Reliaquest Holdings, LLC

United States of America

Back to Profile

1-29 of 29 for Reliaquest Holdings, LLC Sort by
Query
Patent
World - WIPO
Aggregations Reset Report
Date
2023 6
2022 2
2021 12
2019 7
Before 2019 2
IPC Class
G06F 11/00 - Error detection; Error correction; Monitoring 13
G06F 21/00 - Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity 11
G06F 21/55 - Detecting local intrusion or implementing counter-measures 10
G06F 21/56 - Computer malware detection or handling, e.g. anti-virus arrangements 9
G06F 21/57 - Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities 7
See more
Found results for  patents

1.

THREAT MITIGATION SYSTEM AND METHOD

      
Application Number US2023017336
Publication Number 2023/192677
Status In Force
Filing Date 2023-04-03
Publication Date 2023-10-05
Owner RELIAQUEST HOLDINGS, LLC (USA)
Inventor
  • Murphy, Brian P.
  • Partlow, Joe
  • O'Connor, Colin
  • Pfeiffer, Jason
  • Murphy, Brian Philip

Abstract

A computer-implemented method, computer program product and computing system for receiving a plurality of detection events concerning a plurality of security events occurring on a security-relevant subsystem within a computing platform; identifying two or more associated detection events included within the plurality of detection events; and grouping the two or more associated detection events to define a security incident.

IPC Classes  ?

  • H04L 9/40 - Network security protocols
  • G06F 21/56 - Computer malware detection or handling, e.g. anti-virus arrangements
  • G06F 21/57 - Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
  • G06F 11/00 - Error detection; Error correction; Monitoring
  • G06F 21/00 - Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity

2.

THREAT MITIGATION SYSTEM AND METHOD

      
Application Number US2023017341
Publication Number 2023/192682
Status In Force
Filing Date 2023-04-03
Publication Date 2023-10-05
Owner RELIAQUEST HOLDINGS, LLC (USA)
Inventor
  • Murphy, Brian P.
  • Partlow, Joe
  • O'Connor, Colin
  • Pfeiffer, Jason
  • Murphy, Brian Philip

Abstract

A computer-implemented method, computer program product and computing system for defining a first query for a first security-relevant subsystem within a computing platform; processing the first query on the first security-relevant subsystem to generate a first data set concerning security events occurring on the first security-relevant subsystem; and receiving the first data set concerning the security events occurring on the first security-relevant subsystem

IPC Classes  ?

  • H04L 9/40 - Network security protocols
  • G06F 21/56 - Computer malware detection or handling, e.g. anti-virus arrangements
  • G06F 21/57 - Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities

3.

THREAT MITIGATION SYSTEM AND METHOD

      
Application Number US2023017342
Publication Number 2023/192683
Status In Force
Filing Date 2023-04-03
Publication Date 2023-10-05
Owner RELIAQUEST HOLDINGS, LLC (USA)
Inventor
  • Murphy, Brian P.
  • Partlow, Joe
  • O'Connor, Colin
  • Pfeiffer, Jason
  • Murphy, Brian Philip

Abstract

A computer-implemented method, computer program product and computing system for defining a universal detection rule for execution on a computing platform; processing the universal detection rule to generate a first detection rule that is executable on a first security-relevant subsystem within the computing platform; providing the first detection rule to the first security-relevant subsystem for execution on the first security-relevant subsystem; processing the universal detection rule to generate a second detection rule that is executable on a second security-relevant subsystem within the computing platform; and providing the second detection rule to the second security-relevant subsystem for execution on the first security-relevant subsystem

IPC Classes  ?

  • H04L 9/40 - Network security protocols
  • G06F 21/56 - Computer malware detection or handling, e.g. anti-virus arrangements
  • G06F 21/57 - Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
  • G06F 11/00 - Error detection; Error correction; Monitoring
  • G06F 21/00 - Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity

4.

