Patents by Inventor Elliott Jeb Haber
Elliott Jeb Haber has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 9398036Abstract: One or more techniques and/or systems are provided for file acquisition for reputation evaluation. A reputation service may be configured to evaluate files and provide reputations of such files to clients (e.g., an indication as to whether a file is safe or malicious). If the reputation service receives a reputation request for a file that is unknown to the reputation service (e.g., a file not yet fully acquired by the reputation service), then the reputation service may identify a set of chunks into which the file can be partitioned. The reputation service may obtain chunks from various clients, such as a first chunk from a first client and a second chunk from a second client. Such chunks may be evaluated to assign a reputation to the file. In this way, the reputation service may retrieve portions of a file in a distributed manner for reputation evaluation.Type: GrantFiled: September 17, 2014Date of Patent: July 19, 2016Assignee: Microsoft Technology Licensing, LLCInventors: Robert Alexander Sim, Christian Seifert, Anthony Penta, Elliott Jeb Haber, Tomasz Kasperkiewicz
-
Publication number: 20160080400Abstract: One or more techniques and/or systems are provided for file acquisition for reputation evaluation. A reputation service may be configured to evaluate files and provide reputations of such files to clients (e.g., an indication as to whether a file is safe or malicious). If the reputation service receives a reputation request for a file that is unknown to the reputation service (e.g., a file not yet fully acquired by the reputation service), then the reputation service may identify a set of chunks into which the file can be partitioned. The reputation service may obtain chunks from various clients, such as a first chunk from a first client and a second chunk from a second client. Such chunks may be evaluated to assign a reputation to the file. In this way, the reputation service may retrieve portions of a file in a distributed manner for reputation evaluation.Type: ApplicationFiled: September 17, 2014Publication date: March 17, 2016Inventors: Robert Alexander Sim, Christian Seifert, Anthony Penta, Elliott Jeb Haber, Tomasz Kasperkiewicz
-
Patent number: 9235586Abstract: A Web browser of a computing device downloads or otherwise obtains a file. File information identifying the file is obtained and is sent to a remote reputation service. Client information identifying aspects of the computing device can also optionally be sent to the remote reputation service. In response to the file information (and optionally client information), a reputation indication for the file is received from the remote reputation service. A user interface for the Web browser to present at the computing device is determined, based at least in part on the reputation indication, and presented at the computing device.Type: GrantFiled: September 13, 2010Date of Patent: January 12, 2016Assignee: Microsoft Technology Licensing, LLCInventors: Ritika Virmani, Ryan C. Colvin, Elliott Jeb Haber, Warren G. Stevens, Jane T. Kim, Jess S. Holbrook, Sarah J. Bowers, John L. Scarrow, Jeffrey R. McKune
-
Patent number: 9065826Abstract: Malware detection is often based on monitoring a local application binary and/or process, such as detecting patterns of malicious code, unusual local resource utilization, or suspicious application behavior. However, the volume of available software, variety of malware, and sophistication of evasion techniques may reduce the effectiveness of detection based on monitoring local resources. Presented herein are techniques for identifying malware based on the reputations of remote resources (e.g., web content, files, databases, IP addresses, services, and users) accessed by an application. Remote resource accesses may be reported to a reputation service, which may identify reputations of remote resources, and application reputations of applications that utilize such remote resources. These application reputations may be used to adjust the application policies of the applications executed by devices and servers.Type: GrantFiled: August 8, 2011Date of Patent: June 23, 2015Assignee: Microsoft Technology Licensing, LLCInventors: Ryan Charles Colvin, Elliott Jeb Haber, Ameya Bhatawdekar, Anthony P. Penta
-
Patent number: 8863291Abstract: The reputation of an executable computer program is checked when a user input to a computing device initiates a program launch, thus triggering a check of a local cache of reputation information. If the local cache confirms that the program is safe, it is permitted to launch, typically without notifying the user that a reputation check has been made. If the local cache cannot confirm the safety of the program, a reputation check is made by accessing a reputation service in the cloud. If the reputation service identifies the program as safe, it returns an indication to the computing device and the program is permitted to be launched, again without notifying the user that a reputation check has been made. If the reputation service identifies the program as unsafe or potentially unsafe, or does not recognize it at all, a warning is displayed to the user.Type: GrantFiled: January 20, 2011Date of Patent: October 14, 2014Assignee: Microsoft CorporationInventors: Daniel Oliver, Anshul Rawat, Xiang Tu, Ryan Colvin, James Dooley, Elliott Jeb Haber, Ameya Bhatawdekar, Andy Davidson, Jay Dave, Paul Leach, Karanbir Singh, Chris Guzak, Crispin Cowan
-
Patent number: 8839418Abstract: Described is a technology by which phishing-related data sources are processed into aggregated data and a given site evaluated the aggregated data using a predictive model to automatically determine whether the given site is likely to be a phishing site. The predictive model may be built using machine learning based on training data, e.g., including known phishing sites and/or known non-phishing sites. To determine whether an object corresponding to a site is likely a phishing-related object are described, various criteria are evaluated, including one or more features of the object when evaluated. The determination is output in some way, e.g., made available to a reputation service, used to block access to a site or warn a user before allowing access, and/or used to assist a hand grader in being more efficient in evaluating sites.Type: GrantFiled: January 18, 2006Date of Patent: September 16, 2014Assignee: Microsoft CorporationInventors: Geoffrey John Hulten, Paul Stephen Rehfuss, Robert Rounthwaite, Joshua Theodore Goodman, Gopalakrishnan Seshadrinathan, Anthony P. Penta, Manav Mishra, Roderic C. Deyo, Elliott Jeb Haber, David Aaron Ward Snelling
