads from amongst the computing devices by comparing data received from the computing devices to soft fingerprints. In some cases, the pipeline system may perform probing each of the plurality of leads using an emulator, and generating a threat indicator in response to the probing. Next, the pipeline system may enrich the plurality of leads in response to probing each of the plurality of leads and appending enrichment data to the threat indicator. The threat indicator and the enrichment data may be subsequently transferred to update a search cluster.

Classes IPC  ?

  • H04L 9/40 - Protocoles réseaux de sécurité

4.

SYSTEMS AND METHODS FOR DETECTING MALICIOUS NETWORK TRAFFIC USING MULTI-DOMAIN MACHINE LEARNING

      
Numéro d'application 18774688
Statut En instance
Date de dépôt 2024-07-16
Date de la première publication 2024-11-07
Propriétaire IronNet Cybersecurity, Inc. (USA)
Inventeur(s)
  • Grossman, Robert L.
  • Heath, James E.

Abrégé

System and methods for cross-domain training and updating of models to perform classification and scoring of network data/traffic are described. Information used to build deep machine learning models about traffic in one domain is used to improve the modeling in another domain. By using cross-domain learning, labeled data from another domain can be used to improve the detection rate and false positive rate of an analytic model in another domain. Because of the construction of the models, and because the models, and not the data are transferred, there is no disclosure of personally identifiable or otherwise restricted information.

Classes IPC  ?

5.

IDENTIFICATION OF INVALID ADVERTISING TRAFFIC

      
Numéro d'application 18508230
Statut En instance
Date de dépôt 2023-11-14
Date de la première publication 2024-03-14
Propriétaire IronNet Cybersecurity, Inc. (USA)
Inventeur(s)
  • Kacewicz, Ania
  • Swort, Matthew C.

Abrégé

Systems and techniques for detecting advertising fraudulent traffic, or invalid traffic, by correlating advertising traffic with cyber network defense events are described. For example, described techniques include querying cyber network traffic events, querying the metadata returned by the tag script placed in the displayed advertisement, and correlating times, internet protocol (IP) addresses, publisher domains, and referrer domains with domains and IP addresses flagged by network cyber security events.

Classes IPC  ?

  • H04L 9/40 - Protocoles réseaux de sécurité

6.

DATA BLOCK-BASED SYSTEM AND METHODS FOR PREDICTIVE MODELS

      
Numéro d'application 18231689
Statut En instance
Date de dépôt 2023-08-08
Date de la première publication 2023-12-21
Propriétaire IronNet Cybersecurity, Inc. (USA)
Inventeur(s)
  • Grossman, Robert L.
  • Swort, Matthew C.
  • Heath, James E.

Abrégé

Systems and methods for recording information at a granular level; checking and verifying that data is used and processed is consistent with an entity's internal policies and/or external regulations; and producing reports to authorized users (e.g., individuals and organizations) with information are provided. The system and methods capture required data in an immutable fashion so that users outside of an entity (e.g., public, third parties) can check and audit that internal policies and other regulatory policies and frameworks are followed.

Classes IPC  ?

  • G06F 3/06 - Entrée numérique à partir de, ou sortie numérique vers des supports d'enregistrement
  • H04L 9/06 - Dispositions pour les communications secrètes ou protégéesProtocoles réseaux de sécurité l'appareil de chiffrement utilisant des registres à décalage ou des mémoires pour le codage par blocs, p. ex. système DES
  • G06F 21/62 - Protection de l’accès à des données via une plate-forme, p. ex. par clés ou règles de contrôle de l’accès
  • G06N 5/025 - Extraction de règles à partir de données

7.

AUTOMATIC IDENTIFICATION OF ALGORITHMICALLY GENERATED DOMAIN FAMILIES

      
Numéro d'application US2023020893
Numéro de publication 2023/219855
Statut Délivré - en vigueur
Date de dépôt 2023-05-03
Date de publication 2023-11-16
Propriétaire IRONNET CYBERSECURITY, INC. (USA)
Inventeur(s)
  • Smith, Nicholas Todd
  • Adelman, Peter

Abrégé

According to the present disclosure, network security systems (e.g., network security algorithms) may uniquely identify an underlying algorithm and configuration used to produce domain names. For instance, network security techniques described herein may consider a collection of fully-qualified domain names (FQDNs) (e.g., taken from related network traffic data) and produce a value that can serve to uniquely identify the underlying generating algorithm and configuration used to produce the collection of FQDNs. In some examples, such may include implementation of statistical techniques to capture characteristic information about the amount of randomness, length, and distribution of characters in the collection of FQDNs. In some aspects, values of the characteristic information are adjusted based on a determined set of precision parameters. In some aspects, a single value may be produced, which can then be stored for later use in comparing with other values produced from some subsequent collection of FQDNs.

Classes IPC  ?

  • H04L 61/4511 - Répertoires de réseauCorrespondance nom-adresse en utilisant des répertoires normalisésRépertoires de réseauCorrespondance nom-adresse en utilisant des protocoles normalisés d'accès aux répertoires en utilisant le système de noms de domaine [DNS]
  • H04L 9/40 - Protocoles réseaux de sécurité
  • H04L 61/3015 - Enregistrement, génération ou allocation de nom
  • G06F 21/55 - Détection d’intrusion locale ou mise en œuvre de contre-mesures
  • G06F 21/56 - Détection ou gestion de programmes malveillants, p. ex. dispositions anti-virus

8.

Automatic identification of algorithmically generated domain families

      
Numéro d'application 17739318
Numéro de brevet 12225029
Statut Délivré - en vigueur
Date de dépôt 2022-05-09
Date de la première publication 2023-11-09
Date d'octroi 2025-02-11
Propriétaire IronNet Cybersecurity, Inc. (USA)
Inventeur(s)
  • Smith, Nicholas Todd
  • Adelman, Peter

Abrégé

According to the present disclosure, network security systems (e.g., network security algorithms) may uniquely identify an underlying algorithm and configuration used to produce domain names. For instance, network security techniques described herein may consider a collection of fully-qualified domain names (FQDNs) (e.g., taken from related network traffic data) and produce a value that can serve to uniquely identify the underlying generating algorithm and configuration used to produce the collection of FQDNs. In some examples, such may include implementation of statistical techniques to capture characteristic information about the amount of randomness, length, and distribution of characters in the collection of FQDNs. In some aspects, values of the characteristic information are adjusted based on a determined set of precision parameters. In some aspects, a single value may be produced, which can then be stored for later use in comparing with other values produced from some subsequent collection of FQDNs.

Classes IPC  ?

  • H04L 9/40 - Protocoles réseaux de sécurité

9.

Systems and methods of detecting anomalous websites

      
Numéro d'application 18209645
Numéro de brevet 12074907
Statut Délivré - en vigueur
Date de dépôt 2023-06-14
Date de la première publication 2023-10-12
Date d'octroi 2024-08-27
Propriétaire IronNet Cybersecurity, Inc. (USA)
Inventeur(s)
  • Kacewicz, Ania
  • Stinson, Christopher S.