THREAT MITIGATION SYSTEM AND METHOD

      
Application Number US2023017343
Publication Number 2023/192684
Status In Force
Filing Date 2023-04-03
Publication Date 2023-10-05
Owner RELIAQUEST HOLDINGS, LLC (USA)
Inventor
  • Murphy, Brian P.
  • Partlow, Joe
  • O'Connor, Colin
  • Pfeiffer, Jason
  • Murphy, Brian Philip

Abstract

A computer-implemented method, computer program product and computing system for receiving a plurality of detection events concerning a plurality of security events occurring on multiple security-relevant subsystems within one or more computing platforms; storing the plurality of detection events to form an event repository; and processing the event repository using a machine learning model to identify attack patterns defined within the plurality of detection events stored within the event repository, thus defining one or more identified attack patterns

IPC Classes  ?

  • H04L 9/40 - Network security protocols
  • G06F 21/56 - Computer malware detection or handling, e.g. anti-virus arrangements
  • G06F 21/57 - Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
  • G06F 11/00 - Error detection; Error correction; Monitoring
  • G06F 21/00 - Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity

5.

THREAT MITIGATION SYSTEM AND METHOD

      
Application Number US2023017344
Publication Number 2023/192685
Status In Force
Filing Date 2023-04-03
Publication Date 2023-10-05
Owner RELIAQUEST HOLDINGS, LLC (USA)
Inventor
  • Murphy, Brian P.
  • Partlow, Joe
  • O'Connor, Colin
  • Pfeiffer, Jason
  • Murphy, Brian Philip

Abstract

A computer-implemented method, computer program product and computing system for receiving a plurality of detection events concerning a plurality of security events occurring on multiple security-relevant subsystems within one or more computing platforms; processing the plurality of detection events to make them compatible with a graph database, thus defining processed detection events; and storing the processed detection events within a graph content repository

IPC Classes  ?

  • H04L 9/40 - Network security protocols
  • G06F 21/56 - Computer malware detection or handling, e.g. anti-virus arrangements
  • G06F 21/57 - Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
  • G06F 11/00 - Error detection; Error correction; Monitoring
  • G06F 21/00 - Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity

6.

THREAT MITIGATION SYSTEM AND METHOD

      
Application Number US2023017339
Publication Number 2023/192680
Status In Force
Filing Date 2023-04-03
Publication Date 2023-10-05
Owner RELIAQUEST HOLDINGS, LLC (USA)
Inventor
  • Murphy, Brian P.
  • Partlow, Joe
  • O'Connor, Colin
  • Pfeiffer, Jason
  • Murphy, Brian Philip

Abstract

A computer-implemented method, computer program product and computing system for receiving a plurality of detection events concerning a plurality of security events occurring on two or more security-relevant subsystems within a computing platform; identifying two or more associated detection events included within the plurality of detection events; and grouping the two or more associated detection events to define a security incident.

IPC Classes  ?

  • H04L 9/40 - Network security protocols
  • G06F 21/56 - Computer malware detection or handling, e.g. anti-virus arrangements
  • G06F 21/57 - Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
  • G06F 11/00 - Error detection; Error correction; Monitoring
  • G06F 21/00 - Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity

7.

THREAT MITIGATION SYSTEM AND METHOD

      
Application Number US2021060392
Publication Number 2022/109417
Status In Force
Filing Date 2021-11-22
Publication Date 2022-05-27
Owner RELIAQUEST HOLDINGS, LLC (USA)
Inventor
  • Murphy, Brian P.
  • Partlow, Joe
  • O'Connor, Colin
  • Pfeiffer, Jason
  • Murphy, Brian Philip

Abstract

A computer-implemented method, computer program product and computing system for: establishing connectivity with a plurality of security-relevant subsystems within a computing platform; defining a plurality of subsystem-specific queries on a unified platform concerning the plurality of security-relevant subsystems, wherein one or more of the plurality of subsystem-specific queries has a defined execution schedule; and providing the plurality of subsystem-specific queries to the plurality of security-relevant subsystems.

IPC Classes  ?

  • G06F 11/00 - Error detection; Error correction; Monitoring

8.

THREAT MITIGATION SYSTEM AND METHOD

      
Application Number US2021060395
Publication Number 2022/109419
Status In Force
Filing Date 2021-11-22
Publication Date 2022-05-27
Owner RELIAQUEST HOLDINGS, LLC (USA)
Inventor
  • Murphy, Brian P.
  • Partlow, Joe
  • O'Connor, Colin
  • Pfeiffer, Jason
  • Murphy, Brian Philip

Abstract

A computer-implemented method, computer program product and computing system for: a computer-implemented method is executed on a computing device and includes: obtaining object information concerning one or more initial objects within a computing platform in response to a security event; identifying an event type for the security event; and executing a response script based, at least in part, upon the event type.

