Patents by Inventor Amar D. Patel

Amar D. Patel has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 11509667
    Abstract: IPRID reputation assessment enhances cybersecurity. IPRIDs include IP addresses, domain names, and other network resource identities. A convolutional neural network or other machine learning model is trained with data including aggregate features or rollup features or both. Aggregate features may include aggregated submission counts, classification counts, HTTP code counts, detonation statistics, and redirect counts, for instance. Rollup features reflect hierarchical rollups of data using <unknown> value placeholders specified in IPRID templates. The trained model can predictively infer a label, or produce a rapid lookup table of IPRIDs and maliciousness probabilities. Training data may be organized in grids with rows, columns, planes, branches, and slots. Training data may include whois data, geolocation data, and tenant data. Training data tuple sets may be expanded by date or by original IPRID.
    Type: Grant
    Filed: October 19, 2019
    Date of Patent: November 22, 2022
    Assignee: Microsoft Technology Licensing, LLC
    Inventors: Douglas J. Hines, Amar D. Patel, Ravi Chandru Shahani, Juilee Rege
  • Patent number: 11379577
    Abstract: Cybersecurity enhancements help avoid malicious Uniform Resource Locators (URLs). Embodiments may reduce or eliminate reliance on subjective analysis or detonation virtual machines. URL substrings are automatically analyzed for maliciousness using malice patterns. Patterns may test counts, lengths, rarity, encodings, and other inherent aspects of URLs. URLs may be analyzed individually, or in groups to detect shared portions, or both. URL analysis may use or avoid machine learning, and may use or avoid lookups. Malice patterns may be used individually or in combinations to detect malicious URLs. Analysis results may enhance security through blocking use of suspect URLs, flagging them for further analysis, or allowing their validated use, for instance. Analysis results may also be fed back to further train a machine learning model or a statistical model.
    Type: Grant
    Filed: September 26, 2019
    Date of Patent: July 5, 2022
    Assignee: Microsoft Technology Licensing, LLC
    Inventors: Amar D. Patel, Ravi Chandru Shahani, Revanth Rameshkumar, Ethan Jacob Holland, Douglas J. Hines, Abhijeet Surendra Hatekar
  • Publication number: 20210120013
    Abstract: IPRID reputation assessment enhances cybersecurity. IPRIDs include IP addresses, domain names, and other network resource identities. A convolutional neural network or other machine learning model is trained with data including aggregate features or rollup features or both. Aggregate features may include aggregated submission counts, classification counts, HTTP code counts, detonation statistics, and redirect counts, for instance. Rollup features reflect hierarchical rollups of data using <unknown> value placeholders specified in IPRID templates. The trained model can predictively infer a label, or produce a rapid lookup table of IPRIDs and maliciousness probabilities. Training data may be organized in grids with rows, columns, planes, branches, and slots. Training data may include whois data, geolocation data, and tenant data. Training data tuple sets may be expanded by date or by original IPRID.
    Type: Application
    Filed: October 19, 2019
    Publication date: April 22, 2021
    Inventors: Douglas J. HINES, Amar D. PATEL, Ravi Chandru SHAHANI, Juilee REGE
  • Publication number: 20210097168
    Abstract: Cybersecurity enhancements help avoid malicious Uniform Resource Locators (URLs). Embodiments may reduce or eliminate reliance on subjective analysis or detonation virtual machines. URL substrings are automatically analyzed for maliciousness using malice patterns. Patterns may test counts, lengths, rarity, encodings, and other inherent aspects of URLs. URLs may be analyzed individually, or in groups to detect shared portions, or both. URL analysis may use or avoid machine learning, and may use or avoid lookups. Malice patterns may be used individually or in combinations to detect malicious URLs. Analysis results may enhance security through blocking use of suspect URLs, flagging them for further analysis, or allowing their validated use, for instance. Analysis results may also be fed back to further train a machine learning model or a statistical model.
    Type: Application
    Filed: September 26, 2019
    Publication date: April 1, 2021
    Inventors: Amar D. PATEL, Ravi Chandru SHAHANI, Revanth RAMESHKUMAR, Ethan Jacob HOLLAND, Douglas J. HINES, Abhijeet Surendra HATEKAR
  • Patent number: 10511631
    Abstract: Providing safe access of a data item accessed through one of a plurality of access channels while concurrently providing a policy check of the data item. An indication associated with accessing a data item through one access channel of a plurality of access channels may be received. In response to receiving the indication associated with accessing the data item, the data item may be automatically analyzed to determine whether the data item satisfies a policy. Also in response to receiving the indication associated with accessing the data item and while determining whether the data item satisfies the policy, safe access of the data item may be provided. Regardless of the access channel through which the data item was accessed, any of the policy check, the safe access, and the analysis of the data item may be the same.
    Type: Grant
    Filed: January 25, 2017
    Date of Patent: December 17, 2019
    Assignee: Microsoft Technology Licensing, LLC
    Inventors: Amar D. Patel, Mario D. Goertzel, Kristjan E. Hatlelid
  • Publication number: 20180213000
    Abstract: Providing safe access of a data item accessed through one of a plurality of access channels while concurrently providing a policy check of the data item. An indication associated with accessing a data item through one access channel of a plurality of access channels may be received. In response to receiving the indication associated with accessing the data item, the data item may be automatically analyzed to determine whether the data item satisfies a policy. Also in response to receiving the indication associated with accessing the data item and while determining whether the data item satisfies the policy, safe access of the data item may be provided. Regardless of the access channel through which the data item was accessed, any of the policy check, the safe access, and the analysis of the data item may be the same.
    Type: Application
    Filed: January 25, 2017
    Publication date: July 26, 2018
    Inventors: Amar D. Patel, Mario D. Goertzel, Kristjan E. Hatlelid