Abrégé

Systems and methods for detecting anomalous and malicious URL's by analyzing markup language structure, such as HTML, are provided. The systems and methods include the querying of a URL to obtain the markup language data. The markup language data their corresponding elements and their locations rows/depths are parsed into coordinates within a 2-dimensional grid and then processed into features. A color is assigned to each feature as a function of the type of feature. The three dimensions (x, y coordinates and color coordinate) of the features are used to generate an image. The generated images are then compressed to facilitate processing. The compressed images of common websites are analyzed using deep machine learning algorithms to generate a model that represents their structure. These generated models are then used to detect suspicious and/or anomalous websites.

Classes IPC  ?

  • H04L 9/40 - Protocoles réseaux de sécurité
  • G06F 16/951 - IndexationTechniques d’exploration du Web
  • G06F 40/143 - Balisage, p. ex. utilisation du langage SGML ou de définitions de type de document
  • G06F 40/221 - Analyse syntaxique de flux de langages de balisage
  • G06N 3/088 - Apprentissage non supervisé, p. ex. apprentissage compétitif
  • G06T 9/00 - Codage d'image
  • G06T 15/00 - Rendu d'images tridimensionnelles [3D]
  • G06V 10/56 - Extraction de caractéristiques d’images ou de vidéos relative à la couleur

10.

Systems and methods of malware detection

      
Numéro d'application 18209657
Numéro de brevet 12238124
Statut Délivré - en vigueur
Date de dépôt 2023-06-14
Date de la première publication 2023-10-12
Date d'octroi 2025-02-25
Propriétaire IronNet Cybersecurity, Inc. (USA)
Inventeur(s)
  • Webster, Jordan S.
  • Stinson, Christopher S.

Abrégé

Systems and methods for detecting suspicious malware by analyzing data such as transfer protocol data or logs from a host within an enterprise is provided. The systems and methods include a database for storing current data and historical data obtained from the network and a detection module and an optional display. The embodiments herein extract information from non-encrypted transfer protocol metadata, determine a plurality of features, utilize an outlier detection model that is based on historical behaviors, calculate a suspiciousness score, and create alerts for analysis by users when the score exceeds a threshold. In doing so, the systems and methods of the present invention improve the ability to identify suspicious outliers or potential malware on an iterative basis over time.

Classes IPC  ?

  • H04L 9/40 - Protocoles réseaux de sécurité
  • G06F 17/18 - Opérations mathématiques complexes pour l'évaluation de données statistiques
  • G06F 21/56 - Détection ou gestion de programmes malveillants, p. ex. dispositions anti-virus
  • G06N 20/00 - Apprentissage automatique
  • H04L 43/022 - Capture des données de surveillance par échantillonnage
  • H04L 43/16 - Surveillance de seuil
  • H04L 69/322 - Protocoles de communication intra-couche entre entités paires ou définitions d'unité de données de protocole [PDU]

11.

DETECTION OF ABNORMAL EVENTS

      
Numéro d'application US2022049636
Numéro de publication 2023/091357
Statut Délivré - en vigueur
Date de dépôt 2022-11-10
Date de publication 2023-05-25
Propriétaire IRONNET CYBERSECURITY, INC. (USA)
Inventeur(s)
  • Grossman, Robert L.
  • Heath, Jason P.

Abrégé

The present disclosure describes methods, apparatuses, and systems to protect wind turbines, wind farms, and power infrastructure. For instance, wind turbines produce several streams of data varying over time, including sensor readings from components in wind turbines, network traffic from SCADA systems, data from wind farm internal networks, data from the internet, etc. According to the techniques described herein, wind farms may be protected by identifying patterns that may not be apparent from individual time series or network data. Embodiments of the present disclosure include integration and fusion of information from various time series data sources and network data sources for detecting patterns in data (e.g., patterns in data that may indicate an abnormal event, such as wind farm component failure, a control system cyber-attack, etc.). For instance, in some cases, such patterns may be used to detect an abnormal event of interest (e.g., such as an attack).

Classes IPC  ?

  • H04L 9/40 - Protocoles réseaux de sécurité
  • G05B 23/02 - Test ou contrôle électrique
  • H02J 13/00 - Circuits pour pourvoir à l'indication à distance des conditions d'un réseau, p. ex. un enregistrement instantané des conditions d'ouverture ou de fermeture de chaque sectionneur du réseauCircuits pour pourvoir à la commande à distance des moyens de commutation dans un réseau de distribution d'énergie, p. ex. mise en ou hors circuit de consommateurs de courant par l'utilisation de signaux d'impulsion codés transmis par le réseau

12.

DETECTION OF ABNORMAL EVENTS

      
Numéro d'application 17531696
Statut En instance
Date de dépôt 2021-11-19
Date de la première publication 2023-05-25
Propriétaire IRONNET CYBERSECURITY, INC. (USA)
Inventeur(s)
  • Grossman, Robert L.
  • Heath, Jason P.

Abrégé

The present disclosure describes methods, apparatuses, and systems to protect wind turbines, wind farms, and power infrastructure. For instance, wind turbines produce several streams of data varying over time, including sensor readings from components in wind turbines, network traffic from SCADA systems, data from wind farm internal networks, data from the internet, etc. According to the techniques described herein, wind farms may be protected by identifying patterns that may not be apparent from individual time series or network data. Embodiments of the present disclosure include integration and fusion of information from various time series data sources and network data sources for detecting patterns in data (e.g., patterns in data that may indicate an abnormal event, such as wind farm component failure, a control system cyber-attack, etc.). For instance, in some cases, such patterns may be used to detect an abnormal event of interest (e.g., such as an attack).

Classes IPC  ?

  • F03D 7/04 - Commande automatiqueRégulation

13.

Data block-based system and methods for predictive models

      
Numéro d'application 17990601
Numéro de brevet 11861200
Statut Délivré - en vigueur
Date de dépôt 2022-11-18
Date de la première publication 2023-03-30
Date d'octroi 2024-01-02
Propriétaire IronNet Cybersecurity, Inc. (USA)
Inventeur(s)
  • Grossman, Robert L.
  • Swort, Matthew C.
  • Heath, James E.

Abrégé

Systems and methods for recording information at a granular level; checking and verifying that data is used and processed is consistent with an entity's internal policies and/or external regulations; and producing reports to authorized users (e.g., individuals and organizations) with information are provided. The system and methods capture required data in an immutable fashion so that users outside of an entity (e.g., public, third parties) can check and audit that internal policies and other regulatory policies and frameworks are followed.

Classes IPC  ?

  • H04L 29/06 - Commande de la communication; Traitement de la communication caractérisés par un protocole
  • G06F 3/06 - Entrée numérique à partir de, ou sortie numérique vers des supports d'enregistrement
  • H04L 9/06 - Dispositions pour les communications secrètes ou protégéesProtocoles réseaux de sécurité l'appareil de chiffrement utilisant des registres à décalage ou des mémoires pour le codage par blocs, p. ex. système DES
  • G06F 21/62 - Protection de l’accès à des données via une plate-forme, p. ex. par clés ou règles de contrôle de l’accès
  • G06N 5/025 - Extraction de règles à partir de données

14.