IPC Classes  ?

  • G06F 11/00 - Error detection; Error correction; Monitoring

9.

THREAT MITIGATION SYSTEM AND METHOD

      
Application Number US2021034828
Publication Number 2021/243197
Status In Force
Filing Date 2021-05-28
Publication Date 2021-12-02
Owner RELIAQUEST HOLDINGS, LLC (USA)
Inventor
  • Murphy, Brian P.
  • Partlow, Joe
  • O'Connor, Colin
  • Pfeiffer, Jason
  • Murphy, Brian Philip

Abstract

A computer-implemented method, computer program product and computing system for: establishing connectivity with a plurality of security-relevant subsystems within a computing platform; defining a specific task to be executed on one or more of the plurality of security-relevant subsystems, thus defining one or more target security-relevant subsystems; commissioning a container-based job within which the specific task will be executed; and executing the specific task within the container-based job.

IPC Classes  ?

  • G06F 21/53 - Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity, buffer overflow or preventing unwanted data erasure by executing in a restricted environment, e.g. sandbox or secure virtual machine
  • G06F 21/55 - Detecting local intrusion or implementing counter-measures
  • G06F 21/56 - Computer malware detection or handling, e.g. anti-virus arrangements
  • H04L 9/32 - Arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system
  • H04L 12/26 - Monitoring arrangements; Testing arrangements

10.

THREAT MITIGATION SYSTEM AND METHOD

      
Application Number US2020062252
Publication Number 2021/108569
Status In Force
Filing Date 2020-11-25
Publication Date 2021-06-03
Owner RELIAQUEST HOLDINGS, LLC (USA)
Inventor
  • Murphy, Brian, P.
  • Partlow, Joe
  • O'Connor, Colin
  • Pfeiffer, Jason
  • Murphy, Brian, Philip

Abstract

A computer-implemented method, computer program product and computing system for: establishing connectivity with a plurality of security-relevant subsystems within a computing platform; and mapping one or more data fields of a unified platform to one or more data fields of each of the plurality of security-relevant subsystems.

IPC Classes  ?

  • H04L 29/06 - Communication control; Communication processing characterised by a protocol
  • G06F 11/00 - Error detection; Error correction; Monitoring

11.

THREAT MITIGATION SYSTEM AND METHOD

      
Application Number US2020062234
Publication Number 2021/108552
Status In Force
Filing Date 2020-11-25
Publication Date 2021-06-03
Owner RELIAQUEST HOLDINGS, LLC (USA)
Inventor
  • Murphy, Brian P.
  • Partlow, Joe
  • O'Connor, Colin
  • Pfeiffer, Jason
  • Murphy, Brian Philip

Abstract

A computer-implemented method, computer program product and computing system for: establishing connectivity with a plurality of security-relevant subsystems within a computing platform; defining a unified query on a unified platform concerning the plurality of security-relevant subsystems; denormalizing the unified query to define a subsystem-specific query for each of the plurality of security-relevant subsystems, thus defining a plurality of subsystem-specific queries; and providing the plurality of subsystem-specific queries to the plurality of security-relevant subsystems.

IPC Classes  ?

  • H04L 29/06 - Communication control; Communication processing characterised by a protocol
  • G06F 21/00 - Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity

12.

THREAT MITIGATION SYSTEM AND METHOD

      
Application Number US2020049899
Publication Number 2021/050516
Status In Force
Filing Date 2020-09-09
Publication Date 2021-03-18
Owner RELIAQUEST HOLDINGS, LLC (USA)
Inventor
  • Murphy, Brian P.
  • Partlow, Joe
  • O'Connor, Colin
  • Pfeiffer, Jason
  • Murphy, Brian Philip

Abstract

A computer-implemented method, computer program product and computing system for: defining a threat mitigation platform for a client, wherein the threat mitigation platform includes a plurality of threat detection capability modules; defining a rollout schedule for at least a portion of the plurality of threat detection capability modules; and presenting the rollout schedule to the client.

IPC Classes  ?

