Patents by Inventor Elliott Jeb Haber

Elliott Jeb Haber has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 9398036
    Abstract: One or more techniques and/or systems are provided for file acquisition for reputation evaluation. A reputation service may be configured to evaluate files and provide reputations of such files to clients (e.g., an indication as to whether a file is safe or malicious). If the reputation service receives a reputation request for a file that is unknown to the reputation service (e.g., a file not yet fully acquired by the reputation service), then the reputation service may identify a set of chunks into which the file can be partitioned. The reputation service may obtain chunks from various clients, such as a first chunk from a first client and a second chunk from a second client. Such chunks may be evaluated to assign a reputation to the file. In this way, the reputation service may retrieve portions of a file in a distributed manner for reputation evaluation.
    Type: Grant
    Filed: September 17, 2014
    Date of Patent: July 19, 2016
    Assignee: Microsoft Technology Licensing, LLC
    Inventors: Robert Alexander Sim, Christian Seifert, Anthony Penta, Elliott Jeb Haber, Tomasz Kasperkiewicz
  • Publication number: 20160080400
    Abstract: One or more techniques and/or systems are provided for file acquisition for reputation evaluation. A reputation service may be configured to evaluate files and provide reputations of such files to clients (e.g., an indication as to whether a file is safe or malicious). If the reputation service receives a reputation request for a file that is unknown to the reputation service (e.g., a file not yet fully acquired by the reputation service), then the reputation service may identify a set of chunks into which the file can be partitioned. The reputation service may obtain chunks from various clients, such as a first chunk from a first client and a second chunk from a second client. Such chunks may be evaluated to assign a reputation to the file. In this way, the reputation service may retrieve portions of a file in a distributed manner for reputation evaluation.
    Type: Application
    Filed: September 17, 2014
    Publication date: March 17, 2016
    Inventors: Robert Alexander Sim, Christian Seifert, Anthony Penta, Elliott Jeb Haber, Tomasz Kasperkiewicz
  • Patent number: 9235586
    Abstract: A Web browser of a computing device downloads or otherwise obtains a file. File information identifying the file is obtained and is sent to a remote reputation service. Client information identifying aspects of the computing device can also optionally be sent to the remote reputation service. In response to the file information (and optionally client information), a reputation indication for the file is received from the remote reputation service. A user interface for the Web browser to present at the computing device is determined, based at least in part on the reputation indication, and presented at the computing device.
    Type: Grant
    Filed: September 13, 2010
    Date of Patent: January 12, 2016
    Assignee: Microsoft Technology Licensing, LLC
    Inventors: Ritika Virmani, Ryan C. Colvin, Elliott Jeb Haber, Warren G. Stevens, Jane T. Kim, Jess S. Holbrook, Sarah J. Bowers, John L. Scarrow, Jeffrey R. McKune
  • Patent number: 9065826
    Abstract: Malware detection is often based on monitoring a local application binary and/or process, such as detecting patterns of malicious code, unusual local resource utilization, or suspicious application behavior. However, the volume of available software, variety of malware, and sophistication of evasion techniques may reduce the effectiveness of detection based on monitoring local resources. Presented herein are techniques for identifying malware based on the reputations of remote resources (e.g., web content, files, databases, IP addresses, services, and users) accessed by an application. Remote resource accesses may be reported to a reputation service, which may identify reputations of remote resources, and application reputations of applications that utilize such remote resources. These application reputations may be used to adjust the application policies of the applications executed by devices and servers.
    Type: Grant
    Filed: August 8, 2011
    Date of Patent: June 23, 2015
    Assignee: Microsoft Technology Licensing, LLC
    Inventors: Ryan Charles Colvin, Elliott Jeb Haber, Ameya Bhatawdekar, Anthony P. Penta
  • Patent number: 8863291
    Abstract: The reputation of an executable computer program is checked when a user input to a computing device initiates a program launch, thus triggering a check of a local cache of reputation information. If the local cache confirms that the program is safe, it is permitted to launch, typically without notifying the user that a reputation check has been made. If the local cache cannot confirm the safety of the program, a reputation check is made by accessing a reputation service in the cloud. If the reputation service identifies the program as safe, it returns an indication to the computing device and the program is permitted to be launched, again without notifying the user that a reputation check has been made. If the reputation service identifies the program as unsafe or potentially unsafe, or does not recognize it at all, a warning is displayed to the user.
    Type: Grant
    Filed: January 20, 2011
    Date of Patent: October 14, 2014
    Assignee: Microsoft Corporation
    Inventors: Daniel Oliver, Anshul Rawat, Xiang Tu, Ryan Colvin, James Dooley, Elliott Jeb Haber, Ameya Bhatawdekar, Andy Davidson, Jay Dave, Paul Leach, Karanbir Singh, Chris Guzak, Crispin Cowan
  • Patent number: 8839418
    Abstract: Described is a technology by which phishing-related data sources are processed into aggregated data and a given site evaluated the aggregated data using a predictive model to automatically determine whether the given site is likely to be a phishing site. The predictive model may be built using machine learning based on training data, e.g., including known phishing sites and/or known non-phishing sites. To determine whether an object corresponding to a site is likely a phishing-related object are described, various criteria are evaluated, including one or more features of the object when evaluated. The determination is output in some way, e.g., made available to a reputation service, used to block access to a site or warn a user before allowing access, and/or used to assist a hand grader in being more efficient in evaluating sites.
