Patents by Inventor Melvyn Morris
Melvyn Morris has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Publication number: 20220284094Abstract: In one aspect, a method of classifying a computer object as malware includes receiving at a base computer data about a computer object from each of plural remote computers on which the object or similar objects are stored. The data about the computer object received from the plural computers is compared in the base computer. The computer object is classified as malware on the basis of said comparison. In one embodiment, the data about the computer object includes one or more of: executable instructions contained within or constituted by the object; the size of the object; the name of the object; the logical storage location or path of the object on the respective remote computers; the vendor of the object; the software product and version associated with the object; and, events initiated by or involving the object when the object is created, configured or runs on the respective remote computers.Type: ApplicationFiled: May 23, 2022Publication date: September 8, 2022Inventors: Melvyn Morris, Paul Stubbs, Markus Hartwig, Darren Harter
-
Patent number: 11379582Abstract: In one aspect, a method of classifying a computer object as malware includes receiving at a base computer data about a computer object from each of plural remote computers on which the object or similar objects are stored. The data about the computer object received from the plural computers is compared in the base computer. The computer object is classified as malware on the basis of said comparison. In one embodiment, the data about the computer object includes one or more of: executable instructions contained within or constituted by the object; the size of the object; the name of the object; the logical storage location or path of the object on the respective remote computers; the vendor of the object; the software product and version associated with the object; and, events initiated by or involving the object when the object is created, configured or runs on the respective remote computers.Type: GrantFiled: September 3, 2020Date of Patent: July 5, 2022Assignee: Webroot Inc.Inventors: Melvyn Morris, Paul Stubbs, Markus Hartwig, Darren Harter
-
Publication number: 20200401694Abstract: In one aspect, a method of classifying a computer object as malware includes receiving at a base computer data about a computer object from each of plural remote computers on which the object or similar objects are stored. The data about the computer object received from the plural computers is compared in the base computer. The computer object is classified as malware on the basis of said comparison. In one embodiment, the data about the computer object includes one or more of: executable instructions contained within or constituted by the object; the size of the object; the name of the object; the logical storage location or path of the object on the respective remote computers; the vendor of the object; the software product and version associated with the object; and, events initiated by or involving the object when the object is created, configured or runs on the respective remote computers.Type: ApplicationFiled: September 3, 2020Publication date: December 24, 2020Inventors: Melvyn Morris, Paul Stubbs, Markus Hartwig, Darren Harter
-
Patent number: 10803170Abstract: In one aspect, a method of classifying a computer object as malware includes receiving at a base computer data about a computer object from each of plural remote computers on which the object or similar objects are stored. The data about the computer object received from the plural computers is compared in the base computer. The computer object is classified as malware on the basis of said comparison. In one embodiment, the data about the computer object includes one or more of: executable instructions contained within or constituted by the object; the size of the object; the name of the object; the logical storage location or path of the object on the respective remote computers; the vendor of the object; the software product and version associated with the object; and, events initiated by or involving the object when the object is created, configured or runs on the respective remote computers.Type: GrantFiled: June 24, 2014Date of Patent: October 13, 2020Assignee: WEBROOT INC.Inventors: Melvyn Morris, Paul Stubbs, Markus Hartwig, Darren Harter
-
Publication number: 20200177552Abstract: Methods for classifying computer objects as malware and the associated apparatus are disclosed. An exemplary method includes, at a base computer, receiving data about a computer object from each of plural remote computers on which the object or similar objects are stored and or processed and counting the number of times in a given time period objects having one or more common attributes or behaviors that have been seen by the remote computers. The counted number is then compared with the expected number based on past observations, and if the comparison exceeds a predetermined threshold, the objects are flagged as unsafe or as suspicious.Type: ApplicationFiled: February 10, 2020Publication date: June 4, 2020Inventors: Melvyn Morris, Joseph Jaroch
-
Patent number: 10574630Abstract: Methods for classifying computer objects as malware and the associated apparatus are disclosed. An exemplary method includes, at a base computer, receiving data about a computer object from each of plural remote computers on which the object or similar objects are stored and or processed and counting the number of times in a given time period objects having one or more common attributes or behaviors that have been seen by the remote computers. The counted number is then compared with the expected number based on past observations, and if the comparison exceeds a predetermined threshold, the objects are flagged as unsafe or as suspicious.Type: GrantFiled: February 13, 2012Date of Patent: February 25, 2020Assignee: WEBROOT INC.Inventors: Melvyn Morris, Joseph Jaroch
-