  • G06F 21/55 - Detecting local intrusion or implementing counter-measures
  • G06F 21/12 - Protecting executable software
  • G06F 21/54 - Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity, buffer overflow or preventing unwanted data erasure by adding security routines or objects to programs
  • G06F 21/60 - Protecting data
  • G06F 8/60 - Software deployment

13.

THREAT MITIGATION SYSTEM AND METHOD

      
Application Number US2020049903
Publication Number 2021/050519
Status In Force
Filing Date 2020-09-09
Publication Date 2021-03-18
Owner RELIAQUEST HOLDINGS, LLC (USA)
Inventor
  • Murphy, Brian, P.
  • Partlow, Joe
  • O'Connor, Colin
  • Pfeiffer, Jason
  • Murphy, Brian, Philip

Abstract

A computer-implemented method, computer program product and computing system for: obtaining consolidated platform information to identify current security-relevant capabilities for a computing platform; determining possible security-relevant capabilities for the computing platform; and rendering graphical comparison information that illustrates a difference between the current security-relevant capabilities of the computing platform and the possible security-relevant capabilities of the computing platform.

IPC Classes  ?

  • G06F 21/55 - Detecting local intrusion or implementing counter-measures
  • G06F 21/12 - Protecting executable software
  • G06F 21/54 - Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity, buffer overflow or preventing unwanted data erasure by adding security routines or objects to programs
  • G06F 21/60 - Protecting data
  • G06F 8/60 - Software deployment

14.

THREAT MITIGATION SYSTEM AND METHOD

      
Application Number US2020049930
Publication Number 2021/050539
Status In Force
Filing Date 2020-09-09
Publication Date 2021-03-18
Owner RELIAQUEST HOLDINGS, LLC (USA)
Inventor
  • Murphy, Brian P.
  • Partlow, Joe
  • O'Connor, Colin
  • Pfeiffer, Jason
  • Murphy, Brian Philip

Abstract

A computer-implemented method, computer program product and computing system for: detecting one or more security events within a computing platform of a client; notifying the client of the one or more security events within the computing platform; determining if the client responded to the one or more security events within the computing platform; and providing a response report to the client that quantifies client response performance based, at least in part, upon if the client responded to the one or more security events within the computing platform.

IPC Classes  ?

  • G06F 21/55 - Detecting local intrusion or implementing counter-measures
  • G06F 21/12 - Protecting executable software
  • G06F 21/54 - Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity, buffer overflow or preventing unwanted data erasure by adding security routines or objects to programs
  • G06F 21/60 - Protecting data
  • G06F 8/60 - Software deployment

15.

THREAT MITIGATION SYSTEM AND METHOD

      
Application Number US2020049936
Publication Number 2021/050544
Status In Force
Filing Date 2020-09-09
Publication Date 2021-03-18
Owner RELIAQUEST HOLDINGS, LLC (USA)
Inventor
  • Murphy, Brian P.
  • Partlow, Joe
  • O'Connor, Colin
  • Pfeiffer, Jason
  • Murphy, Brian Philip

Abstract

A computer-implemented method, computer program product and computing system for: detecting one or more security events within a computing platform of a client; notifying the client of the one or more security events within the computing platform; determining how long it took the client to resolve the one or more security events within the computing platform; and providing a resolution report to the client that quantifies client resolution performance based, at least in part, upon how long it took the client to resolve the one or more security events within the computing platform.

IPC Classes  ?

  • G06N 20/00 - Machine learning
  • G06F 11/00 - Error detection; Error correction; Monitoring
  • G06F 12/14 - Protection against unauthorised use of memory
  • G06F 21/56 - Computer malware detection or handling, e.g. anti-virus arrangements

16.

THREAT MITIGATION SYSTEM AND METHOD

      
Application Number US2020049912
Publication Number 2021/050525
Status In Force
Filing Date 2020-09-09
Publication Date 2021-03-18
Owner RELIAQUEST HOLDINGS, LLC (USA)
Inventor
  • Murphy, Brian P.
  • Partlow, Joe
  • O'Connor, Colin
  • Pfeiffer, Jason
  • Murphy, Brian Philip

Abstract

A computer-implemented method, computer program product and computing system for: obtaining consolidated platform information to identify current security-relevant capabilities for a computing platform; identifying coverage gaps in the current security-relevant capabilities; and providing one or more recommendations concerning how to mitigate the coverage gaps.

