Location History:
- Minneapolis, MN (US) (2020)
- Lino Lakes, MN (US) (2017 - 2024)
Company Filing History:
Years Active: 2017-2024
Title: Kirby James Koster: Innovator in Computational Security
Introduction
Kirby James Koster is a notable inventor based in Lino Lakes, MN (US), recognized for his contributions to the field of computational security. With a total of four patents to his name, Koster has made significant strides in developing technologies that enhance the detection of malicious and benign computational behaviors.
Latest Patents
Koster's latest patents include innovative methods for detecting malicious and benign computational behavior using parametric behavioral pattern definitions. One of his patents describes a security agent implemented on a monitored computing device that utilizes these definitions in conjunction with canonical patterns of behavior. This configuration allows the security agent to match observed behavior with known computing behavior, whether benign or malignant. The design enables the security agent's behavior to be updated remotely by a security service, ensuring real-time responses to new behaviors exhibited by the monitored device. Another patent focuses on similar principles, emphasizing the importance of real-time adaptability in security measures.
Career Highlights
Throughout his career, Koster has worked with prominent companies in the cybersecurity industry, including CrowdStrike, Inc. and McAfee, Inc. His experience in these organizations has contributed to his expertise in developing advanced security solutions.
Collaborations
Koster has collaborated with notable professionals in the field, including David Frederick Diehl and Daniel W. Brown. These partnerships have likely enriched his work and contributed to the innovative solutions he has developed.
Conclusion
Kirby James Koster stands out as an influential inventor in the realm of computational security, with a focus on enhancing the detection of malicious behaviors. His patents reflect a commitment to advancing technology in this critical area, ensuring that security measures remain effective in an ever-evolving digital landscape.