Patents by Inventor Jonathan Edward ANDERSSON
Jonathan Edward ANDERSSON has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 12032705Abstract: Proper functioning of an antivirus software running on an endpoint system is detected using a test data that is provided to the endpoint system. The test data is also provided to a backend system, which provides the endpoint system with an antivirus definition that includes information for detecting the test data. The antivirus software running on the endpoint system scans for the test data and reports detection of the test data to the backend system. The antivirus software is deemed to have failed the proper functioning test when the antivirus software fails to report detection of the test data. Proper functioning of the antivirus software is also detected by performing a challenge procedure, which involves sending a challenge message to the endpoint system. The endpoint system is expected to respond to the challenge message with a response that includes expected information.Type: GrantFiled: November 4, 2021Date of Patent: July 9, 2024Assignee: Trend Micro IncorporatedInventors: Todd Joseph Kalauhala Manning, Muqeet Ali, Jonathan Edward Andersson, Josiah Dede Hagen, Richard Andrew Lawshae, Haoping Liu
-
Patent number: 11882148Abstract: Systems and methods are presented for mitigating cyber threats. Cybersecurity-related data are stored in a semantic cybersecurity database. A user interface converts a user input to a command utterance. A command node that corresponds to the command utterance is identified in the cybersecurity database. The command node is resolved to one or more action nodes that are connected to the command node, and each action node is resolved to one or more parameter nodes that are connected to the action node. The command node has a command that implements actions indicated in the action nodes. Each action can have one or more required parameters indicated in the parameter nodes. The values of the required parameters are obtained from the command utterance, prompted from the user, or obtained from the cybersecurity database. Actions with their parameter values are executed to mitigate a cyber threat in accordance with the user input.Type: GrantFiled: April 13, 2021Date of Patent: January 23, 2024Assignee: Trend Micro IncorporatedInventors: Josiah Dede Hagen, David Girard, Jonathan Edward Andersson, Vincenzo Ciancaglini, Jannis Weigend, Ahmed M. Ibrahim, Mikhail Gorbulev
-
Patent number: 11080398Abstract: Examples relate to identifying signatures for data sets. In one example, a computing device may: for each of a plurality of first data sets, obtain a data set signature; generate a first data structure for storing each data set signature that is distinct from each other data set signature; for each of a plurality of second data sets, obtain at least one data subset; generate a second data structure for storing each data subset; remove, from the first data structure, each data set signature that matches a data subset included in the second data structure; and for each data set signature removed from the first data structure, identify each first data set from which the data set signature was obtained; and for each identified first data set, obtain a new data set signature.Type: GrantFiled: May 24, 2018Date of Patent: August 3, 2021Assignee: Trend Micro IncorporatedInventors: Josiah Dede Hagen, Jonathan Edward Andersson
-
Patent number: 11063969Abstract: In one embodiment, a network security device monitors network communications between a computer and another computer. A periodicity of transmissions made by one computer to the other computer is determined, with the periodicity being used to identify candidate time point pairs having intervals that match the periodicity. A graph is constructed with time points of the candidate time point pairs as nodes and with intervals of time point pairs as edges. A longest path that continuously links one time point to another time point on the graph is compared to a threshold length to verify that the transmissions are periodic, and are thus potentially indicative of malicious network communications.Type: GrantFiled: June 25, 2019Date of Patent: July 13, 2021Assignee: Trend Micro IncorporatedInventors: Shoufu Luo, Jonathan Edward Andersson, Josiah Dede Hagen
-
Patent number: 11044265Abstract: In one embodiment, local begin and end tags are detected by a network security device to determine a local context of a network traffic flow, and a local feature vector is obtained for that local context. At least one triggering machine learning model is applied by the network security device to the local feature vector, and the result determines whether or not deeper analysis is warranted. In most cases, very substantial resources are not required because deeper analysis is not indicated. If deeper analysis is indicated, one or more deeper machine learning model may then be applied to global and local feature vectors, and regular expressions may be applied to packet data, which may include the triggering data packet and one or more subsequent data packets. Other embodiments, aspects and features are also disclosed.Type: GrantFiled: June 11, 2020Date of Patent: June 22, 2021Assignee: Trend Micro IncorporatedInventors: Josiah Dede Hagen, Jonathan Edward Andersson, Shoufu Luo, Brandon Niemczyk, Leslie Zsohar, Craig Botkin, Peter Andriukaitis
-
Patent number: 11017079Abstract: Examples relate to identifying malicious activity using data complexity anomalies. In one example, a computing device may: receive a byte stream that includes a plurality of bytes; determine, for a least one subset of the byte stream, a measure of complexity of the subset; determine that the measure of complexity meets a predetermined threshold measure of complexity for a context associated with the byte stream; and in response to determining that the measure of complexity meets the threshold, provide an indication that the byte stream complexity is anomalous.Type: GrantFiled: May 24, 2018Date of Patent: May 25, 2021Assignee: Trend Micro IncorporatedInventors: Jonathan Edward Andersson, Josiah Dede Hagen
-
Patent number: 10878088Abstract: Examples relate to identifying randomly generated character strings. In one example, a computing device may: receive a character string that includes two or more characters; identify a number of character transitions included in the character string, each character transition being a change in character type within an n-gram of the character string, where n is a positive integer; and determine, based on the number of character transitions, whether the character string was randomly generated.Type: GrantFiled: February 7, 2018Date of Patent: December 29, 2020Assignee: Trend Micro IncorporatedInventors: Richard Andrew Lawshae, Josiah Dede Hagen, Mathew Robert Powell, Elvis Collado, Jonathan Edward Andersson, Stephen David Povolny