Patent number: 9935817Abstract: Methods and apparatus for managing the expiration and execution of commands sent from a remote system having administration functions to an agent residing on a computer system are disclosed. An exemplary method includes receiving, at an agent, one or more commands, storing the one or more received commands, retrieving the one or more stored commands, and determining whether the one or more retrieved commands can be executed by comparing at least one time parameter associated with the agent to at least one time parameter associated with the one or more retrieved commands.Type: GrantFiled: August 8, 2016Date of Patent: April 3, 2018Assignee: Webroot Inc.Inventors: Joseph Jaroch, Melvyn Morris
-
Publication number: 20170033973Abstract: Methods and apparatus for managing the expiration and execution of commands sent from a remote system having administration functions to an agent residing on a computer system are disclosed. An exemplary method includes receiving, at an agent, one or more commands, storing the one or more received commands, retrieving the one or more stored commands, and determining whether the one or more retrieved commands can be executed by comparing at least one time parameter associated with the agent to at least one time parameter associated with the one or more retrieved commands.Type: ApplicationFiled: August 8, 2016Publication date: February 2, 2017Applicant: Webroot Inc.Inventors: Joseph Jaroch, Melvyn Morris
-
Patent number: 9413721Abstract: Methods for classifying computer objects as malware and the associated apparatus are disclosed. An exemplary method includes, at a base computer, receiving data about a computer object from each of plural remote computers on which the object or similar objects are stored or processed wherein the base computer comprises plural threat servers arranged to receive the data from the plural remote computers and apply rules or heuristics against the data in real time to determine whether or not the object is malware and to communicate the determination to the remote computers. The base computer includes at least one central server in communication with the threat servers and arranged to receive the data about objects from the threat servers to maintain a master database of data received about objects from all threat servers.Type: GrantFiled: February 13, 2012Date of Patent: August 9, 2016Assignee: WEBROOT INC.Inventors: Melvyn Morris, Joseph Jaroch
-
Patent number: 9413596Abstract: Examples provided relate to methods and apparatus for managing the expiration and execution of commands sent from a remote system having administration functions to an agent residing on a computer system. An exemplary method may include receiving, at an agent, one or more commands, storing the one or more received commands, retrieving the one or more stored commands, and determining whether the one or more retrieved commands can be executed by comparing at least one time parameter associated with the agent to at least one time parameter associated with the one or more retrieved commands.Type: GrantFiled: January 10, 2013Date of Patent: August 9, 2016Assignee: WEBROOT INC.Inventors: Joseph Jaroch, Melvyn Morris
-
Publication number: 20150007327Abstract: In one aspect, a method of classifying a computer object as malware includes receiving at a base computer data about a computer object from each of plural remote computers on which the object or similar objects are stored. The data about the computer object received from the plural computers is compared in the base computer. The computer object is classified as malware on the basis of said comparison. In one embodiment, the data about the computer object includes one or more of: executable instructions contained within or constituted by the object; the size of the object; the name of the object; the logical storage location or path of the object on the respective remote computers; the vendor of the object; the software product and version associated with the object; and, events initiated by or involving the object when the object is created, configured or runs on the respective remote computers.Type: ApplicationFiled: June 24, 2014Publication date: January 1, 2015Inventors: Melvyn Morris, Paul Stubbs, Markus Hartwig, Darren Harter
-
Publication number: 20140304800Abstract: Methods and apparatus for providing protection against malware are disclosed. An exemplary method includes executing an agent program on a remote computer connected to a network, the agent program being configured to communicate with a base computer via the network, the agent program including a firewall arranged to block communications between the remote computer and entities on the network in accordance with predetermined rules; and configuring the firewall in accordance with rules received from the base computer.Type: ApplicationFiled: May 23, 2014Publication date: October 9, 2014Applicant: Webroot Inc.Inventors: Melvyn Morris, Joseph Jaroch
-
Publication number: 20140195659Abstract: Methods and apparatus for managing the expiration and execution of commands sent from a remote system having administration functions to an agent residing on a computer system are disclosed. An exemplary method includes receiving, at an agent, one or more commands, storing the one or more received commands, retrieving the one or more stored commands, and determining whether the one or more retrieved commands can be executed by comparing at least one time parameter associated with the agent to at least one time parameter associated with the one or more retrieved commands.Type: ApplicationFiled: January 10, 2013Publication date: July 10, 2014Applicant: WEBROOT INC.Inventors: Joseph Jaroch, Melvyn Morris
-
Patent number: 8763123Abstract: In one aspect, a method of determining the protection that a remote computer has from malware includes receiving at a base computer, details of all or selected security products operating on a remote computer, receiving similar information from other remote computers, and identifying malware process that were not identified by the security products installed on the other remote computers and having a same or similar combination of security products installed on the remote computer.Type: GrantFiled: July 8, 2012Date of Patent: June 24, 2014Assignee: Prevx LimitedInventors: Melvyn Morris, Paul Stubbs, Markus Hartwig, Darren Harter