Systems and methods for analyzing cybersecurity events

      
Numéro d'application 17958625
Numéro de brevet 11997122
Statut Délivré - en vigueur
Date de dépôt 2022-10-03
Date de la première publication 2023-02-02
Date d'octroi 2024-05-28
Propriétaire IronNet Cybersecurity, Inc. (USA)
Inventeur(s)
  • Lowney, Michael
  • Schafer, Phillip Baker
  • Conn, Alexander Michael
  • Collard, Patrick
  • Kinser, Stephen

Abrégé

Methods and systems for the detection, identification, analysis of cybersecurity events in order to support prevention of the persistence of threats, malware or other harmful events are provided. The methods and systems of the present invention enable a user to find similar anomalous network traffic within a single network or across multiple networks. The methods and systems identify and correlate activity in order to analyze potential threats within a network by providing broader contextual information about how those threats relate to other activity within the network or across a sector or country.

Classes IPC  ?

  • H04L 29/06 - Commande de la communication; Traitement de la communication caractérisés par un protocole
  • H04L 9/40 - Protocoles réseaux de sécurité

15.

Identification of invalid advertising traffic

      
Numéro d'application 17330313
Numéro de brevet 11856023
Statut Délivré - en vigueur
Date de dépôt 2021-05-25
Date de la première publication 2022-12-01
Date d'octroi 2023-12-26
Propriétaire IronNet Cybersecurity, Inc. (USA)
Inventeur(s)
  • Kacewicz, Ania
  • Swort, Matthew C.

Abrégé

Systems and techniques for detecting advertising fraudulent traffic, or invalid traffic, by correlating advertising traffic with cyber network defense events are described. For example, described techniques include querying cyber network traffic events, querying the metadata returned by the tag script placed in the displayed advertisement, and correlating times, internet protocol (IP) addresses, publisher domains, and referrer domains with domains and IP addresses flagged by network cyber security events.

Classes IPC  ?

  • H04L 9/40 - Protocoles réseaux de sécurité

16.

IDENTIFICATION OF INVALID ADVERTISING TRAFFIC

      
Numéro d'application US2022030579
Numéro de publication 2022/251132
Statut Délivré - en vigueur
Date de dépôt 2022-05-23
Date de publication 2022-12-01
Propriétaire IRONNET CYBERSECURITY, INC. (USA)
Inventeur(s)
  • Kacewicz, Ania
  • Swort, Matthew C.

Abrégé

Systems and techniques for detecting advertising fraudulent traffic, or invalid traffic, by correlating advertising traffic with cyber network defense events are described. For example, described techniques include querying cyber network traffic events, querying the metadata returned by the tag script placed in the displayed advertisement, and correlating times, internet protocol (IP) addresses, publisher domains, and referrer domains with domains and IP addresses flagged by network cyber security events.

Classes IPC  ?

  • G06Q 30/02 - MarketingEstimation ou détermination des prixCollecte de fonds
  • G06F 17/00 - Équipement ou méthodes de traitement de données ou de calcul numérique, spécialement adaptés à des fonctions spécifiques

17.

IRONRADAR

      
Numéro de série 97662781
Statut Enregistrée
Date de dépôt 2022-11-07
Date d'enregistrement 2024-01-16
Propriétaire IronNet Cybersecurity, Inc. ()
Classes de Nice  ? 42 - Services scientifiques, technologiques et industriels, recherche et conception

Produits et services

Application service provider featuring application programming interface (API) software for providing cyber threat data to subscribing organizations' security platforms to assist such organizations in protecting against cyber threats

18.

SYSTEMS AND METHODS FOR DETECTING MALICIOUS NETWORK TRAFFIC USING MULTI-DOMAIN MACHINE LEARNING

      
Numéro d'application US2021064736
Numéro de publication 2022/146802
Statut Délivré - en vigueur
Date de dépôt 2021-12-21
Date de publication 2022-07-07
Propriétaire IRONNET CYBERSECURITY, INC. (USA)
Inventeur(s)
  • Grossman, Robert L.
  • Heath, James E.

Abrégé

System and methods for cross-domain training and updating of models to perform classification and scoring of network data/traffic are described. Information used to build deep machine learning models about traffic in one domain is used to improve the modeling in another domain. By using cross-domain learning, labeled data from another domain can be used to improve the detection rate and false positive rate of an analytic model in another domain. Because of the construction of the models, and because the models, and not the data are transferred, there is no disclosure of personally identifiable or otherwise restricted information.

Classes IPC  ?

  • G08B 1/08 - Systèmes de signalisation caractérisés seulement par la forme de transmission du signal utilisant une transmission électrique

19.

Systems and methods for detecting malicious network traffic using multi-domain machine learning

      
Numéro d'application 17136582
Numéro de brevet 12069072
Statut Délivré - en vigueur
Date de dépôt 2020-12-29
Date de la première publication 2022-06-30
Date d'octroi 2024-08-20
Propriétaire IronNet Cybersecurity, Inc. (USA)
Inventeur(s)
  • Grossman, Robert L.
  • Heath, James E.

Abrégé

System and methods for cross-domain training and updating of models to perform classification and scoring of network data/traffic are described. Information used to build deep machine learning models about traffic in one domain is used to improve the modeling in another domain. By using cross-domain learning, labeled data from another domain can be used to improve the detection rate and false positive rate of an analytic model in another domain. Because of the construction of the models, and because the models, and not the data are transferred, there is no disclosure of personally identifiable or otherwise restricted information.

Classes IPC  ?

20.

SYSTEMS AND METHODS OF DETECTING ANOMALOUS WEBSITES

      
Numéro d'application US2021038195
Numéro de publication 2021/262573
Statut Délivré - en vigueur
Date de dépôt 2021-06-21
Date de publication 2021-12-30
Propriétaire IRONNET CYBERSECURITY, INC. (USA)
Inventeur(s)
  • Kacewicz, Ania
  • Stinson, Christopher S.

Abrégé

Systems and methods for detecting anomalous and malicious URL's by analyzing markup language structure, such as HTML, are provided. The systems and methods include the querying of a URL to obtain the markup language data. The markup language data their corresponding elements and their locations rows/depths are parsed into coordinates within a 2-dimensional grid and then processed into features. A color is assigned to each feature as a function of the type of feature. The three dimensions (x, y coordinates and color coordinate) of the features are used to generate an image. The generated images are then compressed to facilitate processing. The compressed images of common websites are analyzed using deep machine learning algorithms to generate a model that represents their structure. These generated models are then used to detect suspicious and/or anomalous websites.

Classes IPC  ?

  • G08B 23/00 - Alarmes réagissant à des conditions indésirables ou anormales, non spécifiées
  • H04L 29/06 - Commande de la communication; Traitement de la communication caractérisés par un protocole

21.

