Search

Kenny Carroll Tidwell

from Los Altos, CA
Age ~62

Kenny Tidwell Phones & Addresses

  • 914 S Springer Rd, Los Altos, CA 94024 (408) 948-2794
  • 104 Clear Lake Rd, Weatherford, TX 76087
  • 5429 Waltham Ave, Fort Worth, TX 76133
  • Mountain View, CA
  • Santa Clara, CA

Business Records

Name / Title
Company / Classification
Phones & Addresses
Kenny Tidwell
President
First Choice Equipment of Texas Inc
Retail Used Automobiles
4301 S Interstate 35 W, Alvarado, TX 76009
(817) 790-0995

Publications

Us Patents

Pattern Discovery In A Network Security System

View page
US Patent:
7509677, Mar 24, 2009
Filed:
May 4, 2004
Appl. No.:
10/839613
Inventors:
Kumar Saurabh - Santa Clara CA, US
Kenny Tidwell - Los Altos CA, US
Assignee:
ArcSight, Inc. - Cupertino CA
International Classification:
G06F 7/04
H04L 9/32
G06F 17/30
G06F 11/30
US Classification:
726 23, 726 22, 726 24, 726 25, 726 26, 726 27, 726 3, 726 4, 726 5, 726 6, 726 7, 713182, 713188, 709223, 709224, 709225, 709226, 709227
Abstract:
Patterns can be discovered in security events collected by a network security system. In one embodiment, the present invention includes collecting and storing security events from a variety of monitor devices. In one embodiment, a subset of the stored security events is provided to a manager as an event stream. In one embodiment, the present invention further includes the manager discovering one or more previously unknown event patterns in the event stream.

Object Reference In A System

View page
US Patent:
7647632, Jan 12, 2010
Filed:
Jan 4, 2005
Appl. No.:
11/029920
Inventors:
Chad Ward - Cupertino CA, US
Ankur Lahoti - Santa Clara CA, US
Kenny Tidwell - Los Altos CA, US
Assignee:
ArcSight, Inc. - Cupertino CA
International Classification:
G06F 17/30
G06F 17/10
US Classification:
726 22, 707103 R, 707103 Y, 707103 Z, 719315, 719332
Abstract:
A system can be configured using configuration objects that have the ability to refer to one another. In one embodiment, the present invention includes such a system having a plurality of objects used to configure the system, each object having a uniform resource identifier (URI), and an object reference table to enable the plurality of objects to reference each other without using URIs.

Threat Detection In A Network Security System

View page
US Patent:
7861299, Dec 28, 2010
Filed:
Aug 9, 2007
Appl. No.:
11/836251
Inventors:
Kenny C. Tidwell - Los Altos CA, US
Kumar Saurabh - Daly City CA, US
Debabrata Dash - Sunnyvale CA, US
Hugh S. Njemanze - Los Altos CA, US
Pravin S. Kothari - San Jose CA, US
Assignee:
ArcSight, Inc. - Cupertino CA
International Classification:
G06F 11/00
US Classification:
726 22, 726 23, 726 25
Abstract:
A network security system is provided that receives information from various sensors and can analyze the received information. In one embodiment of the present invention, such a system receives a security event from a software agent. The received security event includes a target address and an event signature, as generated by the software agent. The event signature can be used to determine a set of vulnerabilities exploited by the received security event, and the target address can be used to identify a target asset within the network. By accessing a model of the target asset, a set of vulnerabilities exposed by the target asset can be retrieved. Then, a threat can be detected by comparing the set of vulnerabilities exploited by the security event to the set of vulnerabilities exposed by the target asset.

Pattern Discovery In A Network System

View page
US Patent:
7984502, Jul 19, 2011
Filed:
Oct 1, 2008
Appl. No.:
12/243838
Inventors:
Kumar Saurabh - Mountain View CA, US
Kenny C. Tidwell - Los Altos CA, US
Assignee:
Hewlett-Packard Development Company, L.P. - Houston TX
International Classification:
G06F 7/04
G06F 12/14
H04L 9/00
US Classification:
726 23, 726 22, 726 24, 726 25, 726 26, 726 27, 713182, 713188
Abstract:
Patterns can be discovered in events collected by a network system. In one embodiment, the present invention includes collecting and storing events from a variety of monitor devices. In one embodiment, a subset of the stored events is provided to a manager as an event stream. In one embodiment, the present invention further includes the manager discovering one or more previously unknown event patterns in the event stream.