-
Patent number: 8726389Abstract: In one aspect, a method of classifying a computer object as malware includes receiving at a base computer data about a computer object from each of plural remote computers on which the object or similar objects are stored. The data about the computer object received from the plural computers is compared in the base computer. The computer object is classified as malware on the basis of said comparison. In one embodiment, the data about the computer object includes one or more of: executable instructions contained within or constituted by the object; the size of the object; the name of the object; the logical storage location or path of the object on the respective remote computers; the vendor of the object; the software product and version associated with the object; and, events initiated by or involving the object when the object is created, configured or runs on the respective remote computers.Type: GrantFiled: July 8, 2012Date of Patent: May 13, 2014Assignee: Prevx LimitedInventors: Melvyn Morris, Paul Stubbs, Markus Hartwig, Darren Harter
-
Patent number: 8418250Abstract: In one aspect, a method of classifying a computer object as malware includes receiving at a base computer data about a computer object from each of plural remote computers on which the object or similar objects are stored. The data about the computer object received from the plural computers is compared in the base computer. The computer object is classified as malware on the basis of said comparison. In one embodiment, the data about the computer object includes one or more of: executable instructions contained within or constituted by the object; the size of the object; the name of the object; the logical storage location or path of the object on the respective remote computers; the vendor of the object; the software product and version associated with the object; and, events initiated by or involving the object when the object is created, configured or runs on the respective remote computers.Type: GrantFiled: June 30, 2006Date of Patent: April 9, 2013Assignee: Prevx LimitedInventors: Melvyn Morris, Paul Stubbs, Markus Hartwig, Darren Harter
-
Publication number: 20120278895Abstract: In one aspect, a method of classifying a computer object as malware includes receiving at a base computer data about a computer object from each of plural remote computers on which the object or similar objects are stored. The data about the computer object received from the plural computers is compared in the base computer. The computer object is classified as malware on the basis of said comparison. In one embodiment, the data about the computer object includes one or more of: executable instructions contained within or constituted by the object; the size of the object; the name of the object; the logical storage location or path of the object on the respective remote computers; the vendor of the object; the software product and version associated with the object; and, events initiated by or involving the object when the object is created, configured or runs on the respective remote computers.Type: ApplicationFiled: July 8, 2012Publication date: November 1, 2012Applicant: PREVX LTD.Inventors: Melvyn Morris, Paul Stubbs, Markus Hartwig, Darren Harter
-
Publication number: 20120278891Abstract: In one aspect, a method of classifying a computer object as malware includes receiving at a base computer data about a computer object from each of plural remote computers on which the object or similar objects are stored. The data about the computer object received from the plural computers is compared in the base computer. The computer object is classified as malware on the basis of said comparison. In one embodiment, the data about the computer object includes one or more of: executable instructions contained within or constituted by the object; the size of the object; the name of the object; the logical storage location or path of the object on the respective remote computers; the vendor of the object; the software product and version associated with the object; and, events initiated by or involving the object when the object is created, configured or runs on the respective remote computers.Type: ApplicationFiled: July 8, 2012Publication date: November 1, 2012Applicant: PREVX LTD.Inventors: Melvyn Morris, Paul Stubbs, Markus Hartwig, Darren Harter
-
Publication number: 20120266208Abstract: Methods for classifying computer objects as malware and the associated apparatus are disclosed. An exemplary method includes, at a base computer, receiving data about a computer object from each of plural remote computers on which the object or similar objects are stored and or processed and counting the number of times in a given time period objects having one or more common attributes or behaviors that have been seen by the remote computers. The counted number is then compared with the expected number based on past observations, and if the comparison exceeds a predetermined threshold, the objects are flagged as unsafe or as suspicious.Type: ApplicationFiled: February 13, 2012Publication date: October 18, 2012Applicant: WEBROOT INC.Inventors: Melvyn Morris, Joseph Jaroch
-
Publication number: 20120260304Abstract: Methods and apparatus for providing protection against malware are disclosed. An exemplary method includes executing an agent program on a remote computer connected to a network, the agent program being configured to communicate with a base computer via the network, the agent program including a firewall arranged to block communications between the remote computer and entities on the network in accordance with predetermined rules; and configuring the firewall in accordance with rules received from the base computer.Type: ApplicationFiled: February 13, 2012Publication date: October 11, 2012Applicant: WEBROOT INC.Inventors: Melvyn Morris, Joseph Jaroch