Patents by Inventor Melvyn Morris

Melvyn Morris has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20220284094
    Abstract: In one aspect, a method of classifying a computer object as malware includes receiving at a base computer data about a computer object from each of plural remote computers on which the object or similar objects are stored. The data about the computer object received from the plural computers is compared in the base computer. The computer object is classified as malware on the basis of said comparison. In one embodiment, the data about the computer object includes one or more of: executable instructions contained within or constituted by the object; the size of the object; the name of the object; the logical storage location or path of the object on the respective remote computers; the vendor of the object; the software product and version associated with the object; and, events initiated by or involving the object when the object is created, configured or runs on the respective remote computers.
    Type: Application
    Filed: May 23, 2022
    Publication date: September 8, 2022
    Inventors: Melvyn Morris, Paul Stubbs, Markus Hartwig, Darren Harter
  • Patent number: 11379582
    Abstract: In one aspect, a method of classifying a computer object as malware includes receiving at a base computer data about a computer object from each of plural remote computers on which the object or similar objects are stored. The data about the computer object received from the plural computers is compared in the base computer. The computer object is classified as malware on the basis of said comparison. In one embodiment, the data about the computer object includes one or more of: executable instructions contained within or constituted by the object; the size of the object; the name of the object; the logical storage location or path of the object on the respective remote computers; the vendor of the object; the software product and version associated with the object; and, events initiated by or involving the object when the object is created, configured or runs on the respective remote computers.
    Type: Grant
    Filed: September 3, 2020
    Date of Patent: July 5, 2022
    Assignee: Webroot Inc.
    Inventors: Melvyn Morris, Paul Stubbs, Markus Hartwig, Darren Harter
  • Publication number: 20200401694
    Abstract: In one aspect, a method of classifying a computer object as malware includes receiving at a base computer data about a computer object from each of plural remote computers on which the object or similar objects are stored. The data about the computer object received from the plural computers is compared in the base computer. The computer object is classified as malware on the basis of said comparison. In one embodiment, the data about the computer object includes one or more of: executable instructions contained within or constituted by the object; the size of the object; the name of the object; the logical storage location or path of the object on the respective remote computers; the vendor of the object; the software product and version associated with the object; and, events initiated by or involving the object when the object is created, configured or runs on the respective remote computers.
    Type: Application
    Filed: September 3, 2020
    Publication date: December 24, 2020
    Inventors: Melvyn Morris, Paul Stubbs, Markus Hartwig, Darren Harter
  • Patent number: 10803170
    Abstract: In one aspect, a method of classifying a computer object as malware includes receiving at a base computer data about a computer object from each of plural remote computers on which the object or similar objects are stored. The data about the computer object received from the plural computers is compared in the base computer. The computer object is classified as malware on the basis of said comparison. In one embodiment, the data about the computer object includes one or more of: executable instructions contained within or constituted by the object; the size of the object; the name of the object; the logical storage location or path of the object on the respective remote computers; the vendor of the object; the software product and version associated with the object; and, events initiated by or involving the object when the object is created, configured or runs on the respective remote computers.
    Type: Grant
    Filed: June 24, 2014
    Date of Patent: October 13, 2020
    Assignee: WEBROOT INC.
    Inventors: Melvyn Morris, Paul Stubbs, Markus Hartwig, Darren Harter
  • Publication number: 20200177552
    Abstract: Methods for classifying computer objects as malware and the associated apparatus are disclosed. An exemplary method includes, at a base computer, receiving data about a computer object from each of plural remote computers on which the object or similar objects are stored and or processed and counting the number of times in a given time period objects having one or more common attributes or behaviors that have been seen by the remote computers. The counted number is then compared with the expected number based on past observations, and if the comparison exceeds a predetermined threshold, the objects are flagged as unsafe or as suspicious.
    Type: Application
    Filed: February 10, 2020
    Publication date: June 4, 2020
    Inventors: Melvyn Morris, Joseph Jaroch
  • Patent number: 10574630
    Abstract: Methods for classifying computer objects as malware and the associated apparatus are disclosed. An exemplary method includes, at a base computer, receiving data about a computer object from each of plural remote computers on which the object or similar objects are stored and or processed and counting the number of times in a given time period objects having one or more common attributes or behaviors that have been seen by the remote computers. The counted number is then compared with the expected number based on past observations, and if the comparison exceeds a predetermined threshold, the objects are flagged as unsafe or as suspicious.
    Type: Grant
    Filed: February 13, 2012
    Date of Patent: February 25, 2020
    Assignee: WEBROOT INC.
