Patents by Inventor Mauritius Schmidtler

Mauritius Schmidtler has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20240119178
    Abstract: Systems and methods for anonymizing personal information are provided. A set of data may be received that includes a first subset of data that corresponds to a unique identifier, a second subset of data that corresponds to a timestamp, and a third subset of data that corresponds to a personal identifiable information (PII) record. The PII record may include a plurality of fields, one or more of which may include values. The set of data may be pre-processed. A respective embedding may be generated, for each value of a respective field, of the plurality of fields, that includes a value. The pre-processed set of data may be anonymized to generate an anonymized set of data, in the form of a graph structure. The graph structure may be stored in a database, and a fraud risk model may be trained, based on the database.
    Type: Application
    Filed: October 6, 2023
    Publication date: April 11, 2024
    Inventors: Mauritius Schmidtler, Hal Lonas, Chahm An, Nathan Russo, Etienne Doidic
  • Publication number: 20240054218
    Abstract: Aspects of the present disclosure are operable to protect against malicious objects, such as JavaScript code, which may be encountered, downloaded, or otherwise accessed from a content source by a computing system. In an example, antivirus software implementing aspects disclosed herein may be capable of detecting malicious objects in real-time. Aspects of the present disclosure aim to reduce the amount of time used to detect malicious code while maintaining detection accuracy, as detection delays and/or a high false positive rate may result in a negative user experience. Among other benefits, the systems and methods disclosed herein are operable to identify malicious objects encountered by a computing system while maintaining a high detection rate, a low false positive rate, and a high scanning speed.
    Type: Application
    Filed: October 26, 2023
    Publication date: February 15, 2024
    Inventors: Mauritius A. Schmidtler, Yuanhang Huang, Chahm An
  • Patent number: 11841950
    Abstract: Aspects of the present disclosure are operable to protect against malicious objects, such as JavaScript code, which may be encountered, downloaded, or otherwise accessed from a content source by a computing system. In an example, antivirus software implementing aspects disclosed herein may be capable of detecting malicious objects in real-time. Aspects of the present disclosure aim to reduce the amount of time used to detect malicious code while maintaining detection accuracy, as detection delays and/or a high false positive rate may result in a negative user experience. Among other benefits, the systems and methods disclosed herein are operable to identify malicious objects encountered by a computing system while maintaining a high detection rate, a low false positive rate, and a high scanning speed.
    Type: Grant
    Filed: December 21, 2020
    Date of Patent: December 12, 2023
    Assignee: OPEN TEXT, INC.
    Inventors: Mauritius A. Schmidtler, Yuanhang Huang, Chahm An
  • Patent number: 11409869
    Abstract: Aspects of the present disclosure relate to threat detection of executable files. A plurality of static data points may be extracted from an executable file without decrypting or unpacking the executable file. The executable file may then be analyzed without decrypting or unpacking the executable file. Analysis of the executable file may comprise applying a classifier to the plurality of extracted static data points. The classifier may be trained from data comprising known malicious executable files, known benign executable files and known unwanted executable files. Based upon analysis of the executable file, a determination can be made as to whether the executable file is harmful.
    Type: Grant
    Filed: February 14, 2020
    Date of Patent: August 9, 2022
    Assignee: Webroot Inc.
    Inventors: Mauritius Schmidtler, Gaurav Dalal, Reza Yoosoofmiya
  • Publication number: 20220237293
    Abstract: Aspects of the present disclosure relate to threat detection of executable files. A plurality of static data points may be extracted from an executable file without decrypting or unpacking the executable file. The executable file may then be analyzed without decrypting or unpacking the executable file. Analysis of the executable file may comprise applying a classifier to the plurality of extracted static data points. The classifier may be trained from data comprising known malicious executable files, known benign executable files and known unwanted executable files. Based upon analysis of the executable file, a determination can be made as to whether the executable file is harmful.
    Type: Application
    Filed: April 19, 2022
    Publication date: July 28, 2022
    Inventors: Mauritius Schmidtler, Gaurav Dalal, Reza Yoosoofmiya
  • Publication number: 20210194900
    Abstract: Examples of the present disclosure describe systems and methods of automatic inline detection based on static data. In aspects, a file being received by a recipient device may be analyzed using an inline parser. The inline parser may identify sections of the file and feature vectors may be created for the identified sections. The feature vectors may be used to calculate a score corresponding to the malicious status of the file as the information is being analyzed. If a score is determined to exceed a predetermined threshold, the file download process may be terminated. In aspects, the received files, file fragments, feature vectors and/or additional data may be collected and analyzed to build a probabilistic model used to identify potentially malicious files.