Systems and methods of detecting anomalous websites

      
Numéro d'application 16909435
Numéro de brevet 11716350
Statut Délivré - en vigueur
Date de dépôt 2020-06-23
Date de la première publication 2021-12-23
Date d'octroi 2023-08-01
Propriétaire IRONNET CYBERSECURITY, INC. (USA)
Inventeur(s)
  • Kacewicz, Ania
  • Stinson, Christopher S.

Abrégé

Systems and methods for detecting anomalous and malicious URL's by analyzing markup language structure, such as HTML, are provided. The systems and methods include the querying of a URL to obtain the markup language data. The markup language data their corresponding elements and their locations rows/depths are parsed into coordinates within a 2-dimensional grid and then processed into features. A color is assigned to each feature as a function of the type of feature. The three dimensions (x, y coordinates and color coordinate) of the features are used to generate an image. The generated images are then compressed to facilitate processing. The compressed images of common websites are analyzed using deep machine learning algorithms to generate a model that represents their structure. These generated models are then used to detect suspicious and/or anomalous websites.

Classes IPC  ?

  • H04L 9/40 - Protocoles réseaux de sécurité
  • G06F 16/951 - IndexationTechniques d’exploration du Web
  • G06F 40/143 - Balisage, p. ex. utilisation du langage SGML ou de définitions de type de document
  • G06F 40/221 - Analyse syntaxique de flux de langages de balisage
  • G06T 15/00 - Rendu d'images tridimensionnelles [3D]
  • G06N 3/088 - Apprentissage non supervisé, p. ex. apprentissage compétitif
  • G06T 9/00 - Codage d'image
  • G06V 10/56 - Extraction de caractéristiques d’images ou de vidéos relative à la couleur

22.

Data block-based system and methods for predictive models

      
Numéro d'application 16855027
Numéro de brevet 11507291
Statut Délivré - en vigueur
Date de dépôt 2020-04-22
Date de la première publication 2021-10-28
Date d'octroi 2022-11-22
Propriétaire IronNet Cybersecurity, Inc. (USA)
Inventeur(s)
  • Grossman, Robert L.
  • Swort, Matthew C.
  • Heath, James E.

Abrégé

Systems and methods for recording information at a granular level; checking and verifying that data is used and processed is consistent with an entity's internal policies and/or external regulations; and producing reports to authorized users (e.g., individuals and organizations) with information are provided. The system and methods capture required data in an immutable fashion so that users outside of an entity (e.g., public, third parties) can check and audit that internal policies and other regulatory policies and frameworks are followed.

Classes IPC  ?

  • H04L 29/06 - Commande de la communication; Traitement de la communication caractérisés par un protocole
  • G06F 3/06 - Entrée numérique à partir de, ou sortie numérique vers des supports d'enregistrement
  • H04L 9/06 - Dispositions pour les communications secrètes ou protégéesProtocoles réseaux de sécurité l'appareil de chiffrement utilisant des registres à décalage ou des mémoires pour le codage par blocs, p. ex. système DES
  • G06F 21/62 - Protection de l’accès à des données via une plate-forme, p. ex. par clés ou règles de contrôle de l’accès
  • G06N 5/02 - Représentation de la connaissanceReprésentation symbolique

23.

DATA BLOCK-BASED SYSTEM AND METHODS FOR PREDICTIVE MODELS

      
Numéro d'application US2021027089
Numéro de publication 2021/216321
Statut Délivré - en vigueur
Date de dépôt 2021-04-13
Date de publication 2021-10-28
Propriétaire IRONNET CYBERSECURITY, INC. (USA)
Inventeur(s)
  • Grossman, Robert L.
  • Swort, Matthew C.
  • Heath, James E.

Abrégé

Systems and methods for recording information at a granular level; checking and verifying that data is used and processed is consistent with an entity's internal policies and/or external regulations; and producing reports to authorized users (e.g., individuals and organizations) with information are provided. The system and methods capture required data in an immutable fashion so that users outside of an entity (e.g., public, third parties) can check and audit that internal policies and other regulatory policies and frameworks are followed.

Classes IPC  ?

24.

SYSTEMS AND METHODS OF MALWARE DETECTION

      
Numéro d'application US2021016538
Numéro de publication 2021/162925
Statut Délivré - en vigueur
Date de dépôt 2021-02-04
Date de publication 2021-08-19
Propriétaire IRONNET CYBERSECURITY, INC. (USA)
Inventeur(s)
  • Webster, Jordan S.
  • Stinson, Christopher S.

Abrégé

Systems and methods for detecting suspicious malware by analyzing data such as transfer protocol data or logs from a host within an enterprise is provided. The systems and methods include a database for storing current data and historical data obtained from the network and a detection module and an optional display. The embodiments herein extract information from non-encrypted transfer protocol metadata, determine a plurality of features, utilize an outlier detection model that is based on historical behaviors, calculate a suspiciousness score, and create alerts for analysis by users when the score exceeds a threshold. In doing so, the systems and methods of the present invention improve the ability to identify suspicious outliers or potential malware on an iterative basis over time.

Classes IPC  ?

  • G06F 21/00 - Dispositions de sécurité pour protéger les calculateurs, leurs composants, les programmes ou les données contre une activité non autorisée
  • G06F 21/56 - Détection ou gestion de programmes malveillants, p. ex. dispositions anti-virus

25.

Systems and methods of malware detection

      
Numéro d'application 16786101
Numéro de brevet 11716337
Statut Délivré - en vigueur
Date de dépôt 2020-02-10
Date de la première publication 2021-08-12
Date d'octroi 2023-08-01
Propriétaire IRONNET CYBERSECURITY, INC. (USA)
Inventeur(s)
  • Webster, Jordan S.
  • Stinson, Christopher S.

Abrégé

Systems and methods for detecting suspicious malware by analyzing data such as transfer protocol data or logs from a host within an enterprise is provided. The systems and methods include a database for storing current data and historical data obtained from the network and a detection module and an optional display. The embodiments herein extract information from non-encrypted transfer protocol metadata, determine a plurality of features, utilize an outlier detection model that is based on historical behaviors, calculate a suspiciousness score, and create alerts for analysis by users when the score exceeds a threshold. In doing so, the systems and methods of the present invention improve the ability to identify suspicious outliers or potential malware on an iterative basis over time.

Classes IPC  ?

  • H04L 9/40 - Protocoles réseaux de sécurité
  • H04L 43/16 - Surveillance de seuil
  • H04L 43/022 - Capture des données de surveillance par échantillonnage
  • G06F 17/18 - Opérations mathématiques complexes pour l'évaluation de données statistiques
  • G06F 21/56 - Détection ou gestion de programmes malveillants, p. ex. dispositions anti-virus
  • H04L 69/322 - Protocoles de communication intra-couche entre entités paires ou définitions d'unité de données de protocole [PDU]
  • G06N 20/00 - Apprentissage automatique

26.

