Patents by Inventor John Hendershott Brock

John Hendershott Brock has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20200342102
    Abstract: Under one aspect, a method is provided for protecting a device from a malicious file. The method can be implemented by one or more data processors forming part of at least one computing device and can include extracting from the file, by at least one data processor, sequential data comprising discrete tokens. The method also can include generating, by at least one data processor, n-grams of the discrete tokens. The method also can include generating, by at least one data processor, a vector of weights based on respective frequencies of the n-grams. The method also can include determining, by at least one data processor and based on a statistical analysis of the vector of weights, that the file is likely to be malicious. The method also can include initiating, by at least one data processor and responsive to determining that the file is likely to be malicious, a corrective action.
    Type: Application
    Filed: July 15, 2020
    Publication date: October 29, 2020
    Inventors: Li Li, Xuan Zhao, Sepehr Akhavan-Masouleh, John Hendershott Brock, Yaroslav Oliinyk, Matthew Wolff
  • Patent number: 10754948
    Abstract: Under one aspect, a method is provided for protecting a device from a malicious file. The method can be implemented by one or more data processors forming part of at least one computing device and can include extracting from the file, by at least one data processor, sequential data comprising discrete tokens. The method also can include generating, by at least one data processor, n-grams of the discrete tokens. The method also can include generating, by at least one data processor, a vector of weights based on respective frequencies of the n-grams. The method also can include determining, by at least one data processor and based on a statistical analysis of the vector of weights, that the file is likely to be malicious. The method also can include initiating, by at least one data processor and responsive to determining that the file is likely to be malicious, a corrective action.
    Type: Grant
    Filed: April 18, 2017
    Date of Patent: August 25, 2020
    Assignee: Cylance Inc.
    Inventors: Li Li, Xuan Zhao, Sepehr Akhavan-Masouleh, John Hendershott Brock, Yaroslav Oliinyk, Matthew Wolff
  • Publication number: 20180300482
    Abstract: Under one aspect, a method is provided for protecting a device from a malicious file. The method can be implemented by one or more data processors forming part of at least one computing device and can include extracting from the file, by at least one data processor, sequential data comprising discrete tokens. The method also can include generating, by at least one data processor, n-grams of the discrete tokens. The method also can include generating, by at least one data processor, a vector of weights based on respective frequencies of the n-grams. The method also can include determining, by at least one data processor and based on a statistical analysis of the vector of weights, that the file is likely to be malicious. The method also can include initiating, by at least one data processor and responsive to determining that the file is likely to be malicious, a corrective action.
    Type: Application
    Filed: April 18, 2017
    Publication date: October 18, 2018
    Inventors: Li Ll, Xuan Zhao, Sepehr Akhavan-Masouleh, John Hendershott Brock, Yaroslav Oliinyk, Matthew Wolff