Patents by Inventor Craig Henry Wittenberg
Craig Henry Wittenberg has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 11924162Abstract: A computing system is provided, including a processor and memory storing instructions that cause the processor to execute a domain name service (DNS) log analyzer configured to identify a container identifier associated with a DNS request and a destination IP address associated with a DNS response to the DNS request, using one or more DNS logs, a fleet management system record analyzer configured to identify a first service associated with the container identifier and a second service associated with the destination IP address, using one or more fleet management system logs, and a dependency map generator configured to generate a service-to-service dependency map between the identified first service and the identified second service.Type: GrantFiled: December 15, 2022Date of Patent: March 5, 2024Assignee: Microsoft Technology Licensing, LLCInventors: Abhishek Pathak, Sorabh Kumar Gandhi, Craig Henry Wittenberg, Ming Hao, Rohit Sanjay Galwankar, Vivek Sanjeev Tejwani
-
Patent number: 11777831Abstract: Techniques are described herein that are capable of performing an aggregation-based determination of resiliency of a cloud computing service to chaos events. Chaos events are executed against a cloud computing service during a time frame that includes multiple time periods. For each chaos event, service health indexes (SHIs) that correspond to the time periods are calculated. Each SHI indicates an extent to which indicators, which represent respective measurements of performance of the cloud computing service during the respective time period, satisfy respective criteria. The SHIs for each chaos event are analyzed to provide a respective resiliency score. At least some of the resiliency scores of the respective chaos events are aggregated to provide an aggregated resiliency score, which represents resiliency of the cloud computing service to the chaos events.Type: GrantFiled: January 10, 2022Date of Patent: October 3, 2023Assignee: Microsoft Technology Licensing, LLCInventors: David Dominic Anderson, Piyush Gupta, Jeremy Michael Bares, Weili Zhong McClenahan, Craig Henry Wittenberg, Christopher Grant Ashton, Ritchie Nicholas Hughes
-
Publication number: 20220224625Abstract: Techniques are described herein that are capable of performing an aggregation-based determination of resiliency of a cloud computing service to chaos events. Chaos events are executed against a cloud computing service during a time frame that includes multiple time periods. For each chaos event, service health indexes (SHIs) that correspond to the time periods are calculated. Each SHI indicates an extent to which indicators, which represent respective measurements of performance of the cloud computing service during the respective time period, satisfy respective criteria. The SHIs for each chaos event are analyzed to provide a respective resiliency score. At least some of the resiliency scores of the respective chaos events are aggregated to provide an aggregated resiliency score, which represents resiliency of the cloud computing service to the chaos events.Type: ApplicationFiled: January 10, 2022Publication date: July 14, 2022Inventors: David Dominic ANDERSON, Piyush GUPTA, Jeremy Michael BARES, Weili Zhong MCCLENAHAN, Craig Henry WITTENBERG, Christopher Grant ASHTON, Ritchie Nicholas HUGHES
-
Patent number: 11223552Abstract: Techniques are described herein that are capable of performing an aggregation-based determination of resiliency of a cloud computing service to chaos events. Chaos events are executed against a cloud computing service during a time frame that includes multiple time periods. For each chaos event, service health indexes (SHIs) that correspond to the time periods are calculated. Each SHI indicates an extent to which indicators, which represent respective measurements of performance of the cloud computing service during the respective time period, satisfy respective criteria. The SHIs for each chaos event are analyzed to provide a respective resiliency score. At least some of the resiliency scores of the respective chaos events are aggregated to provide an aggregated resiliency score, which represents resiliency of the cloud computing service to the chaos events.Type: GrantFiled: January 8, 2021Date of Patent: January 11, 2022Assignee: Microsoft Technology Licensing, LLCInventors: David Dominic Anderson, Piyush Gupta, Jeremy Michael Bares, Weili Zhong McClenahan, Craig Henry Wittenberg, Christopher Grant Ashton, Ritchie Nicholas Hughes
-
Patent number: 11194910Abstract: Provided herein are methods, systems, and computer program products for intelligent detection of multistage attacks which may arise in computer environments. Embodiments herein leverage adaptive graph-based machine-learning solutions that can incorporate rules as well as supervised learning for detecting multistage attacks. Multistage attacks and attack chains may be detected or identified by collecting data representing events, detections, and behaviors, determining relationships among various data, and analyzing the data and associated relationships. A graph of events, detections, and behaviors which are connected by edges representing relationships between nodes of the graph may be constructed and then subgraphs of the possibly enormous initial graph may be identified which represent likely attacks.Type: GrantFiled: November 2, 2018Date of Patent: December 7, 2021Assignee: Microsoft Technology Licensing, LLCInventors: Anisha Mazumder, Craig Henry Wittenberg, Daniel L. Mace, Haijun Zhai, Seetharaman Harikrishnan, Ram Shankar Siva Kumar, Yogesh K. Roy
-