SYSTEMS AND METHODS FOR ANALYZING CYBERSECURITY EVENTS

      
Numéro d'application US2021013152
Numéro de publication 2021/146226
Statut Délivré - en vigueur
Date de dépôt 2021-01-13
Date de publication 2021-07-22
Propriétaire IRONNET CYBERSECURITY, INC. (USA)
Inventeur(s)
  • Lowney, Michael
  • Schafer, Phillip Baker
  • Conn, Alexander Michael
  • Collard, Patrick
  • Kinser, Stephen

Abrégé

Methods and systems for the detection, identification, analysis of cybersecurity events in order to support prevention of the persistence of threats, malware or other harmful events are provided. The methods and systems of the present invention enable a user to find similar anomalous network traffic within a single network or across multiple networks. The methods and systems identify and correlate activity in order to analyze potential threats within a network by providing broader contextual information about how those threats relate to other activity within the network or across a sector or country.

Classes IPC  ?

  • G06F 11/00 - Détection d'erreursCorrection d'erreursContrôle de fonctionnement
  • G06F 21/00 - Dispositions de sécurité pour protéger les calculateurs, leurs composants, les programmes ou les données contre une activité non autorisée

27.

Systems and methods for analyzing cybersecurity events

      
Numéro d'application 16742975
Numéro de brevet 11477223
Statut Délivré - en vigueur
Date de dépôt 2020-01-15
Date de la première publication 2021-07-15
Date d'octroi 2022-10-18
Propriétaire IronNet Cybersecurity, Inc. (USA)
Inventeur(s)
  • Lowney, Michael
  • Schafer, Phillip Baker
  • Conn, Alexander Michael
  • Collard, Patrick
  • Kinser, Stephen

Abrégé

Methods and systems for the detection, identification, analysis of cybersecurity events in order to support prevention of the persistence of threats, malware or other harmful events are provided. The methods and systems of the present invention enable a user to find similar anomalous network traffic within a single network or across multiple networks. The methods and systems identify and correlate activity in order to analyze potential threats within a network by providing broader contextual information about how those threats relate to other activity within the network or across a sector or country.

Classes IPC  ?

  • H04L 29/06 - Commande de la communication; Traitement de la communication caractérisés par un protocole
  • H04L 9/40 - Protocoles réseaux de sécurité

28.

TRANSFORMING CYBERSECURITY THROUGH COLLECTIVE DEFENSE

      
Numéro d'application 1597445
Statut Enregistrée
Date de dépôt 2021-04-20
Date d'enregistrement 2021-04-20
Propriétaire IronNet Cybersecurity, Inc. (USA)
Classes de Nice  ?
  • 09 - Appareils et instruments scientifiques et électriques
  • 41 - Éducation, divertissements, activités sportives et culturelles
  • 42 - Services scientifiques, technologiques et industriels, recherche et conception
  • 45 - Services juridiques; services de sécurité; services personnels pour individus

Produits et services

Computer software, downloadable computer software, mobile device software for use in cybersecurity detection and prevention of malware, intrusions, and other cyber threats, for network defense and for monitoring, assessing and implementing improvements in the security of enterprise data, infrastructure, and networks; computer software, downloadable computer software, mobile device software for use in real-time threat assessment, detection, and updates, behavioral modeling, data analytics and proactive responses; computer software, downloadable computer software, mobile device software for assessing the status of enterprise data, infrastructure, and network traffic, and for identifying and assessing threats to the enterprise data, infrastructure, and network traffic, all for use in cybersecurity consulting, assessments, and training; computer software, downloadable computer software, mobile device software for simulating threats, and possible responses to those threats, to the security of enterprise data, infrastructure and networks, for use in cybersecurity consulting, assessments, and training. Cybersecurity training services. Providing non-downloadable computer programs for detection and prevention of malware, intrusions, and other cyber threats, for network defense and for monitoring, assessing and implementing improvements in the security of enterprise data, infrastructure, and networks, all in the field of cybersecurity; computer security consultancy and threat assessments in connection therewith. Remote security monitoring services in the nature of providing real-time threat assessment, detection, and updates of unlawful activity, behavioral modelling of network systems for tracking network security threats, electronic data analytics, namely, analyzing data in computer databases for unlawful activity, and generating proactive incident responses in connection with all of the foregoing.

29.

TRANSFORMING CYBERSECURITY THROUGH COLLECTIVE DEFENSE

      
Numéro d'application 211478200
Statut Enregistrée
Date de dépôt 2021-04-20
Date d'enregistrement 2023-03-01
Propriétaire IronNet Cybersecurity, Inc. (USA)
Classes de Nice  ?
  • 09 - Appareils et instruments scientifiques et électriques
  • 41 - Éducation, divertissements, activités sportives et culturelles
  • 42 - Services scientifiques, technologiques et industriels, recherche et conception
  • 45 - Services juridiques; services de sécurité; services personnels pour individus

Produits et services

(1) Computer software, downloadable computer software, mobile device software for use in cybersecurity detection and prevention of malware, intrusions, and other cyber threats, for network defense and for monitoring, assessing and implementing improvements in the security of enterprise data, infrastructure, and networks; computer software, downloadable computer software, mobile device software for use in real-time threat assessment, detection, and updates, behavioral modeling, data analytics and proactive responses, namely, in the field of cybersecurity detection, prevention of malware, intrusions, and other cyber threats, for network defense; computer software, downloadable computer software, mobile device software for assessing the status of enterprise data, infrastructure, and network traffic, and for identifying and assessing threats to the enterprise data, infrastructure, and network traffic, all for use in cybersecurity consulting, assessments, and training; computer software, downloadable computer software, mobile device software for simulating threats, and possible responses to those threats, to the security of enterprise data, infrastructure and networks, for use in cybersecurity consulting, assessments, and training. (1) Cybersecurity training services. (2) Providing non-downloadable computer programs for detection and prevention of malware, intrusions, and other cyber threats, for network defense and for monitoring, assessing and implementing improvements in the security of enterprise data, infrastructure, and networks, all in the field of cybersecurity; computer security consultancy and threat assessments in connection therewith. (3) Remote security monitoring services in the nature of providing real-time threat assessment, detection, and updates of unlawful activity, behavioral modelling of network systems for tracking network security threats, electronic data analytics, namely, analyzing data in computer databases for unlawful activity, and generating proactive incident responses in connection with all of the foregoing.

30.

Simulation and virtual reality based cyber behavioral systems

      
Numéro d'application 15612381
Numéro de brevet 09910993
Statut Délivré - en vigueur
Date de dépôt 2017-06-02
Date de la première publication 2018-01-18
Date d'octroi 2018-03-06
Propriétaire IronNet Cybersecurity, Inc. (USA)
Inventeur(s)
  • Grossman, Robert L.
  • Alexander, Keith B.
  • Heath, James E.
  • Garrett, Randy Lynn

Abrégé

A cybersecurity system for managing cyber behavior associated with cyber actors such that the cyber behavior can be computed and predicted and cyber interactions between the cyber actors can be created. The system includes a cyber behavioral space management module configured to receive input data, and data from the interaction engine and the analytic workflow engine, and to generate a plurality of cyber behavioral spaces based on the received data. The system includes an interaction engine configured to process cyber actor data to facilitate interactions with the cyber behavioral space, a cyber scene, a cyber map, and another cyber actor. The system includes an analytic workflow engine configured to analyze the cyber behavioral spaces and update cyber data based on the analyzed data and the interaction engine data. The system includes a visualization engine configured to compute visualizations and transmit the visualizations for display.

