Patents by Inventor Adrian Mihail Marinescu

Adrian Mihail Marinescu has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 11368361
    Abstract: A system and method for providing stringent tamper resistant protection against changes to key system security features. The tamper protection is configured such that any changes to the policy can only occur from a configuration manager console, thereby preventing local device admin users or other malicious actors from altering the setting. Thus, tamper protection locks the selected service and prevents security settings from being changed through third-party apps and methods. When a system administrator enables the feature for an enterprise's workstations, only administrators will be able to change the service settings across a company's computers. The tamper protection policy is digitally signed in the backend before being deployed to endpoints, and the endpoint verifies the validity and intent of the policy, establishing that it is a signed package that only security operations personnel with the necessary administrator rights can control.
    Type: Grant
    Filed: June 5, 2020
    Date of Patent: June 21, 2022
    Assignee: Microsoft Technology Licensing, LLC
    Inventors: Matthew Ronald Shadbolt, Michael Joseph Healy, Shweta Jha, Gokhan Ozhan, Adrian Mihail Marinescu, Alemeshet Yismaw Alemu, Karthik Selvaraj, Milind Amrutrao Pawar, Vladimir Soroka, Hayk Hovsepyan, Chaohong Ou, Patanjal Digant Vyas, David Torosyan
  • Publication number: 20210385129
    Abstract: A system and method for providing stringent tamper resistant protection against changes to key system security features. The tamper protection is configured such that any changes to the policy can only occur from a configuration manager console, thereby preventing local device admin users or other malicious actors from altering the setting. Thus, tamper protection locks the selected service and prevents security settings from being changed through third-party apps and methods. When a system administrator enables the feature for an enterprise's workstations, only administrators will be able to change the service settings across a company's computers. The tamper protection policy is digitally signed in the backend before being deployed to endpoints, and the endpoint verifies the validity and intent of the policy, establishing that it is a signed package that only security operations personnel with the necessary administrator rights can control.
    Type: Application
    Filed: June 5, 2020
    Publication date: December 9, 2021
    Applicant: MICROSOFT TECHNOLOGY LICENSING, LLC
    Inventors: Matthew Ronald SHADBOLT, Michael Joseph HEALY, Shweta JHA, Gokhan OZHAN, Adrian Mihail MARINESCU, Alemeshet Yismaw ALEMU, Karthik SELVARAJ, Milind Amrutrao PAWAR, Vladimir SOROKA, Hayk HOVSEPYAN, Chaohong OU, Patanjal Digant VYAS, David TOROSYAN
  • Patent number: 10922409
    Abstract: Technologies for detecting malware based on reinforcement learning model to detect whether a file is malicious or benign and to determine the best time to halt the file's execution in so detecting. The reinforcement learning model combined with an event classifier and a file classifier learns whether to halt execution after enough state information has been observed or to continue execution if more events are needed to make a highly confident determination. The algorithm disclosed allows the system to decide when to stop on a per file basis.
    Type: Grant
    Filed: April 10, 2018
    Date of Patent: February 16, 2021
    Assignee: MICROSOFT TECHNOLOGY LICENSING, LLC
    Inventors: Yu Wang, Jack Wilson Stokes, III, Adrian Mihail Marinescu
  • Publication number: 20190362074
    Abstract: Technologies for training systems for detecting malware based on reinforcement learning model. Such trained systems detect whether a file is malicious or benign and to determine the best time to halt the file's execution in so detecting. The reinforcement learning model combined with an event classifier and a file classifier learns whether to halt execution after enough state information has been observed or to continue execution if more events are needed to make a highly confident determination. The algorithm disclosed allows the system to decide when to stop on a per file basis.
    Type: Application
    Filed: May 24, 2018
    Publication date: November 28, 2019
    Inventors: Yu WANG, Jack Wilson STOKES, III, Adrian Mihail MARINESCU
  • Publication number: 20190311119
    Abstract: Technologies for detecting malware based on reinforcement learning model to detect whether a file is malicious or benign and to determine the best time to halt the file's execution in so detecting. The reinforcement learning model combined with an event classifier and a file classifier learns whether to halt execution after enough state information has been observed or to continue execution if more events are needed to make a highly confident determination. The algorithm disclosed allows the system to decide when to stop on a per file basis.
    Type: Application
    Filed: April 10, 2018
    Publication date: October 10, 2019
    Inventors: Yu WANG, Jack Wilson STOKES, III, Adrian Mihail MARINESCU
  • Publication number: 20100031353
    Abstract: Aspects of the subject matter described herein relate to malware detection using code analysis and behavior monitoring. In aspects, an anti-malware engine performs static analysis on program code and monitors behavior of the program code that is exhibited when the program code executes in a virtual and/or non-virtual environment. The anti-malware engine combines the results of both types of malware detection to determine whether the program code includes malware. The anti-malware engine may use feedback from one or more of the malware detection mechanism to direct additional malware detection (e.g., static and/or behavior detection) for the program code.
    Type: Application
    Filed: February 4, 2008
    Publication date: February 4, 2010
    Applicant: MICROSOFT CORPORATION
    Inventors: Anil Francis Thomas, George Cristian Chicioreanu, Adrian Mihail Marinescu