-
Patent number: 10728268Abstract: In one embodiment, local begin and end tags are detected by a network security device to determine a local context of a network traffic flow, and a local feature vector is obtained for that local context. At least one triggering machine learning model is applied by the network security device to the local feature vector, and the result determines whether or not deeper analysis is warranted. In most cases, very substantial resources are not required because deeper analysis is not indicated. If deeper analysis is indicated, one or more deeper machine learning model may then be applied to global and local feature vectors, and regular expressions may be applied to packet data, which may include the triggering data packet and one or more subsequent data packets. Other embodiments, aspects and features are also disclosed.Type: GrantFiled: April 10, 2018Date of Patent: July 28, 2020Assignee: Trend Micro IncorporatedInventors: Josiah Dede Hagen, Jonathan Edward Andersson, Shoufu Luo, Brandon Niemczyk, Leslie Zsohar, Craig Botkin, Peter Andriukaitis
-
Patent number: 10528732Abstract: Examples relate to identifying a signature for a data set. In one example, a computing device may: receive a data set that includes a plurality of data units; iteratively determine a measure of complexity for windows of data units included in the data set, each window including a distinct portion of the plurality of data units; identify, based on the iterative determinations, a most complex window of data units for the data set; and identify the most complex window as a data unit signature for the data set.Type: GrantFiled: May 24, 2018Date of Patent: January 7, 2020Assignee: Trend Micro IncorporatedInventors: Josiah Dede Hagen, Jonathan Edward Andersson
-
Publication number: 20180268140Abstract: Examples relate to identifying a signature for a data set. In one example, a computing device may: receive a data set that includes a plurality of data units; iteratively determine a measure of complexity for windows of data units included in the data set, each window including a distinct portion of the plurality of data units; identify, based on the iterative determinations, a most complex window of data units for the data set; and identify the most complex window as a data unit signature for the data set.Type: ApplicationFiled: May 24, 2018Publication date: September 20, 2018Applicant: Trend Micro IncorporatedInventors: Josiah Dede HAGEN, Jonathan Edward ANDERSSON
-
Publication number: 20180268137Abstract: Examples relate to identifying malicious activity using data complexity anomalies. In one example, a computing device may: receive a byte stream that includes a plurality of bytes; determine, for a least one subset of the byte stream, a measure of complexity of the subset; determine that the measure of complexity meets a predetermined threshold measure of complexity for a context associated with the byte stream; and in response to determining that the measure of complexity meets the threshold, provide an indication that the byte stream complexity is anomalous.Type: ApplicationFiled: May 24, 2018Publication date: September 20, 2018Inventors: Jonathan Edward ANDERSSON, Josiah Dede HAGEN
-
Publication number: 20180268141Abstract: Examples relate to identifying signatures for data sets. In one example, a computing device may: for each of a plurality of first data sets, obtain a data set signature; generate a first data structure for storing each data set signature that is distinct from each other data set signature; for each of a plurality of second data sets, obtain at least one data subset; generate a second data structure for storing each data subset; remove, from the first data structure, each data set signature that matches a data subset included in the second data structure; and for each data set signature removed from the first data structure, identify each first data set from which the data set signature was obtained; and for each identified first data set, obtain a new data set signature.Type: ApplicationFiled: May 24, 2018Publication date: September 20, 2018Applicant: Trend Micro IncorporatedInventors: Josiah Dede HAGEN, Jonathan Edward ANDERSSON
-
Publication number: 20180198827Abstract: Examples disclosed herein relate to confidence levels in reputable entities. Some of the examples enable identifying a particular reputable entity that is originated from a plurality of sources including a first source and a second source; determining a first level of confidence associated with the first source; determining a second level of confidence associated with the second source; determining an aggregate level of confidence associated with the plurality of sources based on the first and second levels of confidence, wherein the aggregate level confidence is higher than the first and second levels of confidence; and determining an entity score for the particular reputable entity based on the aggregate level of confidence.Type: ApplicationFiled: March 6, 2018Publication date: July 12, 2018Applicant: Trend Micro IncorporatedInventors: Vaughn Kristopher EIFLER, Jonathan Edward ANDERSSON, Josiah Dede HAGEN
-
Publication number: 20180173875Abstract: Examples relate to identifying randomly generated character strings. In one example, a computing device may: receive a character string that includes two or more characters; identify a number of character transitions included in the character string, each character transition being a change in character type within an n-gram of the character string, where n is a positive integer; and determine, based on the number of character transitions, whether the character string was randomly generated.Type: ApplicationFiled: February 7, 2018Publication date: June 21, 2018Applicant: Trend Micro IncorporatedInventors: Richard Andrew LAWSHAE, Josiah Dede HAGEN, Matthew Rob POWELL, Elvis COLLADO, Jonathan Edward ANDERSSON, Stephen David POVOLNY
-
Publication number: 20180077163Abstract: Examples disclosed herein relate to potential blocking impacts. Some of the examples enable obtaining network traffic data of a network that is accessible by a plurality of users. The network traffic data may comprise occurrences of a reputable entity. Some of the examples further enable determining, based on the network traffic data, a potential blocking impact of blocking the reputable entity from the network. Some of the examples further enable providing the potential blocking impact to be used in an application of a network policy to the reputable entity.Type: ApplicationFiled: November 16, 2017Publication date: March 15, 2018Applicant: Trend Micro IncorporatedInventors: Vaughn Kristopher EIFLER, Jonathan Edward ANDERSSON, Josiah Dede HAGEN