Classes IPC  ?

  • H04L 29/06 - Commande de la communication; Traitement de la communication caractérisés par un protocole
  • G06F 21/57 - Certification ou préservation de plates-formes informatiques fiables, p. ex. démarrages ou arrêts sécurisés, suivis de version, contrôles de logiciel système, mises à jour sécurisées ou évaluation de vulnérabilité
  • G06F 21/55 - Détection d’intrusion locale ou mise en œuvre de contre-mesures
  • G06T 19/00 - Transformation de modèles ou d'images tridimensionnels [3D] pour infographie

31.

Simulation and virtual reality based cyber behavioral systems

      
Numéro d'application 15645271
Numéro de brevet 09875360
Statut Délivré - en vigueur
Date de dépôt 2017-07-10
Date de la première publication 2018-01-18
Date d'octroi 2018-01-23
Propriétaire IronNet Cybersecurity, Inc. (USA)
Inventeur(s)
  • Grossman, Robert L.
  • Alexander, Keith B.
  • Heath, James E.
  • Garrett, Randy Lynn

Abrégé

A cybersecurity system for managing cyber behavior associated with cyber actors such that the cyber behavior can be computed and predicted and cyber interactions between the cyber actors can be created. The system includes a cyber behavioral space management module configured to receive input data, and data from the interaction engine and the analytic workflow engine, and to generate a plurality of cyber behavioral spaces based on the received data. The system includes an interaction engine configured to process cyber actor data to facilitate interactions with the cyber behavioral space, a cyber scene, a cyber map, and another cyber actor. The system includes an analytic workflow engine configured to analyze the cyber behavioral spaces and update cyber data based on the analyzed data and the interaction engine data. The system includes a visualization engine configured to compute visualizations and transmit the visualizations for display.

Classes IPC  ?

  • H04L 29/06 - Commande de la communication; Traitement de la communication caractérisés par un protocole
  • G06F 21/57 - Certification ou préservation de plates-formes informatiques fiables, p. ex. démarrages ou arrêts sécurisés, suivis de version, contrôles de logiciel système, mises à jour sécurisées ou évaluation de vulnérabilité
  • G06F 21/55 - Détection d’intrusion locale ou mise en œuvre de contre-mesures
  • G06T 19/00 - Transformation de modèles ou d'images tridimensionnels [3D] pour infographie

32.

SIMULATION AND VIRTUAL REALITY BASED CYBER BEHAVIORAL SYSTEMS

      
Numéro d'application US2017035679
Numéro de publication 2018/013244
Statut Délivré - en vigueur
Date de dépôt 2017-06-02
Date de publication 2018-01-18
Propriétaire IRONNET CYBERSECURITY, INC. (USA)
Inventeur(s)
  • Grossman, Robert, L.
  • Alexander, Keith, B.
  • Heath, James, E.
  • Garrett, Randy, Lynn

Abrégé

A cybersecurity system for managing cyber behavior associated with cyber actors such that the cyber behavior can be computed and predicted and cyber interactions between the cyber actors can be created. The system includes a cyber behavioral space management module configured to receive input data, and data from the interaction engine and the analytic workflow engine, and to generate a plurality of cyber behavioral spaces based on the received data. The system includes an interaction engine configured to process cyber actor data to facilitate interactions with the cyber behavioral space, a cyber scene, a cyber map, and another cyber actor. The system includes an analytic workflow engine configured to analyze the cyber behavioral spaces and update cyber data based on the analyzed data and the interaction engine data. The system includes a visualization engine configured to compute visualizations and transmit the visualizations for display.

Classes IPC  ?

  • G06F 17/30 - Recherche documentaire; Structures de bases de données à cet effet
  • G06F 21/50 - Contrôle des utilisateurs, des programmes ou des dispositifs de préservation de l’intégrité des plates-formes, p. ex. des processeurs, des micrologiciels ou des systèmes d’exploitation
  • G06F 21/56 - Détection ou gestion de programmes malveillants, p. ex. dispositions anti-virus

33.

IRONDEFENSE

      
Numéro d'application 1338521
Statut Enregistrée
Date de dépôt 2016-12-05
Date d'enregistrement 2016-12-05
Propriétaire IronNet Cybersecurity, Inc. (USA)
Classes de Nice  ?
  • 09 - Appareils et instruments scientifiques et électriques
  • 41 - Éducation, divertissements, activités sportives et culturelles
  • 42 - Services scientifiques, technologiques et industriels, recherche et conception
  • 45 - Services juridiques; services de sécurité; services personnels pour individus

Produits et services

Computer software, downloadable computer software, mobile device software for use in cybersecurity detection and prevention of malware, intrusions, and other cyber threats, for network defense and for monitoring, assessing and implementing improvements in the security of enterprise data, infrastructure, and networks; computer software, downloadable computer software, mobile device software for use in real-time threat assessment, detection, and updates, behavioral modeling, data analytics and proactive responses; computer software, downloadable computer software, mobile device software for use in cybersecurity consulting, assessments, and training. Cybersecurity training services. Providing non-downloadable computer programs for detection and prevention of malware, intrusions, and other cyber threats, for network defense and for monitoring, assessing and implementing improvements in the security of enterprise data, infrastructure, and networks, all in the field of cybersecurity; computer security consulting and threat assessments in connection therewith. Remote security monitoring services in the nature of providing real-time threat assessment, detection, and updates of unlawful activity, behavioral modelling of network systems for tracking network security threats, electronic data analytics, namely, analyzing data in computer databases for unlawful activity, and generating proactive incident responses in connection with all of the foregoing.

34.

IRONNET

      
Numéro d'application 1337714
Statut Enregistrée
Date de dépôt 2016-12-05
Date d'enregistrement 2016-12-05
Propriétaire IronNet Cybersecurity, Inc. (USA)
Classes de Nice  ?
  • 09 - Appareils et instruments scientifiques et électriques
  • 41 - Éducation, divertissements, activités sportives et culturelles
  • 42 - Services scientifiques, technologiques et industriels, recherche et conception
  • 45 - Services juridiques; services de sécurité; services personnels pour individus

Produits et services

Computer software, downloadable computer software, mobile device software for use in cybersecurity detection and prevention of malware, intrusions, and other cyber threats, for network defense and for monitoring, assessing and implementing improvements in the security of enterprise data, infrastructure, and networks; computer software, downloadable computer software, mobile device software for use in real-time threat assessment, detection, and updates, behavioral modeling, data analytics and proactive responses; computer software, downloadable computer software, mobile device software for use in cybersecurity consulting, assessments, and training. Cybersecurity training services. Providing non-downloadable computer programs for detection and prevention of malware, intrusions, and other cyber threats, for network defense and for monitoring, assessing and implementing improvements in the security of enterprise data, infrastructure, and networks, all in the field of cybersecurity; computer security consulting and threat assessments in connection therewith. Remote security monitoring services in the nature of providing real-time threat assessment, detection, and updates of unlawful activity, behavioral modelling of network systems for tracking network security threats, electronic data analytics, namely, analyzing data in computer databases for unlawful activity, and generating proactive incident responses in connection with all of the foregoing.