    Inventors: Melvyn Morris, Joseph Jaroch
  • Patent number: 9935817
    Abstract: Methods and apparatus for managing the expiration and execution of commands sent from a remote system having administration functions to an agent residing on a computer system are disclosed. An exemplary method includes receiving, at an agent, one or more commands, storing the one or more received commands, retrieving the one or more stored commands, and determining whether the one or more retrieved commands can be executed by comparing at least one time parameter associated with the agent to at least one time parameter associated with the one or more retrieved commands.
    Type: Grant
    Filed: August 8, 2016
    Date of Patent: April 3, 2018
    Assignee: Webroot Inc.
    Inventors: Joseph Jaroch, Melvyn Morris
  • Publication number: 20170033973
    Abstract: Methods and apparatus for managing the expiration and execution of commands sent from a remote system having administration functions to an agent residing on a computer system are disclosed. An exemplary method includes receiving, at an agent, one or more commands, storing the one or more received commands, retrieving the one or more stored commands, and determining whether the one or more retrieved commands can be executed by comparing at least one time parameter associated with the agent to at least one time parameter associated with the one or more retrieved commands.
    Type: Application
    Filed: August 8, 2016
    Publication date: February 2, 2017
    Applicant: Webroot Inc.
    Inventors: Joseph Jaroch, Melvyn Morris
  • Patent number: 9413721
    Abstract: Methods for classifying computer objects as malware and the associated apparatus are disclosed. An exemplary method includes, at a base computer, receiving data about a computer object from each of plural remote computers on which the object or similar objects are stored or processed wherein the base computer comprises plural threat servers arranged to receive the data from the plural remote computers and apply rules or heuristics against the data in real time to determine whether or not the object is malware and to communicate the determination to the remote computers. The base computer includes at least one central server in communication with the threat servers and arranged to receive the data about objects from the threat servers to maintain a master database of data received about objects from all threat servers.
    Type: Grant
    Filed: February 13, 2012
    Date of Patent: August 9, 2016
    Assignee: WEBROOT INC.
    Inventors: Melvyn Morris, Joseph Jaroch
  • Patent number: 9413596
    Abstract: Examples provided relate to methods and apparatus for managing the expiration and execution of commands sent from a remote system having administration functions to an agent residing on a computer system. An exemplary method may include receiving, at an agent, one or more commands, storing the one or more received commands, retrieving the one or more stored commands, and determining whether the one or more retrieved commands can be executed by comparing at least one time parameter associated with the agent to at least one time parameter associated with the one or more retrieved commands.
    Type: Grant
    Filed: January 10, 2013
    Date of Patent: August 9, 2016
    Assignee: WEBROOT INC.
    Inventors: Joseph Jaroch, Melvyn Morris
  • Publication number: 20150007327
    Abstract: In one aspect, a method of classifying a computer object as malware includes receiving at a base computer data about a computer object from each of plural remote computers on which the object or similar objects are stored. The data about the computer object received from the plural computers is compared in the base computer. The computer object is classified as malware on the basis of said comparison. In one embodiment, the data about the computer object includes one or more of: executable instructions contained within or constituted by the object; the size of the object; the name of the object; the logical storage location or path of the object on the respective remote computers; the vendor of the object; the software product and version associated with the object; and, events initiated by or involving the object when the object is created, configured or runs on the respective remote computers.
    Type: Application
    Filed: June 24, 2014
    Publication date: January 1, 2015
    Inventors: Melvyn Morris, Paul Stubbs, Markus Hartwig, Darren Harter
  • Publication number: 20140304800
    Abstract: Methods and apparatus for providing protection against malware are disclosed. An exemplary method includes executing an agent program on a remote computer connected to a network, the agent program being configured to communicate with a base computer via the network, the agent program including a firewall arranged to block communications between the remote computer and entities on the network in accordance with predetermined rules; and configuring the firewall in accordance with rules received from the base computer.
    Type: Application
    Filed: May 23, 2014
    Publication date: October 9, 2014
    Applicant: Webroot Inc.
    Inventors: Melvyn Morris, Joseph Jaroch
  • Publication number: 20140195659
    Abstract: Methods and apparatus for managing the expiration and execution of commands sent from a remote system having administration functions to an agent residing on a computer system are disclosed. An exemplary method includes receiving, at an agent, one or more commands, storing the one or more received commands, retrieving the one or more stored commands, and determining whether the one or more retrieved commands can be executed by comparing at least one time parameter associated with the agent to at least one time parameter associated with the one or more retrieved commands.
    Type: Application
    Filed: January 10, 2013
    Publication date: July 10, 2014
    Applicant: WEBROOT INC.
    Inventors: Joseph Jaroch, Melvyn Morris
  • Patent number: 8763123
    Abstract: In one aspect, a method of determining the protection that a remote computer has from malware includes receiving at a base computer, details of all or selected security products operating on a remote computer, receiving similar information from other remote computers, and identifying malware process that were not identified by the security products installed on the other remote computers and having a same or similar combination of security products installed on the remote computer.
