Blake Sutherland

Dallas-Fort Worth Metroplex Contact Info
2K followers 500+ connections

Join to view profile

Activity

Join now to see all activity

Licenses & Certifications

Patents

  • Method and System for Determining Licensing/Billing Fees for Computer Security Software

    Issued US 8,762,295 B2

    Value based licensing/billing methods and system for security software is provided, which use an effective vulnerability protection measure provided by a new or updated IPS filter deployed on host computer to determine the licensing/billing fee of the new or updated IPS filter over a billing period. The effective vulnerability protection measure is determined based on vulnerability and host attributes, and, in the embodiment of the invention, is based on a vulnerability time gap or time…

    Value based licensing/billing methods and system for security software is provided, which use an effective vulnerability protection measure provided by a new or updated IPS filter deployed on host computer to determine the licensing/billing fee of the new or updated IPS filter over a billing period. The effective vulnerability protection measure is determined based on vulnerability and host attributes, and, in the embodiment of the invention, is based on a vulnerability time gap or time protected of the host computer.

  • Method and System for Detecting Data Modification within Computing Device

    Issued US 8,713,312 B2

    A method and apparatus for detecting data modification in a layered operating system is disclosed. Outbound content indicators at different layers are compared to detect potential outbound data modifications. Likewise, inbound content indicators at different layers are compared to detect potential inbound data modifications. Content indicators include checksum, cryptographic hash, signature, and fingerprint indicators. Embodiments of the present invention enable detection of data modifications…

    A method and apparatus for detecting data modification in a layered operating system is disclosed. Outbound content indicators at different layers are compared to detect potential outbound data modifications. Likewise, inbound content indicators at different layers are compared to detect potential inbound data modifications. Content indicators include checksum, cryptographic hash, signature, and fingerprint indicators. Embodiments of the present invention enable detection of data modifications across an operating system’s kernel and user mode spaces, prevention of modified outbound data from reaching a network, prevention of modified input data from reaching a user application, and detection of malware and faults within an operating system.

  • Methods and system for determining performance of filters in a computer intrusion prevention detection system

    Issued US 8,321,937

    An intrusion prevention/detection system filter (IPS filter) performance evaluation is provided. The performance evaluation is performed at both the security center and at the customer sites to derive a base confidence score and local confidence scores. Existence of new vulnerability is disclosed and its attributes are used in the generation of new IPS filter or updates. The generated IPS filter is first tested to determine its base confidence score from test confidence attributes prior to…

    An intrusion prevention/detection system filter (IPS filter) performance evaluation is provided. The performance evaluation is performed at both the security center and at the customer sites to derive a base confidence score and local confidence scores. Existence of new vulnerability is disclosed and its attributes are used in the generation of new IPS filter or updates. The generated IPS filter is first tested to determine its base confidence score from test confidence attributes prior to deploying it to a customer site. A deep security manager and deep security agent, at the customer site, collect local confidence attributes that are used for determining the local confidence score. The local confidence score and the base confidence score are aggregated to form a global confidence score. The local and global confidence scores are then compared to deployment thresholds to determine whether the IPS filter should be deployed in prevention or detection mode or sent back to the security center for improvement.

    Other inventors
  • Bulk certificate lifetime allocation systems, components and methods

    Issued US 7,426,635

    A method and system for managing public key certificates is provided. A user purchases a block of unallocated time. When the user requests a certificate, the user specifies a life span for the certificate. A certificate is generated, and the life span of the certificate is deducted from the block of unallocated time. If the user revokes a certificate, the remaining lifetime of the revoked certificate is added back to the block of unallocated time. This allows certificates to be revoked without…

    A method and system for managing public key certificates is provided. A user purchases a block of unallocated time. When the user requests a certificate, the user specifies a life span for the certificate. A certificate is generated, and the life span of the certificate is deducted from the block of unallocated time. If the user revokes a certificate, the remaining lifetime of the revoked certificate is added back to the block of unallocated time. This allows certificates to be revoked without loss of purchased time, and gives the user more flexibility at requesting and revoking certificates.

    Other inventors
    • robert parkhill
  • Secure communication apparatus and method for facilitating recipient and sender activity delegation

    Issued US 20030182559

    A method and apparatus, such as a secure distribution server, receives encrypted information from a sender, wherein the encrypted information is for transmission to a plurality of intended recipients. In addition to the encrypted information, the method includes receiving an encrypted secret key that is encrypted using a public key associated with the secure distribution server. The method and apparatus decrypts the encrypted secret key to produce a decrypted secret key. The method and…

    A method and apparatus, such as a secure distribution server, receives encrypted information from a sender, wherein the encrypted information is for transmission to a plurality of intended recipients. In addition to the encrypted information, the method includes receiving an encrypted secret key that is encrypted using a public key associated with the secure distribution server. The method and apparatus decrypts the encrypted secret key to produce a decrypted secret key. The method and apparatus then obtains a public key associated with one or more delegates of the intended recipient(s), sender(s) or other entity and encrypts the decrypted secret key with the corresponding public key of at least one delegate (or each of a plurality of delegates) associated with the intended recipient(s) or sender(s) to produce at least one delegate-specific secure secret key (or plurality of delegate-specific secure secret keys). The method and apparatus then forwards the received encrypted information sent by the sender and also sends at least one delegate-specific secure secret key to a corresponding delegate of the intended recipient(s) or sender(s).

    Other inventors

Recommendations received

More activity by Blake

View Blake’s full profile

  • See who you know in common
  • Get introduced
  • Contact Blake directly
Join to view full profile

People also viewed

Explore collaborative articles

We’re unlocking community knowledge in a new way. Experts add insights directly into each article, started with the help of AI.

Explore More

Others named Blake Sutherland in United States

Add new skills with these courses