    Type: Grant
    Filed: January 18, 2006
    Date of Patent: September 16, 2014
    Assignee: Microsoft Corporation
    Inventors: Geoffrey John Hulten, Paul Stephen Rehfuss, Robert Rounthwaite, Joshua Theodore Goodman, Gopalakrishnan Seshadrinathan, Anthony P. Penta, Manav Mishra, Roderic C. Deyo, Elliott Jeb Haber, David Aaron Ward Snelling
  • Patent number: 8429743
    Abstract: Online risk mitigation techniques are described. In an implementation, a service is queried for a reputation associated with an object from an online source in response to selection of the object. A backup of a client that is to receive the object is stored prior to obtaining the object when the reputation does not meet a threshold reputation level.
    Type: Grant
    Filed: December 23, 2008
    Date of Patent: April 23, 2013
    Assignee: Microsoft Corporation
    Inventors: Shawn Loveland, Geoffrey J Hulten, Elliott Jeb Haber, John L. Scarrow
  • Publication number: 20130042294
    Abstract: Malware detection is often based on monitoring a local application binary and/or process, such as detecting patterns of malicious code, unusual local resource utilization, or suspicious application behavior. However, the volume of available software, variety of malware, and sophistication of evasion techniques may reduce the effectiveness of detection based on monitoring local resources. Presented herein are techniques for identifying malware based on the reputations of remote resources (e.g., web content, files, databases, IP addresses, services, and users) accessed by an application. Remote resource accesses may be reported to a reputation service, which may identify reputations of remote resources, and application reputations of applications that utilize such remote resources. These application reputations may be used to adjust the application policies of the applications executed by devices and servers.
    Type: Application
    Filed: August 8, 2011
    Publication date: February 14, 2013
    Applicant: Microsoft Corporation
    Inventors: Ryan Charles Colvin, Elliott Jeb Haber, Ameya Bhatawdekar, Anthony P. Penta
  • Publication number: 20130036466
    Abstract: One or more techniques and/or systems are provided for internet connectivity protection. In particular, reputational information assigned to infrastructure components (e.g., IP addresses, name servers, domains, etc.) may be leveraged to determine whether an infrastructure component associated with a user navigating to content of a URL is malicious or safe. For example, infrastructure component data associated with a web browser navigating to a website of a URL may be collected and sent to a reputation server. The reputation server may return reputation information associated with the infrastructure component data (e.g., an IP address may be known as malicious even though the URL may not yet have a reputation). In this way, the user may be provided with notifications, such as warnings, when various unsafe conditions arise, such as interacting with an infrastructure component with a bad reputation, a resolved IP address not matching the URL, etc.
    Type: Application
    Filed: August 1, 2011
    Publication date: February 7, 2013
    Applicant: Microsoft Corporation
    Inventors: Anthony P. Penta, Elliott Jeb Haber, Ameya Bhatawdekar, Ryan Charles Colvin, David Douglas DeBarr, Geoffrey John Hulten
  • Publication number: 20120192275
    Abstract: The reputation of an executable computer program is checked when a user input to a computing device initiates a program launch, thus triggering a check of a local cache of reputation information. If the local cache confirms that the program is safe, it is permitted to launch, typically without notifying the user that a reputation check has been made. If the local cache cannot confirm the safety of the program, a reputation check is made by accessing a reputation service in the cloud. If the reputation service identifies the program as safe, it returns an indication to the computing device and the program is permitted to be launched, again without notifying the user that a reputation check has been made. If the reputation service identifies the program as unsafe or potentially unsafe, or does not recognize it at all, a warning is displayed to the user.
    Type: Application
    Filed: January 20, 2011
    Publication date: July 26, 2012
    Applicant: MICROSOFT CORPORATION
    Inventors: Daniel Oliver, Anshul Rawat, Xiang Tu, Ryan Colvin, James Dooley, Elliott Jeb Haber, Ameya Bhatawdekar, Andy Davidson, Jay Dave, Paul Leach, Karanbir Singh, Chris Guzak, Crispin Cowan
  • Publication number: 20120066346
    Abstract: A Web browser of a computing device downloads or otherwise obtains a file. File information identifying the file is obtained and is sent to a remote reputation service. Client information identifying aspects of the computing device can also optionally be sent to the remote reputation service. In response to the file information (and optionally client information), a reputation indication for the file is received from the remote reputation service. A user interface for the Web browser to present at the computing device is determined, based at least in part on the reputation indication, and presented at the computing device.
    Type: Application
    Filed: September 13, 2010
    Publication date: March 15, 2012
    Applicant: MICROSOFT CORPORATION
    Inventors: Ritika Virmani, Ryan C. Colvin, Elliott Jeb Haber, Warren G. Stevens, Jane T. Kim, Jess S. Holbrook, Sarah J. Bowers, John L. Scarrow, Jeffrey R. McKune
  • Publication number: 20100162391
    Abstract: Online risk mitigation techniques are described. In an implementation, a service is queried for a reputation associated with an object from an online source in response to selection of the object. A backup of a client that is to receive the object is stored prior to obtaining the object when the reputation does not meet a threshold reputation level.
    Type: Application
    Filed: December 23, 2008
    Publication date: June 24, 2010
    Applicant: Microsoft Corporation
    Inventors: Shawn Loveland, Geoffrey J. Hulten, Elliott Jeb Haber, John L. Scarrow