    Type: Grant
    Filed: July 8, 2012
    Date of Patent: June 24, 2014
    Assignee: Prevx Limited
    Inventors: Melvyn Morris, Paul Stubbs, Markus Hartwig, Darren Harter
  • Patent number: 8726389
    Abstract: In one aspect, a method of classifying a computer object as malware includes receiving at a base computer data about a computer object from each of plural remote computers on which the object or similar objects are stored. The data about the computer object received from the plural computers is compared in the base computer. The computer object is classified as malware on the basis of said comparison. In one embodiment, the data about the computer object includes one or more of: executable instructions contained within or constituted by the object; the size of the object; the name of the object; the logical storage location or path of the object on the respective remote computers; the vendor of the object; the software product and version associated with the object; and, events initiated by or involving the object when the object is created, configured or runs on the respective remote computers.
    Type: Grant
    Filed: July 8, 2012
    Date of Patent: May 13, 2014
    Assignee: Prevx Limited
    Inventors: Melvyn Morris, Paul Stubbs, Markus Hartwig, Darren Harter
  • Patent number: 8418250
    Abstract: In one aspect, a method of classifying a computer object as malware includes receiving at a base computer data about a computer object from each of plural remote computers on which the object or similar objects are stored. The data about the computer object received from the plural computers is compared in the base computer. The computer object is classified as malware on the basis of said comparison. In one embodiment, the data about the computer object includes one or more of: executable instructions contained within or constituted by the object; the size of the object; the name of the object; the logical storage location or path of the object on the respective remote computers; the vendor of the object; the software product and version associated with the object; and, events initiated by or involving the object when the object is created, configured or runs on the respective remote computers.
    Type: Grant
    Filed: June 30, 2006
    Date of Patent: April 9, 2013
    Assignee: Prevx Limited
    Inventors: Melvyn Morris, Paul Stubbs, Markus Hartwig, Darren Harter
  • Publication number: 20120278895
    Abstract: In one aspect, a method of classifying a computer object as malware includes receiving at a base computer data about a computer object from each of plural remote computers on which the object or similar objects are stored. The data about the computer object received from the plural computers is compared in the base computer. The computer object is classified as malware on the basis of said comparison. In one embodiment, the data about the computer object includes one or more of: executable instructions contained within or constituted by the object; the size of the object; the name of the object; the logical storage location or path of the object on the respective remote computers; the vendor of the object; the software product and version associated with the object; and, events initiated by or involving the object when the object is created, configured or runs on the respective remote computers.
    Type: Application
    Filed: July 8, 2012
    Publication date: November 1, 2012
    Applicant: PREVX LTD.
    Inventors: Melvyn Morris, Paul Stubbs, Markus Hartwig, Darren Harter
  • Publication number: 20120278891
    Abstract: In one aspect, a method of classifying a computer object as malware includes receiving at a base computer data about a computer object from each of plural remote computers on which the object or similar objects are stored. The data about the computer object received from the plural computers is compared in the base computer. The computer object is classified as malware on the basis of said comparison. In one embodiment, the data about the computer object includes one or more of: executable instructions contained within or constituted by the object; the size of the object; the name of the object; the logical storage location or path of the object on the respective remote computers; the vendor of the object; the software product and version associated with the object; and, events initiated by or involving the object when the object is created, configured or runs on the respective remote computers.
    Type: Application
    Filed: July 8, 2012
    Publication date: November 1, 2012
    Applicant: PREVX LTD.
    Inventors: Melvyn Morris, Paul Stubbs, Markus Hartwig, Darren Harter
  • Publication number: 20120266208
    Abstract: Methods for classifying computer objects as malware and the associated apparatus are disclosed. An exemplary method includes, at a base computer, receiving data about a computer object from each of plural remote computers on which the object or similar objects are stored and or processed and counting the number of times in a given time period objects having one or more common attributes or behaviors that have been seen by the remote computers. The counted number is then compared with the expected number based on past observations, and if the comparison exceeds a predetermined threshold, the objects are flagged as unsafe or as suspicious.
    Type: Application
    Filed: February 13, 2012
    Publication date: October 18, 2012
    Applicant: WEBROOT INC.
    Inventors: Melvyn Morris, Joseph Jaroch
  • Publication number: 20120260304
    Abstract: Methods and apparatus for providing protection against malware are disclosed. An exemplary method includes executing an agent program on a remote computer connected to a network, the agent program being configured to communicate with a base computer via the network, the agent program including a firewall arranged to block communications between the remote computer and entities on the network in accordance with predetermined rules; and configuring the firewall in accordance with rules received from the base computer.
    Type: Application
    Filed: February 13, 2012
    Publication date: October 11, 2012
    Applicant: WEBROOT INC.
    Inventors: Melvyn Morris, Joseph Jaroch