Patents by Inventor Alexandra Faynburd

Alexandra Faynburd has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 11663271
    Abstract: One embodiment included a non-transitory machine-readable medium containing instructions that when executed carry out a method of searching for a search term. The method uses, instead of an index database of search terms, an index database section of only search terms that have the prefix of the search term, such that execution can occur on an improved processing system that is relatively small. The index database section is arranged as a prefix database of terms that start with the prefix, e.g., a trie, a radix trie, or a ternary search tree of the terms. The method may be implemented as a serverless function triggered by a user entering a search term or part thereof.
    Type: Grant
    Filed: October 14, 2019
    Date of Patent: May 30, 2023
    Assignee: Fast Simon, Inc.
    Inventors: Alexandra Faynburd, Adar Greenshpon
  • Patent number: 8424094
    Abstract: An automated collection of forensic evidence associated with a security incident is provided by an arrangement in which different security products called endpoints in an enterprise network are enabled for sharing security-related information over a common communication channel using an abstraction called a security assessment. A security assessment is generally configured to indicate an endpoint's understanding of a detected security incident that pertains to an object in the environment which may include users, computers, IP addresses, and website URIs (Universal Resource Identifiers). The security assessment is published by the endpoint into the channel and received by subscribing endpoints. The security assessment triggers the receiving endpoints to go into a more comprehensive or detailed mode of evidence collection.
    Type: Grant
    Filed: June 30, 2007
    Date of Patent: April 16, 2013
    Assignee: Microsoft Corporation
    Inventors: John Neystadt, Efim Hudis, Yair Helman, Alexandra Faynburd
  • Patent number: 7882542
    Abstract: Compromised host computers in an enterprise network environment comprising a plurality of security products called endpoints are detected in an automated manner by an arrangement in which a reputation service provides updates to identify resources including website URIs (Universal Resource Identifiers) and IP addresses (collectively “resources”) whose reputations have changed and represent potential threats or adversaries to the enterprise network. Responsively to the updates, a malware analyzer, which can be configured as a standalone endpoint, or incorporated into an endpoint having anti-virus/malware detection capability, or incorporated into the reputation service, will analyze logs maintained by another endpoint (typically a firewall, router, proxy server, or gateway) to identify, in a retroactive manner over some predetermined time window, those client computers in the environment that had any past communications with a resource that is newly categorized by the reputation service as malicious.
    Type: Grant
    Filed: June 30, 2007
    Date of Patent: February 1, 2011
    Assignee: Microsoft Corporation
    Inventors: John Neystadt, Efim Hudis, Yair Helman, Alexandra Faynburd
  • Publication number: 20080244694
    Abstract: An automated collection of forensic evidence associated with a security incident is provided by an arrangement in which different security products called endpoints in an enterprise network are enabled for sharing security-related information over a common communication channel using an abstraction called a security assessment. A security assessment is generally configured to indicate an endpoint's understanding of a detected security incident that pertains to an object in the environment which may include users, computers, IP addresses, and website URIs (Universal Resource Identifiers). The security assessment is published by the endpoint into the channel and received by subscribing endpoints. The security assessment triggers the receiving endpoints to go into a more comprehensive or detailed mode of evidence collection.
    Type: Application
    Filed: June 30, 2007
    Publication date: October 2, 2008
    Applicant: Microsoft Corporation
    Inventors: John Neystadt, Efim Hudis, Yair Helman, Alexandra Faynburd
  • Publication number: 20080244742
    Abstract: An automated arrangement for detecting adversaries is provided by examining a log that contains records of communications into and out of the enterprise network upon the detection of a security incident by which a host computer on an enterprise network becomes compromised. The log is analyzed over a window of time starting before the occurrence of the detected security incident to identify the web site URIs (Uniform Resource Identifiers) and IP (Internet Protocol) addresses (collectively “resources”) that were respectively accessed by the compromised host and/or from which traffic was received by the compromised host. When other host computers in the enterprise are detected as being compromised, a similar analysis is performed and the results of all the analyses are correlated to identify one or more resources that are common to the logged communications of all the compromised machines.
    Type: Application
    Filed: June 30, 2007
    Publication date: October 2, 2008
    Applicant: Microsoft Corporation
    Inventors: John Neystadt, Efim Hudis, Yair Helman, Alexandra Faynburd
  • Publication number: 20080244748
    Abstract: Compromised host computers in an enterprise network environment comprising a plurality of security products called endpoints are detected in an automated manner by an arrangement in which a reputation service provides updates to identify resources including website URIs (Universal Resource Identifiers) and IP addresses (collectively “resources”) whose reputations have changed and represent potential threats or adversaries to the enterprise network. Responsively to the updates, a malware analyzer, which can be configured as a standalone endpoint, or incorporated into an endpoint having anti-virus/malware detection capability, or incorporated into the reputation service, will analyze logs maintained by another endpoint (typically a firewall, router, proxy server, or gateway) to identify, in a retroactive manner over some predetermined time window, those client computers in the environment that had any past communications with a resource that is newly categorized by the reputation service as malicious.
    Type: Application
    Filed: June 30, 2007
    Publication date: October 2, 2008
    Applicant: Microsoft Corporation
    Inventors: John Neystadt, Efim Hudis, Yair Helman, Alexandra Faynburd