Publication number: 20200143052Abstract: Provided herein are methods, systems, and computer program products for intelligent detection of multistage attacks which may arise in computer environments. Embodiments herein leverage adaptive graph-based machine-learning solutions that can incorporate rules as well as supervised learning for detecting multistage attacks. Multistage attacks and attack chains may be detected or identified by collecting data representing events, detections, and behaviors, determining relationships among various data, and analyzing the data and associated relationships. A graph of events, detections, and behaviors which are connected by edges representing relationships between nodes of the graph may be constructed and then subgraphs of the possibly enormous initial graph may be identified which represent likely attacks.Type: ApplicationFiled: November 2, 2018Publication date: May 7, 2020Inventors: Anisha MAZUMDER, Craig Henry WITTENBERG, Daniel L. MACE, Haijun ZHAI, Seetharaman HARIKRISHNAN, Ram Shankar Siva KUMAR, Yogesh K. ROY
-
Publication number: 20200104696Abstract: Systems are provided for using machine learning to identify service accounts and/or for distinguishing service accounts from user accounts based on the user names of the accounts. Machine learning tools can be trained on user name label data for service accounts and user accounts. The trained machine learning tool can then be applied to user names of accounts to determine whether the user names correspond to service accounts or not and, in some instances, without referencing tables or other structures that explicitly identify and distinguish the service/user accounts and/or conventions for identifying service accounts. Then, the systems can respond appropriately, based on the determination. The machine learning tool can also be shared with other systems to make the same determinations for their accounts without having to share confidential or proprietary account information.Type: ApplicationFiled: September 28, 2018Publication date: April 2, 2020Inventors: Richard Patrick Lewis, Lisa Deng, Craig Henry Wittenberg, Daniel Lee Mace, Yogesh Kant Roy
-
Patent number: 9819689Abstract: Identify a set or session of processes as having certain characteristics. A method obtains a known set or session of processes, wherein the known set or session of processes has the certain characteristics. A set or session of processes to be evaluated is obtained. A weighted similarity measure is performed between the known set or session of processes and the set or session of processes to be evaluated. The weighted similarity measure is performed element wise, where a comparison is performed for each defined element in the set or session of processes to be evaluated against elements in the known set or session of processes.Type: GrantFiled: March 13, 2015Date of Patent: November 14, 2017Assignee: Microsoft Technology Licensing, LLCInventors: Himanshu Chandola, Jack Wilson Stokes, III, Gil Lapid Shafriri, Craig Henry Wittenberg, Timothy W. Burrell, Christian Seifert
-
Publication number: 20160269424Abstract: Identify a set or session of processes as having certain characteristics. A method obtains a known set or session of processes, wherein the known set or session of processes has the certain characteristics. A set or session of processes to be evaluated is obtained. A weighted similarity measure is performed between the known set or session of processes and the set or session of processes to be evaluated. The weighted similarity measure is performed element wise, where a comparison is performed for each defined element in the set or session of processes to be evaluated against elements in the known set or session of processes.Type: ApplicationFiled: March 13, 2015Publication date: September 15, 2016Inventors: Himanshu Chandola, Jack Wilson Stokes, III, Gil Lapid Shafriri, Craig Henry Wittenberg, Timothy W. Burrell, Christian Seifert
-
Publication number: 20160203316Abstract: Embodiments are directed to generating an account process profile based on meta-events and to detecting account behavior anomalies based on account process profiles. In one scenario, a computer system accesses an indication of which processes were initiated by an account over a specified period of time. The computer system analyzes at least some of the processes identified in the indication to extract features associated with the processes. The computer system assigns the processes to meta-events based on the extracted features, where each meta-event is a representation of how the processes are executed within the computer system. The computer system then generates an account process profile for the account based on the meta-events, where the account process profile provides a comprehensive view of the account's behavior over the specified period of time. This account process profile can be used to identify anomalies in process execution.Type: ApplicationFiled: January 14, 2015Publication date: July 14, 2016Inventors: Daniel Lee Mace, Gil Lapid Shafriri, Craig Henry Wittenberg
-
Publication number: 20160105801Abstract: Embodiments are directed to establishing an acceptability model to determine the acceptability of a communication originating from a specified location and to evaluating the acceptability of a received communication. In one scenario, a computer system accesses a communication history for an electronic device, at least one similar user's communication history and similar locations based on geographic topology data, where the communication history includes at least one previous communication between the electronic device and a computer system. The computer system accesses an updateable listing of locations based on the geographic topology data from which communications may be received from the electronic device. The computer system then generates an acceptability model configured to provide a reachability score that indicates the acceptability of subsequent communications from the electronic device based on the communication history, the similar user's communication history and the geographic topology data.Type: ApplicationFiled: October 9, 2014Publication date: April 14, 2016Inventors: Craig Henry Wittenberg, Gil Lapid Shafriri, Daniel L. Mace, Himanshu Chandola