35.

IRONDOME

      
Numéro d'application 1337715
Statut Enregistrée
Date de dépôt 2016-12-05
Date d'enregistrement 2016-12-05
Propriétaire IronNet Cybersecurity, Inc. (USA)
Classes de Nice  ?
  • 09 - Appareils et instruments scientifiques et électriques
  • 41 - Éducation, divertissements, activités sportives et culturelles
  • 42 - Services scientifiques, technologiques et industriels, recherche et conception
  • 45 - Services juridiques; services de sécurité; services personnels pour individus

Produits et services

Computer software, downloadable computer software, mobile device software for use in cybersecurity detection and prevention of malware, intrusions, and other cyber threats, for network defense and for monitoring, assessing and implementing improvements in the security of enterprise data, infrastructure, and networks; computer software, downloadable computer software, mobile device software for use in real-time threat assessment, detection, and updates, behavioral modeling, data analytics and proactive responses; computer software, downloadable computer software, mobile device software for use in cybersecurity consulting, assessments, and training. Cybersecurity training services. Providing non-downloadable computer programs for detection and prevention of malware, intrusions, and other cyber threats, for network defense and for monitoring, assessing and implementing improvements in the security of enterprise data, infrastructure, and networks, all in the field of cybersecurity; computer security consulting and threat assessments in connection therewith. Remote security monitoring services in the nature of providing real-time threat assessment, detection, and updates of unlawful activity, behavioral modelling of network systems for tracking network security threats, electronic data analytics, namely, analyzing data in computer databases for unlawful activity, and generating proactive incident responses in connection with all of the foregoing.

36.

Miscellaneous Design

      
Numéro d'application 1337054
Statut Enregistrée
Date de dépôt 2016-12-05
Date d'enregistrement 2016-12-05
Propriétaire IronNet Cybersecurity, Inc. (USA)
Classes de Nice  ?
  • 09 - Appareils et instruments scientifiques et électriques
  • 41 - Éducation, divertissements, activités sportives et culturelles
  • 42 - Services scientifiques, technologiques et industriels, recherche et conception
  • 45 - Services juridiques; services de sécurité; services personnels pour individus

Produits et services

Computer software, downloadable computer software, mobile device software for use in cybersecurity detection and prevention of malware, intrusions, and other cyber threats, for network defense and for monitoring, assessing and implementing improvements in the security of enterprise data, infrastructure, and networks; computer software, downloadable computer software, mobile device software for use in real-time threat assessment, detection, and updates, behavioral modeling, data analytics and proactive responses; computer software, downloadable computer software, mobile device software for use in cybersecurity consulting, assessments, and training. Cybersecurity training services. Providing non-downloadable computer programs for detection and prevention of malware, intrusions, and other cyber threats, for network defense and for monitoring, assessing and implementing improvements in the security of enterprise data, infrastructure, and networks, all in the field of cybersecurity. Remote security monitoring services in the nature of providing real-time threat assessment, detection, and updates of unlawful activity, behavioral modelling of network systems for tracking network security threats, electronic data analytics, namely, analyzing data in computer databases for unlawful activity, and generating proactive incident responses in connection with all of the foregoing; providing cybersecurity consulting and threat assessments.

37.

MISCELLANEOUS DESIGN (hexagons logo)

      
Numéro d'application 181241500
Statut Enregistrée
Date de dépôt 2016-12-02
Date d'enregistrement 2019-11-06
Propriétaire IronNet Cybersecurity, Inc. (USA)
Classes de Nice  ?
  • 09 - Appareils et instruments scientifiques et électriques
  • 45 - Services juridiques; services de sécurité; services personnels pour individus

Produits et services

(1) Computer software, downloadable computer software, mobile device software for use in cybersecurity detection and prevention of malware, intrusions, and other cyber threats, for network defense and for monitoring, assessing and implementing improvements in the security of enterprise data, infrastructure, and networks; computer software, downloadable computer software, mobile device software for use in real-time threat assessment, detection, and updates, behavioral modeling, data analytics and proactive responses, namely, in the field of cybersecurity detection, prevention of malware, intrusions, and other cyber threats, for network defense; computer software, downloadable computer software, mobile device software for use in cybersecurity consulting, assessments, and training (1) Providing cybersecurity services, namely, providing non-downloadable computer programs for detection and prevention of malware, intrusions, and other cyber threats, for network defense and for monitoring, assessing and implementing improvements in the security of enterprise data, infrastructure, and networks; providing real-time threat assessment, detection, and updates, behavioral modeling, data analytics and proactive responses; providing cybersecurity consulting, assessments, and training services

38.

IRONDEFENSE

      
Numéro d'application 181241400
Statut Enregistrée
Date de dépôt 2016-12-02
Date d'enregistrement 2019-11-06
Propriétaire IronNet Cybersecurity, Inc. (USA)
Classes de Nice  ?
  • 09 - Appareils et instruments scientifiques et électriques
  • 45 - Services juridiques; services de sécurité; services personnels pour individus

Produits et services

(1) Computer software, downloadable computer software, mobile device software for use in cybersecurity detection and prevention of malware, intrusions, and other cyber threats, for network defense and for monitoring, assessing and implementing improvements in the security of enterprise data, infrastructure, and networks; computer software, downloadable computer software, mobile device software for use in real-time threat assessment, detection, and updates, behavioral modeling, data analytics and proactive responses, namely, in the field of cybersecurity detection, prevention of malware, intrusions, and other cyber threats, for network defense; computer software, downloadable computer software, mobile device software for use in cybersecurity consulting, assessments, and training (1) Providing cybersecurity services, namely, providing non-downloadable computer programs for detection and prevention of malware, intrusions, and other cyber threats, for network defense and for monitoring, assessing and implementing improvements in the security of enterprise data, infrastructure, and networks; providing real-time threat assessment, detection, and updates, behavioral modeling, data analytics and proactive responses; providing cybersecurity consulting, assessments, and training services

39.