IPC Classes  ?

  • G06F 21/55 - Detecting local intrusion or implementing counter-measures
  • G06F 21/12 - Protecting executable software
  • G06F 21/54 - Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity, buffer overflow or preventing unwanted data erasure by adding security routines or objects to programs
  • G06F 21/60 - Protecting data
  • G06F 8/60 - Software deployment

17.

THREAT MITIGATION SYSTEM AND METHOD

      
Application Number US2020043726
Publication Number 2021/021728
Status In Force
Filing Date 2020-07-27
Publication Date 2021-02-04
Owner RELIAQUEST HOLDINGS, LLC (USA)
Inventor
  • Murphy, Brian P.
  • Partlow, Joe
  • O'Connor, Colin
  • Pfeiffer, Jason
  • Murphy, Brian Philip

Abstract

A computer-implemented method, computer program product and computing system for: a computer-implemented method is executed on a computing device and includes: rendering a threat mitigation user interface that identifies objects within a computing platform in response to a security event; rendering an inspection window that defines object information concerning a selected object within the threat mitigation user interface; and enabling a third-party to effectuate a specific targeted action that is based, at least in part, upon the object information defined within the inspection window.

IPC Classes  ?

  • G06F 21/00 - Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
  • H04L 29/06 - Communication control; Communication processing characterised by a protocol
  • G06F 11/00 - Error detection; Error correction; Monitoring

18.

THREAT MITIGATION SYSTEM AND METHOD

      
Application Number US2020043719
Publication Number 2021/021722
Status In Force
Filing Date 2020-07-27
Publication Date 2021-02-04
Owner RELIAQUEST HOLDINGS, LLC (USA)
Inventor
  • Murphy, Brian P.
  • Partlow, Joe
  • O'Connor, Colin
  • Pfeiffer, Jason
  • Murphy, Brian Philip

Abstract

A computer-implemented method, computer program product and computing system for: a computer-implemented method is executed on a computing device and includes: rendering a threat mitigation user interface that identifies objects within a computing platform in response to a security event; enabling a third-party to select an object within the threat mitigation user interface, thus defining a selected object; and rendering an inspection window that defines object information concerning the selected object.

IPC Classes  ?

  • G06F 21/00 - Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
  • H04L 29/06 - Communication control; Communication processing characterised by a protocol
  • G06F 11/00 - Error detection; Error correction; Monitoring

19.

THREAT MITIGATION SYSTEM AND METHOD

      
Application Number US2020043734
Publication Number 2021/021733
Status In Force
Filing Date 2020-07-27
Publication Date 2021-02-04
Owner RELIAQUEST HOLDINGS, LLC (USA)
Inventor
  • Murphy, Brian P.
  • Partlow, Joe
  • O'Connor, Colin
  • Pfeiffer, Jason
  • Murphy, Brian Philip

Abstract

A computer-implemented method, computer program product and computing system for: a computer-implemented method is executed on a computing device and includes: rendering a threat mitigation user interface that identifies objects within a computing platform in response to a security event; and enabling a third-party to gather artifacts concerning an object within the threat mitigation user interface.

IPC Classes  ?

  • G06F 21/00 - Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
  • H04L 29/06 - Communication control; Communication processing characterised by a protocol
  • G06F 11/00 - Error detection; Error correction; Monitoring

20.

THREAT MITIGATION SYSTEM AND METHOD

      
Application Number US2020043741
Publication Number 2021/021737
Status In Force
Filing Date 2020-07-27
Publication Date 2021-02-04
Owner RELIAQUEST HOLDINGS, LLC (USA)
Inventor
  • Murphy, Brian P.
  • Partlow, Joe
  • O'Connor, Colin
  • Pfeiffer, Jason
  • Murphy, Brian Philip

Abstract

A computer-implemented method, computer program product and computing system for: a computer-implemented method is executed on a computing device and includes: rendering a threat mitigation user interface that identifies objects within a computing platform in response to a security event; monitoring actions taken by a third-party when investigating the security event; and providing suggestions to the third-party concerning additional actions to be taken by the third-party concerning the investigation of the security event.

IPC Classes  ?

  • G06F 21/00 - Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
  • H04L 29/06 - Communication control; Communication processing characterised by a protocol
  • G06F 11/00 - Error detection; Error correction; Monitoring

21.

