Patents by Inventor Mark Mager

Mark Mager has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 11995185
    Abstract: The present invention analyzes the text of a received file to determine if the file likely is a forensic artifact of a ransomware attack on a computer system. If the computer system concludes that the file is likely an artifact of a ransomware attack, the system suspends or terminates all related processes, thereby minimizing the harm caused to the computer system.
    Type: Grant
    Filed: April 15, 2022
    Date of Patent: May 28, 2024
    Assignee: Endgame, Inc.
    Inventor: Mark Mager
  • Publication number: 20220237292
    Abstract: The present invention analyzes the text of a received file to determine if the file likely is a forensic artifact of a ransomware attack on a computer system. If the computer system concludes that the file is likely an artifact of a ransomware attack, the system suspends or terminates all related processes, thereby minimizing the harm caused to the computer system.
    Type: Application
    Filed: April 15, 2022
    Publication date: July 28, 2022
    Inventor: Mark Mager
  • Patent number: 11308208
    Abstract: The present invention analyzes the text of a received file to determine if the file likely is a forensic artifact of a ransomware attack on a computer system. If the computer system concludes that the file is likely an artifact of a ransomware attack, the system terminates or ignores all related processes, thereby minimizing the harm caused to the computer system.
    Type: Grant
    Filed: July 31, 2019
    Date of Patent: April 19, 2022
    Assignee: Endgame, Inc.
    Inventor: Mark Mager
  • Publication number: 20200042705
    Abstract: The present invention analyzes the text of a received file to determine if the file likely is a forensic artifact of a ransomware attack on a computer system. If the computer system concludes that the file is likely an artifact of a ransomware attack, the system terminates or ignores all related processes, thereby minimizing the harm caused to the computer system.
    Type: Application
    Filed: July 31, 2019
    Publication date: February 6, 2020
    Inventor: Mark Mager