IRONDOME

      
Numéro d'application 181241300
Statut Enregistrée
Date de dépôt 2016-12-02
Date d'enregistrement 2019-11-06
Propriétaire IronNet Cybersecurity, Inc. (USA)
Classes de Nice  ?
  • 09 - Appareils et instruments scientifiques et électriques
  • 45 - Services juridiques; services de sécurité; services personnels pour individus

Produits et services

(1) Computer software, downloadable computer software, mobile device software for use in cybersecurity detection and prevention of malware, intrusions, and other cyber threats, for network defense and for monitoring, assessing and implementing improvements in the security of enterprise data, infrastructure, and networks; computer software, downloadable computer software, mobile device software for use in real-time threat assessment, detection, and updates, behavioral modeling, data analytics and proactive responses, namely, in the field of cybersecurity detection, prevention of malware, intrusions, and other cyber threats, for network defense; computer software, downloadable computer software, mobile device software for use in cybersecurity consulting, assessments, and training (1) Providing cybersecurity services, namely, providing non-downloadable computer programs for detection and prevention of malware, intrusions, and other cyber threats, for network defense and for monitoring, assessing and implementing improvements in the security of enterprise data, infrastructure, and networks; providing real-time threat assessment, detection, and updates, behavioral modeling, data analytics and proactive responses; providing cybersecurity consulting, assessments, and training services

40.

IRONNET

      
Numéro d'application 181241200
Statut Enregistrée
Date de dépôt 2016-12-02
Date d'enregistrement 2019-11-06
Propriétaire IronNet Cybersecurity, Inc. (USA)
Classes de Nice  ?
  • 09 - Appareils et instruments scientifiques et électriques
  • 45 - Services juridiques; services de sécurité; services personnels pour individus

Produits et services

(1) Computer software, downloadable computer software, mobile device software for use in cybersecurity detection and prevention of malware, intrusions, and other cyber threats, for network defense and for monitoring, assessing and implementing improvements in the security of enterprise data, infrastructure, and networks; computer software, downloadable computer software, mobile device software for use in real-time threat assessment, detection, and updates, behavioral modeling, data analytics and proactive responses, namely, in the field of cybersecurity detection, prevention of malware, intrusions, and other cyber threats, for network defense; computer software, downloadable computer software, mobile device software for use in cybersecurity consulting, assessments, and training (1) Providing cybersecurity services, namely, providing non-downloadable computer programs for detection and prevention of malware, intrusions, and other cyber threats, for network defense and for monitoring, assessing and implementing improvements in the security of enterprise data, infrastructure, and networks; providing real-time threat assessment, detection, and updates, behavioral modeling, data analytics and proactive responses; providing cybersecurity consulting, assessments, and training services

41.

CYBERSECURITY SYSTEM

      
Numéro d'application US2015056082
Numéro de publication 2016/109005
Statut Délivré - en vigueur
Date de dépôt 2015-10-16
Date de publication 2016-07-07
Propriétaire IRONNET CYBERSECURITY, INC. (USA)
Inventeur(s)
  • Grossman, Robert, L.
  • Heath, James, E.
  • Richardson, Russell, D.
  • Alexander, Keith, B.

Abrégé

A cybersecurity system for processing events to produce scores, alerts, and mitigation actions. The system includes sensors for receiving and processing data to form events, distributed analytic platform for processing events to form analytic workflows, and scoring engines for processing events using analytic workflows to produce scoring engine messages. The system also includes real time analytic engine for processing scoring engine messages and distributed analytic platform messages using the analytic workflows and analytic workflow and event processing rules to form and transmit a threat intelligence message. Threat intelligence messages include broadcast messages, mitigation messages, and model update messages. The system also includes logical segments which associate an analytic model, a set of analytic models, or an analytic workflow; one or more sources of inputs about activity within the logical segment, and a set of actions for mitigating an impact of the anomalous activity occurring within the logical segment.

Classes IPC  ?

  • G06F 11/00 - Détection d'erreursCorrection d'erreursContrôle de fonctionnement

42.

Miscellaneous Design

      
Numéro de série 87059420
Statut Enregistrée
Date de dépôt 2016-06-03
Date d'enregistrement 2018-01-09
Propriétaire IronNet Cybersecurity, Inc. ()
Classes de Nice  ?
  • 41 - Éducation, divertissements, activités sportives et culturelles
  • 42 - Services scientifiques, technologiques et industriels, recherche et conception
  • 45 - Services juridiques; services de sécurité; services personnels pour individus

Produits et services

[ Cybersecurity training services ] Providing non-downloadable computer programs for detection and prevention of malware, intrusions, and other cyber threats, for network defense and for monitoring, assessing and implementing improvements in the security of enterprise data, infrastructure, and networks, all in the field of cybersecurity Remote security monitoring services in the nature of providing real-time threat assessment, detection, and updates of unlawful activity, behavioral modelling of network systems for tracking network security threats, electronic data analytics, namely, analyzing data in computer databases for unlawful activity, and generating proactive incident responses in connection with all of the foregoing; providing cybersecurity consulting and threat assessments

43.

IRONNET

      
Numéro de série 87059400
Statut Enregistrée
Date de dépôt 2016-06-03
Date d'enregistrement 2018-01-09
Propriétaire IronNet Cybersecurity, Inc. ()
Classes de Nice  ?
  • 41 - Éducation, divertissements, activités sportives et culturelles
  • 42 - Services scientifiques, technologiques et industriels, recherche et conception
  • 45 - Services juridiques; services de sécurité; services personnels pour individus

Produits et services

[ Cybersecurity training services ] Providing non-downloadable computer programs for detection and prevention of malware, intrusions, and other cyber threats, for network defense and for monitoring, assessing and implementing improvements in the security of enterprise data, infrastructure, and networks, all in the field of cybersecurity Remote security monitoring services in the nature of providing real-time threat assessment, detection, and updates of unlawful activity, behavioral modelling of network systems for tracking network security threats, electronic data analytics, namely, analyzing data in computer databases for unlawful activity, and generating proactive incident responses in connection with all of the foregoing; providing cybersecurity consulting and threat assessments

44.

Cybersecurity system

      
Numéro d'application 14885857
Numéro de brevet 09306965
Statut Délivré - en vigueur
Date de dépôt 2015-10-16
Date de la première publication 2016-04-05
Date d'octroi 2016-04-05
Propriétaire IronNet Cybersecurity, Inc. (USA)
Inventeur(s)
  • Grossman, Robert L.
  • Heath, James E.
  • Richardson, Russell D.
  • Alexander, Keith B.

Abrégé

A cybersecurity system for processing events to produce scores, alerts, and mitigation actions. The system includes sensors for receiving and processing data to form events, distributed analytic platform for processing events to form analytic workflows, and scoring engines for processing events using analytic workflows to produce scoring engine messages. The system also includes real time analytic engine for processing scoring engine messages and distributed analytic platform messages using the analytic workflows and analytic workflow and event processing rules to form and transmit a threat intelligence message. Threat intelligence messages include broadcast messages, mitigation messages, and model update messages. The system also includes logical segments which associate an analytic model, a set of analytic models, or an analytic workflow; one or more sources of inputs about activity within the logical segment, and a set of actions for mitigating an impact of the anomalous activity occurring within the logical segment.

Classes IPC  ?

  • H04L 29/06 - Commande de la communication; Traitement de la communication caractérisés par un protocole