Patents by Inventor Christian Seifert

Christian Seifert has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20250247901
    Abstract: The present disclosure generally relates to communicating data. Some techniques are described herein for selecting an initiator for a near-field communication (NFC). Such techniques include comparing a random number generated to a random message received in a polling message to select an initiator for NFC. NFC is then used to transfer data to be used to establish a different type of wireless communication channel, such as Wi-Fi or Bluetooth. Other techniques are described herein for selectively sending a long-term key over one communication channel for another communication channel when communicating with another device. Such techniques include receiving an authentication credential from the other device and, if the authentication credential has not previously been seen, sending the long-term key. Other techniques are described herein for selectively delaying subsequent communication with another device communication over a communication channel.
    Type: Application
    Filed: March 18, 2025
    Publication date: July 31, 2025
    Inventors: Alejandro A. RODRIGUEZ, Gordon Y. SCOTT, Ho Cheung CHUNG, Pablo PONS BORDES, Sreekuttan SUDARSANAN, Christian SEIFERT, Raj LUHAR
  • Patent number: 12259956
    Abstract: A user equipment (UE) is configured to perform a prewarming process, wherein the prewarming process includes concurrently performing a face detection process and an unlock process independent of face detection, determine whether a face detection operation indicates the presence of a face within a field of view of a camera of the UE and disable prewarming for a predetermined time period when the face detection operation is not satisfied.
    Type: Grant
    Filed: August 23, 2021
    Date of Patent: March 25, 2025
    Assignee: Apple Inc.
    Inventors: Naresh Kumar Chinnathambi Kailasam, Vasilios E. Anton, Christian Seifert, Ramanujam Jagannath, Shannon Shih
  • Publication number: 20240407020
    Abstract: The present disclosure generally relates to communicating data. Some techniques are described herein for selecting an initiator for a near-field communication (NFC). Such techniques include comparing a random number generated to a random message received in a polling message to select an initiator for NFC. NFC is then used to transfer data to be used to establish a different type of wireless communication channel, such as Wi-Fi or Bluetooth. Other techniques are described herein for selectively sending a long-term key over one communication channel for another communication channel when communicating with another device. Such techniques include receiving an authentication credential from the other device and, if the authentication credential has not previously been seen, sending the long-term key. Other techniques are described herein for selectively delaying subsequent communication with another device communication over a communication channel.
    Type: Application
    Filed: May 15, 2024
    Publication date: December 5, 2024
    Inventors: Alejandro A. RODRIGUEZ, Gordon Y. SCOTT, Ho Cheung CHUNG, Pablo PONS BORDES, Sreekuttan SUDARSANAN, Christian SEIFERT, Raj LUHAR
  • Patent number: 12132760
    Abstract: The technology described herein identifies and mitigates phishing attempts by analyzing user input received at the operating system level. Initially, a credential, such as a username or password, is registered with the threat detection system. The technology described herein intercepts user input at the operating system level, generates a hash of the input, and compares it with a hash of a credential being monitored. A credential entry is detected when a hash for the character string entered matches a hash for a credential being monitored. The technology described herein will perform a threat assessment when a secret entry is detected. The threat assessment may use the application context and the network context as inputs to the assessment. Various mitigation actions may be taken when a threat is detected.
    Type: Grant
    Filed: March 3, 2022
    Date of Patent: October 29, 2024
    Assignee: MICROSOFT TECHNOLOGY LICENSING, LLC
    Inventors: Paresh Maisuria, Ali Alabbas, Abhishek Sagar, Mara Beth Fortini, Rupo Zhang, Christian Stockwell, Michael David McCormack, Jason Joseph Weber, Charles J. Strempler, Sinclaire R. Hamilton, Brian Keith Catlin, Richard Joseph Murillo, Robert G. Lefferts, Eric P. Douglas, Christian Seifert
  • Patent number: 12032687
    Abstract: The techniques disclosed herein enable systems to train a machine learning model to classify malicious command line strings and select anomalous and uncertain samples for analysis. To train the machine learning model, a system receives a labeled data set containing command line inputs that are known to be malicious or benign. Utilizing a term embedding model, the system can generate aggregated numerical representations of the command line inputs for analysis by the machine learning model. The aggregated numerical representations can include various information such as term scores that represent a probability that an individual term of the command line string is malicious as well as numerical representations of the individual terms. The system can subsequently provide the aggregated numerical representations to the machine learning model for analysis. Based on the aggregated numerical representations, the machine learning model can learn to distinguish malicious command line inputs from benign inputs.