Hierarchical Architecture In A Network Security System

View page
US Patent:
8015604, Sep 6, 2011
Filed:
Oct 10, 2003
Appl. No.:
10/683221
Inventors:
Kenny Tidwell - Los Altos CA, US
Christian Beedgen - San Jose CA, US
Hugh S. Njemanze - Los Altos CA, US
Pravin S. Kothari - San Jose CA, US
Assignee:
ArcSight Inc - Cupertino CA
International Classification:
G06F 11/00
US Classification:
726 22, 726 23, 726 24, 726 25, 726 26, 709224, 709225
Abstract:
A network security system having a hierarchical configuration is provided. In one embodiment the present invention includes a plurality of subsystems, where each subsystem includes a plurality of distributed software agents configured to collect security events from monitor devices, and a local manager module coupled to the plurality of distributed software agents to generate correlated events by correlating the security events. Each of the subsystems can report the correlated events to a global manager module coupled to the plurality of subsystems, and the global manager module can correlate the correlated events from each manager module.

Object Reference In A System

View page
US Patent:
8065732, Nov 22, 2011
Filed:
Dec 3, 2009
Appl. No.:
12/630573
Inventors:
Chad Ward - Cupertino CA, US
Ankur Lahoti - Lucknow, IN
Kenny Tidwell - Los Altos CA, US
Assignee:
Hewlett-Packard Development Company, L.P. - Houston TX
International Classification:
G06F 17/30
G06F 17/10
US Classification:
726 22, 707999103, 707999104, 707999105, 707999106, 719315, 719332
Abstract:
A system can be configured using configuration objects that have the ability to refer to one another. In one embodiment, the present invention includes such a system having a plurality of objects used to configure the system, each object having a uniform resource identifier (URI), and an object reference table to enable the plurality of objects to reference each other without using URIs.

Comparing Events From Multiple Network Security Devices

View page
US Patent:
8528077, Sep 3, 2013
Filed:
Apr 9, 2004
Appl. No.:
10/821459
Inventors:
Kenny Tidwell - Los Altos CA, US
Debabrata Dash - Sunnyvale CA, US
Assignee:
Hewlett-Packard Development Company, L.P. - Houston TX
International Classification:
G06F 11/00
US Classification:
726 22, 726 23, 726 24, 726 25
Abstract:
Events are received from a plurality of security devices (which may be similar or different devices, e. g. , intrusion detection systems configured to monitor network traffic) and divided into a plurality of event flows. Comparing the event flows (e. g. , using statistical correlation methods) then generates one or more meta-events. The received events may be divided into different event flows on the basis of the security device which generated the events. The meta-events may be generated by evaluating a perimeter defense device through comparison of the different event flows. In some cases, various ones of the security devices may be inside or outside a perimeter defined by the perimeter defense device.

Tracking Changing State Data To Assist In Computer Network Security

View page
US Patent:
20080104046, May 1, 2008
Filed:
Oct 24, 2007
Appl. No.:
11/923502
Inventors:
Anurag Singla - Mountain View CA, US
Kumar Saurabh - Daly City CA, US
Kenny Tidwell - Los Altos CA, US
Assignee:
ARCSIGHT, INC. - Cupertino CA
International Classification:
G06F 17/30
US Classification:
707004000, 707E17014
Abstract:
A session table includes one or more records, where each record represents a session. Session record information is stored in various fields, such as key fields, value fields, and timestamp fields. Session information is described as keys and values in order to support query/lookup operations. A session table is associated with a filter, which describes a set of keys that can be used for records in that table. A session table is populated using data contained in security information/events. Rules are created to identify events related to session information, extract the session information, and use the session information to modify a session table. A session table is partitioned so that the number of records in each session table partition is decreased. A session table is processed periodically so that active sessions are moved to the current partition.
Kenny Carroll Tidwell from Los Altos, CA, age ~62 Get Report