THREAT MITIGATION SYSTEM AND METHOD

      
Application Number US2019035715
Publication Number 2019/236792
Status In Force
Filing Date 2019-06-06
Publication Date 2019-12-12
Owner RELIAQUEST HOLDINGS, LLC (USA)
Inventor
  • Murphy, Brian P.
  • Partlow, Joe
  • O'Connor, Colin
  • Pfeiffer, Jason

Abstract

A computer-implemented method, computer program product and computing system for: establishing connectivity with a plurality of security-relevant subsystems within a computing platform; obtaining at least one security-relevant information set from each of the plurality of security-relevant subsystems, thus defining a plurality of security-relevant information sets; and combining the plurality of security-relevant information sets to form an aggregated security-relevant information set for the computing platform

IPC Classes  ?

  • H04L 29/00 - Arrangements, apparatus, circuits or systems, not covered by a single one of groups

22.

THREAT MITIGATION SYSTEM AND METHOD

      
Application Number US2019035734
Publication Number 2019/236802
Status In Force
Filing Date 2019-06-06
Publication Date 2019-12-12
Owner RELIAQUEST HOLDINGS, LLC (USA)
Inventor
  • Murphy, Brian P.
  • Partlow, Joe
  • O'Connor, Colin
  • Pfeiffer, Jason

Abstract

A computer-implemented method, computer program product and computing system for: obtaining consolidated platform information to identify current security-relevant capabilities for a computing platform; determining comparative platform information that identifies security-relevant capabilities for a comparative platform; and generating comparison information that compares the current security-relevant capabilities of the computing platform to the comparative platform information of the comparative platform to identify a threat context indicator.

IPC Classes  ?

  • G06F 21/53 - Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity, buffer overflow or preventing unwanted data erasure by executing in a restricted environment, e.g. sandbox or secure virtual machine
  • G06F 21/55 - Detecting local intrusion or implementing counter-measures
  • H04L 29/14 - Counter-measures to a fault

23.

THREAT MITIGATION SYSTEM AND METHOD

      
Application Number US2019035704
Publication Number 2019/236786
Status In Force
Filing Date 2019-06-06
Publication Date 2019-12-12
Owner RELIAQUEST HOLDINGS, LLC (USA)
Inventor
  • Murphy, Brian P.
  • Partlow, Joe
  • O' Connor, Colin
  • Pfeiffer, Jason

Abstract

A computer-implemented method, computer program product and computing system for: obtaining system-defined consolidated platform information for a computing platform from an independent information source; obtaining client-defined consolidated platform information for the computing platform from a client information source; and presenting differential consolidated platform information for the computing platform to the third-party.

IPC Classes  ?

  • H04L 29/00 - Arrangements, apparatus, circuits or systems, not covered by a single one of groups

24.

THREAT MITIGATION SYSTEM AND METHOD

      
Application Number US2019035720
Publication Number 2019/236795
Status In Force
Filing Date 2019-06-06
Publication Date 2019-12-12
Owner RELIAQUEST HOLDINGS, LLC (USA)
Inventor
  • Murphy, Brian P.
  • Partlow, Joe
  • O'Connor, Colin
  • Pfeiffer, Jason

Abstract

A computer-implemented method, computer program product and computing system for: establishing connectivity with a plurality of security-relevant subsystems within a computing platform; receiving a unified query from a third-party concerning the plurality of security-relevant subsystems; distributing at least a portion of the unified query to the plurality of security-relevant subsystems; and effectuating the at least a portion of the unified query on each of the plurality of security-relevant subsystems to generate a plurality of result sets.

IPC Classes  ?

  • H04L 29/00 - Arrangements, apparatus, circuits or systems, not covered by a single one of groups

25.

THREAT MITIGATION SYSTEM AND METHOD

      
Application Number US2019035738
Publication Number 2019/236805
Status In Force
Filing Date 2019-06-06
Publication Date 2019-12-12
Owner RELIAQUEST HOLDINGS, LLC (USA)
Inventor
  • Murphy, Brian P.
  • Partlow, Joe
  • O'Connor, Colin
  • Pfeiffer, Jason

Abstract

A computer-implemented method, computer program product and computing system for: obtaining consolidated platform information to identify current security-relevant capabilities for a computing platform; determining possible security-relevant capabilities for the computing platform; and generating comparison information that compares the current security-relevant capabilities of the computing platform to the possible security-relevant capabilities of the computing platform to identify security-relevant deficiencies

IPC Classes  ?