    Type: Grant
    Filed: September 30, 2021
    Date of Patent: July 9, 2024
    Assignee: Microsoft Technology Licensing, LLC
    Inventors: Jack Wilson Stokes, III, Jonathan Bar Or, Christian Seifert, Talha Ongun, Farid Tajaddodianfar
  • Publication number: 20230400346
    Abstract: A dual-truncated wheel Kibble balance includes: a stationary frame; a double balance wheel disposed on the stationary frame; a pair of guide members, such that one of the guide members is disposed on each opposing end of the double balance wheel; outer connector bands, such that each guide member is gravitationally suspended from the double balance wheel by at least one of the outer connector bands; inner connector bands, such that each guide member is gravitationally suspended from the double balance wheel by at least one of the inner connector bands; and a central flexural bridge in mechanical communication with the stationary frame and the double balance wheel, such that the central flexural bridge is: interposed between the stationary frame and double balance wheel, interconnects the stationary frame and the double balance wheel, and flexes in response to pivotal motion of the double balance wheel relative to the stationary frame.
    Type: Application
    Filed: June 14, 2023
    Publication date: December 14, 2023
    Inventors: Darine El Haddad, Lorenz Harald Keck, René Bernd Theska, Frank Christian Seifert
  • Publication number: 20230283633
    Abstract: The technology described herein identifies and mitigates phishing attempts by analyzing user input received at the operating system level. Initially, a credential, such as a username or password, is registered with the threat detection system. The technology described herein intercepts user input at the operating system level, generates a hash of the input, and compares it with a hash of a credential being monitored. A credential entry is detected when a hash for the character string entered matches a hash for a credential being monitored. The technology described herein will perform a threat assessment when a secret entry is detected. The threat assessment may use the application context and the network context as inputs to the assessment. Various mitigation actions may be taken when a threat is detected.
    Type: Application
    Filed: March 3, 2022
    Publication date: September 7, 2023
    Inventors: Paresh MAISURIA, Ali ALABBAS, Abhishek SAGAR, Mara Beth FORTINI, Rupo ZHANG, Christian STOCKWELL, Michael David MCCORMACK, Jason Joseph WEBER, Charles J. STREMPLER, Sinclaire R. HAMILTON, Brian Keith CATLIN, Richard Joseph MURILLO, Robert G. LEFFERTS, Eric P. DOUGLAS, Christian SEIFERT
  • Patent number: 11689561
    Abstract: Various embodiments discussed herein enable the detection of malicious content. Some embodiments do this by determining a similarity score between content, computer objects, or indications (e.g., vectors, file hashes, file signatures, code, etc.) known to be malicious and other content (e.g., unknown files) or indications based on feature weighting. Over various training stages, certain feature characteristics for each labeled malicious content or indication can be learned. For example, for a first malware family of computer objects, the most prominent feature may be a particular URL, whereas other features change considerably for different iterations of the first malware family of computer objects. Consequently, the particular URL can be weighted to determine a particular output classification corresponding to malicious behavior.
    Type: Grant
    Filed: March 17, 2020
    Date of Patent: June 27, 2023
    Assignee: MICROSOFT TECHNOLOGY LICENSING, LLC
    Inventors: Christian Seifert, Jack Wilson Stokes, III, Kristian Holsheimer
  • Publication number: 20230096895
    Abstract: The techniques disclosed herein enable systems to train a machine learning model to classify malicious command line strings and select anomalous and uncertain samples for analysis. To train the machine learning model, a system receives a labeled data set containing command line inputs that are known to be malicious or benign. Utilizing a term embedding model, the system can generate aggregated numerical representations of the command line inputs for analysis by the machine learning model. The aggregated numerical representations can include various information such as term scores that represent a probability that an individual term of the command line string is malicious as well as numerical representations of the individual terms. The system can subsequently provide the aggregated numerical representations to the machine learning model for analysis. Based on the aggregated numerical representations, the machine learning model can learn to distinguish malicious command line inputs from benign inputs.
