Patents by Inventor Mark Eric Obrecht

Mark Eric Obrecht has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20230328097
    Abstract: Methods, devices, and systems disclosed herein measure endpoint user security event susceptibility (e.g., a malware infection) and provide information for endpoint posture evaluation. A relatively small software application may be installed using, for example, a systems management push system where the software runs on each endpoint system and reports back to a central repository or base system. The software runs on machines that it is pushed to and generates a score for that endpoint. That score is a quantification of endpoint user security risk, i.e., the likelihood that a particular endpoint is likely to be the source of a security event at some point in the future. This information may be used to generate a Relative Score for each endpoint so that the endpoints can be ranked from most secure to least secure and an Absolute Score so that a given distributed system can be compared to other distributed systems.
    Type: Application
    Filed: June 16, 2023
    Publication date: October 12, 2023
    Applicant: Six Engines, LLC
    Inventors: Mark Eric Obrecht, Robert Meyers, Taylor Crumpton
  • Patent number: 11683332
    Abstract: Methods, devices, and systems disclosed herein measure endpoint user security event susceptibility (e.g., a malware infection) and provide information for endpoint/user posture evaluation. A relatively small software application may be installed using, for example, a systems management push system where the software runs on each endpoint system and reports back to a central repository or base system. The software runs on machines that it is pushed to and generates a score for that endpoint. That score is a quantification of endpoint user security risk, i.e., the likelihood that a particular endpoint is likely to be the source of a security event at some point in the future. This information may be used to generate a Relative Score for each endpoint so that the endpoints can be ranked from most secure to least secure and an Absolute Score so that a given distributed system can be compared to other distributed systems.
    Type: Grant
    Filed: August 22, 2020
    Date of Patent: June 20, 2023
    Assignee: Six Engines, LLC
    Inventors: Mark Eric Obrecht, Robert Myers, Taylor Crumpton
  • Publication number: 20210058422
    Abstract: Methods, devices, and systems disclosed herein measure endpoint user security event susceptibility (e.g., a malware infection) and provide information for endpoint/user posture evaluation. A relatively small software application may be installed using, for example, a systems management push system where the software runs on each endpoint system and reports back to a central repository or base system. The software runs on machines that it is pushed to and generates a score for that endpoint. That score is a quantification of endpoint user security risk, i.e., the likelihood that a particular endpoint is likely to be the source of a security event at some point in the future. This information may be used to generate a Relative Score for each endpoint so that the endpoints can be ranked from most secure to least secure and an Absolute Score so that a given distributed system can be compared to other distributed systems.
    Type: Application
    Filed: August 22, 2020
    Publication date: February 25, 2021
    Inventors: Mark Eric Obrecht, Robert Myers, Taylor Crumpton
  • Patent number: 8205260
    Abstract: Various embodiments of a system and method for providing protection against malicious software programs are disclosed. The system and method may be operable to detect that a first window of a legitimate software program has been replaced by a second window of a malicious software program, e.g., where the second window includes features to mimic the first window in an effort to fool the user into inputting sensitive information into the second window. The method may operate to alert the user when the window replacement is detected.
    Type: Grant
    Filed: December 19, 2007
    Date of Patent: June 19, 2012
    Assignee: Symantec Operating Corporation
    Inventors: Mark Eric Obrecht, Vijay Bharti, Barrett Baxter
  • Patent number: 7832011
    Abstract: Malicious code detection code is executed by an information handling system. The malicious code detection code includes detection routines. The detection routines are applied to executable code under investigation. The detection routines associate weights to respective code under investigation in response to detections of a valid program or malicious code as a function of the detection routines. It is determined whether code under investigation is a valid program or malicious code as a function of the weights associated by the detection routines.
    Type: Grant
    Filed: August 25, 2003
    Date of Patent: November 9, 2010
    Assignee: Symantec Corporation
    Inventors: Mark Eric Obrecht, Michael Anthony Alagna, Charles Andrew Payne
  • Patent number: 7818800
    Abstract: Various embodiments of a system and method for blocking malicious program behaviors, such as keystroke logging behavior or screen capture behavior, are disclosed. Security software may execute on a computer system, where the security software is operable to monitor the computer system to detect malicious program behavior. In response to detecting a first condition indicating that monitoring of the computer system to detect malicious program behavior should be initiated, the security software automatically initiates monitoring of the computer system to detect malicious program behavior. After initiating the monitoring for malicious program behavior, the security software may detect malicious program behavior of a second program executing on the computer system and block the malicious program behavior of the second program.
    Type: Grant
    Filed: August 4, 2006
    Date of Patent: October 19, 2010
    Assignee: Symantec Corporation
    Inventors: David Glenn Lemley, III, Bret Michael Needle, Mark Eric Obrecht
  • Publication number: 20090165136
    Abstract: Various embodiments of a system and method for providing protection against malicious software programs are disclosed. The system and method may be operable to detect that a first window of a legitimate software program has been replaced by a second window of a malicious software program, e.g., where the second window includes features to mimic the first window in an effort to fool the user into inputting sensitive information into the second window. The method may operate to alert the user when the window replacement is detected.
    Type: Application
    Filed: December 19, 2007
    Publication date: June 25, 2009
    Inventors: Mark Eric Obrecht, Vijay Bharti, Barrett Baxter
  • Patent number: 7509679
    Abstract: From a first information handling system (“IHS”) to a second IHS, in response to a request for initiating an online transaction, a program is downloaded for detecting malicious code on the second IHS.
    Type: Grant
    Filed: January 30, 2004
    Date of Patent: March 24, 2009
    Assignee: Symantec Corporation
    Inventors: Michael Anthony Alagna, Mark Eric Obrecht, Charles Andrew Payne, Peter Norwood
  • Publication number: 20040187023
    Abstract: From a first information handling system (“IHS”) to a second IHS, in response to a request for initiating an online transaction, a program is downloaded for detecting malicious code on the second IHS.
    Type: Application
    Filed: January 30, 2004
    Publication date: September 23, 2004
    Applicant: WholeSecurity, Inc.
    Inventors: Michael Anthony Alagna, Mark Eric Obrecht, Charles Andrew Payne, Peter Norwood
  • Publication number: 20040064736
    Abstract: Malicious code detection code is executed by an information handling system. The malicious code detection code includes detection routines. The detection routines are applied to executable code under investigation. The detection routines associate weights to respective code under investigation in response to detections of a valid program or malicious code as a function of the detection routines. It is determined whether code under investigation is a valid program or malicious code as a function of the weights associated by the detection routines.
    Type: Application
    Filed: August 25, 2003
    Publication date: April 1, 2004
    Applicant: WholeSecurity, Inc.
    Inventors: Mark Eric Obrecht, Michael Anthony Alagna, Charles Andrew Payne