-
Patent number: 9264232Abstract: Binding a security artifact to a service provider. A method includes generating a pseudonym for a security artifact. The pseudonym is an identifier of the security artifact to the service provider that is unique to the service provider in that the pseudonym is not used to identify the security artifact to other service providers. Further, the pseudonym uniquely identifies the particular security artifact to the service provider even when a user has available a number of different security artifacts to authenticate to the same service provider to access a user account for the user. The method further includes providing the pseudonym for the security artifact to the service provider. The pseudonym for the security artifact is bound with a user account at the service provider for a user associated with the security artifact.Type: GrantFiled: August 26, 2014Date of Patent: February 16, 2016Assignee: Microsoft Technology Licensing, LLCInventors: Craig Henry Wittenberg, Christian Paquin, Rushmi U. Malaviarachchi
-
Publication number: 20160006567Abstract: Binding a security artifact to a service provider. A method includes generating a pseudonym for a security artifact. The pseudonym is an identifier of the security artifact to the service provider that is unique to the service provider in that the pseudonym is not used to identify the security artifact to other service providers. Further, the pseudonym uniquely identifies the particular security artifact to the service provider even when a user has available a number of different security artifacts to authenticate to the same service provider to access a user account for the user. The method further includes providing the pseudonym for the security artifact to the service provider. The pseudonym for the security artifact is bound with a user account at the service provider for a user associated with the security artifact.Type: ApplicationFiled: August 26, 2014Publication date: January 7, 2016Inventors: Craig Henry Wittenberg, Christian Paquin, Rushmi U. Malaviarachchi
-
Patent number: 8819437Abstract: Binding a security artifact to a service provider. A method includes generating a pseudonym for a security artifact. The pseudonym is an identifier of the security artifact to the service provider that is unique to the service provider in that the pseudonym is not used to identify the security artifact to other service providers. Further, the pseudonym uniquely identifies the particular security artifact to the service provider even when a user has available a number of different security artifacts to authenticate to the same service provider to access a user account for the user. The method further includes providing the pseudonym for the security artifact to the service provider. The pseudonym for the security artifact is bound with a user account at the service provider for a user associated with the security artifact.Type: GrantFiled: September 30, 2010Date of Patent: August 26, 2014Assignee: Microsoft CorporationInventors: Craig Henry Wittenberg, Christian Paquin, Rushmi U. Malaviarachchi
-
Publication number: 20120084565Abstract: Binding a security artifact to a service provider. A method includes generating a pseudonym for a security artifact. The pseudonym is an identifier of the security artifact to the service provider that is unique to the service provider in that the pseudonym is not used to identify the security artifact to other service providers. Further, the pseudonym uniquely identifies the particular security artifact to the service provider even when a user has available a number of different security artifacts to authenticate to the same service provider to access a user account for the user. The method further includes providing the pseudonym for the security artifact to the service provider. The pseudonym for the security artifact is bound with a user account at the service provider for a user associated with the security artifact.Type: ApplicationFiled: September 30, 2010Publication date: April 5, 2012Applicant: Microsoft CorporationInventors: Craig Henry Wittenberg, Christian Paquin, Rushmi U. Malaviarachchi
-
Patent number: 5724588Abstract: A computer method and system for passing a pointer to an interface from a server process to a client process. In a preferred embodiment, the server process instantiates an object that has multiple interfaces. The server process identifies an interface to pass to the client process and creates a stub object for receiving a request to invoke a function member of the interface and for invoking the requested function member upon receiving the request. The server process then sends an identifier of the stub to the client process. When the client process receives the identifier of the stub, it instantiates a proxy object for receiving requests to invoke a function member of the interface and for sending the request to the identified stub. The client process can then invoke the function members of the interface by invoking function members of the proxy object. The proxy object sends a request to the identified stub. The identified stub then invokes the corresponding function member of the interface.Type: GrantFiled: June 7, 1995Date of Patent: March 3, 1998Assignee: Microsoft CorporationInventors: Richard Douglas Hill, Antony S. Williams, Robert G. Atkinson, Tom Corbett, Paul Leach, Shannon John Chan, Alexander Adams Mitchell, Edward K. Jung, Craig Henry Wittenberg