    Type: Application
    Filed: September 30, 2021
    Publication date: March 30, 2023
    Inventors: Jack Wilson STOKES, III, Jonathan BAR OR, Christian SEIFERT, Talha ONGUN, Farid TAJADDODIANFAR
  • Publication number: 20230057201
    Abstract: A user equipment (UE) is configured to perform a prewarming process, wherein the prewarming process includes concurrently performing a face detection process and an unlock process independent of face detection, determine whether a face detection operation indicates the presence of a face within a field of view of a camera of the UE and disable prewarming for a predetermined time period when the face detection operation is not satisfied.
    Type: Application
    Filed: August 23, 2021
    Publication date: February 23, 2023
    Inventors: Naresh Kumar CHINNATHAMBI KAILASAM, Vasilios E. ANTON, Christian SEIFERT, Ramanujam JAGANNATH, Shannon SHIH
  • Patent number: 11431745
    Abstract: Described are examples for curating threat intelligence data including receiving threat intelligence data comprising a list of entities, one or more associations between entities, a reputation score for each entity, and/or a confidence value corresponding to the one or more associations. An updated reputation score for at least one of a first type of entities can be determined based at least in part on the confidence value and/or on determining a reputation score of at least one of a second type of entities to which the at least one of the first type of entities is associated in the one or more associations. The reputation score of the at least one of the first type of entities can be updated, in the threat intelligence data, to the updated reputation score.
    Type: Grant
    Filed: April 30, 2018
    Date of Patent: August 30, 2022
    Assignee: Microsoft Technology Licensing, LLC
    Inventors: Andrew W. Wicker, Peter A. Cap, Christian Seifert
  • Patent number: 11275643
    Abstract: The disclosed embodiments generate a plurality of anomaly detector configurations and compare results generated by these anomaly detectors to a reference result set. The reference result set is generated by a trained model. A correlation between each result generated by the anomaly detectors and the result set is compared to select an anomaly detector configuration that provides results most similar to those of the trained model. In some embodiments, data defining the selected configuration is then communicated to a product installation. The product installation instantiates the defined anomaly detector and analyzes local events using the instantiated detector. In some other embodiments, the defined anomaly detector is instantiated by the same system that selects the anomaly detector, and thus in these embodiments, the anomaly detector configuration is not transmitted from one system to another.
    Type: Grant
    Filed: October 9, 2019
    Date of Patent: March 15, 2022
    Assignee: Microsoft Technology Licensing, LLC
    Inventors: Robert Lee McCann, Christian Seifert
  • Publication number: 20210141897
    Abstract: Various embodiments discussed herein enable the detection of malicious content. Some embodiments do this by determining a similarity score between content, computer objects, or indications (e.g., vectors, file hashes, file signatures, code, etc.) known to be malicious and other content (e.g., unknown files) or indications based on feature weighting. Over various training stages, certain feature characteristics for each labeled malicious content or indication can be learned. For example, for a first malware family of computer objects, the most prominent feature may be a particular URL, whereas other features change considerably for different iterations of the first malware family of computer objects. Consequently, the particular URL can be weighted to determine a particular output classification corresponding to malicious behavior.
    Type: Application
    Filed: March 17, 2020
    Publication date: May 13, 2021
    Inventors: Christian SEIFERT, Jack Wilson STOKES, III, Kristian HOLSHEIMER
  • Publication number: 20210110282
    Abstract: The disclosed embodiments generate a plurality of anomaly detector configurations and compare results generated by these anomaly detectors to a reference result set. The reference result set is generated by a trained model. A correlation between each result generated by the anomaly detectors and the result set is compared to select an anomaly detector configuration that provides results most similar to those of the trained model. In some embodiments, data defining the selected configuration is then communicated to a product installation. The product installation instantiates the defined anomaly detector and analyzes local events using the instantiated detector. In some other embodiments, the defined anomaly detector is instantiated by the same system that selects the anomaly detector, and thus in these embodiments, the anomaly detector configuration is not transmitted from one system to another.
    Type: Application
    Filed: October 9, 2019
    Publication date: April 15, 2021
    Inventors: Robert Lee McCann, Christian Seifert
  • Patent number: 10910487
    Abstract: A power semiconductor device is disclosed. In one example, the device comprises a semiconductor body coupled to a first load terminal and a second load terminal and comprising a drift region configured to conduct a load current between said terminals. The drift region comprises dopants of a first conductivity type. A source region is arranged in electrical contact with the first load terminal and comprises dopants of the first conductivity type. A channel region comprises dopants of a second conductivity. At least one power unit cell that includes at least one first type trench. The at least one power unit cell further includes a first mesa zone and a second mesa zone of the semiconductor body.
