Patents by Inventor Brian Michael Wallace

Brian Michael Wallace has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 11568185
    Abstract: Centroids are used for improving machine learning classification and information retrieval. A plurality of files are classified as malicious or not malicious based on a function dividing a coordinate space into at least a first portion and a second portion such that the first portion includes a first subset of the plurality of files classified as malicious. One or more first centroids are defined in the first portion that classify files from the first subset as not malicious. A file is determined to be malicious based on whether the file is located within the one or more first centroids.
    Type: Grant
    Filed: September 17, 2020
    Date of Patent: January 31, 2023
    Assignee: Cylance Inc.
    Inventors: Jian Luan, Matthew Wolff, Brian Michael Wallace
  • Patent number: 11501120
    Abstract: An artifact is received and features are extracted therefrom to form a feature vector. Thereafter, a determination is made to alter a malware processing workflow based on a distance of one or more features in the feature vector relative to one or more indicator centroids. Each indicator centroid specifying a threshold distance to trigger an action. Based on such a determination, the malware processing workflow is altered.
    Type: Grant
    Filed: February 20, 2020
    Date of Patent: November 15, 2022
    Assignee: Cylance Inc.
    Inventors: Eric Glen Petersen, Michael Alan Hohimer, Jian Luan, Matthew Wolff, Brian Michael Wallace
  • Patent number: 11283818
    Abstract: A system is provided for training a machine learning model to detect malicious container files. The system may include at least one processor and at least one memory. The memory may include program code which when executed by the at least one processor provides operations including: processing a container file with a trained machine learning model, wherein the trained machine learning is trained to determine a classification for the container file indicative of whether the container file includes at least one file rendering the container file malicious; and providing, as an output by the trained machine learning model, an indication of whether the container file includes the at least one file rendering the container file malicious. Related methods and articles of manufacture, including computer program products, are also disclosed.
    Type: Grant
    Filed: April 28, 2020
    Date of Patent: March 22, 2022
    Assignee: Cylance Inc.
    Inventors: Xuan Zhao, Matthew Wolff, John Brock, Brian Michael Wallace, Andy Wortman, Jian Luan, Mahdi Azarafrooz, Andrew Davis, Michael Thomas Wojnowicz, Derek A. Soeder, David N. Beveridge, Yaroslav Oliinyk, Ryan Permeh
  • Publication number: 20210004649
    Abstract: Centroids are used for improving machine learning classification and information retrieval. A plurality of files are classified as malicious or not malicious based on a function dividing a coordinate space into at least a first portion and a second portion such that the first portion includes a first subset of the plurality of files classified as malicious. One or more first centroids are defined in the first portion that classify files from the first subset as not malicious. A file is determined to be malicious based on whether the file is located within the one or more first centroids.
    Type: Application
    Filed: September 17, 2020
    Publication date: January 7, 2021
    Inventors: Jian Luan, Matthew Wolff, Brian Michael Wallace
  • Publication number: 20200259850
    Abstract: A system is provided for training a machine learning model to detect malicious container files. The system may include at least one processor and at least one memory. The memory may include program code which when executed by the at least one processor provides operations including: processing a container file with a trained machine learning model, wherein the trained machine learning is trained to determine a classification for the container file indicative of whether the container file includes at least one file rendering the container file malicious; and providing, as an output by the trained machine learning model, an indication of whether the container file includes the at least one file rendering the container file malicious. Related methods and articles of manufacture, including computer program products, are also disclosed.
    Type: Application
    Filed: April 28, 2020
    Publication date: August 13, 2020
    Inventors: Xuan Zhao, Matthew Wolff, John Brock, Brian Michael Wallace, Andy Wortman, Jian Luan, Mahdi Azarafrooz, Andrew Davis, Michael Thomas Wojnowicz, Derek A. Soeder, David N. Beveridge, Yaroslav Oliinyk, Ryan Permeh
  • Patent number: 9781150
    Abstract: Data is received that includes a plurality of samples that each characterize interception of data traffic to a computing device over a network. Thereafter, the plurality of samples characterizing the interception of data traffic are grouped into a plurality of clusters. At least a portion of the samples are labeled to characterize a likelihood of each such sample as relating to an unauthorized interception of data traffic. Each cluster is assigned with a label corresponding to a majority of samples within such cluster. At least one machine learning model is trained using the assigned labeled clusters such that, once trained, the at least one machine learning model determines a likelihood of future samples as relating to an unauthorized interception of data traffic to a corresponding computing device.
    Type: Grant
    Filed: September 30, 2016
    Date of Patent: October 3, 2017
    Assignee: Cylance Inc.
    Inventors: Xuan Zhao, Brian Michael Wallace
  • Patent number: 9762611
    Abstract: A first node of a networked computing environment initiates each of a plurality of different types of man-in-the middle (MITM) detection tests to determine whether communications between first and second nodes of a computing network are likely to have been subject to an interception or an attempted interception by a third node. Thereafter, it is determined, by the first node, that at least one of the tests indicate that the communications are likely to have been intercepted by a third node. Data is then provided, by the first node, data that characterizes the determination. In some cases, one or more of the MITM detection tests utilizes a machine learning model. Related apparatus, systems, techniques and articles are also described.
    Type: Grant
    Filed: December 15, 2016
    Date of Patent: September 12, 2017
    Assignee: Cylance Inc.
    Inventors: Brian Michael Wallace, Xuan Zhao, Jonathan Wesley Miller
  • Publication number: 20170237773
    Abstract: A first node of a networked computing environment initiates each of a plurality of different types of man-in-the middle (MITM) detection tests to determine whether communications between first and second nodes of a computing network are likely to have been subject to an interception or an attempted interception by a third node. Thereafter, it is determined, by the first node, that at least one of the tests indicate that the communications are likely to have been intercepted by a third node. Data is then provided, by the first node, data that characterizes the determination. In some cases, one or more of the MITM detection tests utilizes a machine learning model. Related apparatus, systems, techniques and articles are also described.
    Type: Application
    Filed: December 15, 2016
    Publication date: August 17, 2017
    Inventors: Brian Michael Wallace, Xuan Zhao, Jonathan Wesley Miller
  • Patent number: 9680860
    Abstract: A first node of a networked computing environment initiates each of a plurality of different man-in-the middle (MITM) detection tests to determine whether communications between first and second nodes of a computing network are likely to have been subject to an interception or an attempted interception by a third node. Thereafter, it is determined, by the first node, that at least one of the tests indicate that the communications are likely to have been intercepted by a third node. Data is then provided, by the first node, data that characterizes the determination. Related apparatus, systems, techniques and articles are also described.
    Type: Grant
    Filed: October 7, 2016
    Date of Patent: June 13, 2017
    Assignee: Cylance Inc.
    Inventors: Brian Michael Wallace, Jonathan Wesley Miller
  • Patent number: 9602531
    Abstract: A first node of a networked computing environment initiates each of a plurality of different man-in-the middle (MITM) detection tests to determine whether communications between first and second nodes of a computing network are likely to have been subject to an interception or an attempted interception by a third node. Thereafter, it is determined, by the first node, that at least one of the tests indicate that the communications are likely to have been intercepted by a third node. Data is then provided, by the first node, data that characterizes the determination. Related apparatus, systems, techniques and articles are also described.
    Type: Grant
    Filed: February 16, 2016
    Date of Patent: March 21, 2017
    Assignee: Cylance, Inc.
    Inventors: Brian Michael Wallace, Jonathan Wesley Miller