Patents by Inventor Daniel Lee Mace

Daniel Lee Mace has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 11928207
    Abstract: Techniques are described herein that are capable of performing automatic graph-based detection of potential security threats. A Bayesian network is initialized using an association graph to establish connections among network nodes in the Bayesian network. The network nodes are grouped among clusters that correspond to respective intents. Patterns in the Bayesian network are identified. At least one redundant connection, which is redundant with regard to one or more other connections, is removed from the patterns. Scores are assigned to the respective patterns in the Bayesian network, based on knowledge of historical patterns and historical security threats, such that each score indicates a likelihood of the respective pattern to indicate a security threat. An output graph is automatically generated. The output graph includes each pattern that has a score that is greater than or equal to a score threshold. Each pattern in the output graph represents a potential security threat.
    Type: Grant
    Filed: November 5, 2021
    Date of Patent: March 12, 2024
    Assignee: Microsoft Technology Licensing, LLC
    Inventors: Anisha Mazumder, Haijun Zhai, Daniel Lee Mace, Yogesh K. Roy, Seetharaman Harikrishnan
  • Publication number: 20240070270
    Abstract: A computer-implemented method of generating a security language query from a user input query includes receiving, at a computer system, an input security hunting user query indicating a user intention; selecting, using a trained machine learning model and based on the input security hunting query, an example user security hunting query and corresponding example security language query; generating, using the trained machine learning model, query metadata from the input security hunting query; generating a prompt, the prompt comprising: the input security hunting user query; the selected example user security hunting query and the corresponding example security language query; and the generated query metadata; inputting the prompt to a large language model; receiving a security language query from the large language model corresponding to the input security hunting query reflective of the user intention.
    Type: Application
    Filed: August 31, 2022
    Publication date: February 29, 2024
    Inventors: Daniel Lee MACE, William BLUM, Jeremias EICHELBAUM, Amir RUBIN, Edir V. GARCIA LAZO, Nihal Irmak PAKIS, Yogesh K. ROY, Jugal PARIKH, Peter A. BRYAN, Benjamin Elliott NICK, Ram Shankar Siva KUMAR
  • Publication number: 20230275908
    Abstract: In network security systems, graph-based techniques may be employed to generate “thumbprints” of security incidents, which may thereafter be used, e.g., for threat actor attribution or the identification of similar incidents. In various embodiments, each security incident is represented by a graph in which security events correspond to nodes, and which encodes associated metadata in additional nodes and/or node/edge attributes. Graph representation learning may be used to compute node and/or edge embeddings, which can then be aggregated into the thumbprint of the incident.
    Type: Application
    Filed: February 28, 2022
    Publication date: August 31, 2023
    Inventors: Daniel Lee MACE, Andrew White WICKER
  • Publication number: 20230275907
    Abstract: In network security systems, graph-based techniques can be used to identify, for any given security incident including a collection of security events, other incidents that are similar. In example embodiments, similarity is determined based on graph representations of the incidents in which security events are represented as nodes, using graph matching techniques or incident thumbprints computed from node embeddings. The identified similar incidents can provide context to inform threat assessment and the selection of appropriate mitigating actions.
    Type: Application
    Filed: February 28, 2022
    Publication date: August 31, 2023
    Inventors: Anna Swanson BERTIGER, Daniel Lee MACE, Andrew White WICKER
  • Publication number: 20230102103
    Abstract: Techniques are described herein that are capable of performing automatic graph-based detection of potential security threats. A Bayesian network is initialized using an association graph to establish connections among network nodes in the Bayesian network. The network nodes are grouped among clusters that correspond to respective intents. Patterns in the Bayesian network are identified. At least one redundant connection, which is redundant with regard to one or more other connections, is removed from the patterns. Scores are assigned to the respective patterns in the Bayesian network, based on knowledge of historical patterns and historical security threats, such that each score indicates a likelihood of the respective pattern to indicate a security threat. An output graph is automatically generated. The output graph includes each pattern that has a score that is greater than or equal to a score threshold. Each pattern in the output graph represents a potential security threat.
    Type: Application
    Filed: November 5, 2021
    Publication date: March 30, 2023
    Inventors: Anisha MAZUMDER, Haijun ZHAI, Daniel Lee MACE, Yogesh K. ROY, Seetharaman HARIKRISHNAN
  • Publication number: 20200104696
    Abstract: Systems are provided for using machine learning to identify service accounts and/or for distinguishing service accounts from user accounts based on the user names of the accounts. Machine learning tools can be trained on user name label data for service accounts and user accounts. The trained machine learning tool can then be applied to user names of accounts to determine whether the user names correspond to service accounts or not and, in some instances, without referencing tables or other structures that explicitly identify and distinguish the service/user accounts and/or conventions for identifying service accounts. Then, the systems can respond appropriately, based on the determination. The machine learning tool can also be shared with other systems to make the same determinations for their accounts without having to share confidential or proprietary account information.
    Type: Application
    Filed: September 28, 2018
    Publication date: April 2, 2020
    Inventors: Richard Patrick Lewis, Lisa Deng, Craig Henry Wittenberg, Daniel Lee Mace, Yogesh Kant Roy
  • Publication number: 20180137401
    Abstract: A computing system for generating automated responses to improve response times for diagnosing security alerts includes a processor and a memory. An application is stored in the memory and executed by the processor. The application includes instructions for receiving a text phrase relating to a security alert; using a natural language interface with a natural language model to select one of a plurality of intents corresponding to the text phrase; and mapping the selected intent to one of a plurality of actions. Each of the plurality of actions includes at least one of a static response, a dynamic response, and a task. The application includes instructions for sending a response based on the at least one of the static response, the dynamic response, and the task.
    Type: Application
    Filed: November 16, 2016
    Publication date: May 17, 2018
    Applicant: Microsoft Technology Licensing, LLC
    Inventors: Ram Shankar Siva KUMAR, Bryan Jeffrey SMITH, Andrew White WICKER, Daniel Lee MACE, David Charles LADD
  • Publication number: 20160203316
    Abstract: Embodiments are directed to generating an account process profile based on meta-events and to detecting account behavior anomalies based on account process profiles. In one scenario, a computer system accesses an indication of which processes were initiated by an account over a specified period of time. The computer system analyzes at least some of the processes identified in the indication to extract features associated with the processes. The computer system assigns the processes to meta-events based on the extracted features, where each meta-event is a representation of how the processes are executed within the computer system. The computer system then generates an account process profile for the account based on the meta-events, where the account process profile provides a comprehensive view of the account's behavior over the specified period of time. This account process profile can be used to identify anomalies in process execution.
    Type: Application
    Filed: January 14, 2015
    Publication date: July 14, 2016
    Inventors: Daniel Lee Mace, Gil Lapid Shafriri, Craig Henry Wittenberg