Patents by Inventor Joseph A. Jaroch

Joseph A. Jaroch has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 9413596
    Abstract: Examples provided relate to methods and apparatus for managing the expiration and execution of commands sent from a remote system having administration functions to an agent residing on a computer system. An exemplary method may include receiving, at an agent, one or more commands, storing the one or more received commands, retrieving the one or more stored commands, and determining whether the one or more retrieved commands can be executed by comparing at least one time parameter associated with the agent to at least one time parameter associated with the one or more retrieved commands.
    Type: Grant
    Filed: January 10, 2013
    Date of Patent: August 9, 2016
    Assignee: WEBROOT INC.
    Inventors: Joseph Jaroch, Melvyn Morris
  • Patent number: 9413721
    Abstract: Methods for classifying computer objects as malware and the associated apparatus are disclosed. An exemplary method includes, at a base computer, receiving data about a computer object from each of plural remote computers on which the object or similar objects are stored or processed wherein the base computer comprises plural threat servers arranged to receive the data from the plural remote computers and apply rules or heuristics against the data in real time to determine whether or not the object is malware and to communicate the determination to the remote computers. The base computer includes at least one central server in communication with the threat servers and arranged to receive the data about objects from the threat servers to maintain a master database of data received about objects from all threat servers.
    Type: Grant
    Filed: February 13, 2012
    Date of Patent: August 9, 2016
    Assignee: WEBROOT INC.
    Inventors: Melvyn Morris, Joseph Jaroch
  • Publication number: 20140331322
    Abstract: Methods and systems for providing forensic visibility into systems and networks are provided. More particularly, a sensor agent may receive events defining an action of a first object acting on a target. The object, the event, and the target are then correlated to at least one originating object such that an audit trail for each individual event is created. A global perspective indicating an age, popularity, a determination as to whether the object may be malware, and IP/URL information associated with the event may then be applied to at least one of the object, the event, the target, and the originating object. A priority may then be determined and assigned to the event based on at least the global perspective. An event line containing event information is then transmitted to an end recipient where the information may be heuristically displayed.
    Type: Application
    Filed: May 5, 2014
    Publication date: November 6, 2014
    Applicant: Webroot Inc.
    Inventors: Joseph Jaroch, Jacques Etienne Erasmus, Paul Barnes, Johannes Mayr, Michael Leidesdorff, Marco Giuliani, Christopher Jon Williams, Chad Edward Bacher
  • Publication number: 20140304800
    Abstract: Methods and apparatus for providing protection against malware are disclosed. An exemplary method includes executing an agent program on a remote computer connected to a network, the agent program being configured to communicate with a base computer via the network, the agent program including a firewall arranged to block communications between the remote computer and entities on the network in accordance with predetermined rules; and configuring the firewall in accordance with rules received from the base computer.
    Type: Application
    Filed: May 23, 2014
    Publication date: October 9, 2014
    Applicant: Webroot Inc.
    Inventors: Melvyn Morris, Joseph Jaroch
  • Publication number: 20140195659
    Abstract: Methods and apparatus for managing the expiration and execution of commands sent from a remote system having administration functions to an agent residing on a computer system are disclosed. An exemplary method includes receiving, at an agent, one or more commands, storing the one or more received commands, retrieving the one or more stored commands, and determining whether the one or more retrieved commands can be executed by comparing at least one time parameter associated with the agent to at least one time parameter associated with the one or more retrieved commands.
    Type: Application
    Filed: January 10, 2013
    Publication date: July 10, 2014
    Applicant: WEBROOT INC.
    Inventors: Joseph Jaroch, Melvyn Morris
  • Publication number: 20120266208
    Abstract: Methods for classifying computer objects as malware and the associated apparatus are disclosed. An exemplary method includes, at a base computer, receiving data about a computer object from each of plural remote computers on which the object or similar objects are stored and or processed and counting the number of times in a given time period objects having one or more common attributes or behaviors that have been seen by the remote computers. The counted number is then compared with the expected number based on past observations, and if the comparison exceeds a predetermined threshold, the objects are flagged as unsafe or as suspicious.
    Type: Application
    Filed: February 13, 2012
    Publication date: October 18, 2012
    Applicant: WEBROOT INC.
    Inventors: Melvyn Morris, Joseph Jaroch
  • Publication number: 20120260340
    Abstract: Methods for classifying computer objects as malware and the associated apparatus are disclosed. An exemplary method includes, at a base computer, receiving data about a computer object from each of plural remote computers on which the object or similar objects are stored or processed wherein the base computer comprises plural threat servers arranged to receive the data from the plural remote computers and apply rules or heuristics against the data in real time to determine whether or not the object is malware and to communicate the determination to the remote computers. The base computer includes at least one central server in communication with the threat servers and arranged to receive the data about objects from the threat servers to maintain a master database of data received about objects from all threat servers.
    Type: Application
    Filed: February 13, 2012
    Publication date: October 11, 2012
    Applicant: WEBROOT INC.
    Inventors: Melvyn Morris, Joseph Jaroch
  • Publication number: 20120260304
    Abstract: Methods and apparatus for providing protection against malware are disclosed. An exemplary method includes executing an agent program on a remote computer connected to a network, the agent program being configured to communicate with a base computer via the network, the agent program including a firewall arranged to block communications between the remote computer and entities on the network in accordance with predetermined rules; and configuring the firewall in accordance with rules received from the base computer.
    Type: Application
    Filed: February 13, 2012
    Publication date: October 11, 2012
    Applicant: WEBROOT INC.
    Inventors: Melvyn Morris, Joseph Jaroch