  • G06F 21/53 - Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity, buffer overflow or preventing unwanted data erasure by executing in a restricted environment, e.g. sandbox or secure virtual machine
  • G06F 21/55 - Detecting local intrusion or implementing counter-measures
  • H04L 29/14 - Counter-measures to a fault

26.

THREAT MITIGATION SYSTEM AND METHOD

      
Application Number US2019035745
Publication Number 2019/236810
Status In Force
Filing Date 2019-06-06
Publication Date 2019-12-12
Owner RELIAQUEST HOLDINGS, LLC (USA)
Inventor
  • Murphy, Brian P.
  • Partlow, Joe
  • O'Connor, Colin
  • Pfeiffer, Jason

Abstract

A computer-implemented method, computer program product and computing system for: defining a training routine for a specific attack of a computing platform; and generating a simulation of the specific attack by executing the training routine within a controlled test environment.

IPC Classes  ?

  • G06F 21/53 - Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity, buffer overflow or preventing unwanted data erasure by executing in a restricted environment, e.g. sandbox or secure virtual machine
  • G06F 21/55 - Detecting local intrusion or implementing counter-measures
  • H04L 29/14 - Counter-measures to a fault

27.

THREAT MITIGATION SYSTEM AND METHOD

      
Application Number US2019035748
Publication Number 2019/236813
Status In Force
Filing Date 2019-06-06
Publication Date 2019-12-12
Owner RELIAQUEST HOLDINGS, LLC (USA)
Inventor
  • Murphy, Brian P.
  • Partlow, Joe
  • O'Connor, Colin
  • Pfeiffer, Jason

Abstract

A computer-implemented method, computer program product and computing system for: receiving platform information from a plurality of security-relevant subsystems; processing the platform information to generate processed platform information; identifying more threat-pertinent content included within the processed content; and routing the more threat-pertinent content to a threat analysis engine.

IPC Classes  ?

  • G06F 21/53 - Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity, buffer overflow or preventing unwanted data erasure by executing in a restricted environment, e.g. sandbox or secure virtual machine
  • G06F 21/55 - Detecting local intrusion or implementing counter-measures
  • H04L 29/14 - Counter-measures to a fault

28.

THREAT INTELLIGENCE SYSTEM AND METHOD

      
Application Number US2016040987
Publication Number 2017/004619
Status In Force
Filing Date 2016-07-05
Publication Date 2017-01-05
Owner RELIAQUEST HOLDINGS, LLC (USA)
Inventor
  • Murphy, Brian
  • Partlow, Joe

Abstract

A computer-implemented method, computer program product and computing system for associating a unique identifier with an entity. Network traffic directed toward the unique identifier is intercepted and routed to a computing device.

IPC Classes  ?

  • H04L 9/12 - Transmitting and receiving encryption devices synchronised or initially set up in a particular manner
  • H04L 12/22 - Arrangements for preventing the taking of data from a data transmission channel without authorisation
  • H04W 12/12 - Detection or prevention of fraud

29.

THREAT INTELLIGENCE SYSTEM AND METHOD

      
Application Number US2016040994
Publication Number 2017/004620
Status In Force
Filing Date 2016-07-05
Publication Date 2017-01-05
Owner RELIAQUEST HOLDINGS, LLC (USA)
Inventor
  • Murphy, Brian
  • Partlow, Joe

Abstract

A computer-implemented method, computer program product and computing system for importing threat data from a plurality of threat data sources, thus generating a plurality of raw threat data definitions. The plurality of raw threat data definitions are processed, thus generating a plurality of processed threat data definitions. The plurality of processed threat data definitions are processed to form a master threat data definition. The master threat data definition is provided to one or more client electronic devices.

IPC Classes  ?

  • G06F 21/00 - Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
  • G06F 21/55 - Detecting local intrusion or implementing counter-measures
  • G06F 21/56 - Computer malware detection or handling, e.g. anti-virus arrangements
  • G06F 21/57 - Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
  • H04W 12/00 - Security arrangements; Authentication; Protecting privacy or anonymity