    Type: Application
    Filed: March 3, 2021
    Publication date: June 24, 2021
    Inventors: Mauritius Schmidtler, Reza M. Yoosoofmiya, Kristina Theroux
  • Publication number: 20210110039
    Abstract: Aspects of the present disclosure are operable to protect against malicious objects, such as JavaScript code, which may be encountered, downloaded, or otherwise accessed from a content source by a computing system. In an example, antivirus software implementing aspects disclosed herein may be capable of detecting malicious objects in real-time. Aspects of the present disclosure aim to reduce the amount of time used to detect malicious code while maintaining detection accuracy, as detection delays and/or a high false positive rate may result in a negative user experience. Among other benefits, the systems and methods disclosed herein are operable to identify malicious objects encountered by a computing system while maintaining a high detection rate, a low false positive rate, and a high scanning speed.
    Type: Application
    Filed: December 21, 2020
    Publication date: April 15, 2021
    Inventors: Mauritius A. Schmidtler, Yuanhang Huang, Chahm An
  • Patent number: 10972482
    Abstract: Examples of the present disclosure describe systems and methods of automatic inline detection based on static data. In aspects, a file being received by a recipient device may be analyzed using an inline parser. The inline parser may identify sections of the file and feature vectors may be created for the identified sections. The feature vectors may be used to calculate a score corresponding to the malicious status of the file as the information is being analyzed. If a score is determined to exceed a predetermined threshold, the file download process may be terminated. In aspects, the received files, file fragments, feature vectors and/or additional data may be collected and analyzed to build a probabilistic model used to identify potentially malicious files.
    Type: Grant
    Filed: July 5, 2016
    Date of Patent: April 6, 2021
    Assignee: WEBROOT INC.
    Inventors: Mauritius Schmidtler, Reza M. Yoosoofmiya, Kristina Theroux
  • Patent number: 10902124
    Abstract: Aspects of the present disclosure are operable to protect against malicious objects, such as JavaScript code, which may be encountered, downloaded, or otherwise accessed from a content source by a computing system. In an example, antivirus software implementing aspects disclosed herein may be capable of detecting malicious objects in real-time. Aspects of the present disclosure aim to reduce the amount of time used to detect malicious code while maintaining detection accuracy, as detection delays and/or a high false positive rate may result in a negative user experience. Among other benefits, the systems and methods disclosed herein are operable to identify malicious objects encountered by a computing system while maintaining a high detection rate, a low false positive rate, and a high scanning speed.
    Type: Grant
    Filed: January 31, 2018
    Date of Patent: January 26, 2021
    Assignee: WEBROOT INC.
    Inventors: Mauritius A. Schmidtler, Yuanhang Huang, Chahm An
  • Publication number: 20200184073
    Abstract: Aspects of the present disclosure relate to threat detection of executable files. A plurality of static data points may be extracted from an executable file without decrypting or unpacking the executable file. The executable file may then be analyzed without decrypting or unpacking the executable file. Analysis of the executable file may comprise applying a classifier to the plurality of extracted static data points. The classifier may be trained from data comprising known malicious executable files, known benign executable files and known unwanted executable files. Based upon analysis of the executable file, a determination can be made as to whether the executable file is harmful.
    Type: Application
    Filed: February 14, 2020
    Publication date: June 11, 2020
    Inventors: Mauritius Schmidtler, Gaurav Dalal, Reza Yoosoofmiya
  • Patent number: 10599844
    Abstract: Aspects of the present disclosure relate to threat detection of executable files. A plurality of static data points may be extracted from an executable file without decrypting or unpacking the executable file. The executable file may then be analyzed without decrypting or unpacking the executable file. Analysis of the executable file may comprise applying a classifier to the plurality of extracted static data points. The classifier may be trained from data comprising known malicious executable files, known benign executable files and known unwanted executable files. Based upon analysis of the executable file, a determination can be made as to whether the executable file is harmful.
    Type: Grant
    Filed: May 12, 2015
    Date of Patent: March 24, 2020
    Assignee: Webroot, Inc.
    Inventors: Mauritius Schmidtler, Gaurav Dalal, Reza Yoosoofmiya
  • Publication number: 20190087574
    Abstract: Aspects of the present disclosure are operable to protect against malicious objects, such as JavaScript code, which may be encountered, downloaded, or otherwise accessed from a content source by a computing system. In an example, antivirus software implementing aspects disclosed herein may be capable of detecting malicious objects in real-time. Aspects of the present disclosure aim to reduce the amount of time used to detect malicious code while maintaining detection accuracy, as detection delays and/or a high false positive rate may result in a negative user experience. Among other benefits, the systems and methods disclosed herein are operable to identify malicious objects encountered by a computing system while maintaining a high detection rate, a low false positive rate, and a high scanning speed.
