Patents by Inventor Daniel L. Mace

Daniel L. Mace has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 11194910
    Abstract: Provided herein are methods, systems, and computer program products for intelligent detection of multistage attacks which may arise in computer environments. Embodiments herein leverage adaptive graph-based machine-learning solutions that can incorporate rules as well as supervised learning for detecting multistage attacks. Multistage attacks and attack chains may be detected or identified by collecting data representing events, detections, and behaviors, determining relationships among various data, and analyzing the data and associated relationships. A graph of events, detections, and behaviors which are connected by edges representing relationships between nodes of the graph may be constructed and then subgraphs of the possibly enormous initial graph may be identified which represent likely attacks.
    Type: Grant
    Filed: November 2, 2018
    Date of Patent: December 7, 2021
    Assignee: Microsoft Technology Licensing, LLC
    Inventors: Anisha Mazumder, Craig Henry Wittenberg, Daniel L. Mace, Haijun Zhai, Seetharaman Harikrishnan, Ram Shankar Siva Kumar, Yogesh K. Roy
  • Patent number: 11159551
    Abstract: The described technologies leverage a trained evaluation function to analyze an email message to determine if a password is included in the text of the email message. The text of the email message may be vectorized using a character lookup table including vector values for each ASCII character. The trained evaluation function analyzes the vectorized text to determine if a password is included in the text of the mail message. An email message found to include a password may be placed in a quarantine storage to at least temporality prevent the email message from being disseminated to a recipient.
    Type: Grant
    Filed: April 19, 2019
    Date of Patent: October 26, 2021
    Assignee: Microsoft Technology Licensing, LLC
    Inventors: Richard P. Lewis, Arvindnarayanan Ravi, Daniel L. Mace, Jordan Wesley Rogers, Manas George, Wing Kwong Wan, Yogesh K. Roy
  • Publication number: 20200336501
    Abstract: The described technologies leverage a trained evaluation function to analyze an email message to determine if a password is included in the text of the email message. The text of the email message may be vectorized using a character lookup table including vector values for each ASCII character. The trained evaluation function analyzes the vectorized text to determine if a password is included in the text of the mail message. An email message found to include a password may be placed in a quarantine storage to at least temporality prevent the email message from being disseminated to a recipient.
    Type: Application
    Filed: April 19, 2019
    Publication date: October 22, 2020
    Inventors: Richard P. LEWIS, Arvindnarayanan RAVI, Daniel L. MACE, Jordan Wesley ROGERS, Manas GEORGE, Wing Kwong WAN, Yogesh K. ROY
  • Publication number: 20200143052
    Abstract: Provided herein are methods, systems, and computer program products for intelligent detection of multistage attacks which may arise in computer environments. Embodiments herein leverage adaptive graph-based machine-learning solutions that can incorporate rules as well as supervised learning for detecting multistage attacks. Multistage attacks and attack chains may be detected or identified by collecting data representing events, detections, and behaviors, determining relationships among various data, and analyzing the data and associated relationships. A graph of events, detections, and behaviors which are connected by edges representing relationships between nodes of the graph may be constructed and then subgraphs of the possibly enormous initial graph may be identified which represent likely attacks.
    Type: Application
    Filed: November 2, 2018
    Publication date: May 7, 2020
    Inventors: Anisha MAZUMDER, Craig Henry WITTENBERG, Daniel L. MACE, Haijun ZHAI, Seetharaman HARIKRISHNAN, Ram Shankar Siva KUMAR, Yogesh K. ROY
  • Publication number: 20160105801
    Abstract: Embodiments are directed to establishing an acceptability model to determine the acceptability of a communication originating from a specified location and to evaluating the acceptability of a received communication. In one scenario, a computer system accesses a communication history for an electronic device, at least one similar user's communication history and similar locations based on geographic topology data, where the communication history includes at least one previous communication between the electronic device and a computer system. The computer system accesses an updateable listing of locations based on the geographic topology data from which communications may be received from the electronic device. The computer system then generates an acceptability model configured to provide a reachability score that indicates the acceptability of subsequent communications from the electronic device based on the communication history, the similar user's communication history and the geographic topology data.
    Type: Application
    Filed: October 9, 2014
    Publication date: April 14, 2016
    Inventors: Craig Henry Wittenberg, Gil Lapid Shafriri, Daniel L. Mace, Himanshu Chandola