49 patents
Page 2 of 3
Utility
Anomaly Detection
30 Jun 22
Analyzing log data, such as security log data and machine data, is disclosed.
Kumar Saurabh, David M. Andrzejewski, Yuchen Zhao, Christian Friedrich Beedgen, Bruno Kurtic
Filed: 17 Mar 22
Utility
Searchable investigation history for event data store
14 Jun 22
A processing device receives a first query comprising a first field value and a first time period.
Kenny Tidwell, David Frampton, Brendan O'Connell
Filed: 17 Oct 19
Utility
Clustering of structured log data by key schema
3 May 22
Clustering structured log data by key schema includes receiving a raw log message.
Udit Saxena, Reetika Roy, Ryley Higa, David M. Andrzejewski, Bashyam Tca
Filed: 1 Sep 20
Utility
Anomaly detection
26 Apr 22
Analyzing log data, such as security log data and machine data, is disclosed.
Kumar Saurabh, David M. Andrzejewski, Yuchen Zhao, Christian Friedrich Beedgen, Bruno Kurtic
Filed: 16 Aug 19
Utility
Cardinality of Time Series
30 Dec 21
Querying of time-aware metrics time series includes receiving a query, the query comprising a set of query metadata and a query time range.
Christian Friedrich Beedgen, David M. Andrzejewski, Weijia Che
Filed: 27 Aug 21
Utility
Clustering of Structured Log Data by Key-values
2 Dec 21
Clustering structured log data by key-values includes receiving, via a user interface, a request to apply an operator to cluster a set of raw log messages according to values for a set of keys associated with the request.
Udit Saxena, Reetika Roy, Ryley Higa, David M. Andrzejewski, Bashyam TCA
Filed: 1 Sep 20
Utility
Clustering of Structured Log Data by Key Schema
2 Dec 21
Clustering structured log data by key schema includes receiving a raw log message.
Udit Saxena, Reetika Roy, Ryley Higa, David M. Andrzejewski, Bashyam TCA
Filed: 1 Sep 20
Utility
Single click delta analysis
30 Nov 21
Single-click delta analysis is disclosed.
Matt K. Amel, Christian Friedrich Beedgen, Kumar Saurabh, Bruno Kurtic
Filed: 11 May 20
Utility
Cardinality of time series
23 Nov 21
Querying of time-aware metrics time series includes receiving a query, the query comprising a set of query metadata and a query time range.
Christian Friedrich Beedgen, David M. Andrzejewski, Weijia Che
Filed: 13 Nov 18
Utility
Single Click Delta Analysis
11 Nov 21
Single-click delta analysis is disclosed.
Matt K. Amel, Christian Friedrich Beedgen, Kumar Saurabh, Bruno Kurtic
Filed: 22 Jul 21
Utility
Logs to metrics synthesis
22 Jun 21
A technique for logs to metrics synthesis is disclosed.
Christian Friedrich Beedgen, David M Andrzejewski, Benjamin Everette Newton, Kumar Avijit, Stefan Christoph Zier
Filed: 10 Jul 18
Utility
Vehicle with a Boom Comprising a Hydraulic Control Circuit with a Load Control Valve
27 May 21
A vehicle including a control valve to lift and lower a boom.
Davide Cristofori, Giovanni Notarnicola, Alessandro Benevelli
Filed: 2 May 18
Utility
Selective structure preserving obfuscation
13 Apr 21
Obfuscating data is disclosed.
Bruno Kurtic, Stefan Christoph Zier, Christian Friedrich Beedgen, Kumar Saurabh
Filed: 31 Oct 19
Utility
Logs to Metrics Synthesis
25 Mar 21
Logs to metrics synthesis includes receiving a log message.
Christian Friedrich Beedgen, David M. Andrzejewski, Benjamin Everette Newton, Kumar Avijit, Stefan Christoph Zier
Filed: 3 Dec 20
Utility
Systems and Methods for Trie-based Automated Discovery of Patterns In Computer Logs
18 Mar 21
Systems and methods for tokenization of log records for efficient data storage, log querying, and log data analytics can utilize a trie pattern conversion of the log files, storing trie data pattern IDs, free parameters, and metadata instead of the entire log record.
Przemyslaw Maciolek, Daniel Cincunegui, Krzysztof Koszyka
Filed: 13 Nov 20
Utility
Method for predicting and characterizing cyber attacks
16 Mar 21
One variation of a method for predicting and characterizing cyber attacks includes: receiving, from a sensor implementing deep packet inspection to detect anomalous behaviors on the network, a first signal specifying a first anomalous behavior of a first asset on the network at a first time; representing the first signal in a first vector representing frequencies of anomalous behaviors—in a set of behavior types—of the first asset within a first time window; calculating a first malicious score representing proximity of the first vector to malicious vectors defining sets of behaviors representative of security threats; calculating a first benign score representing proximity of the first vector to a benign vector representing an innocuous set of behaviors; and in response to the first malicious score exceeding the first benign score and a malicious threshold score, issuing a first alert to investigate the network for a security threat.
Gregory Martin, Thomas Piscitell, III, David Matslofva, Brian Waskiewicz, Scott Woods
Filed: 13 Jun 19
Utility
Automatic parser selection and usage
12 Jan 21
The automatic selection and usage of a parser is disclosed.
Kumar Saurabh, Christian Friedrich Beedgen, Bruno Kurtic
Filed: 6 Aug 15
Utility
Systems and methods for trie-based automated discovery of patterns in computer logs
14 Dec 20
Systems and methods for tokenization of log records for efficient data storage, log querying, and log data analytics can utilize a trie pattern conversion of the log files, storing trie data pattern IDs, free parameters, and metadata instead of the entire log record.
Przemyslaw Maciolek, Daniel Cincunegui, Krzysztof Koszyka
Filed: 14 Aug 16
Utility
Method for detecting a cyber attack
14 Dec 20
One variation of a method for detecting a cyber attack includes: recording representations of network events occurring on a network over a period of time to a network accounting log; writing metadata values of network events in the accounting log to a compressed log file; in response to receipt of a new threat intelligence representing a newly-identified security threat identified after the period of time, querying the compressed log file for a set of metadata values of a threat element defined in the new threat intelligence; in response to detecting the set of metadata values of the threat element in the compressed log file, querying the network accounting log for a set of threat elements defined in the new threat intelligence; and in response to detecting the set of threat elements in the network accounting log, issuing an alert to respond to the newly-identified security threat on the network.
Gregory Martin, Thomas Piscitell, III, David Matslofva
Filed: 12 Jun 19
Utility
Method for predicting security risks of assets on a computer network
30 Nov 20
One variation of a method for predicting security risks of assets on a computer network includes: over a first period of time, detecting an asset connected to the computer network and a first set of behaviors exhibited by the asset; associating the asset with a first set of assets based on similarity of the first set of behaviors to behaviors characteristic of the first set of assets; over a second period of time succeeding the first period of time, detecting the asset connected to the computer network and a second set of behaviors exhibited by the asset; detecting deviation of the asset from the first set of assets based on differences between the second set of behaviors and behaviors characteristic of the first set of assets; and generating a security alert for the asset in response to deviation of the asset from the first set of assets.
Gregory Charles Martin, Jeffrey J. Guy, Grant Babb
Filed: 30 Oct 17