Malicious Data Prevention


Inventor-Driven Auction: Cybernet / Chuck Jacobus - December 10th, 2015

CHECK FOR AVAILABILITY - Inventor-Driven Auction: Cybernet / Chuck Jacobus - December 10th, 2015
ID Lot 002
Seller Cybernet/Chuck Jacobus
Sector Computer Security
Assets 2 - US Patents; 4 - US Applications
US Patents 8,646,082 8,806,619
Applications US 12/026,850; US 60/888,331; US 61/015,462; US 61/453,777

Lot Summary

With priority dates from 2007, this portfolio is directed towards computer security, specifically with regards to the identification and removal of malicious software/data. This portfolio contains:

1. Apparatus and methods of preventing malicious data in Universal Serial Bus (USB) configurations by providing a hardware firewall. Malicious USB devices have been created that utilize weaknesses in the USB infrastructure to attack unprotected hosts and devices through combinations of malformed packets, device spoofing, electrical tricks, and other methods. Such a device comprises a hardware unit interconnected between a Universal Serial Bus (USB) device and a host. The device, which may include a memory to log data exchanges, monitors communication packets associated with data exchanges between the bus and the host and blocks packets having unwanted or malicious intent. In the preferred embodiment, the device acts as a hub, enabling multiple devices to connect to a single host. [US 8,646,082]
2. A system and method to determine whether software includes malicious code. A validation machine is instrumented with tools and monitors that capture the static and dynamic behavior of software. Software under examination is executed on the validation machine, and the tools and monitors are used to log behavioral data to detect vulnerable or malicious code. If possible, operations are automatically performed on the software to neutralize the vulnerable or malicious code. Activities that cannot be neutralized are automatically flagged for human inspection. The software executed on the validation machine may be source code or non-source code, with different operations being disclosed and described in each case. The basic approach employs AI learning based technology to identify malicious code and behaviors so that zero-day exploits become readily identifiable. [US 8,806,619]
3. Dynamic defenses within private networks that make it unlikely that outside agents attacking said networks can find or remain connected to the networks long enough to complete an incursion. [Patent Pending]

Due Diligence

Patent NumberFile History