-
Patent number: 8429743Abstract: Online risk mitigation techniques are described. In an implementation, a service is queried for a reputation associated with an object from an online source in response to selection of the object. A backup of a client that is to receive the object is stored prior to obtaining the object when the reputation does not meet a threshold reputation level.Type: GrantFiled: December 23, 2008Date of Patent: April 23, 2013Assignee: Microsoft CorporationInventors: Shawn Loveland, Geoffrey J Hulten, Elliott Jeb Haber, John L. Scarrow
-
Publication number: 20130042294Abstract: Malware detection is often based on monitoring a local application binary and/or process, such as detecting patterns of malicious code, unusual local resource utilization, or suspicious application behavior. However, the volume of available software, variety of malware, and sophistication of evasion techniques may reduce the effectiveness of detection based on monitoring local resources. Presented herein are techniques for identifying malware based on the reputations of remote resources (e.g., web content, files, databases, IP addresses, services, and users) accessed by an application. Remote resource accesses may be reported to a reputation service, which may identify reputations of remote resources, and application reputations of applications that utilize such remote resources. These application reputations may be used to adjust the application policies of the applications executed by devices and servers.Type: ApplicationFiled: August 8, 2011Publication date: February 14, 2013Applicant: Microsoft CorporationInventors: Ryan Charles Colvin, Elliott Jeb Haber, Ameya Bhatawdekar, Anthony P. Penta
-
Publication number: 20130036466Abstract: One or more techniques and/or systems are provided for internet connectivity protection. In particular, reputational information assigned to infrastructure components (e.g., IP addresses, name servers, domains, etc.) may be leveraged to determine whether an infrastructure component associated with a user navigating to content of a URL is malicious or safe. For example, infrastructure component data associated with a web browser navigating to a website of a URL may be collected and sent to a reputation server. The reputation server may return reputation information associated with the infrastructure component data (e.g., an IP address may be known as malicious even though the URL may not yet have a reputation). In this way, the user may be provided with notifications, such as warnings, when various unsafe conditions arise, such as interacting with an infrastructure component with a bad reputation, a resolved IP address not matching the URL, etc.Type: ApplicationFiled: August 1, 2011Publication date: February 7, 2013Applicant: Microsoft CorporationInventors: Anthony P. Penta, Elliott Jeb Haber, Ameya Bhatawdekar, Ryan Charles Colvin, David Douglas DeBarr, Geoffrey John Hulten
-
Publication number: 20120192275Abstract: The reputation of an executable computer program is checked when a user input to a computing device initiates a program launch, thus triggering a check of a local cache of reputation information. If the local cache confirms that the program is safe, it is permitted to launch, typically without notifying the user that a reputation check has been made. If the local cache cannot confirm the safety of the program, a reputation check is made by accessing a reputation service in the cloud. If the reputation service identifies the program as safe, it returns an indication to the computing device and the program is permitted to be launched, again without notifying the user that a reputation check has been made. If the reputation service identifies the program as unsafe or potentially unsafe, or does not recognize it at all, a warning is displayed to the user.Type: ApplicationFiled: January 20, 2011Publication date: July 26, 2012Applicant: MICROSOFT CORPORATIONInventors: Daniel Oliver, Anshul Rawat, Xiang Tu, Ryan Colvin, James Dooley, Elliott Jeb Haber, Ameya Bhatawdekar, Andy Davidson, Jay Dave, Paul Leach, Karanbir Singh, Chris Guzak, Crispin Cowan
-
Publication number: 20120066346Abstract: A Web browser of a computing device downloads or otherwise obtains a file. File information identifying the file is obtained and is sent to a remote reputation service. Client information identifying aspects of the computing device can also optionally be sent to the remote reputation service. In response to the file information (and optionally client information), a reputation indication for the file is received from the remote reputation service. A user interface for the Web browser to present at the computing device is determined, based at least in part on the reputation indication, and presented at the computing device.Type: ApplicationFiled: September 13, 2010Publication date: March 15, 2012Applicant: MICROSOFT CORPORATIONInventors: Ritika Virmani, Ryan C. Colvin, Elliott Jeb Haber, Warren G. Stevens, Jane T. Kim, Jess S. Holbrook, Sarah J. Bowers, John L. Scarrow, Jeffrey R. McKune
-
Publication number: 20100162391Abstract: Online risk mitigation techniques are described. In an implementation, a service is queried for a reputation associated with an object from an online source in response to selection of the object. A backup of a client that is to receive the object is stored prior to obtaining the object when the reputation does not meet a threshold reputation level.Type: ApplicationFiled: December 23, 2008Publication date: June 24, 2010Applicant: Microsoft CorporationInventors: Shawn Loveland, Geoffrey J. Hulten, Elliott Jeb Haber, John L. Scarrow