    Type: Application
    Filed: January 31, 2018
    Publication date: March 21, 2019
    Applicant: Webroot Inc.
    Inventors: Mauritius A. Schmidtler, Yuanhang Huang, Chahm An
  • Publication number: 20180013772
    Abstract: Examples of the present disclosure describe systems and methods of automatic inline detection based on static data. In aspects, a file being received by a recipient device may be analyzed using an inline parser. The inline parser may identify sections of the file and feature vectors may be created for the identified sections. The feature vectors may be used to calculate a score corresponding to the malicious status of the file as the information is being analyzed. If a score is determined to exceed a predetermined threshold, the file download process may be terminated. In aspects, the received files, file fragments, feature vectors and/or additional data may be collected and analyzed to build a probabilistic model used to identify potentially malicious files.
    Type: Application
    Filed: July 5, 2016
    Publication date: January 11, 2018
    Applicant: Webroot Inc.
    Inventors: Mauritius Schmidtler, Reza M. Yoosoofmiya, Kristina Theroux
  • Publication number: 20160335435
    Abstract: Aspects of the present disclosure relate to threat detection of executable files. A plurality of static data points may be extracted from an executable file without decrypting or unpacking the executable file. The executable file may then be analyzed without decrypting or unpacking the executable file. Analysis of the executable file may comprise applying a classifier to the plurality of extracted static data points. The classifier may be trained from data comprising known malicious executable files, known benign executable files and known unwanted executable files. Based upon analysis of the executable file, a determination can be made as to whether the executable file is harmful.
    Type: Application
    Filed: May 12, 2015
    Publication date: November 17, 2016
    Inventors: Mauritius Schmidtler, Gaurav Dalal, Reza Yoosoofmiya
  • Publication number: 20060215231
    Abstract: An efficient method and system to enhance digital acquisition devices for analog data is presented. The enhancements offered by the method and system are available to the user in local as well as in remote deployments yielding efficiency gains for a large variety of business processes. The quality enhancements of the acquired digital data are achieved efficiently by employing virtual reacquisition. The method of virtual reacquisition renders unnecessary the physical reacquisition of the analog data in case the digital data obtained by the acquisition device are of insufficient quality. The method and system allows multiple users to access the same acquisition device for analog data. In some embodiments, one or more users can virtually reacquire data provided by multiple analog or digital sources. The acquired raw data can be processed by each user according to his personal preferences and/or requirements.
    Type: Application
    Filed: January 11, 2006
    Publication date: September 28, 2006
    Inventors: Roland Borrey, Mauritius Schmidtler, Robert Taylor, Joel Fechter, Hari Asuri
  • Publication number: 20060215230
    Abstract: An efficient method and system to enhance digital acquisition devices for analog data is presented. The enhancements offered by the method and system are available to the user in local as well as in remote deployments yielding efficiency gains for a large variety of business processes. The quality enhancements of the acquired digital data are achieved efficiently by employing virtual reacquisition. The method of virtual reacquisition renders unnecessary the physical reacquisition of the analog data in case the digital data obtained by the acquisition device are of insufficient quality. The method and system allows multiple users to access the same acquisition device for analog data. In some embodiments, one or more users can virtually reacquire data provided by multiple analog or digital sources. The acquired raw data can be processed by each user according to his personal preferences and/or requirements.
    Type: Application
    Filed: January 11, 2006
    Publication date: September 28, 2006
    Inventors: Roland Borrey, Mauritius Schmidtler, Robert Taylor, Joel Fechter, Hari Asuri
  • Publication number: 20050134935
    Abstract: A method and system for delineating document boundaries and identifying document types by analyzing digital images of one or more documents, automatically categorizing one or more pages or subdocuments within the one or more documents and automatically generating delineation identifiers, such as computer-generated images of separation pages inserted between digital images belonging to different categories, a description of the categorization sequence of the digital images, or a computer-generated electronic label affixed or associated with said digital images.
    Type: Application
    Filed: December 19, 2003
    Publication date: June 23, 2005
    Inventors: Mauritius Schmidtler, Scott Texeira, Christopher Harris, Sameer Samat, Roland Borrey, Anthony Macciola