    Type: Grant
    Filed: June 28, 2019
    Date of Patent: February 2, 2021
    Assignee: Infineon Technologies AG
    Inventors: Alexander Philippou, Christian Jaeger, Johannes Georg Laven, Max Christian Seifert, Antonio Vellei
  • Patent number: 10868159
    Abstract: A power semiconductor device includes a semiconductor body having a front side coupled to a first load terminal structure and a backside coupled to a second load terminal structure. A front side structure arranged at the front side is at least partially included in the semiconductor body and defines a front side active region configured to conduct a load current between the load terminal structures. The front side structure includes first and second lateral edge portions and a first corner portion that forms a transition between the lateral edge portions. A drift region included in the semiconductor body is configured to carry the load current. A backside emitter region arranged in the semiconductor body in contact with the second load terminal has a net dopant concentration higher than a net dopant concentration of the drift region.
    Type: Grant
    Filed: May 16, 2019
    Date of Patent: December 15, 2020
    Assignee: Infineon Technologies AG
    Inventors: Benedikt Stoib, Hans-Joachim Schulze, Max Christian Seifert
  • Publication number: 20190355841
    Abstract: A power semiconductor device includes a semiconductor body having a front side coupled to a first load terminal structure and a backside coupled to a second load terminal structure. A front side structure arranged at the front side is at least partially included in the semiconductor body and defines a front side active region configured to conduct a load current between the load terminal structures. The front side structure includes first and second lateral edge portions and a first corner portion that forms a transition between the lateral edge portions. A drift region included in the semiconductor body is configured to carry the load current. A backside emitter region arranged in the semiconductor body in contact with the second load terminal has a net dopant concentration higher than a net dopant concentration of the drift region.
    Type: Application
    Filed: May 16, 2019
    Publication date: November 21, 2019
    Inventors: Benedikt Stoib, Hans-Joachim Schulze, Max Christian Seifert
  • Publication number: 20190334942
    Abstract: Described are examples for curating threat intelligence data including receiving threat intelligence data comprising a list of entities, one or more associations between entities, a reputation score for each entity, and/or a confidence value corresponding to the one or more associations. An updated reputation score for at least one of a first type of entities can be determined based at least in part on the confidence value and/or on determining a reputation score of at least one of a second type of entities to which the at least one of the first type of entities is associated in the one or more associations. The reputation score of the at least one of the first type of entities can be updated, in the threat intelligence data, to the updated reputation score.
    Type: Application
    Filed: April 30, 2018
    Publication date: October 31, 2019
    Inventors: Andrew W. WICKER, Peter A. CAP, Christian SEIFERT
  • Publication number: 20190319122
    Abstract: A power semiconductor device is disclosed. In one example, the device comprises a semiconductor body coupled to a first load terminal and a second load terminal and comprising a drift region configured to conduct a load current between said terminals. The drift region comprises dopants of a first conductivity type. A source region is arranged in electrical contact with the first load terminal and comprises dopants of the first conductivity type. A channel region comprises dopants of a second conductivity. At least one power unit cell that includes at least one first type trench. The at least one power unit cell further includes a first mesa zone and a second mesa zone of the semiconductor body.
    Type: Application
    Filed: June 28, 2019
    Publication date: October 17, 2019
    Applicant: Infineon Technologies AG
    Inventors: Alexander Philippou, Christian Jaeger, Johannes Georg Laven, Max Christian Seifert, Antonio Vellei
  • Patent number: 10347754
    Abstract: A power semiconductor device is disclosed. In one example, the device comprises a semiconductor body coupled to a first load terminal and a second load terminal and comprising a drift region configured to conduct a load current between said terminals. The drift region comprises dopants of a first conductivity type. A source region is arranged in electrical contact with the first load terminal and comprises dopants of the first conductivity type. A channel region comprises dopants of a second conductivity. At least one power unit cell that includes at least one first type trench. The at least one power unit cell further includes a first mesa zone and a second mesa zone of the semiconductor body.
    Type: Grant
    Filed: September 14, 2017
    Date of Patent: July 9, 2019
    Assignee: Infineon Technologies AG
    Inventors: Alexander Philippou, Christian Jaeger, Johannes Georg Laven, Max Christian Seifert, Antonio Vellei